This topic includes release notes for Linux stemcells used with Tanzu Operations Manager.

Jammy Stemcells

The following sections describe each Jammy stemcell release.

1.x

This section includes release notes for the 1.x line of Linux stemcells used with Tanzu Operations Manager.

1.486

Available in the Broadcom Support portal

Release Date: July 02, 2024

Metadata:

BOSH Agent Version: 2.663.0
Kernel Version: 5.15.0.113.113

USNs:


Title: USN-6847-1: libheif vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6847-1
Priorities: medium
Description:
It was discovered that libheif incorrectly handled certain image data.
An attacker could possibly use this issue to crash the program, resulting
in a denial of service. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-11471)

Reza Mirzazade Farkhani discovered that libheif incorrectly handled
certain image data. An attacker could possibly use this issue to crash the
program, resulting in a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2020-23109)

Eugene Lim discovered that libheif incorrectly handled certain image data.
An attacker could possibly use this issue to crash the program, resulting
in a denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-0996)

Min Jang discovered that libheif incorrectly handled certain image data.
An attacker could possibly use this issue to crash the program, resulting
in a denial of service. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-29659)

Yuchuan Meng discovered that libheif incorrectly handled certain image data.
An attacker could possibly use this issue to crash the program, resulting
in a denial of service. This issue only affected Ubuntu 23.10.
(CVE-2023-49460, CVE-2023-49462, CVE-2023-49463, CVE-2023-49464)
CVEs:
- https://ubuntu.com/security/CVE-2019-11471
- https://ubuntu.com/security/CVE-2020-23109
- https://ubuntu.com/security/CVE-2023-0996
- https://ubuntu.com/security/CVE-2023-29659
- https://ubuntu.com/security/CVE-2023-49460
- https://ubuntu.com/security/CVE-2023-49462
- https://ubuntu.com/security/CVE-2023-49463
- https://ubuntu.com/security/CVE-2023-49464
- https://ubuntu.com/security/CVE-2023-49463
- https://ubuntu.com/security/CVE-2020-23109
- https://ubuntu.com/security/CVE-2023-49464
- https://ubuntu.com/security/CVE-2023-29659
- https://ubuntu.com/security/CVE-2023-49462
- https://ubuntu.com/security/CVE-2019-11471
- https://ubuntu.com/security/CVE-2023-49460
- https://ubuntu.com/security/CVE-2023-0996

Title: USN-6842-1: gdb vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6842-1
Priorities: low
Description:
It was discovered that gdb incorrectly handled certain memory operations
when parsing an ELF file. An attacker could possibly use this issue
to cause a denial of service. This issue is the result of an
incomplete fix for CVE-2020-16599. This issue only affected
Ubuntu 22.04 LTS. (CVE-2022-4285)

It was discovered that gdb incorrectly handled memory leading
to a heap based buffer overflow. An attacker could use this
issue to cause a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS.
(CVE-2023-1972)

It was discovered that gdb incorrectly handled memory leading
to a stack overflow. An attacker could possibly use this issue
to cause a denial of service. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2023-39128)

It was discovered that gdb had a use after free vulnerability
under certain circumstances. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. This issue
only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS
and Ubuntu 22.04 LTS. (CVE-2023-39129)

It was discovered that gdb incorrectly handled memory leading to a
heap based buffer overflow. An attacker could use this issue to cause
a denial of service, or possibly execute arbitrary code. This issue
only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2023-39130)
CVEs:
- https://ubuntu.com/security/CVE-2020-16599
- https://ubuntu.com/security/CVE-2022-4285
- https://ubuntu.com/security/CVE-2023-1972
- https://ubuntu.com/security/CVE-2023-39128
- https://ubuntu.com/security/CVE-2023-39129
- https://ubuntu.com/security/CVE-2023-39130

Title: USN-6809-1: BlueZ vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6809-1
Priorities: low,medium
Description:
It was discovered that BlueZ could be made to dereference invalid memory.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 22.04 LTS. (CVE-2022-3563)

It was discovered that BlueZ could be made to write out of bounds. If a
user were tricked into connecting to a malicious device, an attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. (CVE-2023-27349)
CVEs:
- https://ubuntu.com/security/CVE-2022-3563
- https://ubuntu.com/security/CVE-2023-27349
- https://ubuntu.com/security/CVE-2023-27349
- https://ubuntu.com/security/CVE-2022-3563

Title: USN-6846-1: Ansible vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6846-1
Priorities: medium
Description:
It was discovered that Ansible incorrectly handled certain inputs when using
tower_callback parameter. If a user or an automated system were tricked into
opening a specially crafted input file, a remote attacker could possibly use
this issue to obtain sensitive information. This issue only affected Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-3697)

It was discovered that Ansible incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file, a
remote attacker could possibly use this issue to perform a Template Injection.
(CVE-2023-5764)
CVEs:
- https://ubuntu.com/security/CVE-2022-3697
- https://ubuntu.com/security/CVE-2023-5764
- https://ubuntu.com/security/CVE-2023-5764
- https://ubuntu.com/security/CVE-2022-3697

Title: USN-6854-1: OpenSSL vulnerability
URL: https://ubuntu.com/security/notices/USN-6854-1
Priorities: medium
Description:
It was discovered that OpenSSL failed to choose an appropriately short
private key size when computing shared-secrets in the Diffie-Hellman Key
Agreement Protocol. A remote attacker could possibly use this issue to cause
OpenSSL to consume resources, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40735

Title: USN-6851-1: Netplan vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6851-1
Priorities: medium
Description:
Andreas Hasenack discovered that netplan incorrectly handled the permissions
for netdev files containing wireguard configuration. An attacker could use this to obtain
wireguard secret keys.

It was discovered that netplan configuration could be manipulated into injecting
arbitrary commands while setting up network interfaces. An attacker could
use this to execute arbitrary commands or escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-4968

Title: USN-6822-1: Node.js vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6822-1
Priorities: medium
Description:
It was discovered that Node.js incorrectly handled certain inputs when it is
using the policy mechanism. If a user or an automated system were tricked into
opening a specially crafted input file, a remote attacker could possibly use
this issue to bypass the policy mechanism. (CVE-2023-32002, CVE-2023-32006)

It was discovered that Node.js incorrectly handled certain inputs when it is
using the policy mechanism. If a user or an automated system were tricked into
opening a specially crafted input file, a remote attacker could possibly use
this issue to perform a privilege escalation. (CVE-2023-32559)
CVEs:
- https://ubuntu.com/security/CVE-2023-32002
- https://ubuntu.com/security/CVE-2023-32006
- https://ubuntu.com/security/CVE-2023-32559
- https://ubuntu.com/security/CVE-2023-32002
- https://ubuntu.com/security/CVE-2023-32559
- https://ubuntu.com/security/CVE-2023-32006

Title: USN-6800-1: browserify-sign vulnerability
URL: https://ubuntu.com/security/notices/USN-6800-1
Priorities: medium
Description:
It was discovered that browserify-sign incorrectly handled an upper bound check
in signature verification. If a user or an automated system were tricked into
opening a specially crafted input file, a remote attacker could possibly use
this issue to perform a signature forgery attack.
CVEs:
- https://ubuntu.com/security/CVE-2023-46234

Title: LSN-0104-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0104-1
Priorities: high
Description:
It was discovered that the ATA over Ethernet (AoE) driver in the Linux
kernel contained a race condition, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code.(CVE-2023-6270)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-51781)

In the Linux kernel, the following vulnerability has been
resolved: netfilter: nft_set_rbtree: skip end interval element from gc
rbtree lazy gc on insert might collect an end interval element that has
been just added in this transactions, skip end interval elements that are
not yet active.(CVE-2024-26581)

In the Linux kernel, the following vulnerability has been
resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable
rmnet_link_ops assign a bigger maxtype which leads to a global out-of-
bounds read when parsing the netlink attributes.(CVE-2024-26597)
CVEs:
- https://ubuntu.com/security/CVE-2023-6270
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2023-6270
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2024-26581

Title: USN-6819-4: Linux kernel (Oracle) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6819-4
Priorities: medium,low,high,negligible
Description:
Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly validate H2C PDU data, leading to a null pointer
dereference vulnerability. A remote attacker could use this to cause a
denial of service (system crash). (CVE-2023-6356, CVE-2023-6535,
CVE-2023-6536)

Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- Core kernel;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- Android drivers;
- Drivers core;
- Power management core;
- Bus devices;
- Device frequency scaling framework;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCMI message protocol;
- GPU drivers;
- IIO ADC drivers;
- InfiniBand drivers;
- IOMMU subsystem;
- Media drivers;
- Multifunction device drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- Device tree and open firmware driver;
- PCI driver for MicroSemi Switchtec;
- Power supply drivers;
- RPMSG subsystem;
- SCSI drivers;
- QCOM SoC drivers;
- SPMI drivers;
- Thermal drivers;
- TTY drivers;
- VFIO drivers;
- BTRFS file system;
- Ceph distributed file system;
- EFI Variable file system;
- EROFS file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFS file system;
- Network file systems library;
- Network file system server daemon;
- File systems infrastructure;
- Pstore file system;
- ReiserFS file system;
- SMB network file system;
- BPF subsystem;
- Memory management;
- TLS protocol;
- Ethernet bridge;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- NetLabel subsystem;
- Network traffic control;
- SMC sockets;
- Sun RPC protocol;
- AppArmor security module;
- Intel ASoC drivers;
- MediaTek ASoC drivers;
- USB sound devices;
(CVE-2023-52612, CVE-2024-26808, CVE-2023-52691, CVE-2023-52618,
CVE-2023-52463, CVE-2023-52447, CVE-2024-26668, CVE-2023-52454,
CVE-2024-26670, CVE-2024-26646, CVE-2023-52472, CVE-2024-26586,
CVE-2023-52681, CVE-2023-52453, CVE-2023-52611, CVE-2023-52622,
CVE-2024-26641, CVE-2023-52616, CVE-2024-26592, CVE-2023-52606,
CVE-2024-26620, CVE-2023-52692, CVE-2024-26669, CVE-2023-52623,
CVE-2023-52588, CVE-2024-26616, CVE-2024-26610, CVE-2024-35839,
CVE-2023-52490, CVE-2023-52672, CVE-2024-26612, CVE-2023-52617,
CVE-2023-52697, CVE-2024-26644, CVE-2023-52458, CVE-2023-52598,
CVE-2024-35841, CVE-2023-52664, CVE-2023-52635, CVE-2023-52676,
CVE-2023-52669, CVE-2024-26632, CVE-2023-52486, CVE-2024-26625,
CVE-2023-52608, CVE-2024-26634, CVE-2023-52599, CVE-2024-26618,
CVE-2024-26640, CVE-2023-52489, CVE-2023-52675, CVE-2023-52678,
CVE-2024-26583, CVE-2023-52693, CVE-2023-52498, CVE-2024-26649,
CVE-2023-52670, CVE-2023-52473, CVE-2023-52449, CVE-2023-52667,
CVE-2023-52467, CVE-2023-52686, CVE-2024-26633, CVE-2023-52666,
CVE-2024-35840, CVE-2024-26629, CVE-2024-26595, CVE-2023-52593,
CVE-2023-52687, CVE-2023-52465, CVE-2024-26627, CVE-2023-52493,
CVE-2023-52491, CVE-2024-26636, CVE-2024-26584, CVE-2023-52587,
CVE-2023-52597, CVE-2023-52462, CVE-2023-52633, CVE-2023-52696,
CVE-2024-26585, CVE-2023-52589, CVE-2023-52456, CVE-2023-52470,
CVE-2024-35838, CVE-2024-26645, CVE-2023-52591, CVE-2023-52464,
CVE-2023-52609, CVE-2024-26608, CVE-2023-52450, CVE-2023-52584,
CVE-2023-52469, CVE-2023-52583, CVE-2023-52451, CVE-2023-52495,
CVE-2023-52626, CVE-2023-52595, CVE-2023-52680, CVE-2023-52632,
CVE-2024-26582, CVE-2024-35837, CVE-2023-52494, CVE-2023-52614,
CVE-2023-52443, CVE-2023-52698, CVE-2023-52448, CVE-2024-26615,
CVE-2023-52452, CVE-2023-52492, CVE-2024-26647, CVE-2023-52468,
CVE-2023-52594, CVE-2023-52621, CVE-2024-26638, CVE-2024-26594,
CVE-2024-26673, CVE-2023-52457, CVE-2023-52677, CVE-2023-52607,
CVE-2024-26623, CVE-2023-52488, CVE-2023-52497, CVE-2023-52445,
CVE-2024-26607, CVE-2023-52610, CVE-2024-35842, CVE-2023-52690,
CVE-2023-52683, CVE-2023-52444, CVE-2024-26671, CVE-2023-52455,
CVE-2023-52679, CVE-2024-26598, CVE-2023-52674, CVE-2023-52627,
CVE-2023-52619, CVE-2023-52487, CVE-2023-52446, CVE-2024-35835,
CVE-2023-52682, CVE-2023-52685, CVE-2023-52694, CVE-2024-26631)
CVEs:
- https://ubuntu.com/security/CVE-2023-6356
- https://ubuntu.com/security/CVE-2023-6535
- https://ubuntu.com/security/CVE-2023-6536
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2024-24860
- https://ubuntu.com/security/CVE-2023-52612
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2023-52691
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2023-52463
- https://ubuntu.com/security/CVE-2023-52447
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2023-52454
- https://ubuntu.com/security/CVE-2024-26670
- https://ubuntu.com/security/CVE-2024-26646
- https://ubuntu.com/security/CVE-2023-52472
- https://ubuntu.com/security/CVE-2024-26586
- https://ubuntu.com/security/CVE-2023-52681
- https://ubuntu.com/security/CVE-2023-52453
- https://ubuntu.com/security/CVE-2023-52611
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2024-26620
- https://ubuntu.com/security/CVE-2023-52692
- https://ubuntu.com/security/CVE-2024-26669
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2024-26616
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2024-35839
- https://ubuntu.com/security/CVE-2023-52490
- https://ubuntu.com/security/CVE-2023-52672
- https://ubuntu.com/security/CVE-2024-26612
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2023-52697
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2023-52458
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2024-35841
- https://ubuntu.com/security/CVE-2023-52664
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2023-52676
- https://ubuntu.com/security/CVE-2023-52669
- https://ubuntu.com/security/CVE-2024-26632
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2024-26634
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2024-26618
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2023-52675
- https://ubuntu.com/security/CVE-2023-52678
- https://ubuntu.com/security/CVE-2024-26583
- https://ubuntu.com/security/CVE-2023-52693
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2024-26649
- https://ubuntu.com/security/CVE-2023-52670
- https://ubuntu.com/security/CVE-2023-52473
- https://ubuntu.com/security/CVE-2023-52449
- https://ubuntu.com/security/CVE-2023-52667
- https://ubuntu.com/security/CVE-2023-52467
- https://ubuntu.com/security/CVE-2023-52686
- https://ubuntu.com/security/CVE-2024-26633
- https://ubuntu.com/security/CVE-2023-52666
- https://ubuntu.com/security/CVE-2024-35840
- https://ubuntu.com/security/CVE-2024-26629
- https://ubuntu.com/security/CVE-2024-26595
- https://ubuntu.com/security/CVE-2023-52593
- https://ubuntu.com/security/CVE-2023-52687
- https://ubuntu.com/security/CVE-2023-52465
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2024-26584
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2023-52462
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2023-52696
- https://ubuntu.com/security/CVE-2024-26585
- https://ubuntu.com/security/CVE-2023-52589
- https://ubuntu.com/security/CVE-2023-52456
- https://ubuntu.com/security/CVE-2023-52470
- https://ubuntu.com/security/CVE-2024-35838
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2023-52591
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52609
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2023-52450
- https://ubuntu.com/security/CVE-2023-52584
- https://ubuntu.com/security/CVE-2023-52469
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2023-52495
- https://ubuntu.com/security/CVE-2023-52626
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2023-52680
- https://ubuntu.com/security/CVE-2023-52632
- https://ubuntu.com/security/CVE-2024-26582
- https://ubuntu.com/security/CVE-2024-35837
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2023-52443
- https://ubuntu.com/security/CVE-2023-52698
- https://ubuntu.com/security/CVE-2023-52448
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2023-52452
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2024-26647
- https://ubuntu.com/security/CVE-2023-52468
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2023-52621
- https://ubuntu.com/security/CVE-2024-26638
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2023-52457
- https://ubuntu.com/security/CVE-2023-52677
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2024-26623
- https://ubuntu.com/security/CVE-2023-52488
- https://ubuntu.com/security/CVE-2023-52497
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2024-26607
- https://ubuntu.com/security/CVE-2023-52610
- https://ubuntu.com/security/CVE-2024-35842
- https://ubuntu.com/security/CVE-2023-52690
- https://ubuntu.com/security/CVE-2023-52683
- https://ubuntu.com/security/CVE-2023-52444
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2023-52455
- https://ubuntu.com/security/CVE-2023-52679
- https://ubuntu.com/security/CVE-2024-26598
- https://ubuntu.com/security/CVE-2023-52674
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2023-52487
- https://ubuntu.com/security/CVE-2023-52446
- https://ubuntu.com/security/CVE-2024-35835
- https://ubuntu.com/security/CVE-2023-52682
- https://ubuntu.com/security/CVE-2023-52685
- https://ubuntu.com/security/CVE-2023-52694
- https://ubuntu.com/security/CVE-2024-26631
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2023-52453
- https://ubuntu.com/security/CVE-2023-52462
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2024-35835
- https://ubuntu.com/security/CVE-2023-52681
- https://ubuntu.com/security/CVE-2023-52454
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2024-26623
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2023-52686
- https://ubuntu.com/security/CVE-2024-26584
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2023-52467
- https://ubuntu.com/security/CVE-2023-52458
- https://ubuntu.com/security/CVE-2024-35839
- https://ubuntu.com/security/CVE-2023-52593
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2023-52465
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2023-52677
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2024-26583
- https://ubuntu.com/security/CVE-2024-26616
- https://ubuntu.com/security/CVE-2023-52455
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52446
- https://ubuntu.com/security/CVE-2024-26638
- https://ubuntu.com/security/CVE-2023-52691
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2023-52470
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2024-26598
- https://ubuntu.com/security/CVE-2023-52447
- https://ubuntu.com/security/CVE-2023-52469
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2023-52696
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2023-52685
- https://ubuntu.com/security/CVE-2024-24860
- https://ubuntu.com/security/CVE-2023-52584
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2023-52683
- https://ubuntu.com/security/CVE-2023-52495
- https://ubuntu.com/security/CVE-2023-52670
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2024-26634
- https://ubuntu.com/security/CVE-2023-52457
- https://ubuntu.com/security/CVE-2023-52609
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2023-52621
- https://ubuntu.com/security/CVE-2024-26632
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2023-6356
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2024-26646
- https://ubuntu.com/security/CVE-2023-52632
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2023-52468
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26618
- https://ubuntu.com/security/CVE-2023-52626
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2023-6535
- https://ubuntu.com/security/CVE-2023-52589
- https://ubuntu.com/security/CVE-2023-52612
- https://ubuntu.com/security/CVE-2024-26582
- https://ubuntu.com/security/CVE-2023-52443
- https://ubuntu.com/security/CVE-2023-52611
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2023-52463
- https://ubuntu.com/security/CVE-2024-26670
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2024-26649
- https://ubuntu.com/security/CVE-2023-52692
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2023-52488
- https://ubuntu.com/security/CVE-2023-52690
- https://ubuntu.com/security/CVE-2024-26629
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2023-52669
- https://ubuntu.com/security/CVE-2024-26633
- https://ubuntu.com/security/CVE-2024-26607
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2023-52698
- https://ubuntu.com/security/CVE-2023-52672
- https://ubuntu.com/security/CVE-2024-26631
- https://ubuntu.com/security/CVE-2023-52666
- https://ubuntu.com/security/CVE-2023-52591
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2024-26585
- https://ubuntu.com/security/CVE-2024-26612
- https://ubuntu.com/security/CVE-2024-35837
- https://ubuntu.com/security/CVE-2023-52472
- https://ubuntu.com/security/CVE-2023-52674
- https://ubuntu.com/security/CVE-2023-52694
- https://ubuntu.com/security/CVE-2023-52449
- https://ubuntu.com/security/CVE-2023-52678
- https://ubuntu.com/security/CVE-2023-52450
- https://ubuntu.com/security/CVE-2023-52676
- https://ubuntu.com/security/CVE-2023-52490
- https://ubuntu.com/security/CVE-2023-52487
- https://ubuntu.com/security/CVE-2023-52497
- https://ubuntu.com/security/CVE-2024-35840
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2024-26586
- https://ubuntu.com/security/CVE-2023-52473
- https://ubuntu.com/security/CVE-2024-26647
- https://ubuntu.com/security/CVE-2023-52664
- https://ubuntu.com/security/CVE-2024-35838
- https://ubuntu.com/security/CVE-2023-52444
- https://ubuntu.com/security/CVE-2024-35842
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2024-26595
- https://ubuntu.com/security/CVE-2023-52675
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2023-6536
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2023-52456
- https://ubuntu.com/security/CVE-2024-35841
- https://ubuntu.com/security/CVE-2023-52610
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2023-52680
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2023-52448
- https://ubuntu.com/security/CVE-2023-52679
- https://ubuntu.com/security/CVE-2023-52693
- https://ubuntu.com/security/CVE-2024-26620
- https://ubuntu.com/security/CVE-2023-52687
- https://ubuntu.com/security/CVE-2024-26669
- https://ubuntu.com/security/CVE-2023-52682
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2023-52452
- https://ubuntu.com/security/CVE-2023-52697
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2023-52667

Title: USN-6805-1: libarchive vulnerability
URL: https://ubuntu.com/security/notices/USN-6805-1
Priorities: medium
Description:
It was discovered that libarchive incorrectly handled certain RAR archive files.
An attacker could possibly use this issue to execute arbitrary code
or cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2024-26256

Title: USN-6844-1: CUPS vulnerability
URL: https://ubuntu.com/security/notices/USN-6844-1
Priorities: medium
Description:
Rory McNamara discovered that when starting the cupsd server with a
Listen configuration item, the cupsd process fails to validate if
bind call passed. An attacker could possibly trick cupsd to perform
an arbitrary chmod of the provided argument, providing world-writable
access to the target.
CVEs:
- https://ubuntu.com/security/CVE-2024-35235

Title: USN-6801-1: PyMySQL vulnerability
URL: https://ubuntu.com/security/notices/USN-6801-1
Priorities: medium
Description:
It was discovered that PyMySQL incorrectly escaped untrusted JSON input. An
attacker could possibly use this issue to perform SQL injection attacks.
CVEs:
- https://ubuntu.com/security/CVE-2024-36039

Title: USN-6843-1: Plasma Workspace vulnerability
URL: https://ubuntu.com/security/notices/USN-6843-1
Priorities: medium
Description:
Fabian Vogt discovered that Plasma Workspace incorrectly handled
connections via ICE. A local attacker could possibly use this issue to
gain access to another user’s session manager and execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2024-36041

Title: USN-6852-1: Wget vulnerability
URL: https://ubuntu.com/security/notices/USN-6852-1
Priorities: medium
Description:
It was discovered that Wget incorrectly handled semicolons in the userinfo
subcomponent of a URI. A remote attacker could possibly trick a user into
connecting to a different host than expected.
CVEs:
- https://ubuntu.com/security/CVE-2024-38428

Title: USN-6798-1: GStreamer Base Plugins vulnerability
URL: https://ubuntu.com/security/notices/USN-6798-1
Priorities: medium
Description:
It was discovered that GStreamer Base Plugins incorrectly handled certain
EXIF metadata. An attacker could possibly use this issue to execute arbitrary
code or cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2024-4453

Title: USN-6859-1: OpenSSH vulnerability
URL: https://ubuntu.com/security/notices/USN-6859-1
Priorities: high
Description:
It was discovered that OpenSSH incorrectly handled signal management. A
remote attacker could use this issue to bypass authentication and remotely
access systems without proper credentials.
CVEs:
- https://ubuntu.com/security/CVE-2024-6387

What’s Changed

  • Vary location of grub config if the stemcell is EFI or not by @selzoc in https://github.com/cloudfoundry/bosh-linux-stemcell-builder/pull/362

New Contributors

  • @selzoc made their first contribution in https://github.com/cloudfoundry/bosh-linux-stemcell-builder/pull/362

    Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.351…ubuntu-jammy/v1.486

1.465

Available in the Broadcom Support portal

Release Date: June 04, 2024

Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.351…ubuntu-jammy/v1.465

[Bug] vSphere stemcell with IPv6 will be unresponsive; as a workaround, use stemcell 1.445. This is caused by the introduction of EFI partition which moved the location of the grub.cfg file whose modification is a requirement for IPv6.

Metadata:

BOSH Agent Version: 2.653.0
Kernel Version: 5.15.0.107.107

USNs:


Title: USN-6792-1: Flask-Security vulnerability
URL: https://ubuntu.com/security/notices/USN-6792-1
Priorities: medium
Description:
Naom Moshe discovered that Flask-Security incorrectly validated URLs. An attacker could use this issue to redirect users to arbitrary URLs.
CVEs:
- https://ubuntu.com/security/CVE-2021-23385

Title: USN-6786-1: Netatalk vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6786-1
Priorities: medium
Description:
It was discovered that Netatalk did not properly protect an SMB and AFP
default configuration. A remote attacker could possibly use this issue to
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-22995

Title: USN-6772-1: strongSwan vulnerability
URL: https://ubuntu.com/security/notices/USN-6772-1
Priorities: medium
Description:
Jan Schermer discovered that strongSwan incorrectly validated client
certificates in certain configurations. A remote attacker could possibly
use this issue to bypass access controls.
CVEs:
- https://ubuntu.com/security/CVE-2022-4967

Title: USN-6797-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6797-1
Priorities: medium
Description:
It was discovered that some 3rd and 4th Generation Intel® Xeon® Processors
did not properly restrict access to certain hardware features when using
Intel® SGX or Intel® TDX. This may allow a privileged local user to
potentially further escalate their privileges on the system. This issue only
affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 16.04 LTS. (CVE-2023-22655)

It was discovered that some Intel® Atom® Processors did not properly clear
register state when performing various operations. A local attacker could
use this to obtain sensitive information via a transient execution attack.
This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-28746)

It was discovered that some Intel® Processors did not properly clear the
state of various hardware structures when switching execution contexts. A
local attacker could use this to access privileged information. This issue only
affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 16.04 LTS. (CVE-2023-38575)

It was discovered that some Intel® Processors did not properly enforce bus
lock regulator protections. A remote attacker could use this to cause a
denial of service. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-39368)

It was discovered that some Intel® Xeon® D Processors did not properly
calculate the SGX base key when using Intel® SGX. A privileged local
attacker could use this to obtain sensitive information. This issue only
affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 16.04 LTS. (CVE-2023-43490)

It was discovered that some Intel® Processors did not properly protect against
concurrent accesses. A local attacker could use this to obtain sensitive
information. (CVE-2023-45733)

It was discovered that some Intel® Processors TDX module software did not
properly validate input. A privileged local attacker could use this information
to potentially further escalate their privileges on the system.
(CVE-2023-45745, CVE-2023-47855)

It was discovered that some Intel® Core™ Ultra processors did not properly
handle particular instruction sequences. A local attacker could use this
issue to cause a denial of service. (CVE-2023-46103)
CVEs:
- https://ubuntu.com/security/CVE-2023-22655
- https://ubuntu.com/security/CVE-2023-28746
- https://ubuntu.com/security/CVE-2023-38575
- https://ubuntu.com/security/CVE-2023-39368
- https://ubuntu.com/security/CVE-2023-43490
- https://ubuntu.com/security/CVE-2023-45733
- https://ubuntu.com/security/CVE-2023-45745
- https://ubuntu.com/security/CVE-2023-47855
- https://ubuntu.com/security/CVE-2023-46103
- https://ubuntu.com/security/CVE-2023-46103
- https://ubuntu.com/security/CVE-2023-22655
- https://ubuntu.com/security/CVE-2023-39368
- https://ubuntu.com/security/CVE-2023-38575
- https://ubuntu.com/security/CVE-2023-47855
- https://ubuntu.com/security/CVE-2023-43490
- https://ubuntu.com/security/CVE-2023-45733
- https://ubuntu.com/security/CVE-2023-45745
- https://ubuntu.com/security/CVE-2023-28746

Title: USN-6774-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6774-1
Priorities: low,high,medium
Description:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Hardware random number generator core;
- Ext4 file system;
- JFS file system;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- Logical Link layer;
- Netlink;
- Tomoyo security module;
(CVE-2024-26704, CVE-2023-52615, CVE-2024-26805, CVE-2023-52604,
CVE-2024-26614, CVE-2023-52602, CVE-2024-26635, CVE-2024-26622,
CVE-2023-52601, CVE-2024-26801)
CVEs:
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2022-0001
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-47233

Title: USN-6795-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6795-1
Priorities: low,medium,high,negligible
Description:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

It was discovered that the Open vSwitch implementation in the Linux kernel
could overflow its stack during recursive action operations under certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-1151)

Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)

Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- S390 architecture;
- Core kernel;
- Block layer subsystem;
- Android drivers;
- Power management core;
- Bus devices;
- Hardware random number generator core;
- Cryptographic API;
- Device frequency;
- DMA engine subsystem;
- ARM SCMI message protocol;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- IIO Magnetometer sensors drivers;
- InfiniBand drivers;
- Media drivers;
- Network drivers;
- PCI driver for MicroSemi Switchtec;
- PHY drivers;
- SCSI drivers;
- DesignWare USB3 driver;
- BTRFS file system;
- Ceph distributed file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- NILFS2 file system;
- NTFS3 file system;
- Pstore file system;
- SMB network file system;
- Memory management;
- CAN network layer;
- Networking core;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- NFC subsystem;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- Unix domain sockets;
- Tomoyo security module;
- Realtek audio codecs;
(CVE-2023-52616, CVE-2024-26679, CVE-2024-26608, CVE-2023-52594,
CVE-2024-26622, CVE-2023-52643, CVE-2024-26594, CVE-2023-52598,
CVE-2023-52627, CVE-2023-52491, CVE-2024-26592, CVE-2024-26717,
CVE-2023-52638, CVE-2024-26704, CVE-2023-52637, CVE-2024-26645,
CVE-2023-52602, CVE-2024-26722, CVE-2024-26671, CVE-2023-52599,
CVE-2024-26720, CVE-2023-52631, CVE-2023-52486, CVE-2024-26640,
CVE-2023-52606, CVE-2023-52633, CVE-2024-26593, CVE-2024-26664,
CVE-2023-52618, CVE-2024-26625, CVE-2023-52604, CVE-2024-26695,
CVE-2024-26644, CVE-2024-26826, CVE-2024-26600, CVE-2024-26808,
CVE-2023-52619, CVE-2023-52597, CVE-2024-26602, CVE-2024-26635,
CVE-2023-52623, CVE-2024-26665, CVE-2024-26916, CVE-2024-26689,
CVE-2023-52635, CVE-2024-26712, CVE-2023-52614, CVE-2024-26606,
CVE-2024-26610, CVE-2024-26675, CVE-2023-52617, CVE-2024-26697,
CVE-2023-52595, CVE-2023-52494, CVE-2024-26641, CVE-2024-26698,
CVE-2024-26707, CVE-2024-26673, CVE-2023-52493, CVE-2024-26676,
CVE-2024-26910, CVE-2023-52601, CVE-2024-26660, CVE-2023-52608,
CVE-2024-26615, CVE-2023-52587, CVE-2024-26825, CVE-2023-52498,
CVE-2023-52492, CVE-2024-26668, CVE-2024-26715, CVE-2024-26685,
CVE-2024-26702, CVE-2024-26663, CVE-2024-26636, CVE-2024-26627,
CVE-2024-26696, CVE-2023-52583, CVE-2023-52642, CVE-2023-52489,
CVE-2024-26614, CVE-2024-26829, CVE-2024-26684, CVE-2023-52615,
CVE-2023-52435, CVE-2023-52530, CVE-2023-52607, CVE-2024-26920,
CVE-2023-52622, CVE-2023-52588)
CVEs:
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2024-1151
- https://ubuntu.com/security/CVE-2022-0001
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2024-26679
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2023-52643
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2024-26717
- https://ubuntu.com/security/CVE-2023-52638
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2023-52637
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26722
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2024-26720
- https://ubuntu.com/security/CVE-2023-52631
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2024-26593
- https://ubuntu.com/security/CVE-2024-26664
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26695
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2024-26826
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2024-26602
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2024-26665
- https://ubuntu.com/security/CVE-2024-26916
- https://ubuntu.com/security/CVE-2024-26689
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2024-26712
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2024-26606
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2024-26675
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2024-26697
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2024-26698
- https://ubuntu.com/security/CVE-2024-26707
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2024-26676
- https://ubuntu.com/security/CVE-2024-26910
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26660
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26825
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2024-26715
- https://ubuntu.com/security/CVE-2024-26685
- https://ubuntu.com/security/CVE-2024-26702
- https://ubuntu.com/security/CVE-2024-26663
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2024-26696
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2023-52642
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2024-26829
- https://ubuntu.com/security/CVE-2024-26684
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2023-52435
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2024-26920
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2024-26722
- https://ubuntu.com/security/CVE-2024-26602
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2024-26702
- https://ubuntu.com/security/CVE-2024-26712
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2024-26715
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2024-26685
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2024-26825
- https://ubuntu.com/security/CVE-2024-26826
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2023-52637
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2023-52631
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2024-26717
- https://ubuntu.com/security/CVE-2024-26695
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2024-26910
- https://ubuntu.com/security/CVE-2024-26696
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26916
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2024-26665
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2023-52642
- https://ubuntu.com/security/CVE-2024-26689
- https://ubuntu.com/security/CVE-2024-26606
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-26698
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2024-26720
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2023-52638
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2024-26707
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26684
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2023-52643
- https://ubuntu.com/security/CVE-2024-26593
- https://ubuntu.com/security/CVE-2024-26664
- https://ubuntu.com/security/CVE-2024-26663
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2024-26679
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2024-26676
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52435
- https://ubuntu.com/security/CVE-2024-26829
- https://ubuntu.com/security/CVE-2024-26675
- https://ubuntu.com/security/CVE-2024-26920
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26660
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2024-1151
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2024-26697
- https://ubuntu.com/security/CVE-2024-26668

Title: USN-6775-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6775-2
Priorities: low,medium
Description:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- MAC80211 subsystem;
- Tomoyo security module;
(CVE-2024-26622, CVE-2023-52530)
CVEs:
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-47233

Title: USN-6784-1: cJSON vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6784-1
Priorities: medium
Description:
It was discovered that cJSON incorrectly handled certain input. An
attacker could possibly use this issue to cause cJSON to crash, resulting
in a denial of service. This issue only affected Ubuntu 22.04 LTS and
Ubuntu 23.10. (CVE-2023-50471, CVE-2023-50472)

Luo Jin discovered that cJSON incorrectly handled certain input. An
attacker could possibly use this issue to cause cJSON to crash, resulting
in a denial of service. (CVE-2024-31755)
CVEs:
- https://ubuntu.com/security/CVE-2023-50471
- https://ubuntu.com/security/CVE-2023-50472
- https://ubuntu.com/security/CVE-2024-31755
- https://ubuntu.com/security/CVE-2023-50472
- https://ubuntu.com/security/CVE-2023-50471
- https://ubuntu.com/security/CVE-2024-31755

Title: USN-6781-1: Spreadsheet::ParseExcel vulnerability
URL: https://ubuntu.com/security/notices/USN-6781-1
Priorities: medium
Description:
Le Dinh Hai discovered that Spreadsheet::ParseExcel was passing unvalidated
input from a file into a string-type “eval”. An attacker could craft a
malicious file to achieve arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-7101

Title: USN-6766-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6766-2
Priorities: medium,high,low,negligible
Description:
It was discovered that the Open vSwitch implementation in the Linux kernel
could overflow its stack during recursive action operations under certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-1151)

Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)

Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- S390 architecture;
- Core kernel;
- Block layer subsystem;
- Android drivers;
- Power management core;
- Bus devices;
- Hardware random number generator core;
- Cryptographic API;
- Device frequency;
- DMA engine subsystem;
- ARM SCMI message protocol;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- IIO Magnetometer sensors drivers;
- InfiniBand drivers;
- Media drivers;
- Network drivers;
- PCI driver for MicroSemi Switchtec;
- PHY drivers;
- SCSI drivers;
- DesignWare USB3 driver;
- BTRFS file system;
- Ceph distributed file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- NILFS2 file system;
- NTFS3 file system;
- Pstore file system;
- SMB network file system;
- Memory management;
- CAN network layer;
- Networking core;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- Multipath TCP;
- Netfilter;
- NFC subsystem;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- Unix domain sockets;
- Realtek audio codecs;
(CVE-2023-52594, CVE-2023-52601, CVE-2024-26826, CVE-2023-52622,
CVE-2024-26665, CVE-2023-52493, CVE-2023-52633, CVE-2024-26684,
CVE-2024-26663, CVE-2023-52618, CVE-2023-52588, CVE-2023-52637,
CVE-2024-26825, CVE-2023-52606, CVE-2024-26594, CVE-2024-26625,
CVE-2024-26720, CVE-2024-26614, CVE-2023-52627, CVE-2023-52602,
CVE-2024-26673, CVE-2024-26685, CVE-2023-52638, CVE-2023-52498,
CVE-2023-52619, CVE-2024-26910, CVE-2024-26689, CVE-2023-52583,
CVE-2024-26676, CVE-2024-26671, CVE-2024-26704, CVE-2024-26608,
CVE-2024-26610, CVE-2024-26592, CVE-2023-52599, CVE-2023-52595,
CVE-2024-26660, CVE-2023-52617, CVE-2024-26645, CVE-2023-52486,
CVE-2023-52631, CVE-2023-52607, CVE-2023-52608, CVE-2024-26722,
CVE-2024-26615, CVE-2023-52615, CVE-2024-26636, CVE-2023-52642,
CVE-2023-52587, CVE-2024-26712, CVE-2024-26675, CVE-2023-52614,
CVE-2024-26606, CVE-2024-26916, CVE-2024-26600, CVE-2024-26679,
CVE-2024-26829, CVE-2024-26641, CVE-2023-52623, CVE-2024-26627,
CVE-2024-26696, CVE-2024-26640, CVE-2024-26635, CVE-2023-52491,
CVE-2024-26664, CVE-2024-26602, CVE-2023-52604, CVE-2024-26717,
CVE-2023-52643, CVE-2024-26593, CVE-2023-52598, CVE-2024-26668,
CVE-2023-52435, CVE-2023-52597, CVE-2024-26715, CVE-2024-26707,
CVE-2023-52635, CVE-2024-26695, CVE-2024-26698, CVE-2023-52494,
CVE-2024-26920, CVE-2024-26808, CVE-2023-52616, CVE-2023-52492,
CVE-2024-26702, CVE-2024-26644, CVE-2023-52489, CVE-2024-26697)
CVEs:
- https://ubuntu.com/security/CVE-2024-1151
- https://ubuntu.com/security/CVE-2022-0001
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26826
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2024-26665
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2024-26684
- https://ubuntu.com/security/CVE-2024-26663
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52637
- https://ubuntu.com/security/CVE-2024-26825
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2024-26720
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2024-26685
- https://ubuntu.com/security/CVE-2023-52638
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2024-26910
- https://ubuntu.com/security/CVE-2024-26689
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2024-26676
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2024-26660
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2023-52631
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2024-26722
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2023-52642
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26712
- https://ubuntu.com/security/CVE-2024-26675
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2024-26606
- https://ubuntu.com/security/CVE-2024-26916
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2024-26679
- https://ubuntu.com/security/CVE-2024-26829
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2024-26696
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2024-26664
- https://ubuntu.com/security/CVE-2024-26602
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26717
- https://ubuntu.com/security/CVE-2023-52643
- https://ubuntu.com/security/CVE-2024-26593
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2023-52435
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2024-26715
- https://ubuntu.com/security/CVE-2024-26707
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2024-26695
- https://ubuntu.com/security/CVE-2024-26698
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2024-26920
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2024-26702
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2024-26697
- https://ubuntu.com/security/CVE-2023-52631
- https://ubuntu.com/security/CVE-2024-26697
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2024-26679
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2023-52638
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2024-26684
- https://ubuntu.com/security/CVE-2024-26826
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2024-1151
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2024-26660
- https://ubuntu.com/security/CVE-2024-26825
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2023-52643
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2024-26696
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2024-26664
- https://ubuntu.com/security/CVE-2024-26675
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26722
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2024-26665
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2024-26685
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2024-26717
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2024-26702
- https://ubuntu.com/security/CVE-2023-52642
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2024-26920
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52435
- https://ubuntu.com/security/CVE-2024-26916
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2024-26676
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2024-26910
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2024-26720
- https://ubuntu.com/security/CVE-2024-26715
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2024-26698
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2024-26707
- https://ubuntu.com/security/CVE-2024-26829
- https://ubuntu.com/security/CVE-2024-26606
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2024-26663
- https://ubuntu.com/security/CVE-2024-26689
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2024-26695
- https://ubuntu.com/security/CVE-2024-26593
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2024-26602
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2023-52637
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2024-26712
- https://ubuntu.com/security/CVE-2023-52597

Title: USN-6766-3: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6766-3
Priorities: medium,high,low,negligible
Description:
It was discovered that the Open vSwitch implementation in the Linux kernel
could overflow its stack during recursive action operations under certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-1151)

Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)

Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- S390 architecture;
- Core kernel;
- Block layer subsystem;
- Android drivers;
- Power management core;
- Bus devices;
- Hardware random number generator core;
- Cryptographic API;
- Device frequency;
- DMA engine subsystem;
- ARM SCMI message protocol;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- IIO Magnetometer sensors drivers;
- InfiniBand drivers;
- Media drivers;
- Network drivers;
- PCI driver for MicroSemi Switchtec;
- PHY drivers;
- SCSI drivers;
- DesignWare USB3 driver;
- BTRFS file system;
- Ceph distributed file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- NILFS2 file system;
- NTFS3 file system;
- Pstore file system;
- SMB network file system;
- Memory management;
- CAN network layer;
- Networking core;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- Multipath TCP;
- Netfilter;
- NFC subsystem;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- Unix domain sockets;
- Realtek audio codecs;
(CVE-2023-52594, CVE-2023-52601, CVE-2024-26826, CVE-2023-52622,
CVE-2024-26665, CVE-2023-52493, CVE-2023-52633, CVE-2024-26684,
CVE-2024-26663, CVE-2023-52618, CVE-2023-52588, CVE-2023-52637,
CVE-2024-26825, CVE-2023-52606, CVE-2024-26594, CVE-2024-26625,
CVE-2024-26720, CVE-2024-26614, CVE-2023-52627, CVE-2023-52602,
CVE-2024-26673, CVE-2024-26685, CVE-2023-52638, CVE-2023-52498,
CVE-2023-52619, CVE-2024-26910, CVE-2024-26689, CVE-2023-52583,
CVE-2024-26676, CVE-2024-26671, CVE-2024-26704, CVE-2024-26608,
CVE-2024-26610, CVE-2024-26592, CVE-2023-52599, CVE-2023-52595,
CVE-2024-26660, CVE-2023-52617, CVE-2024-26645, CVE-2023-52486,
CVE-2023-52631, CVE-2023-52607, CVE-2023-52608, CVE-2024-26722,
CVE-2024-26615, CVE-2023-52615, CVE-2024-26636, CVE-2023-52642,
CVE-2023-52587, CVE-2024-26712, CVE-2024-26675, CVE-2023-52614,
CVE-2024-26606, CVE-2024-26916, CVE-2024-26600, CVE-2024-26679,
CVE-2024-26829, CVE-2024-26641, CVE-2023-52623, CVE-2024-26627,
CVE-2024-26696, CVE-2024-26640, CVE-2024-26635, CVE-2023-52491,
CVE-2024-26664, CVE-2024-26602, CVE-2023-52604, CVE-2024-26717,
CVE-2023-52643, CVE-2024-26593, CVE-2023-52598, CVE-2024-26668,
CVE-2023-52435, CVE-2023-52597, CVE-2024-26715, CVE-2024-26707,
CVE-2023-52635, CVE-2024-26695, CVE-2024-26698, CVE-2023-52494,
CVE-2024-26920, CVE-2024-26808, CVE-2023-52616, CVE-2023-52492,
CVE-2024-26702, CVE-2024-26644, CVE-2023-52489, CVE-2024-26697)
CVEs:
- https://ubuntu.com/security/CVE-2024-1151
- https://ubuntu.com/security/CVE-2022-0001
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26826
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2024-26665
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2024-26684
- https://ubuntu.com/security/CVE-2024-26663
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52637
- https://ubuntu.com/security/CVE-2024-26825
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2024-26720
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2024-26685
- https://ubuntu.com/security/CVE-2023-52638
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2024-26910
- https://ubuntu.com/security/CVE-2024-26689
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2024-26676
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2024-26660
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2023-52631
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2024-26722
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2023-52642
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26712
- https://ubuntu.com/security/CVE-2024-26675
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2024-26606
- https://ubuntu.com/security/CVE-2024-26916
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2024-26679
- https://ubuntu.com/security/CVE-2024-26829
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2024-26696
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2024-26664
- https://ubuntu.com/security/CVE-2024-26602
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26717
- https://ubuntu.com/security/CVE-2023-52643
- https://ubuntu.com/security/CVE-2024-26593
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2023-52435
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2024-26715
- https://ubuntu.com/security/CVE-2024-26707
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2024-26695
- https://ubuntu.com/security/CVE-2024-26698
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2024-26920
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2024-26702
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2024-26697
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2023-52643
- https://ubuntu.com/security/CVE-2024-26829
- https://ubuntu.com/security/CVE-2023-52642
- https://ubuntu.com/security/CVE-2024-1151
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2024-26663
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2024-26665
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2024-26695
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26697
- https://ubuntu.com/security/CVE-2024-26675
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2024-26696
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2024-26685
- https://ubuntu.com/security/CVE-2024-26664
- https://ubuntu.com/security/CVE-2024-26916
- https://ubuntu.com/security/CVE-2024-26825
- https://ubuntu.com/security/CVE-2024-26689
- https://ubuntu.com/security/CVE-2024-26720
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2024-26707
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2024-26684
- https://ubuntu.com/security/CVE-2024-26717
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2024-26698
- https://ubuntu.com/security/CVE-2023-52631
- https://ubuntu.com/security/CVE-2024-26715
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2023-52637
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2024-26676
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2023-52435
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2024-26679
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2024-26712
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2024-26606
- https://ubuntu.com/security/CVE-2024-26660
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2024-26910
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2024-26702
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2024-26920
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2024-26602
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2024-26826
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26722
- https://ubuntu.com/security/CVE-2024-26593
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2023-52638
- https://ubuntu.com/security/CVE-2024-26614

Title: USN-6766-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6766-1
Priorities: medium,high,low,negligible
Description:
It was discovered that the Open vSwitch implementation in the Linux kernel
could overflow its stack during recursive action operations under certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-1151)

Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)

Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- S390 architecture;
- Core kernel;
- Block layer subsystem;
- Android drivers;
- Power management core;
- Bus devices;
- Hardware random number generator core;
- Cryptographic API;
- Device frequency;
- DMA engine subsystem;
- ARM SCMI message protocol;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- I2C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- IIO Magnetometer sensors drivers;
- InfiniBand drivers;
- Media drivers;
- Network drivers;
- PCI driver for MicroSemi Switchtec;
- PHY drivers;
- SCSI drivers;
- DesignWare USB3 driver;
- BTRFS file system;
- Ceph distributed file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- NILFS2 file system;
- NTFS3 file system;
- Pstore file system;
- SMB network file system;
- Memory management;
- CAN network layer;
- Networking core;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- Multipath TCP;
- Netfilter;
- NFC subsystem;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- Unix domain sockets;
- Realtek audio codecs;
(CVE-2023-52594, CVE-2023-52601, CVE-2024-26826, CVE-2023-52622,
CVE-2024-26665, CVE-2023-52493, CVE-2023-52633, CVE-2024-26684,
CVE-2024-26663, CVE-2023-52618, CVE-2023-52588, CVE-2023-52637,
CVE-2024-26825, CVE-2023-52606, CVE-2024-26594, CVE-2024-26625,
CVE-2024-26720, CVE-2024-26614, CVE-2023-52627, CVE-2023-52602,
CVE-2024-26673, CVE-2024-26685, CVE-2023-52638, CVE-2023-52498,
CVE-2023-52619, CVE-2024-26910, CVE-2024-26689, CVE-2023-52583,
CVE-2024-26676, CVE-2024-26671, CVE-2024-26704, CVE-2024-26608,
CVE-2024-26610, CVE-2024-26592, CVE-2023-52599, CVE-2023-52595,
CVE-2024-26660, CVE-2023-52617, CVE-2024-26645, CVE-2023-52486,
CVE-2023-52631, CVE-2023-52607, CVE-2023-52608, CVE-2024-26722,
CVE-2024-26615, CVE-2023-52615, CVE-2024-26636, CVE-2023-52642,
CVE-2023-52587, CVE-2024-26712, CVE-2024-26675, CVE-2023-52614,
CVE-2024-26606, CVE-2024-26916, CVE-2024-26600, CVE-2024-26679,
CVE-2024-26829, CVE-2024-26641, CVE-2023-52623, CVE-2024-26627,
CVE-2024-26696, CVE-2024-26640, CVE-2024-26635, CVE-2023-52491,
CVE-2024-26664, CVE-2024-26602, CVE-2023-52604, CVE-2024-26717,
CVE-2023-52643, CVE-2024-26593, CVE-2023-52598, CVE-2024-26668,
CVE-2023-52435, CVE-2023-52597, CVE-2024-26715, CVE-2024-26707,
CVE-2023-52635, CVE-2024-26695, CVE-2024-26698, CVE-2023-52494,
CVE-2024-26920, CVE-2024-26808, CVE-2023-52616, CVE-2023-52492,
CVE-2024-26702, CVE-2024-26644, CVE-2023-52489, CVE-2024-26697)
CVEs:
- https://ubuntu.com/security/CVE-2024-1151
- https://ubuntu.com/security/CVE-2022-0001
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26826
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2024-26665
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2024-26684
- https://ubuntu.com/security/CVE-2024-26663
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52637
- https://ubuntu.com/security/CVE-2024-26825
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2024-26720
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2024-26685
- https://ubuntu.com/security/CVE-2023-52638
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2024-26910
- https://ubuntu.com/security/CVE-2024-26689
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2024-26676
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2024-26660
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2023-52631
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2024-26722
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2023-52642
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26712
- https://ubuntu.com/security/CVE-2024-26675
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2024-26606
- https://ubuntu.com/security/CVE-2024-26916
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2024-26679
- https://ubuntu.com/security/CVE-2024-26829
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2024-26696
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2024-26664
- https://ubuntu.com/security/CVE-2024-26602
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26717
- https://ubuntu.com/security/CVE-2023-52643
- https://ubuntu.com/security/CVE-2024-26593
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2023-52435
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2024-26715
- https://ubuntu.com/security/CVE-2024-26707
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2024-26695
- https://ubuntu.com/security/CVE-2024-26698
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2024-26920
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2024-26702
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2024-26697
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2023-52638
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2023-52631
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2024-26715
- https://ubuntu.com/security/CVE-2024-26665
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2024-26720
- https://ubuntu.com/security/CVE-2024-26676
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2024-26697
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2024-26916
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2024-26717
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2024-26712
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2024-26593
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2024-26826
- https://ubuntu.com/security/CVE-2024-26702
- https://ubuntu.com/security/CVE-2024-26675
- https://ubuntu.com/security/CVE-2023-52637
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26660
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2024-26679
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2023-52642
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2024-26707
- https://ubuntu.com/security/CVE-2024-26684
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2024-26695
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2024-1151
- https://ubuntu.com/security/CVE-2024-26829
- https://ubuntu.com/security/CVE-2023-52643
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2024-26663
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2024-26722
- https://ubuntu.com/security/CVE-2023-52435
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2024-26602
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2024-26685
- https://ubuntu.com/security/CVE-2024-26698
- https://ubuntu.com/security/CVE-2024-26664
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26910
- https://ubuntu.com/security/CVE-2024-26689
- https://ubuntu.com/security/CVE-2024-26825
- https://ubuntu.com/security/CVE-2024-26606
- https://ubuntu.com/security/CVE-2024-26920
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2024-26696

Title: USN-6769-1: Spreadsheet::ParseXLSX vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6769-1
Priorities: medium
Description:
Le Dinh Hai discovered that Spreadsheet::ParseXLSX did not properly manage
memory during cell merge operations. An attacker could possibly use this
issue to consume large amounts of memory, resulting in a denial of service
condition. (CVE-2024-22368)

An Pham discovered that Spreadsheet::ParseXLSX allowed the processing of
external entities in a default configuration. An attacker could possibly
use this vulnerability to execute an XML External Entity (XXE) injection
attack. (CVE-2024-23525)
CVEs:
- https://ubuntu.com/security/CVE-2024-22368
- https://ubuntu.com/security/CVE-2024-23525
- https://ubuntu.com/security/CVE-2024-22368
- https://ubuntu.com/security/CVE-2024-23525

Title: USN-6788-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6788-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2024-27834

Title: USN-6773-1: .NET vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6773-1
Priorities: medium
Description:
It was discovered that .NET did not properly handle memory in it’s
Double Parse routine. An attacker could possibly use this issue to
achieve remote code execution. (CVE-2024-30045)

It was discovered that .NET did not properly handle the usage of a
shared resource. An attacker could possibly use this to cause a dead-lock
condition, resulting in a denial of service. (CVE-2024-30046)
CVEs:
- https://ubuntu.com/security/CVE-2024-30045
- https://ubuntu.com/security/CVE-2024-30046
- https://ubuntu.com/security/CVE-2024-30045
- https://ubuntu.com/security/CVE-2024-30046

Title: USN-6789-1: LibreOffice vulnerability
URL: https://ubuntu.com/security/notices/USN-6789-1
Priorities: medium
Description:
Amel Bouziane-Leblond discovered that LibreOffice incorrectly handled
graphic on-click bindings. If a user were tricked into clicking a graphic
in a specially crafted document, a remote attacker could possibly run
arbitrary script.
CVEs:
- https://ubuntu.com/security/CVE-2024-3044

Title: USN-6791-1: Unbound vulnerability
URL: https://ubuntu.com/security/notices/USN-6791-1
Priorities: low
Description:
It was discovered that Unbound could take part in a denial of service
amplification attack known as DNSBomb. This update introduces certain
resource limits to make the impact from Unbound significantly lower.
CVEs:
- https://ubuntu.com/security/CVE-2024-33655

Title: USN-6787-1: Jinja2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6787-1
Priorities: medium
Description:
It was discovered that Jinja2 incorrectly handled certain HTML attributes
that were accepted by the xmlattr filter. An attacker could use this issue
to inject arbitrary HTML attribute keys and values to potentially execute
a cross-site scripting (XSS) attack.
CVEs:
- https://ubuntu.com/security/CVE-2024-34064

Title: USN-6768-1: GLib vulnerability
URL: https://ubuntu.com/security/notices/USN-6768-1
Priorities: medium
Description:
Alicia Boya García discovered that GLib incorrectly handled signal
subscriptions. A local attacker could use this issue to spoof D-Bus signals
resulting in a variety of impacts including possible privilege escalation.
CVEs:
- https://ubuntu.com/security/CVE-2024-34397

Title: USN-6780-1: idna vulnerability
URL: https://ubuntu.com/security/notices/USN-6780-1
Priorities: medium
Description:
Guido Vranken discovered that idna did not properly manage certain inputs,
which could lead to significant resource consumption. An attacker could
possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2024-3651

Title: USN-6771-1: SQL parse vulnerability
URL: https://ubuntu.com/security/notices/USN-6771-1
Priorities: medium
Description:
It was discovered that SQL parse incorrectly handled certain nested lists.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2024-4340

1.445

Available in the Broadcom Support portal

Release Date: May 14, 2024

Metadata:

BOSH Agent Version: 2.648.0
Kernel Version: 5.15.0.107.107

USNs:


Title: USN-6757-2: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6757-2
Priorities: low,medium
Description:
USN-6757-1 fixed vulnerabilities in PHP. Unfortunately these fixes were incomplete for
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. This update fixes the problem.

Original advisory details:

It was discovered that PHP incorrectly handled PHP_CLI_SERVER_WORKERS variable.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. This issue only affected Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-4900)

It was discovered that PHP incorrectly handled certain cookies.
An attacker could possibly use this issue to cookie by pass.
(CVE-2024-2756)

It was discovered that PHP incorrectly handled some passwords.
An attacker could possibly use this issue to cause an account takeover
attack. (CVE-2024-3096)
CVEs:
- https://ubuntu.com/security/CVE-2022-4900
- https://ubuntu.com/security/CVE-2024-2756
- https://ubuntu.com/security/CVE-2024-3096
- https://ubuntu.com/security/CVE-2022-4900
- https://ubuntu.com/security/CVE-2024-2756
- https://ubuntu.com/security/CVE-2024-3096

Title: USN-6764-1: libde265 vulnerability
URL: https://ubuntu.com/security/notices/USN-6764-1
Priorities: medium
Description:
It was discovered that libde265 could be made to allocate memory that
exceeds the maximum supported size. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-51792

1.439

Available in the Broadcom Support portal

Release Date: May 07, 2024

Metadata:

BOSH Agent Version: 2.648.0
Kernel Version: 5.15.0.105.102

USNs:


Title: USN-6754-1: nghttp2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6754-1
Priorities: medium
Description:
It was discovered that nghttp2 incorrectly handled the HTTP/2
implementation. A remote attacker could possibly use this issue to cause
nghttp2 to consume resources, leading to a denial of service. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511,
CVE-2019-9513)

It was discovered that nghttp2 incorrectly handled request cancellation. A
remote attacker could possibly use this issue to cause nghttp2 to consume
resources, leading to a denial of service. This issue only affected Ubuntu
16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487)

It was discovered that nghttp2 could be made to process an unlimited number
of HTTP/2 CONTINUATION frames. A remote attacker could possibly use this
issue to cause nghttp2 to consume resources, leading to a denial of
service. (CVE-2024-28182)
CVEs:
- https://ubuntu.com/security/CVE-2019-9511
- https://ubuntu.com/security/CVE-2019-9513
- https://ubuntu.com/security/CVE-2023-44487
- https://ubuntu.com/security/CVE-2024-28182
- https://ubuntu.com/security/CVE-2024-28182
- https://ubuntu.com/security/CVE-2019-9511
- https://ubuntu.com/security/CVE-2019-9513
- https://ubuntu.com/security/CVE-2023-44487

Title: USN-6730-1: Apache Maven Shared Utils vulnerability
URL: https://ubuntu.com/security/notices/USN-6730-1
Priorities: medium
Description:
It was discovered that Apache Maven Shared Utils did not handle double-quoted
strings properly, allowing shell injection attacks. This could allow an
attacker to run arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-29599

Title: USN-6758-1: JSON5 vulnerability
URL: https://ubuntu.com/security/notices/USN-6758-1
Priorities: medium
Description:
It was discovered that the JSON5 parse method incorrectly handled the parsing
of keys named __proto__. An attacker could possibly use this issue to pollute
the prototype of the returned object, setting arbitrary or unexpected keys, and
cause a denial of service, allow unintended access to network services or have
other unspecified impact, depending on the application’s use of the module.
CVEs:
- https://ubuntu.com/security/CVE-2022-46175

Title: USN-6725-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6725-1
Priorities: medium,low,high
Description:
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate certain data structure fields when parsing lease
contexts, leading to an out-of-bounds read vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information. (CVE-2023-1194)

Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A remote attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-32254)

It was discovered that a race condition existed in the KSMBD implementation
in the Linux kernel when handling session connections, leading to a use-
after-free vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32258)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an integer
underflow and out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38427)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate SMB request protocol IDs, leading to a out-of-
bounds read vulnerability. A remote attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-38430)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate packet header sizes in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38431)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly handle session setup requests, leading to an out-of-bounds read
vulnerability. A remote attacker could use this to expose sensitive
information. (CVE-2023-3867)

Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)

It was discovered that the IPv6 implementation of the Linux kernel did not
properly manage route cache memory usage. A remote attacker could use this
to cause a denial of service (memory exhaustion). (CVE-2023-52340)

It was discovered that the device mapper driver in the Linux kernel did not
properly validate target size during certain memory allocations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-52429, CVE-2024-23851)

Yang Chaoming discovered that the KSMBD implementation in the Linux kernel
did not properly validate request buffer sizes, leading to an out-of-bounds
read vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2024-22705)

Chenyuan Yang discovered that the btrfs file system in the Linux kernel did
not properly handle read operations on newly created subvolumes in certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-23850)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Architecture specifics;
- Block layer;
- Cryptographic API;
- Android drivers;
- EDAC drivers;
- GPU drivers;
- Media drivers;
- Multifunction device drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- TTY drivers;
- Userspace I/O drivers;
- EFI Variable file system;
- F2FS file system;
- GFS2 file system;
- SMB network file system;
- BPF subsystem;
- IPv6 Networking;
- Network Traffic Control;
- AppArmor security module;
(CVE-2023-52463, CVE-2023-52445, CVE-2023-52462, CVE-2023-52609,
CVE-2023-52448, CVE-2023-52457, CVE-2023-52464, CVE-2023-52456,
CVE-2023-52454, CVE-2023-52438, CVE-2023-52480, CVE-2023-52443,
CVE-2023-52442, CVE-2024-26631, CVE-2023-52439, CVE-2023-52612,
CVE-2024-26598, CVE-2024-26586, CVE-2024-26589, CVE-2023-52444,
CVE-2023-52436, CVE-2024-26633, CVE-2024-26597, CVE-2023-52458,
CVE-2024-26591, CVE-2023-52449, CVE-2023-52467, CVE-2023-52441,
CVE-2023-52610, CVE-2023-52451, CVE-2023-52469, CVE-2023-52470)
CVEs:
- https://ubuntu.com/security/CVE-2023-1194
- https://ubuntu.com/security/CVE-2023-32254
- https://ubuntu.com/security/CVE-2023-32258
- https://ubuntu.com/security/CVE-2023-38427
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-38431
- https://ubuntu.com/security/CVE-2023-3867
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2023-52340
- https://ubuntu.com/security/CVE-2023-52429
- https://ubuntu.com/security/CVE-2024-23851
- https://ubuntu.com/security/CVE-2024-22705
- https://ubuntu.com/security/CVE-2024-23850
- https://ubuntu.com/security/CVE-2024-24860
- https://ubuntu.com/security/CVE-2023-52463
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52462
- https://ubuntu.com/security/CVE-2023-52609
- https://ubuntu.com/security/CVE-2023-52448
- https://ubuntu.com/security/CVE-2023-52457
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52456
- https://ubuntu.com/security/CVE-2023-52454
- https://ubuntu.com/security/CVE-2023-52438
- https://ubuntu.com/security/CVE-2023-52480
- https://ubuntu.com/security/CVE-2023-52443
- https://ubuntu.com/security/CVE-2023-52442
- https://ubuntu.com/security/CVE-2024-26631
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2023-52612
- https://ubuntu.com/security/CVE-2024-26598
- https://ubuntu.com/security/CVE-2024-26586
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2023-52444
- https://ubuntu.com/security/CVE-2023-52436
- https://ubuntu.com/security/CVE-2024-26633
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2023-52458
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2023-52449
- https://ubuntu.com/security/CVE-2023-52467
- https://ubuntu.com/security/CVE-2023-52441
- https://ubuntu.com/security/CVE-2023-52610
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2023-52469
- https://ubuntu.com/security/CVE-2023-52470
- https://ubuntu.com/security/CVE-2023-38427
- https://ubuntu.com/security/CVE-2023-52442
- https://ubuntu.com/security/CVE-2023-52610
- https://ubuntu.com/security/CVE-2023-52469
- https://ubuntu.com/security/CVE-2023-52429
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52456
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2023-52470
- https://ubuntu.com/security/CVE-2023-52457
- https://ubuntu.com/security/CVE-2023-52480
- https://ubuntu.com/security/CVE-2023-32254
- https://ubuntu.com/security/CVE-2023-52463
- https://ubuntu.com/security/CVE-2024-24860
- https://ubuntu.com/security/CVE-2023-52436
- https://ubuntu.com/security/CVE-2024-26598
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-52340
- https://ubuntu.com/security/CVE-2024-22705
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2023-52467
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52612
- https://ubuntu.com/security/CVE-2023-1194
- https://ubuntu.com/security/CVE-2023-52444
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2023-52441
- https://ubuntu.com/security/CVE-2023-3867
- https://ubuntu.com/security/CVE-2023-52462
- https://ubuntu.com/security/CVE-2024-26631
- https://ubuntu.com/security/CVE-2024-26586
- https://ubuntu.com/security/CVE-2023-52448
- https://ubuntu.com/security/CVE-2023-38431
- https://ubuntu.com/security/CVE-2023-52443
- https://ubuntu.com/security/CVE-2024-26633
- https://ubuntu.com/security/CVE-2023-52609
- https://ubuntu.com/security/CVE-2023-52458
- https://ubuntu.com/security/CVE-2024-23851
- https://ubuntu.com/security/CVE-2023-32258
- https://ubuntu.com/security/CVE-2023-52454
- https://ubuntu.com/security/CVE-2023-52438
- https://ubuntu.com/security/CVE-2024-23850
- https://ubuntu.com/security/CVE-2023-52449

Title: USN-6725-2: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6725-2
Priorities: medium,low,high
Description:
Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate certain data structure fields when parsing lease
contexts, leading to an out-of-bounds read vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information. (CVE-2023-1194)

Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A remote attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-32254)

It was discovered that a race condition existed in the KSMBD implementation
in the Linux kernel when handling session connections, leading to a use-
after-free vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32258)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an integer
underflow and out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38427)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate SMB request protocol IDs, leading to a out-of-
bounds read vulnerability. A remote attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-38430)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate packet header sizes in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38431)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly handle session setup requests, leading to an out-of-bounds read
vulnerability. A remote attacker could use this to expose sensitive
information. (CVE-2023-3867)

Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)

It was discovered that the IPv6 implementation of the Linux kernel did not
properly manage route cache memory usage. A remote attacker could use this
to cause a denial of service (memory exhaustion). (CVE-2023-52340)

It was discovered that the device mapper driver in the Linux kernel did not
properly validate target size during certain memory allocations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-52429, CVE-2024-23851)

Yang Chaoming discovered that the KSMBD implementation in the Linux kernel
did not properly validate request buffer sizes, leading to an out-of-bounds
read vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2024-22705)

Chenyuan Yang discovered that the btrfs file system in the Linux kernel did
not properly handle read operations on newly created subvolumes in certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-23850)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Architecture specifics;
- Block layer;
- Cryptographic API;
- Android drivers;
- EDAC drivers;
- GPU drivers;
- Media drivers;
- Multifunction device drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- TTY drivers;
- Userspace I/O drivers;
- EFI Variable file system;
- F2FS file system;
- GFS2 file system;
- SMB network file system;
- BPF subsystem;
- IPv6 Networking;
- Network Traffic Control;
- AppArmor security module;
(CVE-2023-52463, CVE-2023-52445, CVE-2023-52462, CVE-2023-52609,
CVE-2023-52448, CVE-2023-52457, CVE-2023-52464, CVE-2023-52456,
CVE-2023-52454, CVE-2023-52438, CVE-2023-52480, CVE-2023-52443,
CVE-2023-52442, CVE-2024-26631, CVE-2023-52439, CVE-2023-52612,
CVE-2024-26598, CVE-2024-26586, CVE-2024-26589, CVE-2023-52444,
CVE-2023-52436, CVE-2024-26633, CVE-2024-26597, CVE-2023-52458,
CVE-2024-26591, CVE-2023-52449, CVE-2023-52467, CVE-2023-52441,
CVE-2023-52610, CVE-2023-52451, CVE-2023-52469, CVE-2023-52470)
CVEs:
- https://ubuntu.com/security/CVE-2023-1194
- https://ubuntu.com/security/CVE-2023-32254
- https://ubuntu.com/security/CVE-2023-32258
- https://ubuntu.com/security/CVE-2023-38427
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-38431
- https://ubuntu.com/security/CVE-2023-3867
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2023-52340
- https://ubuntu.com/security/CVE-2023-52429
- https://ubuntu.com/security/CVE-2024-23851
- https://ubuntu.com/security/CVE-2024-22705
- https://ubuntu.com/security/CVE-2024-23850
- https://ubuntu.com/security/CVE-2024-24860
- https://ubuntu.com/security/CVE-2023-52463
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52462
- https://ubuntu.com/security/CVE-2023-52609
- https://ubuntu.com/security/CVE-2023-52448
- https://ubuntu.com/security/CVE-2023-52457
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52456
- https://ubuntu.com/security/CVE-2023-52454
- https://ubuntu.com/security/CVE-2023-52438
- https://ubuntu.com/security/CVE-2023-52480
- https://ubuntu.com/security/CVE-2023-52443
- https://ubuntu.com/security/CVE-2023-52442
- https://ubuntu.com/security/CVE-2024-26631
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2023-52612
- https://ubuntu.com/security/CVE-2024-26598
- https://ubuntu.com/security/CVE-2024-26586
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2023-52444
- https://ubuntu.com/security/CVE-2023-52436
- https://ubuntu.com/security/CVE-2024-26633
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2023-52458
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2023-52449
- https://ubuntu.com/security/CVE-2023-52467
- https://ubuntu.com/security/CVE-2023-52441
- https://ubuntu.com/security/CVE-2023-52610
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2023-52469
- https://ubuntu.com/security/CVE-2023-52470
- https://ubuntu.com/security/CVE-2023-38427
- https://ubuntu.com/security/CVE-2023-52442
- https://ubuntu.com/security/CVE-2023-52610
- https://ubuntu.com/security/CVE-2023-52469
- https://ubuntu.com/security/CVE-2023-52429
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52456
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2023-52470
- https://ubuntu.com/security/CVE-2023-52457
- https://ubuntu.com/security/CVE-2023-52480
- https://ubuntu.com/security/CVE-2023-32254
- https://ubuntu.com/security/CVE-2023-52463
- https://ubuntu.com/security/CVE-2024-24860
- https://ubuntu.com/security/CVE-2023-52436
- https://ubuntu.com/security/CVE-2024-26598
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-52340
- https://ubuntu.com/security/CVE-2024-22705
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2023-52467
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52612
- https://ubuntu.com/security/CVE-2023-1194
- https://ubuntu.com/security/CVE-2023-52444
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2023-52441
- https://ubuntu.com/security/CVE-2023-3867
- https://ubuntu.com/security/CVE-2023-52462
- https://ubuntu.com/security/CVE-2024-26631
- https://ubuntu.com/security/CVE-2024-26586
- https://ubuntu.com/security/CVE-2023-52448
- https://ubuntu.com/security/CVE-2023-38431
- https://ubuntu.com/security/CVE-2023-52443
- https://ubuntu.com/security/CVE-2024-26633
- https://ubuntu.com/security/CVE-2023-52609
- https://ubuntu.com/security/CVE-2023-52458
- https://ubuntu.com/security/CVE-2024-23851
- https://ubuntu.com/security/CVE-2023-32258
- https://ubuntu.com/security/CVE-2023-52454
- https://ubuntu.com/security/CVE-2023-52438
- https://ubuntu.com/security/CVE-2024-23850
- https://ubuntu.com/security/CVE-2023-52449

Title: LSN-0102-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0102-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-1872)

Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory).(CVE-2023-4569)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code.(CVE-2023-6176)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-51781)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2024-0646)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.(CVE-2024-1086)
CVEs:
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-1872

Title: USN-6748-1: Sanitize vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6748-1
Priorities: medium
Description:
It was discovered that Sanitize incorrectly handled noscript elements
under certain circumstances. An attacker could possibly use this issue to
execute a cross-site scripting (XSS) attack. This issue only affected
Ubuntu 22.04 LTS. (CVE-2023-23627)

It was discovered that Sanitize incorrectly handled style elements under
certain circumstances. An attacker could possibly use this issue to
execute a cross-site scripting (XSS) attack. (CVE-2023-36823)
CVEs:
- https://ubuntu.com/security/CVE-2023-23627
- https://ubuntu.com/security/CVE-2023-36823
- https://ubuntu.com/security/CVE-2023-23627
- https://ubuntu.com/security/CVE-2023-36823

Title: USN-6742-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6742-2
Priorities: medium
Description:
Daniele Antonioli discovered that the Secure Simple Pairing and Secure
Connections pairing in the Bluetooth protocol could allow an
unauthenticated user to complete authentication without pairing
credentials. A physically proximate attacker placed between two Bluetooth
devices could use this to subsequently impersonate one of the paired
devices. (CVE-2023-24023)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- JFS file system;
- Netfilter;
(CVE-2024-26581, CVE-2023-52600, CVE-2023-52603)
CVEs:
- https://ubuntu.com/security/CVE-2023-24023
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2023-24023
- https://ubuntu.com/security/CVE-2023-52603

Title: USN-6742-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6742-1
Priorities: medium
Description:
Daniele Antonioli discovered that the Secure Simple Pairing and Secure
Connections pairing in the Bluetooth protocol could allow an
unauthenticated user to complete authentication without pairing
credentials. A physically proximate attacker placed between two Bluetooth
devices could use this to subsequently impersonate one of the paired
devices. (CVE-2023-24023)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- JFS file system;
- Netfilter;
(CVE-2024-26581, CVE-2023-52600, CVE-2023-52603)
CVEs:
- https://ubuntu.com/security/CVE-2023-24023
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2023-24023
- https://ubuntu.com/security/CVE-2023-52600

Title: USN-6729-1: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6729-1
Priorities: medium
Description:
Orange Tsai discovered that the Apache HTTP Server incorrectly handled
validating certain input. A remote attacker could possibly use this
issue to perform HTTP request splitting attacks. (CVE-2023-38709)

Keran Mu and Jianjun Chen discovered that the Apache HTTP Server
incorrectly handled validating certain input. A remote attacker could
possibly use this issue to perform HTTP request splitting attacks.
(CVE-2024-24795)

Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module
incorrectly handled endless continuation frames. A remote attacker could
possibly use this issue to cause the server to consume resources, leading
to a denial of service. (CVE-2024-27316)
CVEs:
- https://ubuntu.com/security/CVE-2023-38709
- https://ubuntu.com/security/CVE-2024-24795
- https://ubuntu.com/security/CVE-2024-27316
- https://ubuntu.com/security/CVE-2024-27316
- https://ubuntu.com/security/CVE-2024-24795
- https://ubuntu.com/security/CVE-2023-38709

Title: USN-6727-2: NSS regression
URL: https://ubuntu.com/security/notices/USN-6727-2
Priorities: medium
Description:
USN-6727-1 fixed vulnerabilities in NSS. The update introduced a regression
when trying to load security modules on Ubuntu 20.04 LTS and Ubuntu 22.04
LTS. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that NSS incorrectly handled padding when checking PKCS#1
certificates. A remote attacker could possibly use this issue to perform
Bleichenbacher-like attacks and recover private data. This issue only
affected Ubuntu 20.04 LTS. (CVE-2023-4421)

It was discovered that NSS had a timing side-channel when performing RSA
decryption. A remote attacker could possibly use this issue to recover
private data. (CVE-2023-5388)

It was discovered that NSS had a timing side-channel when using certain
NIST curves. A remote attacker could possibly use this issue to recover
private data. (CVE-2023-6135)

The NSS package contained outdated CA certificates. This update refreshes
the NSS package to version 3.98 which includes the latest CA certificate
bundle and other security improvements.
CVEs:
- https://ubuntu.com/security/CVE-2023-4421
- https://ubuntu.com/security/CVE-2023-5388
- https://ubuntu.com/security/CVE-2023-6135

Title: USN-6727-1: NSS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6727-1
Priorities: medium
Description:
It was discovered that NSS incorrectly handled padding when checking PKCS#1
certificates. A remote attacker could possibly use this issue to perform
Bleichenbacher-like attacks and recover private data. This issue only
affected Ubuntu 20.04 LTS. (CVE-2023-4421)

It was discovered that NSS had a timing side-channel when performing RSA
decryption. A remote attacker could possibly use this issue to recover
private data. (CVE-2023-5388)

It was discovered that NSS had a timing side-channel when using certain
NIST curves. A remote attacker could possibly use this issue to recover
private data. (CVE-2023-6135)

The NSS package contained outdated CA certificates. This update refreshes
the NSS package to version 3.98 which includes the latest CA certificate
bundle and other security improvements.
CVEs:
- https://ubuntu.com/security/CVE-2023-4421
- https://ubuntu.com/security/CVE-2023-5388
- https://ubuntu.com/security/CVE-2023-6135
- https://ubuntu.com/security/CVE-2023-5388
- https://ubuntu.com/security/CVE-2023-6135
- https://ubuntu.com/security/CVE-2023-4421

Title: LSN-0103-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0103-1
Priorities: high
Description:
Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory).(CVE-2023-4569)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-6817)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-51781)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.(CVE-2024-0193)

Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.(CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.(CVE-2024-1086)

In the Linux kernel, the following vulnerability has been
resolved: net: qualcomm: rmnet: fix global oob in rmnet_policy The variable
rmnet_link_ops assign a bigger maxtype which leads to a global out-of-
bounds read when parsing the netlink attributes. (CVE-2024-26597)
CVEs:
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086

Title: USN-6724-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6724-1
Priorities: medium,low
Description:
Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)

It was discovered that the Habana’s AI Processors driver in the Linux
kernel did not properly initialize certain data structures before passing
them to user space. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-50431)

It was discovered that the device mapper driver in the Linux kernel did not
properly validate target size during certain memory allocations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-52429, CVE-2024-23851)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate certain SMB messages, leading to an
out-of-bounds read vulnerability. An attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-6610)

Yang Chaoming discovered that the KSMBD implementation in the Linux kernel
did not properly validate request buffer sizes, leading to an out-of-bounds
read vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2024-22705)

Chenyuan Yang discovered that the btrfs file system in the Linux kernel did
not properly handle read operations on newly created subvolumes in certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-23850)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Android drivers;
- Userspace I/O drivers;
- F2FS file system;
- SMB network file system;
- Networking core;
(CVE-2023-52434, CVE-2023-52436, CVE-2023-52435, CVE-2023-52439,
CVE-2023-52438)
CVEs:
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2023-50431
- https://ubuntu.com/security/CVE-2023-52429
- https://ubuntu.com/security/CVE-2024-23851
- https://ubuntu.com/security/CVE-2023-6610
- https://ubuntu.com/security/CVE-2024-22705
- https://ubuntu.com/security/CVE-2024-23850
- https://ubuntu.com/security/CVE-2023-52434
- https://ubuntu.com/security/CVE-2023-52436
- https://ubuntu.com/security/CVE-2023-52435
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2023-52438
- https://ubuntu.com/security/CVE-2023-6610
- https://ubuntu.com/security/CVE-2024-23851
- https://ubuntu.com/security/CVE-2023-52429
- https://ubuntu.com/security/CVE-2023-52434
- https://ubuntu.com/security/CVE-2024-23850
- https://ubuntu.com/security/CVE-2023-52438
- https://ubuntu.com/security/CVE-2023-50431
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2024-22705
- https://ubuntu.com/security/CVE-2023-52436
- https://ubuntu.com/security/CVE-2023-52435

Title: USN-6728-1: Squid vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6728-1
Priorities: medium
Description:
Joshua Rogers discovered that Squid incorrectly handled collapsed
forwarding. A remote attacker could possibly use this issue to cause Squid
to crash, resulting in a denial of service. This issue only affected Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-49288)

Joshua Rogers discovered that Squid incorrectly handled certain structural
elements. A remote attacker could possibly use this issue to cause Squid to
crash, resulting in a denial of service. (CVE-2023-5824)

Joshua Rogers discovered that Squid incorrectly handled Cache Manager error
responses. A remote trusted client can possibly use this issue to cause
Squid to crash, resulting in a denial of service. (CVE-2024-23638)

Joshua Rogers discovered that Squid incorrectly handled the HTTP Chunked
decoder. A remote attacker could possibly use this issue to cause Squid to
stop responding, resulting in a denial of service. (CVE-2024-25111)

Joshua Rogers discovered that Squid incorrectly handled HTTP header
parsing. A remote trusted client can possibly use this issue to cause
Squid to crash, resulting in a denial of service. (CVE-2024-25617)
CVEs:
- https://ubuntu.com/security/CVE-2023-49288
- https://ubuntu.com/security/CVE-2023-5824
- https://ubuntu.com/security/CVE-2024-23638
- https://ubuntu.com/security/CVE-2024-25111
- https://ubuntu.com/security/CVE-2024-25617
- https://ubuntu.com/security/CVE-2024-23638
- https://ubuntu.com/security/CVE-2023-5824
- https://ubuntu.com/security/CVE-2024-25617
- https://ubuntu.com/security/CVE-2024-25111
- https://ubuntu.com/security/CVE-2023-49288

Title: USN-6743-3: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6743-3
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- JFS file system;
- BPF subsystem;
- Netfilter;
(CVE-2023-52600, CVE-2024-26589, CVE-2024-26591, CVE-2024-26581,
CVE-2023-52603)
CVEs:
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2023-52603

Title: USN-6743-2: Linux kernel (Low Latency) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6743-2
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- JFS file system;
- BPF subsystem;
- Netfilter;
(CVE-2023-52600, CVE-2024-26589, CVE-2024-26591, CVE-2024-26581,
CVE-2023-52603)
CVEs:
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2024-26589

Title: USN-6743-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6743-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- JFS file system;
- BPF subsystem;
- Netfilter;
(CVE-2023-52600, CVE-2024-26589, CVE-2024-26591, CVE-2024-26581,
CVE-2023-52603)
CVEs:
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2024-26581

Title: USN-6765-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6765-1
Priorities: medium,high,low,negligible
Description:
Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly validate H2C PDU data, leading to a null pointer
dereference vulnerability. A remote attacker could use this to cause a
denial of service (system crash). (CVE-2023-6356, CVE-2023-6535,
CVE-2023-6536)

Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida
discovered that the Linux kernel mitigations for the initial Branch History
Injection vulnerability (CVE-2022-0001) were insufficient for Intel
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2024-2201)

Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PowerPC architecture;
- S390 architecture;
- Core kernel;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Android drivers;
- Drivers core;
- Power management core;
- Bus devices;
- Hardware random number generator core;
- Device frequency;
- DMA engine subsystem;
- EDAC drivers;
- ARM SCMI message protocol;
- GPU drivers;
- IIO ADC drivers;
- InfiniBand drivers;
- IOMMU subsystem;
- Media drivers;
- Multifunction device drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- PCI driver for MicroSemi Switchtec;
- x86 platform drivers;
- Power supply drivers;
- SCSI drivers;
- QCOM SoC drivers;
- SPMI drivers;
- Thermal drivers;
- TTY drivers;
- VFIO drivers;
- BTRFS file system;
- Ceph distributed file system;
- EFI Variable file system;
- EROFS file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFS file system;
- Network file systems library;
- Network file system server daemon;
- Pstore file system;
- ReiserFS file system;
- SMB network file system;
- BPF subsystem;
- Memory management;
- TLS protocol;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- Netfilter;
- Network traffic control;
- SMC sockets;
- Sun RPC protocol;
- AppArmor security module;
(CVE-2023-52635, CVE-2024-26632, CVE-2023-52468, CVE-2023-52472,
CVE-2023-52589, CVE-2024-26671, CVE-2024-26640, CVE-2024-26631,
CVE-2023-52489, CVE-2023-52616, CVE-2023-52445, CVE-2023-52463,
CVE-2024-26610, CVE-2023-52497, CVE-2023-52453, CVE-2023-52470,
CVE-2024-26649, CVE-2023-52583, CVE-2024-26644, CVE-2023-52607,
CVE-2023-52587, CVE-2024-26594, CVE-2023-52618, CVE-2023-52495,
CVE-2023-52632, CVE-2024-26583, CVE-2023-52633, CVE-2023-52591,
CVE-2024-26633, CVE-2023-52627, CVE-2024-26670, CVE-2024-26598,
CVE-2024-26592, CVE-2023-52473, CVE-2023-52623, CVE-2023-52446,
CVE-2023-52443, CVE-2023-52451, CVE-2024-26629, CVE-2023-52462,
CVE-2024-26808, CVE-2023-52598, CVE-2023-52611, CVE-2023-52492,
CVE-2023-52456, CVE-2023-52626, CVE-2023-52455, CVE-2024-26641,
CVE-2023-52588, CVE-2023-52608, CVE-2024-26618, CVE-2024-26582,
CVE-2023-52609, CVE-2023-52604, CVE-2024-26646, CVE-2024-26634,
CVE-2023-52469, CVE-2023-52467, CVE-2023-52447, CVE-2024-26623,
CVE-2023-52621, CVE-2024-26647, CVE-2024-26615, CVE-2023-52450,
CVE-2023-52619, CVE-2023-52610, CVE-2023-52606, CVE-2023-52464,
CVE-2023-52465, CVE-2024-26638, CVE-2023-52498, CVE-2024-26625,
CVE-2023-52449, CVE-2023-52584, CVE-2023-52454, CVE-2023-52458,
CVE-2024-26585, CVE-2024-26669, CVE-2023-52493, CVE-2024-26645,
CVE-2024-26607, CVE-2023-52615, CVE-2023-52617, CVE-2024-26612,
CVE-2024-26668, CVE-2023-52594, CVE-2023-52612, CVE-2024-26584,
CVE-2024-26586, CVE-2024-26616, CVE-2024-26673, CVE-2023-52448,
CVE-2024-26620, CVE-2023-52614, CVE-2024-26636, CVE-2023-52602,
CVE-2023-52452, CVE-2023-52601, CVE-2024-26635, CVE-2024-26627,
CVE-2023-52488, CVE-2023-52487, CVE-2023-52597, CVE-2023-52494,
CVE-2023-52444, CVE-2024-26608, CVE-2023-52593, CVE-2023-52491,
CVE-2023-52595, CVE-2023-52599, CVE-2024-26595, CVE-2023-52622,
CVE-2024-26650, CVE-2024-26614, CVE-2023-52490, CVE-2023-52486,
CVE-2023-52457)
CVEs:
- https://ubuntu.com/security/CVE-2023-6356
- https://ubuntu.com/security/CVE-2023-6535
- https://ubuntu.com/security/CVE-2023-6536
- https://ubuntu.com/security/CVE-2022-0001
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2024-24860
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2024-26632
- https://ubuntu.com/security/CVE-2023-52468
- https://ubuntu.com/security/CVE-2023-52472
- https://ubuntu.com/security/CVE-2023-52589
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2024-26631
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52463
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2023-52497
- https://ubuntu.com/security/CVE-2023-52453
- https://ubuntu.com/security/CVE-2023-52470
- https://ubuntu.com/security/CVE-2024-26649
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2023-52495
- https://ubuntu.com/security/CVE-2023-52632
- https://ubuntu.com/security/CVE-2024-26583
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2023-52591
- https://ubuntu.com/security/CVE-2024-26633
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2024-26670
- https://ubuntu.com/security/CVE-2024-26598
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2023-52473
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2023-52446
- https://ubuntu.com/security/CVE-2023-52443
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2024-26629
- https://ubuntu.com/security/CVE-2023-52462
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2023-52611
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2023-52456
- https://ubuntu.com/security/CVE-2023-52626
- https://ubuntu.com/security/CVE-2023-52455
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2024-26618
- https://ubuntu.com/security/CVE-2024-26582
- https://ubuntu.com/security/CVE-2023-52609
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26646
- https://ubuntu.com/security/CVE-2024-26634
- https://ubuntu.com/security/CVE-2023-52469
- https://ubuntu.com/security/CVE-2023-52467
- https://ubuntu.com/security/CVE-2023-52447
- https://ubuntu.com/security/CVE-2024-26623
- https://ubuntu.com/security/CVE-2023-52621
- https://ubuntu.com/security/CVE-2024-26647
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2023-52450
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2023-52610
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52465
- https://ubuntu.com/security/CVE-2024-26638
- https://ubuntu.com/security/CVE-2023-52498
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2023-52449
- https://ubuntu.com/security/CVE-2023-52584
- https://ubuntu.com/security/CVE-2023-52454
- https://ubuntu.com/security/CVE-2023-52458
- https://ubuntu.com/security/CVE-2024-26585
- https://ubuntu.com/security/CVE-2024-26669
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2024-26607
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2024-26612
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2023-52612
- https://ubuntu.com/security/CVE-2024-26584
- https://ubuntu.com/security/CVE-2024-26586
- https://ubuntu.com/security/CVE-2024-26616
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2023-52448
- https://ubuntu.com/security/CVE-2024-26620
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2023-52452
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2023-52488
- https://ubuntu.com/security/CVE-2023-52487
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2023-52444
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2023-52593
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2024-26595
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2024-26650
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52490
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2023-52457
- https://ubuntu.com/security/CVE-2023-52622
- https://ubuntu.com/security/CVE-2023-52491
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2023-6536
- https://ubuntu.com/security/CVE-2023-52618
- https://ubuntu.com/security/CVE-2023-52608
- https://ubuntu.com/security/CVE-2023-52446
- https://ubuntu.com/security/CVE-2023-52467
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2023-52584
- https://ubuntu.com/security/CVE-2023-52444
- https://ubuntu.com/security/CVE-2023-52492
- https://ubuntu.com/security/CVE-2024-26585
- https://ubuntu.com/security/CVE-2023-52472
- https://ubuntu.com/security/CVE-2024-26808
- https://ubuntu.com/security/CVE-2024-26583
- https://ubuntu.com/security/CVE-2023-52453
- https://ubuntu.com/security/CVE-2023-52619
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2024-24860
- https://ubuntu.com/security/CVE-2024-26631
- https://ubuntu.com/security/CVE-2024-26671
- https://ubuntu.com/security/CVE-2023-52611
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2023-52469
- https://ubuntu.com/security/CVE-2023-52495
- https://ubuntu.com/security/CVE-2023-52447
- https://ubuntu.com/security/CVE-2024-26640
- https://ubuntu.com/security/CVE-2024-26636
- https://ubuntu.com/security/CVE-2023-52468
- https://ubuntu.com/security/CVE-2024-26608
- https://ubuntu.com/security/CVE-2023-6356
- https://ubuntu.com/security/CVE-2024-26610
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2024-26629
- https://ubuntu.com/security/CVE-2023-52486
- https://ubuntu.com/security/CVE-2023-52457
- https://ubuntu.com/security/CVE-2024-2201
- https://ubuntu.com/security/CVE-2024-26646
- https://ubuntu.com/security/CVE-2023-52488
- https://ubuntu.com/security/CVE-2024-26584
- https://ubuntu.com/security/CVE-2023-52448
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52589
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26582
- https://ubuntu.com/security/CVE-2024-26668
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2023-52443
- https://ubuntu.com/security/CVE-2023-52614
- https://ubuntu.com/security/CVE-2024-26638
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52465
- https://ubuntu.com/security/CVE-2023-52455
- https://ubuntu.com/security/CVE-2023-52615
- https://ubuntu.com/security/CVE-2023-52635
- https://ubuntu.com/security/CVE-2024-26647
- https://ubuntu.com/security/CVE-2023-52617
- https://ubuntu.com/security/CVE-2024-26607
- https://ubuntu.com/security/CVE-2024-26632
- https://ubuntu.com/security/CVE-2023-52616
- https://ubuntu.com/security/CVE-2023-52591
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2024-26634
- https://ubuntu.com/security/CVE-2024-26615
- https://ubuntu.com/security/CVE-2023-52621
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2023-52632
- https://ubuntu.com/security/CVE-2024-26633
- https://ubuntu.com/security/CVE-2024-26616
- https://ubuntu.com/security/CVE-2023-52458
- https://ubuntu.com/security/CVE-2023-52626
- https://ubuntu.com/security/CVE-2024-26645
- https://ubuntu.com/security/CVE-2024-26649
- https://ubuntu.com/security/CVE-2023-52462
- https://ubuntu.com/security/CVE-2024-26650
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52463
- https://ubuntu.com/security/CVE-2024-26620
- https://ubuntu.com/security/CVE-2024-26644
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2023-52456
- https://ubuntu.com/security/CVE-2023-52490
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2024-26612
- https://ubuntu.com/security/CVE-2023-52493
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2024-26586
- https://ubuntu.com/security/CVE-2024-26595
- https://ubuntu.com/security/CVE-2023-52623
- https://ubuntu.com/security/CVE-2024-26598
- https://ubuntu.com/security/CVE-2023-52449
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2023-52609
- https://ubuntu.com/security/CVE-2023-6535
- https://ubuntu.com/security/CVE-2023-52450
- https://ubuntu.com/security/CVE-2023-52612
- https://ubuntu.com/security/CVE-2023-52470
- https://ubuntu.com/security/CVE-2023-52593
- https://ubuntu.com/security/CVE-2023-52494
- https://ubuntu.com/security/CVE-2023-52473
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2024-26641
- https://ubuntu.com/security/CVE-2023-52610
- https://ubuntu.com/security/CVE-2023-52454
- https://ubuntu.com/security/CVE-2024-26669
- https://ubuntu.com/security/CVE-2024-26673
- https://ubuntu.com/security/CVE-2023-52497
- https://ubuntu.com/security/CVE-2024-26670
- https://ubuntu.com/security/CVE-2023-52627
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2023-52633
- https://ubuntu.com/security/CVE-2023-52489
- https://ubuntu.com/security/CVE-2023-52452
- https://ubuntu.com/security/CVE-2024-26618
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2023-52487
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2024-26623
- https://ubuntu.com/security/CVE-2023-52498

Title: USN-6755-1: GNU cpio vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6755-1
Priorities: medium
Description:
Ingo Brückl discovered that cpio contained a path traversal vulnerability.
If a user or automated system were tricked into extracting a specially
crafted cpio archive, an attacker could possibly use this issue to write
arbitrary files outside the target directory on the host, even if using the
option –no-absolute-filenames.
CVEs:
- https://ubuntu.com/security/CVE-2023-7207

Title: USN-6749-1: FreeRDP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6749-1
Priorities: low,medium
Description:
It was discovered that FreeRDP incorrectly handled certain context resets.
If a user were tricked into connecting to a malicious server, a remote
attacker could use this issue to cause FreeRDP to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2024-22211)

Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory
operations. If a user were tricked into connecting to a malicious server, a
remote attacker could use this issue to cause FreeRDP to crash, resulting
in a denial of service, or possibly execute arbitrary code.
(CVE-2024-32039, CVE-2024-32040)

Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory
operations. If a user were tricked into connecting to a malicious server, a
remote attacker could possibly use this issue to cause FreeRDP to crash,
resulting in a denial of service. (CVE-2024-32041, CVE-2024-32458,
CVE-2024-32460)

Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to cause
FreeRDP clients and servers to crash, resulting in a denial of service.
(CVE-2024-32459)
CVEs:
- https://ubuntu.com/security/CVE-2024-22211
- https://ubuntu.com/security/CVE-2024-32039
- https://ubuntu.com/security/CVE-2024-32040
- https://ubuntu.com/security/CVE-2024-32041
- https://ubuntu.com/security/CVE-2024-32458
- https://ubuntu.com/security/CVE-2024-32460
- https://ubuntu.com/security/CVE-2024-32459
- https://ubuntu.com/security/CVE-2024-22211
- https://ubuntu.com/security/CVE-2024-32458
- https://ubuntu.com/security/CVE-2024-32460
- https://ubuntu.com/security/CVE-2024-32041
- https://ubuntu.com/security/CVE-2024-32039
- https://ubuntu.com/security/CVE-2024-32459
- https://ubuntu.com/security/CVE-2024-32040

Title: USN-6746-1: Google Guest Agent and Google OS Config Agent vulnerability
URL: https://ubuntu.com/security/notices/USN-6746-1
Priorities: medium
Description:
It was discovered that Google Guest Agent and Google OS Config Agent incorrectly
handled certain JSON files. An attacker could possibly use this issue to
cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2024-24786

Title: USN-6750-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6750-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2024-2609, CVE-2024-3852,
CVE-2024-3864)

Bartek Nowotarski discovered that Thunderbird did not properly limit HTTP/2
CONTINUATION frames. An attacker could potentially exploit this issue to
cause a denial of service. (CVE-2024-3302)

Lukas Bernhard discovered that Thunderbird did not properly manage memory
during JIT optimisations, leading to an out-of-bounds read vulnerability.
An attacker could possibly use this issue to cause a denial of service or
expose sensitive information. (CVE-2024-3854)

Lukas Bernhard discovered that Thunderbird did not properly manage memory
when handling JIT created code during garbage collection. An attacker
could potentially exploit this issue to cause a denial of service, or
execute arbitrary code. (CVE-2024-3857)

Ronald Crane discovered that Thunderbird did not properly manage memory in
the OpenType sanitizer on 32-bit devices, leading to an out-of-bounds read
vulnerability. An attacker could possibly use this issue to cause a denial
of service or expose sensitive information. (CVE-2024-3859)

Ronald Crane discovered that Thunderbird did not properly manage memory
when handling an AlignedBuffer. An attacker could potentially exploit this
issue to cause denial of service, or execute arbitrary code. (CVE-2024-3861)
CVEs:
- https://ubuntu.com/security/CVE-2024-2609
- https://ubuntu.com/security/CVE-2024-3852
- https://ubuntu.com/security/CVE-2024-3864
- https://ubuntu.com/security/CVE-2024-3302
- https://ubuntu.com/security/CVE-2024-3854
- https://ubuntu.com/security/CVE-2024-3857
- https://ubuntu.com/security/CVE-2024-3859
- https://ubuntu.com/security/CVE-2024-3861
- https://ubuntu.com/security/CVE-2024-3861
- https://ubuntu.com/security/CVE-2024-3859
- https://ubuntu.com/security/CVE-2024-2609
- https://ubuntu.com/security/CVE-2024-3864
- https://ubuntu.com/security/CVE-2024-3854
- https://ubuntu.com/security/CVE-2024-3302
- https://ubuntu.com/security/CVE-2024-3852
- https://ubuntu.com/security/CVE-2024-3857

Title: USN-6719-2: util-linux vulnerability
URL: https://ubuntu.com/security/notices/USN-6719-2
Priorities: medium
Description:
USN-6719-1 fixed a vulnerability in util-linux. Unfortunately, it was
discovered that the fix did not fully address the issue. This update
removes the setgid permission bit from the wall and write utilities.

Original advisory details:

Skyler Ferrante discovered that the util-linux wall command did not filter
escape sequences from command line arguments. A local attacker could
possibly use this issue to obtain sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2024-28085

Title: USN-6744-1: Pillow vulnerability
URL: https://ubuntu.com/security/notices/USN-6744-1
Priorities: medium
Description:
Hugo van Kemenade discovered that Pillow was not properly performing
bounds checks when processing an ICC file, which could lead to a buffer
overflow. If a user or automated system were tricked into processing a
specially crafted ICC file, an attacker could possibly use this issue
to cause a denial of service or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2024-28219

Title: USN-6733-1: GnuTLS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6733-1
Priorities: medium
Description:
It was discovered that GnuTLS had a timing side-channel when performing
certain ECDSA operations. A remote attacker could possibly use this issue
to recover sensitive information. (CVE-2024-28834)

It was discovered that GnuTLS incorrectly handled verifying certain PEM
bundles. A remote attacker could possibly use this issue to cause GnuTLS to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 23.10. (CVE-2024-28835)
CVEs:
- https://ubuntu.com/security/CVE-2024-28834
- https://ubuntu.com/security/CVE-2024-28835
- https://ubuntu.com/security/CVE-2024-28835
- https://ubuntu.com/security/CVE-2024-28834

Title: USN-6737-1: GNU C Library vulnerability
URL: https://ubuntu.com/security/notices/USN-6737-1
Priorities: medium
Description:
Charles Fol discovered that the GNU C Library iconv feature incorrectly
handled certain input sequences. An attacker could use this issue to cause
the GNU C Library to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2024-2961

Title: USN-6761-1: Anope vulnerability
URL: https://ubuntu.com/security/notices/USN-6761-1
Priorities: medium
Description:
It was discovered that Anope did not properly process credentials for
suspended accounts. An attacker could possibly use this issue to normally
login to the platform as a suspended user after changing their password.
CVEs:
- https://ubuntu.com/security/CVE-2024-30187

Title: USN-6721-2: X.Org X Server regression
URL: https://ubuntu.com/security/notices/USN-6721-2
Priorities: medium
Description:
USN-6721-1 fixed vulnerabilities in X.Org X Server. That fix was incomplete
resulting in a regression. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that X.Org X Server incorrectly handled certain data.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2024-31080, CVE-2024-31081, CVE-2024-31082)

It was discovered that X.Org X Server incorrectly handled certain glyphs.
An attacker could possibly use this issue to cause a crash or expose sensitive
information. (CVE-2024-31083)
CVEs:
- https://ubuntu.com/security/CVE-2024-31080
- https://ubuntu.com/security/CVE-2024-31081
- https://ubuntu.com/security/CVE-2024-31082
- https://ubuntu.com/security/CVE-2024-31083

Title: USN-6721-1: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6721-1
Priorities: medium
Description:
It was discovered that X.Org X Server incorrectly handled certain data.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2024-31080, CVE-2024-31081, CVE-2024-31082)

It was discovered that X.Org X Server incorrectly handled certain glyphs.
An attacker could possibly use this issue to cause a crash or expose sensitive
information. (CVE-2024-31083)
CVEs:
- https://ubuntu.com/security/CVE-2024-31080
- https://ubuntu.com/security/CVE-2024-31081
- https://ubuntu.com/security/CVE-2024-31082
- https://ubuntu.com/security/CVE-2024-31083
- https://ubuntu.com/security/CVE-2024-31083
- https://ubuntu.com/security/CVE-2024-31082
- https://ubuntu.com/security/CVE-2024-31081
- https://ubuntu.com/security/CVE-2024-31080

Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.423…ubuntu-jammy/v1.439

1.423

Available in the Broadcom Support portal

Release Date: April 08, 2024

Metadata:

BOSH Agent Version: 2.646.0
Kernel Version: 5.15.0.101.98

USNs:


Title: USN-6695-1: TeX Live vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6695-1
Priorities: low,medium
Description:
It was discovered that TeX Live incorrectly handled certain memory
operations in the embedded axodraw2 tool. An attacker could possibly use
this issue to cause TeX Live to crash, resulting in a denial of service.
This issue only affected Ubuntu 20.04 LTS. (CVE-2019-18604)

It was discovered that TeX Live allowed documents to make arbitrary
network requests. If a user or automated system were tricked into opening a
specially crafted document, a remote attacker could possibly use this issue
to exfiltrate sensitive information, or perform other network-related
attacks. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2023-32668)

It was discovered that TeX Live incorrectly handled certain TrueType fonts.
If a user or automated system were tricked into opening a specially crafted
TrueType font, a remote attacker could use this issue to cause TeX Live to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2024-25262)
CVEs:
- https://ubuntu.com/security/CVE-2019-18604
- https://ubuntu.com/security/CVE-2023-32668
- https://ubuntu.com/security/CVE-2024-25262
- https://ubuntu.com/security/CVE-2024-25262
- https://ubuntu.com/security/CVE-2019-18604
- https://ubuntu.com/security/CVE-2023-32668

Title: USN-6705-1: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6705-1
Priorities: low,medium,high
Description:
It was discovered that the DesignWare USB3 for Qualcomm SoCs driver in the
Linux kernel did not properly handle certain error conditions during device
registration. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2023-22995)

It was discovered that the NVIDIA Tegra XUSB pad controller driver in the
Linux kernel did not properly handle return values in certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-23000)

Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly handle session setup requests. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2023-32247)

It was discovered that a race condition existed in the Cypress touchscreen
driver in the Linux kernel during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4134)

黄思聪 discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel did not properly handle certain memory allocation failure
conditions, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-46343)

It was discovered that the io_uring subsystem in the Linux kernel contained
a race condition, leading to a null pointer dereference vulnerability. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-46862)

It was discovered that a race condition existed in the Bluetooth subsystem
of the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that a race condition existed in the Rose X.25 protocol
implementation in the Linux kernel, leading to a use-after- free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51782)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel
did not properly handle connect command payloads in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2023-6121)

It was discovered that the VirtIO subsystem in the Linux kernel did not
properly initialize memory in some situations. A local attacker could use
this to possibly expose sensitive information (kernel memory).
(CVE-2024-0340)

Dan Carpenter discovered that the netfilter subsystem in the Linux kernel
did not store data in properly sized memory locations. A local user could
use this to cause a denial of service (system crash). (CVE-2024-0607)

Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)
CVEs:
- https://ubuntu.com/security/CVE-2023-22995
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-46343
- https://ubuntu.com/security/CVE-2023-46862
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2024-0340
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-22995
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2023-46862
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2024-0340
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-46343
- https://ubuntu.com/security/CVE-2023-32247

Title: USN-6686-4: Linux kernel (KVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6686-4
Priorities: low,medium
Description:
It was discovered that the DesignWare USB3 for Qualcomm SoCs driver in the
Linux kernel did not properly handle certain error conditions during device
registration. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2023-22995)

It was discovered that a race condition existed in the Cypress touchscreen
driver in the Linux kernel during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4134)

黄思聪 discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel did not properly handle certain memory allocation failure
conditions, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-46343)

It was discovered that the io_uring subsystem in the Linux kernel contained
a race condition, leading to a null pointer dereference vulnerability. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-46862)

It was discovered that a race condition existed in the Bluetooth subsystem
of the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that a race condition existed in the Rose X.25 protocol
implementation in the Linux kernel, leading to a use-after- free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51782)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel
did not properly handle connect command payloads in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2023-6121)

It was discovered that the VirtIO subsystem in the Linux kernel did not
properly initialize memory in some situations. A local attacker could use
this to possibly expose sensitive information (kernel memory).
(CVE-2024-0340)

Dan Carpenter discovered that the netfilter subsystem in the Linux kernel
did not store data in properly sized memory locations. A local user could
use this to cause a denial of service (system crash). (CVE-2024-0607)
CVEs:
- https://ubuntu.com/security/CVE-2023-22995
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-46343
- https://ubuntu.com/security/CVE-2023-46862
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2024-0340
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2023-46343
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2024-0340
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2023-46862
- https://ubuntu.com/security/CVE-2023-22995

Title: USN-6686-3: Linux kernel (Oracle) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6686-3
Priorities: low,medium
Description:
It was discovered that the DesignWare USB3 for Qualcomm SoCs driver in the
Linux kernel did not properly handle certain error conditions during device
registration. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2023-22995)

It was discovered that a race condition existed in the Cypress touchscreen
driver in the Linux kernel during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4134)

黄思聪 discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel did not properly handle certain memory allocation failure
conditions, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-46343)

It was discovered that the io_uring subsystem in the Linux kernel contained
a race condition, leading to a null pointer dereference vulnerability. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-46862)

It was discovered that a race condition existed in the Bluetooth subsystem
of the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that a race condition existed in the Rose X.25 protocol
implementation in the Linux kernel, leading to a use-after- free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51782)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel
did not properly handle connect command payloads in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2023-6121)

It was discovered that the VirtIO subsystem in the Linux kernel did not
properly initialize memory in some situations. A local attacker could use
this to possibly expose sensitive information (kernel memory).
(CVE-2024-0340)

Dan Carpenter discovered that the netfilter subsystem in the Linux kernel
did not store data in properly sized memory locations. A local user could
use this to cause a denial of service (system crash). (CVE-2024-0607)
CVEs:
- https://ubuntu.com/security/CVE-2023-22995
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-46343
- https://ubuntu.com/security/CVE-2023-46862
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2024-0340
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2023-46343
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2024-0340
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2023-46862
- https://ubuntu.com/security/CVE-2023-22995

Title: USN-6704-4: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6704-4
Priorities: medium,high
Description:
It was discovered that the NVIDIA Tegra XUSB pad controller driver in the
Linux kernel did not properly handle return values in certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-23000)

Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly handle session setup requests. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2023-32247)

Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)
CVEs:
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-32247

Title: USN-6704-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6704-1
Priorities: medium,high
Description:
It was discovered that the NVIDIA Tegra XUSB pad controller driver in the
Linux kernel did not properly handle return values in certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-23000)

Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly handle session setup requests. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2023-32247)

Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)
CVEs:
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-24855

Title: USN-6704-3: Linux kernel (Oracle) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6704-3
Priorities: medium,high
Description:
It was discovered that the NVIDIA Tegra XUSB pad controller driver in the
Linux kernel did not properly handle return values in certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-23000)

Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly handle session setup requests. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2023-32247)

Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)
CVEs:
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2024-24855

Title: USN-6714-1: Debian Goodies vulnerability
URL: https://ubuntu.com/security/notices/USN-6714-1
Priorities: low
Description:
It was discovered that debmany in Debian Goodies incorrectly handled certain
deb files. An attacker could possibly use this issue to execute arbitrary shell
commands.
CVEs:
- https://ubuntu.com/security/CVE-2023-27635

Title: USN-6720-1: Cacti vulnerability
URL: https://ubuntu.com/security/notices/USN-6720-1
Priorities: high
Description:
Kentaro Kawane discovered that Cacti incorrectly handled user provided
input sent through request parameters to the graph_view.php script.
A remote authenticated attacker could use this issue to perform
SQL injection attacks.
CVEs:
- https://ubuntu.com/security/CVE-2023-39361

Title: USN-6708-1: Graphviz vulnerability
URL: https://ubuntu.com/security/notices/USN-6708-1
Priorities: medium
Description:
It was discovered that Graphviz incorrectly handled certain config6a files.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-46045

Title: USN-6680-3: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6680-3
Priorities: medium
Description:
黄思聪 discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel did not properly handle certain memory allocation failure
conditions, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-46343)

It was discovered that a race condition existed in the Bluetooth subsystem
of the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that a race condition existed in the Rose X.25 protocol
implementation in the Linux kernel, leading to a use-after- free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51782)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel
did not properly handle connect command payloads in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2023-6121)

Jann Horn discovered that the io_uring subsystem in the Linux kernel
contained an out-of-bounds access vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2023-6560)

Dan Carpenter discovered that the netfilter subsystem in the Linux kernel
did not store data in properly sized memory locations. A local user could
use this to cause a denial of service (system crash). (CVE-2024-0607)

Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and
Shweta Shinde discovered that the Confidential Computing framework in the
Linux kernel for x86 platforms did not properly handle 32-bit emulation on
TDX and SEV. An attacker with access to the VMM could use this to cause a
denial of service (guest crash) or possibly execute arbitrary code.
(CVE-2024-25744)
CVEs:
- https://ubuntu.com/security/CVE-2023-46343
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2023-6560
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2024-25744
- https://ubuntu.com/security/CVE-2023-6560
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2023-46343
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2024-25744

Title: USN-6717-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6717-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2024-0743, CVE-2024-2611,
CVE-2024-2614)

Hubert Kario discovered that Thunderbird had a timing side-channel when
performing RSA decryption. A remote attacker could possibly use this
issue to recover sensitive information. (CVE-2023-5388)

Gary Kwong discovered that Thunderbird incorrectly updated return
registers for JIT code on Armv7-A systems. An attacker could potentially
exploit this issue to execute arbitrary code. (CVE-2024-2607)

Ronald Crane discovered that Thunderbird did not properly manage memory
during character encoding. An attacker could potentially exploit this
issue to cause a denial of service. (CVE-2024-2608)

Georg Felber and Marco Squarcina discovered that Thunderbird incorrectly
handled html and body tags. An attacker who was able to inject markup into
a page otherwise protected by a Content Security Policy may have been able
obtain sensitive information. (CVE-2024-2610)

Ronald Crane discovered a use-after-free in Thunderbird when handling code
in SafeRefPtr. An attacker could potentially exploit this issue to cause a
denial of service, or execute arbitrary code. (CVE-2024-2612)

Ryan VanderMeulen and Dan Minor discovered that Thunderbird did not
properly manage memory conditions in ICU. An attacker could potentially
exploit this issue to cause a denial of service. (CVE-2024-2616)
CVEs:
- https://ubuntu.com/security/CVE-2024-0743
- https://ubuntu.com/security/CVE-2024-2611
- https://ubuntu.com/security/CVE-2024-2614
- https://ubuntu.com/security/CVE-2023-5388
- https://ubuntu.com/security/CVE-2024-2607
- https://ubuntu.com/security/CVE-2024-2608
- https://ubuntu.com/security/CVE-2024-2610
- https://ubuntu.com/security/CVE-2024-2612
- https://ubuntu.com/security/CVE-2024-2616
- https://ubuntu.com/security/CVE-2024-2610
- https://ubuntu.com/security/CVE-2024-2608
- https://ubuntu.com/security/CVE-2024-2612
- https://ubuntu.com/security/CVE-2024-0743
- https://ubuntu.com/security/CVE-2024-2614
- https://ubuntu.com/security/CVE-2024-2616
- https://ubuntu.com/security/CVE-2023-5388
- https://ubuntu.com/security/CVE-2024-2611
- https://ubuntu.com/security/CVE-2024-2607

Title: USN-6715-1: unixODBC vulnerability
URL: https://ubuntu.com/security/notices/USN-6715-1
Priorities: medium
Description:
It was discovered that unixODBC incorrectly handled certain bytes.
An attacker could use this issue to execute arbitrary code or cause
a crash.
CVEs:
- https://ubuntu.com/security/CVE-2024-1013

Title: USN-6707-4: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6707-4
Priorities: high,medium
Description:
Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network drivers;
- PWM drivers;
(CVE-2024-26597, CVE-2024-26599)
CVEs:
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2024-26599
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2024-26599

Title: USN-6707-3: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6707-3
Priorities: high,medium
Description:
Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network drivers;
- PWM drivers;
(CVE-2024-26597, CVE-2024-26599)
CVEs:
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2024-26599
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-26599

Title: USN-6707-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6707-1
Priorities: high,medium
Description:
Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network drivers;
- PWM drivers;
(CVE-2024-26597, CVE-2024-26599)
CVEs:
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2024-26599
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-26599

Title: USN-6718-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6718-1
Priorities: low,medium
Description:
Dan Fandrich discovered that curl would incorrectly use the default set of
protocols when a parameter option disabled all protocols without adding
any, contrary to expectations. This issue only affected Ubuntu 23.10.
(CVE-2024-2004)

It was discovered that curl incorrectly handled memory when limiting the
amount of headers when HTTP/2 server push is allowed. A remote attacker
could possibly use this issue to cause curl to consume resources, leading
to a denial of service. (CVE-2024-2398)
CVEs:
- https://ubuntu.com/security/CVE-2024-2004
- https://ubuntu.com/security/CVE-2024-2398
- https://ubuntu.com/security/CVE-2024-2004
- https://ubuntu.com/security/CVE-2024-2398

Title: USN-6698-1: Vim vulnerability
URL: https://ubuntu.com/security/notices/USN-6698-1
Priorities: low
Description:
Zhen Zhou discovered that Vim did not properly manage memory. An
attacker could possibly use this issue to cause a denial of service
CVEs:
- https://ubuntu.com/security/CVE-2024-22667

Title: USN-6719-1: util-linux vulnerability
URL: https://ubuntu.com/security/notices/USN-6719-1
Priorities: medium
Description:
Skyler Ferrante discovered that the util-linux wall command did not filter
escape sequences from command line arguments. A local attacker could
possibly use this issue to obtain sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2024-28085

Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.406…ubuntu-jammy/v1.423

1.406

Available in the Broadcom Support portal

Release Date: March 18, 2024

Metadata:

BOSH Agent Version: 2.640.0
Kernel Version: 5.15.0.101.98

Updates:


- [Bug fix]: bosh-agent compile generates broken compiled releases

USNs:


Title: USN-6692-1: Gson vulnerability
URL: https://ubuntu.com/security/notices/USN-6692-1
Priorities: medium
Description:
It was discovered that Gson incorrectly handled deserialization of untrusted
input data. If a user or an automated system were tricked into opening a
specially crafted input file, a remote attacker could possibly use this issue
to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-25647

Title: USN-6690-1: Open vSwitch vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6690-1
Priorities: medium
Description:
Timothy Redaelli and Haresh Khandelwal discovered that Open vSwitch
incorrectly handled certain crafted Geneve packets when hardware offloading
via the netlink path is enabled. A remote attacker could possibly use this
issue to cause Open vSwitch to crash, leading to a denial of service.
(CVE-2023-3966)

It was discovered that Open vSwitch incorrectly handled certain ICMPv6
Neighbor Advertisement packets. A remote attacker could possibly use this
issue to redirect traffic to arbitrary IP addresses. (CVE-2023-5366)
CVEs:
- https://ubuntu.com/security/CVE-2023-3966
- https://ubuntu.com/security/CVE-2023-5366
- https://ubuntu.com/security/CVE-2023-5366
- https://ubuntu.com/security/CVE-2023-3966

Title: USN-6693-1: .NET vulnerability
URL: https://ubuntu.com/security/notices/USN-6693-1
Priorities: medium
Description:
It was discovered that .NET did not properly handle certain specially
crafted requests. An attacker could potentially use this issue to cause
a resource leak, leading to a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2024-21392

Title: USN-6691-1: OVN vulnerability
URL: https://ubuntu.com/security/notices/USN-6691-1
Priorities: medium
Description:
It was discovered that OVN incorrectly enabled OVS Bidirectional Forwarding
Detection on logical ports. A remote attacker could possibly use this issue
to disrupt traffic.
CVEs:
- https://ubuntu.com/security/CVE-2024-2182

1.404

Available in the Broadcom Support portal

Release Date: March 13, 2024

Metadata:

BOSH Agent Version: 2.639.0

Updates:

The linux kernel has been changed from the HWE line of kernels back to the LTS line of kernels. Changing from the current 6.5 to 5.15. This is an attempt to mitigate issue 318 where we see cgroups with memory limits hitting OOM errors when they previously did not under the 6.2 kernel versions.

USNs:


Title: USN-6682-1: Puma vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6682-1
Priorities: medium
Description:
ZeddYu Lu discovered that Puma incorrectly handled parsing certain headers.
A remote attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue only affected Ubuntu 20.04 LTS.
(CVE-2020-11076)

It was discovered that Puma incorrectly handled parsing certain headers.
A remote attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue only affected Ubuntu 20.04 LTS.
(CVE-2020-11077)

Jean Boussier discovered that Puma might not always release resources
properly after handling HTTP requests. A remote attacker could possibly
use this issue to read sensitive information. (CVE-2022-23634)

It was discovered that Puma incorrectly handled certain malformed headers.
A remote attacker could use this issue to perform an HTTP Request Smuggling
attack. (CVE-2022-24790)

Ben Kallus discovered that Puma incorrectly handled parsing certain headers.
A remote attacker could use this issue to perform an HTTP Request Smuggling
attack. (CVE-2023-40175)

Bartek Nowotarski discovered that Puma incorrectly handled parsing certain
encoded content. A remote attacker could possibly use this to cause a
denial of service. (CVE-2024-21647)
CVEs:
- https://ubuntu.com/security/CVE-2020-11076
- https://ubuntu.com/security/CVE-2020-11077
- https://ubuntu.com/security/CVE-2022-23634
- https://ubuntu.com/security/CVE-2022-24790
- https://ubuntu.com/security/CVE-2023-40175
- https://ubuntu.com/security/CVE-2024-21647
- https://ubuntu.com/security/CVE-2024-21647
- https://ubuntu.com/security/CVE-2020-11076
- https://ubuntu.com/security/CVE-2023-40175
- https://ubuntu.com/security/CVE-2020-11077
- https://ubuntu.com/security/CVE-2022-23634
- https://ubuntu.com/security/CVE-2022-24790

Title: USN-6675-1: ImageProcessing vulnerability
URL: https://ubuntu.com/security/notices/USN-6675-1
Priorities: medium
Description:
It was discovered that ImageProcessing incorrectly handled series of operations
that are coming from unsanitised inputs. If a user or an automated system were
tricked into opening a specially crafted input file, a remote attacker could
possibly use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-24720

Title: USN-6659-1: libde265 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6659-1
Priorities: medium
Description:
It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2022-43244, CVE-2022-43249,
CVE-2022-43250, CVE-2022-47665, CVE-2023-25221)

It was discovered that libde265 could be made to read out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service. (CVE-2022-43245)

It was discovered that libde265 could be made to dereference invalid
memory. If a user or automated system were tricked into opening a specially
crafted file, an attacker could possibly use this issue to cause a denial
of service. (CVE-2023-24751, CVE-2023-24752, CVE-2023-24754,
CVE-2023-24755, CVE-2023-24756, CVE-2023-24757, CVE-2023-24758)
CVEs:
- https://ubuntu.com/security/CVE-2022-43244
- https://ubuntu.com/security/CVE-2022-43249
- https://ubuntu.com/security/CVE-2022-43250
- https://ubuntu.com/security/CVE-2022-47665
- https://ubuntu.com/security/CVE-2023-25221
- https://ubuntu.com/security/CVE-2022-43245
- https://ubuntu.com/security/CVE-2023-24751
- https://ubuntu.com/security/CVE-2023-24752
- https://ubuntu.com/security/CVE-2023-24754
- https://ubuntu.com/security/CVE-2023-24755
- https://ubuntu.com/security/CVE-2023-24756
- https://ubuntu.com/security/CVE-2023-24757
- https://ubuntu.com/security/CVE-2023-24758
- https://ubuntu.com/security/CVE-2022-47665
- https://ubuntu.com/security/CVE-2023-24752
- https://ubuntu.com/security/CVE-2022-43244
- https://ubuntu.com/security/CVE-2023-24754
- https://ubuntu.com/security/CVE-2023-24756
- https://ubuntu.com/security/CVE-2022-43245
- https://ubuntu.com/security/CVE-2023-24758
- https://ubuntu.com/security/CVE-2023-24751
- https://ubuntu.com/security/CVE-2023-25221
- https://ubuntu.com/security/CVE-2022-43250
- https://ubuntu.com/security/CVE-2022-43249
- https://ubuntu.com/security/CVE-2023-24757
- https://ubuntu.com/security/CVE-2023-24755

Title: USN-6667-1: Cpanel-JSON-XS vulnerability
URL: https://ubuntu.com/security/notices/USN-6667-1
Priorities: medium
Description:
It was discovered that Cpanel-JSON-XS incorrectly decoded certain data. A
remote attacker could use this issue to cause Cpanel-JSON-XS to crash,
resulting in a denial of service, or possibly obtain sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-48623

Title: USN-6664-1: less vulnerability
URL: https://ubuntu.com/security/notices/USN-6664-1
Priorities: medium
Description:
It was discovered that less incorrectly handled certain file names.
An attacker could possibly use this issue to cause a crash or execute
arbitrary commands.
CVEs:
- https://ubuntu.com/security/CVE-2022-48624

Title: USN-6671-1: php-nyholm-psr7 vulnerability
URL: https://ubuntu.com/security/notices/USN-6671-1
Priorities: medium
Description:
It was discovered that php-nyholm-psr7 incorrectly parsed HTTP
headers. A remote attacker could possibly use this issue to perform
an HTTP header injection attack.
CVEs:
- https://ubuntu.com/security/CVE-2023-29197

Title: USN-6670-1: php-guzzlehttp-psr7 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6670-1
Priorities: medium
Description:
It was discovered that php-guzzlehttp-psr7 incorrectly parsed HTTP
headers. A remote attacker could possibly use these issues to perform
an HTTP header injection attack.
CVEs:
- https://ubuntu.com/security/CVE-2023-29197
- https://ubuntu.com/security/CVE-2022-24775

Title: USN-6683-1: HtmlCleaner vulnerability
URL: https://ubuntu.com/security/notices/USN-6683-1
Priorities: low
Description:
It was discovered that HtmlCleaner incorrectly handled certain html
documents. An attacker could possibly use this issue to cause a denial
of service via application crash.
CVEs:
- https://ubuntu.com/security/CVE-2023-34624

Title: USN-6680-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6680-2
Priorities: medium
Description:
黄思聪 discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel did not properly handle certain memory allocation failure
conditions, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-46343)

It was discovered that a race condition existed in the Bluetooth subsystem
of the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that a race condition existed in the Rose X.25 protocol
implementation in the Linux kernel, leading to a use-after- free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51782)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel
did not properly handle connect command payloads in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2023-6121)

Jann Horn discovered that the io_uring subsystem in the Linux kernel
contained an out-of-bounds access vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2023-6560)

Dan Carpenter discovered that the netfilter subsystem in the Linux kernel
did not store data in properly sized memory locations. A local user could
use this to cause a denial of service (system crash). (CVE-2024-0607)

Supraja Sridhara, Benedict Schlüter, Mark Kuhne, Andrin Bertschi, and
Shweta Shinde discovered that the Confidential Computing framework in the
Linux kernel for x86 platforms did not properly handle 32-bit emulation on
TDX and SEV. An attacker with access to the VMM could use this to cause a
denial of service (guest crash) or possibly execute arbitrary code.
(CVE-2024-25744)
CVEs:
- https://ubuntu.com/security/CVE-2023-46343
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2023-6560
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2024-25744
- https://ubuntu.com/security/CVE-2023-46343
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2024-25744
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-6560

Title: USN-6688-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6688-1
Priorities: medium,high,low,negligible
Description:
Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)

It was discovered that the Habana’s AI Processors driver in the Linux
kernel did not properly initialize certain data structures before passing
them to user space. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-50431)

Murray McAllister discovered that the VMware Virtual GPU DRM driver in the
Linux kernel did not properly handle memory objects when storing surfaces,
leading to a use-after-free vulnerability. A local attacker in a guest VM
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5633)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate certain SMB messages, leading to an
out-of-bounds read vulnerability. An attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-6610)

It was discovered that the VirtIO subsystem in the Linux kernel did not
properly initialize memory in some situations. A local attacker could use
this to possibly expose sensitive information (kernel memory).
(CVE-2024-0340)

Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

Chenyuan Yang discovered that the RDS Protocol implementation in the Linux
kernel contained an out-of-bounds read vulnerability. An attacker could use
this to possibly cause a denial of service (system crash). (CVE-2024-23849)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Architecture specifics;
- Block layer;
- ACPI drivers;
- Android drivers;
- EDAC drivers;
- GPU drivers;
- InfiniBand drivers;
- Media drivers;
- Multifunction device drivers;
- MTD block device drivers;
- Network drivers;
- NVME drivers;
- PHY drivers;
- PWM drivers;
- SCSI drivers;
- SPMI drivers;
- TTY drivers;
- Userspace I/O drivers;
- Ceph distributed file system;
- EFI Variable file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFS file system;
- SMB network file system;
- BPF subsystem;
- Logical Link Layer;
- Netfilter;
- Unix domain sockets;
- AppArmor security module;
(CVE-2024-26599, CVE-2023-52604, CVE-2023-52439, CVE-2024-26627,
CVE-2024-26601, CVE-2024-26628, CVE-2023-52607, CVE-2023-52456,
CVE-2023-52602, CVE-2023-52443, CVE-2023-52599, CVE-2023-52603,
CVE-2024-26588, CVE-2024-26581, CVE-2023-52600, CVE-2024-26624,
CVE-2023-52584, CVE-2024-26625, CVE-2023-52606, CVE-2023-52463,
CVE-2023-52464, CVE-2023-52597, CVE-2023-52595, CVE-2023-52458,
CVE-2023-52457, CVE-2023-52438, CVE-2023-52469, CVE-2023-52462,
CVE-2024-26589, CVE-2024-26592, CVE-2024-26594, CVE-2023-52601,
CVE-2023-52593, CVE-2023-52436, CVE-2023-52447, CVE-2023-52587,
CVE-2023-52445, CVE-2023-52454, CVE-2023-52451, CVE-2023-52605,
CVE-2024-26597, CVE-2023-52448, CVE-2023-52598, CVE-2024-26591,
CVE-2023-52449, CVE-2023-52444, CVE-2023-52583, CVE-2023-52589,
CVE-2024-26598, CVE-2023-52470, CVE-2023-52594, CVE-2023-52588,
CVE-2023-52467, CVE-2024-26600)
CVEs:
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2023-50431
- https://ubuntu.com/security/CVE-2023-5633
- https://ubuntu.com/security/CVE-2023-6610
- https://ubuntu.com/security/CVE-2024-0340
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2024-24860
- https://ubuntu.com/security/CVE-2024-26599
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2024-26601
- https://ubuntu.com/security/CVE-2024-26628
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2023-52456
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2023-52443
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2024-26588
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2024-26624
- https://ubuntu.com/security/CVE-2023-52584
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2023-52463
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2023-52458
- https://ubuntu.com/security/CVE-2023-52457
- https://ubuntu.com/security/CVE-2023-52438
- https://ubuntu.com/security/CVE-2023-52469
- https://ubuntu.com/security/CVE-2023-52462
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52593
- https://ubuntu.com/security/CVE-2023-52436
- https://ubuntu.com/security/CVE-2023-52447
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52454
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2023-52605
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2023-52448
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2023-52449
- https://ubuntu.com/security/CVE-2023-52444
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2023-52589
- https://ubuntu.com/security/CVE-2024-26598
- https://ubuntu.com/security/CVE-2023-52470
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52467
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2023-52438
- https://ubuntu.com/security/CVE-2023-52467
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2023-52594
- https://ubuntu.com/security/CVE-2023-5633
- https://ubuntu.com/security/CVE-2024-26628
- https://ubuntu.com/security/CVE-2024-26624
- https://ubuntu.com/security/CVE-2023-50431
- https://ubuntu.com/security/CVE-2024-26625
- https://ubuntu.com/security/CVE-2023-52457
- https://ubuntu.com/security/CVE-2023-52463
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26600
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-26592
- https://ubuntu.com/security/CVE-2023-52593
- https://ubuntu.com/security/CVE-2023-52605
- https://ubuntu.com/security/CVE-2023-52599
- https://ubuntu.com/security/CVE-2024-26588
- https://ubuntu.com/security/CVE-2023-52584
- https://ubuntu.com/security/CVE-2023-52589
- https://ubuntu.com/security/CVE-2024-23849
- https://ubuntu.com/security/CVE-2023-52443
- https://ubuntu.com/security/CVE-2023-52588
- https://ubuntu.com/security/CVE-2023-52447
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2024-24860
- https://ubuntu.com/security/CVE-2023-52462
- https://ubuntu.com/security/CVE-2023-6610
- https://ubuntu.com/security/CVE-2024-26594
- https://ubuntu.com/security/CVE-2023-52470
- https://ubuntu.com/security/CVE-2023-52436
- https://ubuntu.com/security/CVE-2024-26599
- https://ubuntu.com/security/CVE-2023-52595
- https://ubuntu.com/security/CVE-2024-26601
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2023-52469
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2023-52607
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52598
- https://ubuntu.com/security/CVE-2024-26589
- https://ubuntu.com/security/CVE-2024-26597
- https://ubuntu.com/security/CVE-2023-52454
- https://ubuntu.com/security/CVE-2023-52444
- https://ubuntu.com/security/CVE-2023-52456
- https://ubuntu.com/security/CVE-2024-26591
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2023-52449
- https://ubuntu.com/security/CVE-2023-52597
- https://ubuntu.com/security/CVE-2023-52458
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52606
- https://ubuntu.com/security/CVE-2024-0340
- https://ubuntu.com/security/CVE-2023-52448
- https://ubuntu.com/security/CVE-2023-52587
- https://ubuntu.com/security/CVE-2024-26627
- https://ubuntu.com/security/CVE-2024-26581
- https://ubuntu.com/security/CVE-2024-1085
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26598

Title: USN-6665-1: Unbound vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6665-1
Priorities: medium
Description:
Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered
that Unbound incorrectly handled validating DNSSEC messages. A remote
attacker could possibly use this issue to cause Unbound to consume
resources, leading to a denial of service. (CVE-2023-50387)

It was discovered that Unbound incorrectly handled preparing an NSEC3
closest encloser proof. A remote attacker could possibly use this issue to
cause Unbound to consume resources, leading to a denial of service.
(CVE-2023-50868)
CVEs:
- https://ubuntu.com/security/CVE-2023-50387
- https://ubuntu.com/security/CVE-2023-50868
- https://ubuntu.com/security/CVE-2023-50868
- https://ubuntu.com/security/CVE-2023-50387

Title: USN-6673-1: python-cryptography vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6673-1
Priorities: medium
Description:
Hubert Kario discovered that python-cryptography incorrectly handled
errors returned by the OpenSSL API when processing incorrect padding in
RSA PKCS#1 v1.5. A remote attacker could possibly use this issue to expose
confidential or sensitive information. (CVE-2023-50782)

It was discovered that python-cryptography incorrectly handled memory
operations when processing mismatched PKCS#12 keys. A remote attacker could
possibly use this issue to cause python-cryptography to crash, leading to a
denial of service. This issue only affected Ubuntu 23.10. (CVE-2024-26130)
CVEs:
- https://ubuntu.com/security/CVE-2023-50782
- https://ubuntu.com/security/CVE-2024-26130
- https://ubuntu.com/security/CVE-2024-26130
- https://ubuntu.com/security/CVE-2023-50782

Title: USN-6651-3: Linux kernel (StarFive) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6651-3
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

Zhenghan Wang discovered that the generic ID allocator implementation in
the Linux kernel did not properly check for null bitmap when releasing IDs.
A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-6915)

Robert Morris discovered that the CIFS network file system implementation
in the Linux kernel did not properly validate certain server commands
fields, leading to an out-of-bounds read vulnerability. An attacker could
use this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2024-0565)

Jann Horn discovered that the io_uring subsystem in the Linux kernel did
not properly handle the release of certain buffer rings. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2024-0582)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2024-0646)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0582
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0582
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-51780

Title: USN-6651-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6651-2
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

Zhenghan Wang discovered that the generic ID allocator implementation in
the Linux kernel did not properly check for null bitmap when releasing IDs.
A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-6915)

Robert Morris discovered that the CIFS network file system implementation
in the Linux kernel did not properly validate certain server commands
fields, leading to an out-of-bounds read vulnerability. An attacker could
use this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2024-0565)

Jann Horn discovered that the io_uring subsystem in the Linux kernel did
not properly handle the release of certain buffer rings. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2024-0582)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2024-0646)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0582
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0582
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-51780

Title: USN-6653-3: Linux kernel (Low Latency) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6653-3
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

Zhenghan Wang discovered that the generic ID allocator implementation in
the Linux kernel did not properly check for null bitmap when releasing IDs.
A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-6915)

Robert Morris discovered that the CIFS network file system implementation
in the Linux kernel did not properly validate certain server commands
fields, leading to an out-of-bounds read vulnerability. An attacker could
use this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2024-0565)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2024-0646)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2023-6915

Title: USN-6653-4: Linux kernel (GKE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6653-4
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

Zhenghan Wang discovered that the generic ID allocator implementation in
the Linux kernel did not properly check for null bitmap when releasing IDs.
A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-6915)

Robert Morris discovered that the CIFS network file system implementation
in the Linux kernel did not properly validate certain server commands
fields, leading to an out-of-bounds read vulnerability. An attacker could
use this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2024-0565)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2024-0646)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-51780

Title: USN-6653-2: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6653-2
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

Zhenghan Wang discovered that the generic ID allocator implementation in
the Linux kernel did not properly check for null bitmap when releasing IDs.
A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-6915)

Robert Morris discovered that the CIFS network file system implementation
in the Linux kernel did not properly validate certain server commands
fields, leading to an out-of-bounds read vulnerability. An attacker could
use this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2024-0565)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2024-0646)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2023-51781

Title: USN-6668-1: python-openstackclient vulnerability
URL: https://ubuntu.com/security/notices/USN-6668-1
Priorities: medium
Description:
It was discovered that when python-openstackclient attempted to delete a
non-existing access rule, it would delete another existing access rule
instead, contrary to expectations.
CVEs:
- https://ubuntu.com/security/CVE-2023-6110

Title: LSN-0101-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0101-1
Priorities: high
Description:
Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-6817)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-6932)

It was discovered that the netfilter connection tracker for netlink in the
Linux kernel did not properly perform reference counting in some error
conditions. A local attacker could possibly use this to cause a denial of
service (memory exhaustion).(CVE-2023-7192)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.(CVE-2024-0193)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2024-0646)
CVEs:
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-7192
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-7192
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-0646

Title: USN-6661-1: OpenJDK 17 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6661-1
Priorities: medium
Description:
Yi Yang discovered that the Hotspot component of OpenJDK 17 incorrectly
handled array accesses in the C1 compiler. An attacker could possibly
use this issue to cause a denial of service, execute arbitrary code or
bypass Java sandbox restrictions. (CVE-2024-20918)

It was discovered that the Hotspot component of OpenJDK 17 did not
properly verify bytecode in certain situations. An attacker could
possibly use this issue to bypass Java sandbox restrictions.
(CVE-2024-20919)

It was discovered that the Hotspot component of OpenJDK 17 had an
optimization flaw when generating range check loop predicates. An attacker
could possibly use this issue to cause a denial of service, execute
arbitrary code or bypass Java sandbox restrictions. (CVE-2024-20921)

Yakov Shafranovich discovered that OpenJDK 17 incorrectly handled ZIP
archives that have file and directory entries with the same name. An
attacker could possibly use this issue to bypass Java sandbox
restrictions. (CVE-2024-20932)

It was discovered that OpenJDK 17 could produce debug logs that contained
private keys used for digital signatures. An attacker could possibly use
this issue to obtain sensitive information. (CVE-2024-20945)

Hubert Kario discovered that the TLS implementation in OpenJDK 17 had a
timing side-channel and incorrectly handled RSA padding. A remote attacker
could possibly use this issue to recover sensitive information.
(CVE-2024-20952)
CVEs:
- https://ubuntu.com/security/CVE-2024-20918
- https://ubuntu.com/security/CVE-2024-20919
- https://ubuntu.com/security/CVE-2024-20921
- https://ubuntu.com/security/CVE-2024-20932
- https://ubuntu.com/security/CVE-2024-20945
- https://ubuntu.com/security/CVE-2024-20952
- https://ubuntu.com/security/CVE-2024-20952
- https://ubuntu.com/security/CVE-2024-20921
- https://ubuntu.com/security/CVE-2024-20945
- https://ubuntu.com/security/CVE-2024-20918
- https://ubuntu.com/security/CVE-2024-20919
- https://ubuntu.com/security/CVE-2024-20932

Title: USN-6662-1: OpenJDK 21 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6662-1
Priorities: medium
Description:
Yi Yang discovered that the Hotspot component of OpenJDK 21 incorrectly
handled array accesses in the C1 compiler. An attacker could possibly
use this issue to cause a denial of service, execute arbitrary code or
bypass Java sandbox restrictions. (CVE-2024-20918)

It was discovered that the Hotspot component of OpenJDK 21 did not
properly verify bytecode in certain situations. An attacker could
possibly use this issue to bypass Java sandbox restrictions.
(CVE-2024-20919)

It was discovered that the Hotspot component of OpenJDK 21 had an
optimization flaw when generating range check loop predicates. An attacker
could possibly use this issue to cause a denial of service, execute
arbitrary code or bypass Java sandbox restrictions. (CVE-2024-20921)

It was discovered that OpenJDK 21 could produce debug logs that contained
private keys used for digital signatures. An attacker could possibly use
this issue to obtain sensitive information. (CVE-2024-20945)

Hubert Kario discovered that the TLS implementation in OpenJDK 21 had a
timing side-channel and incorrectly handled RSA padding. A remote attacker
could possibly use this issue to recover sensitive information.
(CVE-2024-20952)
CVEs:
- https://ubuntu.com/security/CVE-2024-20918
- https://ubuntu.com/security/CVE-2024-20919
- https://ubuntu.com/security/CVE-2024-20921
- https://ubuntu.com/security/CVE-2024-20945
- https://ubuntu.com/security/CVE-2024-20952
- https://ubuntu.com/security/CVE-2024-20952
- https://ubuntu.com/security/CVE-2024-20921
- https://ubuntu.com/security/CVE-2024-20945
- https://ubuntu.com/security/CVE-2024-20918
- https://ubuntu.com/security/CVE-2024-20919

Title: USN-6676-1: c-ares vulnerability
URL: https://ubuntu.com/security/notices/USN-6676-1
Priorities: medium
Description:
Vojtěch Vobr discovered that c-ares incorrectly handled user input from
local configuration files. An attacker could possibly use this issue to
cause a denial of service via application crash.
CVEs:
- https://ubuntu.com/security/CVE-2024-25629

Title: USN-6679-1: FRR vulnerability
URL: https://ubuntu.com/security/notices/USN-6679-1
Priorities: medium
Description:
It was discovered that FRR incorrectly handled certain malformed OSPF LSA
packets. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2024-27913

1.390

Available in the Broadcom Support portal

Release Date: February 29, 2024

Metadata:

BOSH Agent Version: 2.636.0

Updates:

Stemcells are now built using snapshot.ubuntu.com APT repositories rather than archive.ubuntu.com. This is to help keep packages the same when rebuilding a stemcell. If a processes tries to install APT packages on a stemcell, they will only get package versions that existed when the stemcell was published.

USNs:


Title: USN-6655-1: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6655-1
Priorities: medium
Description:
It was discovered that GNU binutils was not properly handling the logic
behind certain memory management related operations, which could lead to
an invalid memory access. An attacker could possibly use this issue to
cause a denial of service. (CVE-2022-47695)

It was discovered that GNU binutils was not properly performing bounds
checks when dealing with memory allocation operations, which could lead
to excessive memory consumption. An attacker could possibly use this issue
to cause a denial of service. (CVE-2022-48063)

It was discovered that GNU binutils incorrectly handled memory management
operations in several of its functions, which could lead to excessive
memory consumption due to memory leaks. An attacker could possibly use
these issues to cause a denial of service. (CVE-2022-48065)
CVEs:
- https://ubuntu.com/security/CVE-2022-47695
- https://ubuntu.com/security/CVE-2022-48063
- https://ubuntu.com/security/CVE-2022-48065
- https://ubuntu.com/security/CVE-2022-48063
- https://ubuntu.com/security/CVE-2022-47695
- https://ubuntu.com/security/CVE-2022-48065

Title: USN-6626-3: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6626-3
Priorities: medium,low,high
Description:
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)

Marek Marczykowski-Górecki discovered that the Xen event channel
infrastructure implementation in the Linux kernel contained a race
condition. An attacker in a guest VM could possibly use this to cause a
denial of service (paravirtualized device unavailability). (CVE-2023-34324)

Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)

Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV)
implementation for AMD processors in the Linux kernel contained a race
condition when accessing MMIO registers. A local attacker in a SEV guest VM
could possibly use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-46813)

It was discovered that the Microchip USB Ethernet driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash). (CVE-2023-6039)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-6176)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle dynset expressions passed from userspace, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2023-6622)

It was discovered that the TIPC protocol implementation in the Linux kernel
did not properly handle locking during tipc_crypto_key_revoke() operations.
A local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2024-0641)
CVEs:
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2023-35827
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-6039
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2024-0641
- https://ubuntu.com/security/CVE-2023-6039
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-35827
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2024-0641

Title: USN-6654-1: Roundcube Webmail vulnerability
URL: https://ubuntu.com/security/notices/USN-6654-1
Priorities: medium
Description:
It was discovered that Roundcube Webmail incorrectly sanitized characters
in the linkrefs text messages. An attacker could possibly use this issue to
execute a cross-site scripting (XSS) attack. (CVE-2023-43770)
CVEs:
- https://ubuntu.com/security/CVE-2023-43770
- https://ubuntu.com/security/CVE-2023-43770

Title: USN-6657-1: Dnsmasq vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6657-1
Priorities: medium,low
Description:
Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered
that Dnsmasq icorrectly handled validating DNSSEC messages. A remote
attacker could possibly use this issue to cause Dnsmasq to consume
resources, leading to a denial of service. (CVE-2023-50387)

It was discovered that Dnsmasq incorrectly handled preparing an NSEC3
closest encloser proof. A remote attacker could possibly use this issue to
cause Dnsmasq to consume resources, leading to a denial of service.
(CVE-2023-50868)

It was discovered that Dnsmasq incorrectly set the maximum EDNS.0 UDP
packet size as required by DNS Flag Day 2020. This issue only affected
Ubuntu 23.10. (CVE-2023-28450)
CVEs:
- https://ubuntu.com/security/CVE-2023-50387
- https://ubuntu.com/security/CVE-2023-50868
- https://ubuntu.com/security/CVE-2023-28450
- https://ubuntu.com/security/CVE-2023-50387
- https://ubuntu.com/security/CVE-2023-50868
- https://ubuntu.com/security/CVE-2023-28450

Title: USN-6639-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6639-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

It was discovered that a race condition existed in the Rose X.25 protocol
implementation in the Linux kernel, leading to a use-after- free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51782)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel
did not properly handle connect command payloads in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2023-6121)

Jann Horn discovered that a race condition existed in the Linux kernel when
handling io_uring over sockets, leading to a use-after-free vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6531)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle dynset expressions passed from userspace, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2023-6622)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Robert Morris discovered that the CIFS network file system implementation
in the Linux kernel did not properly validate certain server commands
fields, leading to an out-of-bounds read vulnerability. An attacker could
use this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2024-0565)

Dan Carpenter discovered that the netfilter subsystem in the Linux kernel
did not store data in properly sized memory locations. A local user could
use this to cause a denial of service (system crash). (CVE-2024-0607)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2024-0646)

Yang Chaoming discovered that the KSMBD implementation in the Linux kernel
did not properly validate request buffer sizes, leading to an out-of-bounds
read vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2024-22705)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2023-6531
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-22705
- https://ubuntu.com/security/CVE-2023-6531
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-22705
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2024-0607
- https://ubuntu.com/security/CVE-2023-6622

Title: USN-6651-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6651-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

Zhenghan Wang discovered that the generic ID allocator implementation in
the Linux kernel did not properly check for null bitmap when releasing IDs.
A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-6915)

Robert Morris discovered that the CIFS network file system implementation
in the Linux kernel did not properly validate certain server commands
fields, leading to an out-of-bounds read vulnerability. An attacker could
use this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2024-0565)

Jann Horn discovered that the io_uring subsystem in the Linux kernel did
not properly handle the release of certain buffer rings. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2024-0582)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2024-0646)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0582
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0582
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-51780

Title: USN-6653-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6653-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

Zhenghan Wang discovered that the generic ID allocator implementation in
the Linux kernel did not properly check for null bitmap when releasing IDs.
A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-6915)

Robert Morris discovered that the CIFS network file system implementation
in the Linux kernel did not properly validate certain server commands
fields, leading to an out-of-bounds read vulnerability. An attacker could
use this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2024-0565)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2024-0646)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-0565
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-0646

Title: USN-6650-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-6650-1
Priorities: medium
Description:
Zhenghan Wang discovered that the generic ID allocator implementation in
the Linux kernel did not properly check for null bitmap when releasing IDs.
A local attacker could use this to cause a denial of service (system
crash).
CVEs:
- https://ubuntu.com/security/CVE-2023-6915

Title: USN-6656-1: PostgreSQL vulnerability
URL: https://ubuntu.com/security/notices/USN-6656-1
Priorities: medium
Description:
It was discovered that PostgreSQL incorrectly handled dropping privileges
when handling REFRESH MATERIALIZED VIEW CONCURRENTLY commands. If a user or
automatic system were tricked into running a specially crafted command, a
remote attacker could possibly use this issue to execute arbitrary SQL
functions.
CVEs:
- https://ubuntu.com/security/CVE-2024-0985

Title: USN-6658-1: libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6658-1
Priorities: medium
Description:
It was discovered that libxml2 incorrectly handled certain XML documents. A
remote attacker could possibly use this issue to cause libxml2 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2024-25062

1.379

Available in the Broadcom Support portal

Release Date: February 20, 2024

Metadata:

BOSH Agent Version: 2.633.0

USNs:


Title: USN-6627-1: libde265 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6627-1
Priorities: medium,low
Description:
It was discovered that libde265 could be made to read out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service. (CVE-2021-35452, CVE-2021-36411, CVE-2022-43238, CVE-2022-43241,
CVE-2022-43242)

It was discovered that libde265 did not properly manage memory. If a user
or automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 22.04 LTS.
(CVE-2021-36408)

It was discovered that libde265 contained a logical error. If a user
or automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service.
(CVE-2021-36409)

It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2021-36410, CVE-2022-43235,
CVE-2022-43236, CVE-2022-43237, CVE-2022-43239, CVE-2022-43240,
CVE-2022-43243, CVE-2022-43248, CVE-2022-43252, CVE-2022-43253)

It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 22.04
LTS. (CVE-2022-1253)
CVEs:
- https://ubuntu.com/security/CVE-2021-35452
- https://ubuntu.com/security/CVE-2021-36411
- https://ubuntu.com/security/CVE-2022-43238
- https://ubuntu.com/security/CVE-2022-43241
- https://ubuntu.com/security/CVE-2022-43242
- https://ubuntu.com/security/CVE-2021-36408
- https://ubuntu.com/security/CVE-2021-36409
- https://ubuntu.com/security/CVE-2021-36410
- https://ubuntu.com/security/CVE-2022-43235
- https://ubuntu.com/security/CVE-2022-43236
- https://ubuntu.com/security/CVE-2022-43237
- https://ubuntu.com/security/CVE-2022-43239
- https://ubuntu.com/security/CVE-2022-43240
- https://ubuntu.com/security/CVE-2022-43243
- https://ubuntu.com/security/CVE-2022-43248
- https://ubuntu.com/security/CVE-2022-43252
- https://ubuntu.com/security/CVE-2022-43253
- https://ubuntu.com/security/CVE-2022-1253
- https://ubuntu.com/security/CVE-2022-43242
- https://ubuntu.com/security/CVE-2022-43243
- https://ubuntu.com/security/CVE-2021-36409
- https://ubuntu.com/security/CVE-2021-36410
- https://ubuntu.com/security/CVE-2022-43240
- https://ubuntu.com/security/CVE-2022-43239
- https://ubuntu.com/security/CVE-2022-43237
- https://ubuntu.com/security/CVE-2021-36411
- https://ubuntu.com/security/CVE-2022-1253
- https://ubuntu.com/security/CVE-2022-43236
- https://ubuntu.com/security/CVE-2022-43253
- https://ubuntu.com/security/CVE-2022-43241
- https://ubuntu.com/security/CVE-2022-43235
- https://ubuntu.com/security/CVE-2021-35452
- https://ubuntu.com/security/CVE-2021-36408
- https://ubuntu.com/security/CVE-2022-43252
- https://ubuntu.com/security/CVE-2022-43238
- https://ubuntu.com/security/CVE-2022-43248

Title: USN-6638-1: EDK II vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6638-1
Priorities: medium
Description:
Marc Beatove discovered buffer overflows exit in EDK2. An attacker on the
local network could potentially use this to impact availability or possibly
cause remote code execution. (CVE-2022-36763, CVE-2022-36764,
CVE-2022-36765)

It was discovered that a buffer overflows exists in EDK2’s Network Package
An attacker on the local network could potentially use these to impact
availability or possibly cause remote code execution. (CVE-2023-45230,
CVE-2023-45234, CVE-2023-45235)

It was discovered that an out-of-bounds read exists in EDK2’s Network
Package An attacker on the local network could potentially use this to
impact confidentiality. (CVE-2023-45231)

It was discovered that infinite-loops exists in EDK2’s Network Package
An attacker on the local network could potentially use these to impact
availability. (CVE-2023-45232, CVE-2023-45233)

Mate Kukri discovered that an insecure default to allow UEFI Shell in
EDK2 was left enabled in Ubuntu’s EDK2. An attacker could use this to
bypass Secure Boot. (CVE-2023-48733)
CVEs:
- https://ubuntu.com/security/CVE-2022-36763
- https://ubuntu.com/security/CVE-2022-36764
- https://ubuntu.com/security/CVE-2022-36765
- https://ubuntu.com/security/CVE-2023-45230
- https://ubuntu.com/security/CVE-2023-45234
- https://ubuntu.com/security/CVE-2023-45235
- https://ubuntu.com/security/CVE-2023-45231
- https://ubuntu.com/security/CVE-2023-45232
- https://ubuntu.com/security/CVE-2023-45233
- https://ubuntu.com/security/CVE-2023-48733
- https://ubuntu.com/security/CVE-2023-45232
- https://ubuntu.com/security/CVE-2023-45233
- https://ubuntu.com/security/CVE-2023-48733
- https://ubuntu.com/security/CVE-2023-45230
- https://ubuntu.com/security/CVE-2022-36765
- https://ubuntu.com/security/CVE-2023-45234
- https://ubuntu.com/security/CVE-2022-36763
- https://ubuntu.com/security/CVE-2023-45235
- https://ubuntu.com/security/CVE-2022-36764
- https://ubuntu.com/security/CVE-2023-45231

Title: USN-6628-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6628-1
Priorities: medium,low,high
Description:
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)

Marek Marczykowski-Górecki discovered that the Xen event channel
infrastructure implementation in the Linux kernel contained a race
condition. An attacker in a guest VM could possibly use this to cause a
denial of service (paravirtualized device unavailability). (CVE-2023-34324)

Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)

Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV)
implementation for AMD processors in the Linux kernel contained a race
condition when accessing MMIO registers. A local attacker in a SEV guest VM
could possibly use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-46813)

It was discovered that the Microchip USB Ethernet driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash). (CVE-2023-6039)

Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6040)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-6176)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle dynset expressions passed from userspace, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2023-6622)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)

It was discovered that the TIPC protocol implementation in the Linux kernel
did not properly handle locking during tipc_crypto_key_revoke() operations.
A local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2024-0641)
CVEs:
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2023-35827
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-6039
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-0641
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0641
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-35827
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2023-6039

Title: USN-6626-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6626-2
Priorities: medium,low,high
Description:
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)

Marek Marczykowski-Górecki discovered that the Xen event channel
infrastructure implementation in the Linux kernel contained a race
condition. An attacker in a guest VM could possibly use this to cause a
denial of service (paravirtualized device unavailability). (CVE-2023-34324)

Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)

Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV)
implementation for AMD processors in the Linux kernel contained a race
condition when accessing MMIO registers. A local attacker in a SEV guest VM
could possibly use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-46813)

It was discovered that the Microchip USB Ethernet driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash). (CVE-2023-6039)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-6176)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle dynset expressions passed from userspace, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2023-6622)

It was discovered that the TIPC protocol implementation in the Linux kernel
did not properly handle locking during tipc_crypto_key_revoke() operations.
A local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2024-0641)
CVEs:
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2023-35827
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-6039
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2024-0641
- https://ubuntu.com/security/CVE-2023-6039
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-35827
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2024-0641

Title: USN-6626-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6626-1
Priorities: medium,low,high
Description:
Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)

Marek Marczykowski-Górecki discovered that the Xen event channel
infrastructure implementation in the Linux kernel contained a race
condition. An attacker in a guest VM could possibly use this to cause a
denial of service (paravirtualized device unavailability). (CVE-2023-34324)

Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)

Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV)
implementation for AMD processors in the Linux kernel contained a race
condition when accessing MMIO registers. A local attacker in a SEV guest VM
could possibly use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-46813)

It was discovered that the Microchip USB Ethernet driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash). (CVE-2023-6039)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-6176)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle dynset expressions passed from userspace, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2023-6622)

It was discovered that the TIPC protocol implementation in the Linux kernel
did not properly handle locking during tipc_crypto_key_revoke() operations.
A local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2024-0641)
CVEs:
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2023-35827
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-6039
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2024-0641
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2024-0641
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-6039
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-35827
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-32250

Title: USN-6624-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6624-1
Priorities: medium,low,high
Description:
Marek Marczykowski-Górecki discovered that the Xen event channel
infrastructure implementation in the Linux kernel contained a race
condition. An attacker in a guest VM could possibly use this to cause a
denial of service (paravirtualized device unavailability). (CVE-2023-34324)

Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver
in the Linux kernel during device removal. A privileged attacker could use
this to cause a denial of service (system crash). (CVE-2023-35827)

Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV)
implementation for AMD processors in the Linux kernel contained a race
condition when accessing MMIO registers. A local attacker in a SEV guest VM
could possibly use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-46813)

It was discovered that the io_uring subsystem in the Linux kernel contained
a race condition, leading to a null pointer dereference vulnerability. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-46862)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly validate inner tunnel netlink attributes, leading to a null
pointer dereference vulnerability. A local attacker could use this to cause
a denial of service (system crash). (CVE-2023-5972)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-6176)

Jann Horn discovered that a race condition existed in the Linux kernel when
handling io_uring over sockets, leading to a use-after-free vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6531)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle dynset expressions passed from userspace, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2023-6622)

It was discovered that the TIPC protocol implementation in the Linux kernel
did not properly handle locking during tipc_crypto_key_revoke() operations.
A local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2024-0641)
CVEs:
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2023-35827
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-46862
- https://ubuntu.com/security/CVE-2023-5972
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-6531
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2024-0641
- https://ubuntu.com/security/CVE-2023-6531
- https://ubuntu.com/security/CVE-2023-5972
- https://ubuntu.com/security/CVE-2023-35827
- https://ubuntu.com/security/CVE-2023-46862
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-6622
- https://ubuntu.com/security/CVE-2024-0641

Title: USN-6635-1: Linux kernel (GCP) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6635-1
Priorities: medium,high
Description:
It was discovered that the USB subsystem in the Linux kernel contained a
race condition while handling device descriptors in certain situations,
leading to a out-of-bounds read vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-37453)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)

Jason Wang discovered that the virtio ring implementation in the Linux
kernel did not properly handle iov buffers in some situations. A local
attacker in a guest VM could use this to cause a denial of service (host
system crash). (CVE-2023-5158)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly handle queue initialization failures in certain
situations, leading to a use-after-free vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)
CVEs:
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-5158
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-5158
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-39189

Title: LSN-0100-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0100-1
Priorities: high,medium
Description:
It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code.(CVE-2023-5345)

Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code.(CVE-2023-6040)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code.(CVE-2023-6176)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-6817)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-6932)
CVEs:
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-5345

Title: USN-6608-2: Linux kernel (NVIDIA) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6608-2
Priorities: medium,high
Description:
It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)
CVEs:
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6817

Title: USN-6630-1: Glance_store vulnerability
URL: https://ubuntu.com/security/notices/USN-6630-1
Priorities: medium
Description:
It was discovered that Glance_store incorrectly handled logging when the
DEBUG log level is enabled. A local attacker could use this issue to obtain
access_key values.
CVEs:
- https://ubuntu.com/security/CVE-2024-1141

Title: USN-6634-1: .NET vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6634-1
Priorities: medium
Description:
Brennan Conroy discovered that .NET with SignalR did not properly
handle malicious clients. An attacker could possibly use this issue
to cause a denial of service. (CVE-2024-21386)

Bahaa Naamneh discovered that .NET with OpenSSL support did not
properly parse X509 certificates. An attacker could possibly use
this issue to cause a denial of service. (CVE-2024-21404)
CVEs:
- https://ubuntu.com/security/CVE-2024-21386
- https://ubuntu.com/security/CVE-2024-21404
- https://ubuntu.com/security/CVE-2024-21386
- https://ubuntu.com/security/CVE-2024-21404

Title: USN-6623-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-6623-1
Priorities: medium
Description:
It was discovered that Django incorrectly handled certain inputs
that uses intcomma template filter. An attacker could possibly
use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2024-24680

Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.351…ubuntu-jammy/v1.379

1.360

Available in the Broadcom Support portal

Release Date: February 08, 2024

Metadata:

BOSH Agent Version: 2.624.0

USNs:


Title: USN-6616-1: OpenLDAP vulnerability
URL: https://ubuntu.com/security/notices/USN-6616-1
Priorities: low
Description:
It was discovered that OpenLDAP was not properly performing bounds checks
when executing functions related to LDAP URLs. An attacker could possibly
use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-2953

Title: USN-6614-1: amanda vulnerability
URL: https://ubuntu.com/security/notices/USN-6614-1
Priorities: medium
Description:
It was discovered that amanda did not properly check certain arguments. A
local unprivileged attacker could possibly use this issue to perform a
privilege escalation attack.
CVEs:
- https://ubuntu.com/security/CVE-2023-30577

Title: USN-6612-1: TinyXML vulnerability
URL: https://ubuntu.com/security/notices/USN-6612-1
Priorities: medium
Description:
It was discovered that TinyXML incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
XML file, a remote attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-34194

Title: USN-6613-1: Ceph vulnerability
URL: https://ubuntu.com/security/notices/USN-6613-1
Priorities: medium
Description:
Lucas Henry discovered that Ceph incorrectly handled specially
crafted POST requests. An uprivileged user could use this to
bypass Ceph’s authorization checks and upload a file to any bucket.
CVEs:
- https://ubuntu.com/security/CVE-2023-43040

Title: USN-6591-2: Postfix update
URL: https://ubuntu.com/security/notices/USN-6591-2
Priorities: medium
Description:
USN-6591-1 fixed vulnerabilities in Postfix. A fix with less risk of
regression has been made available since the last update. This update
updates the fix and aligns with the latest configuration guidelines
regarding this vulnerability.

We apologize for the inconvenience.

Original advisory details:

Timo Longin discovered that Postfix incorrectly handled certain email line
endings. A remote attacker could possibly use this issue to bypass an email
authentication mechanism, allowing domain spoofing and potential spamming.

Please note that certain configuration changes are required to address
this issue. They are not enabled by default for backward compatibility.
Information can be found at https://www.postfix.org/smtp-smuggling.html.
CVEs:
- https://ubuntu.com/security/CVE-2023-51764

Title: USN-6611-1: Exim vulnerability
URL: https://ubuntu.com/security/notices/USN-6611-1
Priorities: medium
Description:
It was discovered that Exim incorrectly handled certain requests.
A remote attacker could possibly use a published exploitation technique
to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass
of an SPF protection mechanism.
CVEs:
- https://ubuntu.com/security/CVE-2023-51766

Title: USN-6606-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6606-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the Bluetooth subsystem
of the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)
CVEs:
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931

Title: USN-6621-1: ImageMagick vulnerability
URL: https://ubuntu.com/security/notices/USN-6621-1
Priorities: medium
Description:
It was discovered that ImageMagick incorrectly handled certain values when
processing BMP files. An attacker could exploit this to cause a denial of
service.
CVEs:
- https://ubuntu.com/security/CVE-2023-5341

Title: USN-6607-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6607-1
Priorities: high,medium
Description:
It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)

Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6040)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)
CVEs:
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6606

Title: USN-6622-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6622-1
Priorities: low
Description:
David Benjamin discovered that OpenSSL incorrectly handled excessively long
X9.42 DH keys. A remote attacker could possibly use this issue to cause
OpenSSL to consume resources, leading to a denial of service.
(CVE-2023-5678)

Sverker Eriksson discovered that OpenSSL incorrectly handled POLY1304 MAC
on the PowerPC architecture. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and
Ubuntu 23.04. (CVE-2023-6129)

It was discovered that OpenSSL incorrectly handled excessively long RSA
public keys. A remote attacker could possibly use this issue to cause
OpenSSL to consume resources, leading to a denial of service. This issue
only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6237)

Bahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed
PKCS12 files. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. (CVE-2024-0727)
CVEs:
- https://ubuntu.com/security/CVE-2023-5678
- https://ubuntu.com/security/CVE-2023-6129
- https://ubuntu.com/security/CVE-2023-6237
- https://ubuntu.com/security/CVE-2024-0727
- https://ubuntu.com/security/CVE-2023-6237
- https://ubuntu.com/security/CVE-2023-5678
- https://ubuntu.com/security/CVE-2024-0727
- https://ubuntu.com/security/CVE-2023-6129

Title: USN-6609-3: Linux kernel (Oracle) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6609-3
Priorities: medium,high
Description:
Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6040)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)
CVEs:
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6932

Title: USN-6609-2: Linux kernel (NVIDIA) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6609-2
Priorities: medium,high
Description:
Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6040)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)
CVEs:
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6931

Title: USN-6609-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6609-1
Priorities: medium,high
Description:
Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6040)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)
CVEs:
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6931

Title: USN-6608-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6608-1
Priorities: medium,high
Description:
It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)
CVEs:
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6606

Title: USN-6587-3: X.Org X Server regression
URL: https://ubuntu.com/security/notices/USN-6587-3
Priorities: medium
Description:
USN-6587-1 fixed vulnerabilities in X.Org X Server. The fix was incomplete
resulting in a possible regression. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the DeviceFocusEvent and ProcXIQueryPointer APIs. An
attacker could possibly use this issue to cause the X Server to crash,
obtain sensitive information, or execute arbitrary code. (CVE-2023-6816)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
reattaching to a different master device. An attacker could use this issue
to cause the X Server to crash, leading to a denial of service, or possibly
execute arbitrary code. (CVE-2024-0229)

Olivier Fourdan and Donn Seeley discovered that the X.Org X Server
incorrectly labeled GLX PBuffers when used with SELinux. An attacker could
use this issue to cause the X Server to crash, leading to a denial of
service. (CVE-2024-0408)

Olivier Fourdan discovered that the X.Org X Server incorrectly handled
the curser code when used with SELinux. An attacker could use this issue to
cause the X Server to crash, leading to a denial of service.
(CVE-2024-0409)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the XISendDeviceHierarchyEvent API. An attacker
could possibly use this issue to cause the X Server to crash, or execute
arbitrary code. (CVE-2024-21885)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
devices being disabled. An attacker could possibly use this issue to cause
the X Server to crash, or execute arbitrary code. (CVE-2024-21886)
CVEs:
- https://ubuntu.com/security/CVE-2023-6816
- https://ubuntu.com/security/CVE-2024-0229
- https://ubuntu.com/security/CVE-2024-0408
- https://ubuntu.com/security/CVE-2024-0409
- https://ubuntu.com/security/CVE-2024-21885
- https://ubuntu.com/security/CVE-2024-21886

Title: USN-6619-1: runC vulnerability
URL: https://ubuntu.com/security/notices/USN-6619-1
Priorities: high
Description:
Rory McNamara discovered that runC did not properly manage internal file
descriptor while managing containers. An attacker could possibly use this
issue to obtain sensitive information or bypass container restrictions.
CVEs:
- https://ubuntu.com/security/CVE-2024-21626

Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.351…ubuntu-jammy/v1.360

1.351

Available in the Broadcom Support portal

Release Date: January 29, 2024

Metadata:

BOSH Agent Version: 2.620.0

Improvements

  • 311

  • kernel bumped to 6.5 #312
  • libsumcmd.a folder changes with newer kernels #313 #315

USNs:


Title: USN-6579-2: Xerces-C++ vulnerability
URL: https://ubuntu.com/security/notices/USN-6579-2
Priorities: medium
Description:
USN-6579-1 fixed a vulnerability in Xerces-C++. This update provides the
corresponding update for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04
and Ubuntu 23.10.

Original advisory details:

It was discovered that Xerces-C++ was not properly handling memory
management operations when parsing XML data containing external DTDs,
which could trigger a use-after-free error. If a user or automated system
were tricked into processing a specially crafted XML document, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2018-1311

Title: USN-6590-1: Xerces-C++ vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6590-1
Priorities: medium
Description:
It was discovered that Xerces-C++ was not properly handling memory
management operations when parsing XML data containing external DTDs,
which could trigger a use-after-free error. If a user or automated system
were tricked into processing a specially crafted XML document, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2018-1311)

It was discovered that Xerces-C++ was not properly performing bounds
checks when processing XML Schema Definition files, which could lead to an
out-of-bounds access via an HTTP request. If a user or automated system
were tricked into processing a specially crafted XSD file, a remote
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-37536)
CVEs:
- https://ubuntu.com/security/CVE-2018-1311
- https://ubuntu.com/security/CVE-2023-37536
- https://ubuntu.com/security/CVE-2018-1311
- https://ubuntu.com/security/CVE-2023-37536

Title: USN-6559-1: ZooKeeper vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6559-1
Priorities: low,medium
Description:
It was discovered that ZooKeeper incorrectly handled authorization for
the getACL() command. A remote attacker could possibly use this issue to
obtain sensitive information. This issue only affected Ubuntu 14.04
LTS and Ubuntu 16.04 LTS. (CVE-2019-0201)

Damien Diederen discovered that ZooKeeper incorrectly handled
authorization if SASL Quorum Peer authentication is enabled. An
attacker could possibly use this issue to bypass ZooKeeper’s
authorization system. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04
and Ubuntu 23.10. (CVE-2023-44981)
CVEs:
- https://ubuntu.com/security/CVE-2019-0201
- https://ubuntu.com/security/CVE-2023-44981
- https://ubuntu.com/security/CVE-2023-44981
- https://ubuntu.com/security/CVE-2019-0201

Title: USN-6586-1: FreeImage vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6586-1
Priorities: medium
Description:
It was discovered that FreeImage incorrectly handled certain memory
operations. If a user were tricked into opening a crafted TIFF file, a
remote attacker could use this issue to cause a heap buffer overflow,
resulting in a denial of service attack. This issue only affected Ubuntu
16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12211)

It was discovered that FreeImage incorrectly processed images under
certain circumstances. If a user were tricked into opening a crafted TIFF
file, a remote attacker could possibly use this issue to cause a stack
exhaustion condition, resulting in a denial of service attack. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12213)

It was discovered that FreeImage incorrectly processed certain images.
If a user or automated system were tricked into opening a specially
crafted image file, a remote attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2020-21427,
CVE-2020-21428)

It was discovered that FreeImage incorrectly processed certain images.
If a user or automated system were tricked into opening a specially
crafted PFM file, an attacker could possibly use this issue to cause a
denial of service. (CVE-2020-22524)
CVEs:
- https://ubuntu.com/security/CVE-2019-12211
- https://ubuntu.com/security/CVE-2019-12213
- https://ubuntu.com/security/CVE-2020-21427
- https://ubuntu.com/security/CVE-2020-21428
- https://ubuntu.com/security/CVE-2020-22524
- https://ubuntu.com/security/CVE-2020-21427
- https://ubuntu.com/security/CVE-2020-21428
- https://ubuntu.com/security/CVE-2019-12213
- https://ubuntu.com/security/CVE-2020-22524
- https://ubuntu.com/security/CVE-2019-12211

Title: USN-6571-1: Monit vulnerability
URL: https://ubuntu.com/security/notices/USN-6571-1
Priorities: medium
Description:
Youssef Rebahi-Gilbert discovered that Monit did not properly process
credentials for disabled accounts. An attacker could possibly use this
issue to login to the platform with an expired account and a valid
password.
CVEs:
- https://ubuntu.com/security/CVE-2022-26563

Title: USN-6575-1: Twisted vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6575-1
Priorities: low,medium
Description:
It was discovered that Twisted incorrectly escaped host headers in certain
404 responses. A remote attacker could possibly use this issue to perform
HTML and script injection attacks. This issue only affected Ubuntu 20.04
LTS and Ubuntu 22.04 LTS. (CVE-2022-39348)

It was discovered that Twisted incorrectly handled response order when
processing multiple HTTP requests. A remote attacker could possibly use
this issue to delay responses and manipulate the responses of second
requests. (CVE-2023-46137)
CVEs:
- https://ubuntu.com/security/CVE-2022-39348
- https://ubuntu.com/security/CVE-2023-46137
- https://ubuntu.com/security/CVE-2022-39348
- https://ubuntu.com/security/CVE-2023-46137

Title: USN-6581-1: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6581-1
Priorities: medium
Description:
It was discovered that GNU binutils was not properly performing bounds
checks in several functions, which could lead to a buffer overflow. An
attacker could possibly use this issue to cause a denial of service,
expose sensitive information or execute arbitrary code.
(CVE-2022-44840, CVE-2022-45703)

It was discovered that GNU binutils incorrectly handled memory management
operations in several of its functions, which could lead to excessive
memory consumption due to memory leaks. An attacker could possibly use
these issues to cause a denial of service.
(CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011)
CVEs:
- https://ubuntu.com/security/CVE-2022-44840
- https://ubuntu.com/security/CVE-2022-45703
- https://ubuntu.com/security/CVE-2022-47007
- https://ubuntu.com/security/CVE-2022-47008
- https://ubuntu.com/security/CVE-2022-47010
- https://ubuntu.com/security/CVE-2022-47011
- https://ubuntu.com/security/CVE-2022-47008
- https://ubuntu.com/security/CVE-2022-47011
- https://ubuntu.com/security/CVE-2022-47007
- https://ubuntu.com/security/CVE-2022-47010
- https://ubuntu.com/security/CVE-2022-45703
- https://ubuntu.com/security/CVE-2022-44840

Title: USN-6600-1: MariaDB vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6600-1
Priorities: medium
Description:
Several security issues were discovered in MariaDB and this update
includes new upstream MariaDB versions to fix these issues.

MariaDB has been updated to 10.3.39 in Ubuntu 20.04 LTS, 10.6.16
in Ubuntu 22.04 LTS and 10.11.6 in Ubuntu 23.10.

CVE-2022-47015 only affected the MariaDB packages in Ubuntu 20.04 LTS
and Ubuntu 22.04 LTS.

In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.
CVEs:
- https://ubuntu.com/security/CVE-2022-47015
- https://ubuntu.com/security/CVE-2022-47015
- https://ubuntu.com/security/CVE-2023-22084

Title: USN-6574-1: Go vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6574-1
Priorities: medium
Description:
Takeshi Kaneko discovered that Go did not properly handle comments and
special tags in the script context of html/template module. An attacker
could possibly use this issue to inject Javascript code and perform a cross
site scripting attack. This issue only affected Go 1.20 in Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-39318, CVE-2023-39319)

It was discovered that Go did not properly validate the “//go:cgo_”
directives during compilation. An attacker could possibly use this issue to
inject arbitrary code during compile time. (CVE-2023-39323)

It was discovered that Go did not limit the number of simultaneously
executing handler goroutines in the net/http module. An attacker could
possibly use this issue to cause a panic resulting into a denial of service.
(CVE-2023-39325, CVE-2023-44487)

It was discovered that the Go net/http module did not properly validate the
chunk extensions reading from a request or response body. An attacker could
possibly use this issue to read sensitive information. (CVE-2023-39326)

It was discovered that Go did not properly validate the insecure “git://”
protocol when using go get to fetch a module with the “.git” suffix. An
attacker could possibly use this issue to bypass secure protocol checks.
(CVE-2023-45285)
CVEs:
- https://ubuntu.com/security/CVE-2023-39318
- https://ubuntu.com/security/CVE-2023-39319
- https://ubuntu.com/security/CVE-2023-39323
- https://ubuntu.com/security/CVE-2023-39325
- https://ubuntu.com/security/CVE-2023-44487
- https://ubuntu.com/security/CVE-2023-39326
- https://ubuntu.com/security/CVE-2023-45285
- https://ubuntu.com/security/CVE-2023-39326
- https://ubuntu.com/security/CVE-2023-39323
- https://ubuntu.com/security/CVE-2023-45285
- https://ubuntu.com/security/CVE-2023-39325
- https://ubuntu.com/security/CVE-2023-44487
- https://ubuntu.com/security/CVE-2023-39319
- https://ubuntu.com/security/CVE-2023-39318

Title: USN-6580-1: w3m vulnerability
URL: https://ubuntu.com/security/notices/USN-6580-1
Priorities: medium
Description:
It was discovered that w3m incorrectly handled certain HTML files.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-4255

Title: USN-6582-1: WebKitGTK vulnerability
URL: https://ubuntu.com/security/notices/USN-6582-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-42883

Title: USN-6541-2: GNU C Library regression
URL: https://ubuntu.com/security/notices/USN-6541-2
Priorities: low,medium
Description:
USN-6541-1 fixed vulnerabilities in the GNU C Library. Unfortunately,
changes made to allow proper application of the fix for CVE-2023-4806 in
Ubuntu 22.04 LTS introduced an issue in the NSCD service IPv6 processing
functionalities. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that the GNU C Library was not properly handling certain
memory operations. An attacker could possibly use this issue to cause a
denial of service (application crash). (CVE-2023-4806, CVE-2023-4813)

It was discovered that the GNU C library was not properly implementing a
fix for CVE-2023-4806 in certain cases, which could lead to a memory leak.
An attacker could possibly use this issue to cause a denial of service
(application crash). This issue only affected Ubuntu 22.04 LTS and Ubuntu
23.04. (CVE-2023-5156)
CVEs:
- https://ubuntu.com/security/CVE-2023-4806
- https://ubuntu.com/security/CVE-2023-4806
- https://ubuntu.com/security/CVE-2023-4813
- https://ubuntu.com/security/CVE-2023-4806
- https://ubuntu.com/security/CVE-2023-5156

Title: USN-6589-1: FileZilla vulnerability
URL: https://ubuntu.com/security/notices/USN-6589-1
Priorities: medium
Description:
Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH
protocol used in FileZilla is prone to a prefix truncation attack, known as
the “Terrapin attack”. A remote attacker could use this issue to downgrade or
disable some security features and obtain sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-48795

Title: USN-6598-1: Paramiko vulnerability
URL: https://ubuntu.com/security/notices/USN-6598-1
Priorities: medium
Description:
Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH
protocol was vulnerable to a prefix truncation attack. If a remote attacker
was able to intercept SSH communications, extension negotiation messages
could be truncated, possibly leading to certain algorithms and features
being downgraded. This issue is known as the Terrapin attack. This update
adds protocol extensions to mitigate this issue.
CVEs:
- https://ubuntu.com/security/CVE-2023-48795

Title: USN-6591-1: Postfix vulnerability
URL: https://ubuntu.com/security/notices/USN-6591-1
Priorities: medium
Description:
Timo Longin discovered that Postfix incorrectly handled certain email line
endings. A remote attacker could possibly use this issue to bypass an email
authentication mechanism, allowing domain spoofing and potential spamming.

Please note that certain configuration changes are required to address
this issue. They are not enabled by default for backward compatibility.
Information can be found at https://www.postfix.org/smtp-smuggling.html.
CVEs:
- https://ubuntu.com/security/CVE-2023-51764

Title: USN-6606-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6606-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the Bluetooth subsystem
of the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)
CVEs:
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931

Title: USN-6607-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6607-1
Priorities: high,medium
Description:
It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)

Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6040)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)
CVEs:
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6606

Title: USN-6592-1: libssh vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6592-1
Priorities: medium
Description:
It was discovered that libssh incorrectly handled the ProxyCommand and the
ProxyJump features. A remote attacker could possibly use this issue to
inject malicious code into the command of the features mentioned through
the hostname parameter. (CVE-2023-6004)

It was discovered that libssh incorrectly handled return codes when
performing message digest operations. A remote attacker could possibly use
this issue to cause libssh to crash, obtain sensitive information, or
execute arbitrary code. (CVE-2023-6918)
CVEs:
- https://ubuntu.com/security/CVE-2023-6004
- https://ubuntu.com/security/CVE-2023-6918
- https://ubuntu.com/security/CVE-2023-6918
- https://ubuntu.com/security/CVE-2023-6004

Title: USN-6576-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-6576-1
Priorities: medium
Description:
Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle an expired catchall element in some situations, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-6111

Title: USN-6587-1: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6587-1
Priorities: medium
Description:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the DeviceFocusEvent and ProcXIQueryPointer APIs. An
attacker could possibly use this issue to cause the X Server to crash,
obtain sensitive information, or execute arbitrary code. (CVE-2023-6816)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
reattaching to a different master device. An attacker could use this issue
to cause the X Server to crash, leading to a denial of service, or possibly
execute arbitrary code. (CVE-2024-0229)

Olivier Fourdan and Donn Seeley discovered that the X.Org X Server
incorrectly labeled GLX PBuffers when used with SELinux. An attacker could
use this issue to cause the X Server to crash, leading to a denial of
service. (CVE-2024-0408)

Olivier Fourdan discovered that the X.Org X Server incorrectly handled
the curser code when used with SELinux. An attacker could use this issue to
cause the X Server to crash, leading to a denial of service.
(CVE-2024-0409)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the XISendDeviceHierarchyEvent API. An attacker
could possibly use this issue to cause the X Server to crash, or execute
arbitrary code. (CVE-2024-21885)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
devices being disabled. An attacker could possibly use this issue to cause
the X Server to crash, or execute arbitrary code. (CVE-2024-21886)
CVEs:
- https://ubuntu.com/security/CVE-2023-6816
- https://ubuntu.com/security/CVE-2024-0229
- https://ubuntu.com/security/CVE-2024-0408
- https://ubuntu.com/security/CVE-2024-0409
- https://ubuntu.com/security/CVE-2024-21885
- https://ubuntu.com/security/CVE-2024-21886
- https://ubuntu.com/security/CVE-2024-21886
- https://ubuntu.com/security/CVE-2024-21885
- https://ubuntu.com/security/CVE-2024-0408
- https://ubuntu.com/security/CVE-2024-0409
- https://ubuntu.com/security/CVE-2023-6816
- https://ubuntu.com/security/CVE-2024-0229

Title: USN-6578-1: .NET vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6578-1
Priorities: medium
Description:
Vishal Mishra and Anita Gaud discovered that .NET did not properly
validate X.509 certificates with malformed signatures. An attacker
could possibly use this issue to bypass an application’s typical
authentication logic.
(CVE-2024-0057)

Morgan Brown discovered that .NET did not properly handle requests from
unauthenticated clients. An attacker could possibly use this issue to
cause a denial of service.
(CVE-2024-21319)
CVEs:
- https://ubuntu.com/security/CVE-2024-0057
- https://ubuntu.com/security/CVE-2024-21319
- https://ubuntu.com/security/CVE-2024-0057
- https://ubuntu.com/security/CVE-2024-21319

Title: USN-6588-1: PAM vulnerability
URL: https://ubuntu.com/security/notices/USN-6588-1
Priorities: medium
Description:
Matthias Gerstner discovered that the PAM pam_namespace module incorrectly
handled special files when performing directory checks. A local attacker
could possibly use this issue to cause PAM to stop responding, resulting in
a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2024-22365

1.340

Available in the Broadcom Support portal

Release Date: January 10, 2024

Metadata:

BOSH Agent Version: 2.616.0

What’s Changed


* Fixed issue where logrotate was not being scheduled properly due to using “OnUnitActiveSec” instead of “OnCalendar.” https://github.com/cloudfoundry/bosh-linux-stemcell-builder/pull/308

USNs:


Title: USN-6233-2: YAJL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6233-2
Priorities: low,medium
Description:
USN-6233-1 fixed vulnerabilities in YAJL. This update provides the
corresponding updates for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu
23.04.

Original advisory details:

It was discovered that YAJL was not properly performing bounds checks when
decoding a string with escape sequences. If a user or automated system
using YAJL were tricked into processing specially crafted input, an
attacker could possibly use this issue to cause a denial of service
(application abort). (CVE-2017-16516)

It was discovered that YAJL was not properly handling memory allocation
when dealing with large inputs, which could lead to heap memory
corruption. If a user or automated system using YAJL were tricked into
running a specially crafted large input, an attacker could possibly use
this issue to cause a denial of service. (CVE-2022-24795)

It was discovered that memory leaks existed in one of the YAJL parsing
functions. An attacker could possibly use this issue to cause a denial of
service (memory exhaustion). (CVE-2023-33460)
CVEs:
- https://ubuntu.com/security/CVE-2017-16516
- https://ubuntu.com/security/CVE-2022-24795
- https://ubuntu.com/security/CVE-2023-33460
- https://ubuntu.com/security/CVE-2023-33460
- https://ubuntu.com/security/CVE-2017-16516
- https://ubuntu.com/security/CVE-2022-24795

Title: USN-6558-1: audiofile vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6558-1
Priorities: low,medium
Description:
It was discovered that audiofile could be made to dereference invalid
memory. If a user or an automated system were tricked into opening a
specially crafted file, an attacker could possibly use this issue to cause
a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu
18.04 LTS. (CVE-2018-13440)

It was discovered that audiofile could be made to write out of bounds. If a
user or an automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 16.04
LTS and Ubuntu 18.04 LTS. (CVE-2018-17095)

It was discovered that audiofile could be made to dereference invalid
memory. If a user or an automated system were tricked into opening a
specially crafted file, an attacker could possibly use this issue to cause
a denial of service. (CVE-2019-13147)

It was discovered that audiofile could be made to leak memory. If a user or
an automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to obtain sensitive information.
(CVE-2022-24599)
CVEs:
- https://ubuntu.com/security/CVE-2018-13440
- https://ubuntu.com/security/CVE-2018-17095
- https://ubuntu.com/security/CVE-2019-13147
- https://ubuntu.com/security/CVE-2022-24599
- https://ubuntu.com/security/CVE-2018-17095
- https://ubuntu.com/security/CVE-2019-13147
- https://ubuntu.com/security/CVE-2018-13440
- https://ubuntu.com/security/CVE-2022-24599

Title: USN-6567-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6567-1
Priorities: low,medium
Description:
Gaoning Pan and Xingwei Li discovered that QEMU incorrectly handled the
USB xHCI controller device. A privileged guest attacker could possibly use
this issue to cause QEMU to crash, leading to a denial of service. This
issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2020-14394)

It was discovered that QEMU incorrectly handled the TCG Accelerator. A
local attacker could use this issue to cause QEMU to crash, leading to a
denial of service, or possibly execute arbitrary code and esclate
privileges. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-24165)

It was discovered that QEMU incorrectly handled the Intel HD audio device.
A malicious guest attacker could use this issue to cause QEMU to crash,
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS.
(CVE-2021-3611)

It was discovered that QEMU incorrectly handled the ATI VGA device. A
malicious guest attacker could use this issue to cause QEMU to crash,
leading to a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-3638)

It was discovered that QEMU incorrectly handled the VMWare paravirtual RDMA
device. A malicious guest attacker could use this issue to cause QEMU to
crash, leading to a denial of service. (CVE-2023-1544)

It was discovered that QEMU incorrectly handled the 9p passthrough
filesystem. A malicious guest attacker could possibly use this issue to
open special files and escape the exported 9p tree. This issue only
affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-2861)

It was discovered that QEMU incorrectly handled the virtual crypto device.
A malicious guest attacker could use this issue to cause QEMU to crash,
leading to a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-3180)

It was discovered that QEMU incorrectly handled the built-in VNC server.
A remote authenticated attacker could possibly use this issue to cause QEMU
to stop responding, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-3255)

It was discovered that QEMU incorrectly handled net device hot-unplugging.
A malicious guest attacker could use this issue to cause QEMU to crash,
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS
and Ubuntu 23.04. (CVE-2023-3301)

It was discovered that QEMU incorrectly handled the built-in VNC server.
A remote attacker could possibly use this issue to cause QEMU to crash,
resulting in a denial of service. This issue only affected Ubuntu 20.04
LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-3354)

It was discovered that QEMU incorrectly handled NVME devices. A malicious
guest attacker could use this issue to cause QEMU to crash, leading to a
denial of service. This issue only affected Ubuntu 23.10. (CVE-2023-40360)

It was discovered that QEMU incorrectly handled NVME devices. A malicious
guest attacker could use this issue to cause QEMU to crash, leading to a
denial of service, or possibly obtain sensitive information. This issue
only affected Ubuntu 23.10. (CVE-2023-4135)

It was discovered that QEMU incorrectly handled SCSI devices. A malicious
guest attacker could use this issue to cause QEMU to crash, leading to a
denial of service. This issue only affected Ubuntu 23.04 and Ubuntu 23.10.
(CVE-2023-42467)

It was discovered that QEMU incorrectly handled certain disk offsets. A
malicious guest attacker could possibly use this issue to gain control of
the host in certain nested virtualization scenarios. (CVE-2023-5088)
CVEs:
- https://ubuntu.com/security/CVE-2020-14394
- https://ubuntu.com/security/CVE-2020-24165
- https://ubuntu.com/security/CVE-2021-3611
- https://ubuntu.com/security/CVE-2021-3638
- https://ubuntu.com/security/CVE-2023-1544
- https://ubuntu.com/security/CVE-2023-2861
- https://ubuntu.com/security/CVE-2023-3180
- https://ubuntu.com/security/CVE-2023-3255
- https://ubuntu.com/security/CVE-2023-3301
- https://ubuntu.com/security/CVE-2023-3354
- https://ubuntu.com/security/CVE-2023-40360
- https://ubuntu.com/security/CVE-2023-4135
- https://ubuntu.com/security/CVE-2023-42467
- https://ubuntu.com/security/CVE-2023-5088
- https://ubuntu.com/security/CVE-2023-1544
- https://ubuntu.com/security/CVE-2023-3354
- https://ubuntu.com/security/CVE-2023-3301
- https://ubuntu.com/security/CVE-2023-5088
- https://ubuntu.com/security/CVE-2020-24165
- https://ubuntu.com/security/CVE-2021-3638
- https://ubuntu.com/security/CVE-2023-4135
- https://ubuntu.com/security/CVE-2023-3180
- https://ubuntu.com/security/CVE-2023-2861
- https://ubuntu.com/security/CVE-2021-3611
- https://ubuntu.com/security/CVE-2023-3255
- https://ubuntu.com/security/CVE-2023-42467
- https://ubuntu.com/security/CVE-2020-14394
- https://ubuntu.com/security/CVE-2023-40360

Title: USN-6565-1: OpenSSH vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6565-1
Priorities: low,medium
Description:
It was discovered that OpenSSH incorrectly handled supplemental groups when
running helper programs for AuthorizedKeysCommand and
AuthorizedPrincipalsCommand as a different user. An attacker could possibly
use this issue to escalate privileges. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-41617)

It was discovered that OpenSSH incorrectly added destination constraints
when PKCS#11 token keys were added to ssh-agent, contrary to expectations.
This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-51384)

It was discovered that OpenSSH incorrectly handled user names or host names
with shell metacharacters. An attacker could possibly use this issue to
perform OS command injection. (CVE-2023-51385)
CVEs:
- https://ubuntu.com/security/CVE-2021-41617
- https://ubuntu.com/security/CVE-2023-51384
- https://ubuntu.com/security/CVE-2023-51385
- https://ubuntu.com/security/CVE-2021-41617
- https://ubuntu.com/security/CVE-2023-51384
- https://ubuntu.com/security/CVE-2023-51385

Title: USN-6557-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6557-1
Priorities: low,medium
Description:
It was discovered that Vim could be made to dereference invalid memory. An
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-1725)

It was discovered that Vim could be made to recurse infinitely. An
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1771)

It was discovered that Vim could be made to write out of bounds with a put
command. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 22.04
LTS. (CVE-2022-1886)

It was discovered that Vim could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1897,
CVE-2022-2000)

It was discovered that Vim did not properly manage memory in the spell
command. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 22.04
LTS. (CVE-2022-2042)

It was discovered that Vim did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2023-46246, CVE-2023-48231)

It was discovered that Vim could be made to divide by zero. An attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 23.04 and Ubuntu 23.10. (CVE-2023-48232)

It was discovered that Vim contained multiple arithmetic overflows. An
attacker could possibly use these issues to cause a denial of service.
(CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236,
CVE-2023-48237)

It was discovered that Vim did not properly manage memory in the
substitute command. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. This issue only affected
Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-48706)
CVEs:
- https://ubuntu.com/security/CVE-2022-1725
- https://ubuntu.com/security/CVE-2022-1771
- https://ubuntu.com/security/CVE-2022-1886
- https://ubuntu.com/security/CVE-2022-1897
- https://ubuntu.com/security/CVE-2022-2000
- https://ubuntu.com/security/CVE-2022-2042
- https://ubuntu.com/security/CVE-2023-46246
- https://ubuntu.com/security/CVE-2023-48231
- https://ubuntu.com/security/CVE-2023-48232
- https://ubuntu.com/security/CVE-2023-48233
- https://ubuntu.com/security/CVE-2023-48234
- https://ubuntu.com/security/CVE-2023-48235
- https://ubuntu.com/security/CVE-2023-48236
- https://ubuntu.com/security/CVE-2023-48237
- https://ubuntu.com/security/CVE-2023-48706
- https://ubuntu.com/security/CVE-2023-48706
- https://ubuntu.com/security/CVE-2023-48234
- https://ubuntu.com/security/CVE-2023-48231
- https://ubuntu.com/security/CVE-2023-46246
- https://ubuntu.com/security/CVE-2023-48235
- https://ubuntu.com/security/CVE-2022-1725
- https://ubuntu.com/security/CVE-2023-48232
- https://ubuntu.com/security/CVE-2022-2042
- https://ubuntu.com/security/CVE-2022-2000
- https://ubuntu.com/security/CVE-2022-1886
- https://ubuntu.com/security/CVE-2023-48233
- https://ubuntu.com/security/CVE-2023-48236
- https://ubuntu.com/security/CVE-2022-1771
- https://ubuntu.com/security/CVE-2022-1897
- https://ubuntu.com/security/CVE-2023-48237

Title: USN-6564-1: Node.js vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6564-1
Priorities: medium,high
Description:
Hubert Kario discovered that Node.js incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to obtain sensitive
information. (CVE-2022-4304)

CarpetFuzz, Dawei Wang discovered that Node.js incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2022-4450)

Octavio Galland and Marcel Böhme discovered that Node.js incorrectly handled
certain inputs. If a user or an automated system were tricked into opening a
specially crafted input file, a remote attacker could possibly use this issue
to cause a denial of service. (CVE-2023-0215)

David Benjamin discovered that Node.js incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to obtain sensitive
information. (CVE-2023-0286)

Hubert Kario and Dmitry Belyavsky discovered that Node.js incorrectly handled
certain inputs. If a user or an automated system were tricked into opening a
specially crafted input file, a remote attacker could possibly use this issue
to cause a denial of service. (CVE-2023-0401)
CVEs:
- https://ubuntu.com/security/CVE-2022-4304
- https://ubuntu.com/security/CVE-2022-4450
- https://ubuntu.com/security/CVE-2023-0215
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2023-0401
- https://ubuntu.com/security/CVE-2022-4450
- https://ubuntu.com/security/CVE-2022-4304
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2023-0401
- https://ubuntu.com/security/CVE-2023-0215

Title: USN-6556-1: Budgie Extras vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6556-1
Priorities: medium
Description:
It was discovered that Budgie Extras incorrectly handled certain temporary file paths.
An attacker could possibly use this issue to inject false information or deny
access to the application. (CVE-2023-49342, CVE-2023-49343, CVE-2023-49347)

Matthias Gerstner discovered that Budgie Extras incorrectly handled certain
temporary file paths. A local attacker could use this to inject arbitrary PNG
data in this path and have it displayed on the victim’s desktop or deny access
to the application. (CVE-2023-49344)

Matthias Gerstner discovered that Budgie Extras incorrectly handled certain
temporary file paths. A local attacker could use this to inject false information
or deny access to the application. (CVE-2023-49345, CVE-2023-49346)
CVEs:
- https://ubuntu.com/security/CVE-2023-49342
- https://ubuntu.com/security/CVE-2023-49343
- https://ubuntu.com/security/CVE-2023-49347
- https://ubuntu.com/security/CVE-2023-49344
- https://ubuntu.com/security/CVE-2023-49345
- https://ubuntu.com/security/CVE-2023-49346
- https://ubuntu.com/security/CVE-2023-49346
- https://ubuntu.com/security/CVE-2023-49343
- https://ubuntu.com/security/CVE-2023-49344
- https://ubuntu.com/security/CVE-2023-49347
- https://ubuntu.com/security/CVE-2023-49345
- https://ubuntu.com/security/CVE-2023-49342

Title: USN-6563-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6563-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code.(CVE-2023-6857, CVE-2023-6858,
CVE-2023-6859, CVE-2023-6861, CVE-2023-6862, CVE-2023-6863, CVE-2023-6864)

Marcus Brinkmann discovered that Thunderbird did not properly parse a PGP/MIME
payload that contains digitally signed text. An attacker could potentially
exploit this issue to spoof an email message. (CVE-2023-50762)

Marcus Brinkmann discovered that Thunderbird did not properly compare the
signature creation date with the message date and time when using digitally
signed S/MIME email message. An attacker could potentially exploit this
issue to spoof date and time of an email message. (CVE-2023-50761)

DoHyun Lee discovered that Thunderbird did not properly manage memory when
used on systems with the Mesa VM driver. An attacker could potentially
exploit this issue to execute arbitrary code. (CVE-2023-6856)

Andrew Osmond discovered that Thunderbird did not properly validate the
textures produced by remote decoders. An attacker could potentially exploit
this issue to escape the sandbox. (CVE-2023-6860)
CVEs:
- https://ubuntu.com/security/CVE-2023-6857
- https://ubuntu.com/security/CVE-2023-6858
- https://ubuntu.com/security/CVE-2023-6859
- https://ubuntu.com/security/CVE-2023-6861
- https://ubuntu.com/security/CVE-2023-6862
- https://ubuntu.com/security/CVE-2023-6863
- https://ubuntu.com/security/CVE-2023-6864
- https://ubuntu.com/security/CVE-2023-50762
- https://ubuntu.com/security/CVE-2023-50761
- https://ubuntu.com/security/CVE-2023-6856
- https://ubuntu.com/security/CVE-2023-6860
- https://ubuntu.com/security/CVE-2023-6859
- https://ubuntu.com/security/CVE-2023-6860
- https://ubuntu.com/security/CVE-2023-6863
- https://ubuntu.com/security/CVE-2023-6858
- https://ubuntu.com/security/CVE-2023-6864
- https://ubuntu.com/security/CVE-2023-6856
- https://ubuntu.com/security/CVE-2023-6857
- https://ubuntu.com/security/CVE-2023-50762
- https://ubuntu.com/security/CVE-2023-6861
- https://ubuntu.com/security/CVE-2023-6862
- https://ubuntu.com/security/CVE-2023-50761

1.329

Available in the Broadcom Support portal

Release Date: December 21, 2023

Metadata:

BOSH Agent Version: 2.612.0

Updates

  • bumped azure cli to solve server timeouts 14

USNs:

1.327

Available in the Broadcom Support portal

Release Date: December 18, 2023

Metadata:

BOSH Agent Version: 2.611.0

USNs:


Title: USN-6529-1: Request Tracker vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6529-1
Priorities: low,medium
Description:
It was discovered that Request Tracker incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information. (CVE-2021-38562, CVE-2022-25802, CVE-2023-41259,
CVE-2023-41260)
CVEs:
- https://ubuntu.com/security/CVE-2021-38562
- https://ubuntu.com/security/CVE-2022-25802
- https://ubuntu.com/security/CVE-2023-41259
- https://ubuntu.com/security/CVE-2023-41260
- https://ubuntu.com/security/CVE-2022-25802
- https://ubuntu.com/security/CVE-2023-41260
- https://ubuntu.com/security/CVE-2023-41259
- https://ubuntu.com/security/CVE-2021-38562

Title: USN-6531-1: Redis vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6531-1
Priorities: medium
Description:
Seiya Nakata and Yudai Fujiwara discovered that Redis incorrectly handled
certain specially crafted Lua scripts. An attacker could possibly use this
issue to cause heap corruption and execute arbitrary code.
(CVE-2022-24834)

SeungHyun Lee discovered that Redis incorrectly handled specially crafted
commands. An attacker could possibly use this issue to trigger an integer
overflow, which might cause Redis to allocate impossible amounts of memory,
resulting in a denial of service via an application crash. (CVE-2022-35977)

Tom Levy discovered that Redis incorrectly handled crafted string matching
patterns. An attacker could possibly use this issue to cause Redis to hang,
resulting in a denial of service. (CVE-2022-36021)

Yupeng Yang discovered that Redis incorrectly handled specially crafted
commands. An attacker could possibly use this issue to trigger an integer
overflow, resulting in a denial of service via an application crash.
(CVE-2023-25155)

It was discovered that Redis incorrectly handled a specially crafted
command. An attacker could possibly use this issue to create an invalid
hash field, which could potentially cause Redis to crash on future access.
(CVE-2023-28856)

Alexander Aleksandrovič Klimov discovered that Redis incorrectly listened
to a Unix socket before setting proper permissions. A local attacker could
possibly use this issue to connect, bypassing intended permissions.
(CVE-2023-45145)
CVEs:
- https://ubuntu.com/security/CVE-2022-24834
- https://ubuntu.com/security/CVE-2022-35977
- https://ubuntu.com/security/CVE-2022-36021
- https://ubuntu.com/security/CVE-2023-25155
- https://ubuntu.com/security/CVE-2023-28856
- https://ubuntu.com/security/CVE-2023-45145
- https://ubuntu.com/security/CVE-2023-25155
- https://ubuntu.com/security/CVE-2022-36021
- https://ubuntu.com/security/CVE-2022-24834
- https://ubuntu.com/security/CVE-2023-45145
- https://ubuntu.com/security/CVE-2023-28856
- https://ubuntu.com/security/CVE-2022-35977

Title: USN-6550-1: PostfixAdmin vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6550-1
Priorities: medium,high
Description:
It was discovered that Smarty, that is integrated in the PostfixAdmin
code, was not properly sanitizing user input when generating templates. An
attacker could, through PHP injection, possibly use this issue to execute
arbitrary code. (CVE-2022-29221)

It was discovered that Moment.js, that is integrated in the PostfixAdmin
code, was using an inefficient parsing algorithm when processing date
strings in the RFC 2822 standard. An attacker could possibly use this
issue to cause a denial of service. (CVE-2022-31129)

It was discovered that Smarty, that is integrated in the PostfixAdmin
code, was not properly escaping JavaScript code. An attacker could
possibly use this issue to conduct cross-site scripting attacks (XSS).
(CVE-2023-28447)
CVEs:
- https://ubuntu.com/security/CVE-2022-29221
- https://ubuntu.com/security/CVE-2022-31129
- https://ubuntu.com/security/CVE-2023-28447
- https://ubuntu.com/security/CVE-2022-31129
- https://ubuntu.com/security/CVE-2023-28447
- https://ubuntu.com/security/CVE-2022-29221

Title: USN-6544-1: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6544-1
Priorities: medium,low
Description:
It was discovered that GNU binutils incorrectly handled certain COFF files.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2022-38533)

It was discovered that GNU binutils was not properly performing bounds
checks in several functions, which could lead to a buffer overflow. An
attacker could possibly use this issue to cause a denial of service,
expose sensitive information or execute arbitrary code. This issue only
affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-4285, CVE-2020-19726, CVE-2021-46174)

It was discovered that GNU binutils contained a reachable assertion, which
could lead to an intentional assertion failure when processing certain
crafted DWARF files. An attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 20.04 LTS
and Ubuntu 22.04 LTS. (CVE-2022-35205)
CVEs:
- https://ubuntu.com/security/CVE-2022-38533
- https://ubuntu.com/security/CVE-2022-4285
- https://ubuntu.com/security/CVE-2020-19726
- https://ubuntu.com/security/CVE-2021-46174
- https://ubuntu.com/security/CVE-2022-35205
- https://ubuntu.com/security/CVE-2022-35205
- https://ubuntu.com/security/CVE-2020-19726
- https://ubuntu.com/security/CVE-2021-46174
- https://ubuntu.com/security/CVE-2022-38533
- https://ubuntu.com/security/CVE-2022-4285

Title: USN-6528-1: OpenJDK 8 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6528-1
Priorities: medium
Description:
It was discovered that the HotSpot VM implementation in OpenJDK did not
properly validate bytecode blocks in certain situations. An attacker could
possibly use this to cause a denial of service. (CVE-2022-40433)

Carter Kozak discovered that OpenJDK, when compiling with AVX-512
instruction support enabled, could produce code that resulted in memory
corruption in certain situations. An attacker targeting applications built
in this way could possibly use this to cause a denial of service or execute
arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512
instructions. (CVE-2023-22025)

It was discovered that the CORBA implementation in OpenJDK did not properly
perform deserialization of IOR string objects. An attacker could possibly
use this to bypass Java sandbox restrictions. (CVE-2023-22067)

It was discovered that OpenJDK did not properly perform PKIX certification
path validation in certain situations. An attacker could use this to cause
a denial of service. (CVE-2023-22081)
CVEs:
- https://ubuntu.com/security/CVE-2022-40433
- https://ubuntu.com/security/CVE-2023-22025
- https://ubuntu.com/security/CVE-2023-22067
- https://ubuntu.com/security/CVE-2023-22081
- https://ubuntu.com/security/CVE-2023-22067
- https://ubuntu.com/security/CVE-2022-40433
- https://ubuntu.com/security/CVE-2023-22081
- https://ubuntu.com/security/CVE-2023-22025

Title: USN-6527-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6527-1
Priorities: medium
Description:
Carter Kozak discovered that OpenJDK, when compiling with AVX-512
instruction support enabled, could produce code that resulted in memory
corruption in certain situations. An attacker targeting applications built
in this way could possibly use this to cause a denial of service or execute
arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512
instructions. (CVE-2023-22025)

It was discovered that OpenJDK did not properly perform PKIX certification
path validation in certain situations. An attacker could use this to cause
a denial of service. (CVE-2023-22081)
CVEs:
- https://ubuntu.com/security/CVE-2023-22025
- https://ubuntu.com/security/CVE-2023-22081
- https://ubuntu.com/security/CVE-2023-22081
- https://ubuntu.com/security/CVE-2023-22025

Title: USN-6539-1: python-cryptography vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6539-1
Priorities: low,medium
Description:
It was discovered that the python-cryptography Cipher.update_into function
would incorrectly accept objects with immutable buffers. This would result
in corrupted output, contrary to expectations. This issue only affected
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-23931)

It was dicovered that python-cryptography incorrectly handled loading
certain PKCS7 certificates. A remote attacker could possibly use this
issue to cause python-cryptography to crash, resulting in a denial of
service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and
Ubuntu 23.10. (CVE-2023-49083)
CVEs:
- https://ubuntu.com/security/CVE-2023-23931
- https://ubuntu.com/security/CVE-2023-49083
- https://ubuntu.com/security/CVE-2023-49083
- https://ubuntu.com/security/CVE-2023-23931

Title: USN-6496-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6496-2
Priorities: medium,low
Description:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)

Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)
CVEs:
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-25775

Title: USN-6549-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6549-1
Priorities: medium
Description:
It was discovered that the USB subsystem in the Linux kernel contained a
race condition while handling device descriptors in certain situations,
leading to a out-of-bounds read vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-37453)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel did not properly initialize a policy data structure, leading
to an out-of-bounds vulnerability. A local privileged attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information (kernel memory). (CVE-2023-3773)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)

Lucas Leong discovered that the Netlink Transformation (XFRM) subsystem in
the Linux kernel did not properly handle state filters, leading to an out-
of-bounds read vulnerability. A privileged local attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-39194)

It was discovered that a race condition existed in QXL virtual GPU driver
in the Linux kernel, leading to a use after free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-39198)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)

Jason Wang discovered that the virtio ring implementation in the Linux
kernel did not properly handle iov buffers in some situations. A local
attacker in a guest VM could use this to cause a denial of service (host
system crash). (CVE-2023-5158)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly handle queue initialization failures in certain
situations, leading to a use-after-free vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)
CVEs:
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-3773
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-39198
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-5158
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-5158
- https://ubuntu.com/security/CVE-2023-3773
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-39198
- https://ubuntu.com/security/CVE-2023-39193

Title: USN-6549-2: Linux kernel (GKE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6549-2
Priorities: medium
Description:
It was discovered that the USB subsystem in the Linux kernel contained a
race condition while handling device descriptors in certain situations,
leading to a out-of-bounds read vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-37453)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel did not properly initialize a policy data structure, leading
to an out-of-bounds vulnerability. A local privileged attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information (kernel memory). (CVE-2023-3773)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)

Lucas Leong discovered that the Netlink Transformation (XFRM) subsystem in
the Linux kernel did not properly handle state filters, leading to an out-
of-bounds read vulnerability. A privileged local attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-39194)

It was discovered that a race condition existed in QXL virtual GPU driver
in the Linux kernel, leading to a use after free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-39198)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)

Jason Wang discovered that the virtio ring implementation in the Linux
kernel did not properly handle iov buffers in some situations. A local
attacker in a guest VM could use this to cause a denial of service (host
system crash). (CVE-2023-5158)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly handle queue initialization failures in certain
situations, leading to a use-after-free vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)
CVEs:
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-3773
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-39198
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-5158
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-5158
- https://ubuntu.com/security/CVE-2023-3773
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-39198

Title: USN-6534-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6534-1
Priorities: medium,low
Description:
It was discovered that the USB subsystem in the Linux kernel contained a
race condition while handling device descriptors in certain situations,
leading to a out-of-bounds read vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-37453)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel did not properly initialize a policy data structure, leading
to an out-of-bounds vulnerability. A local privileged attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information (kernel memory). (CVE-2023-3773)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)

Lucas Leong discovered that the Netlink Transformation (XFRM) subsystem in
the Linux kernel did not properly handle state filters, leading to an out-
of-bounds read vulnerability. A privileged local attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-39194)

It was discovered that a race condition existed in QXL virtual GPU driver
in the Linux kernel, leading to a use after free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-39198)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)

Jason Wang discovered that the virtio ring implementation in the Linux
kernel did not properly handle iov buffers in some situations. A local
attacker in a guest VM could use this to cause a denial of service (host
system crash). (CVE-2023-5158)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly handle queue initialization failures in certain
situations, leading to a use-after-free vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)

It was discovered that the Microchip USB Ethernet driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash). (CVE-2023-6039)
CVEs:
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-3773
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-39198
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-5158
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-6039
- https://ubuntu.com/security/CVE-2023-5158
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-39198
- https://ubuntu.com/security/CVE-2023-6039
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-3773
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-42754

Title: USN-6534-3: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6534-3
Priorities: medium,low
Description:
It was discovered that the USB subsystem in the Linux kernel contained a
race condition while handling device descriptors in certain situations,
leading to a out-of-bounds read vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-37453)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel did not properly initialize a policy data structure, leading
to an out-of-bounds vulnerability. A local privileged attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information (kernel memory). (CVE-2023-3773)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)

Lucas Leong discovered that the Netlink Transformation (XFRM) subsystem in
the Linux kernel did not properly handle state filters, leading to an out-
of-bounds read vulnerability. A privileged local attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-39194)

It was discovered that a race condition existed in QXL virtual GPU driver
in the Linux kernel, leading to a use after free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-39198)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)

Jason Wang discovered that the virtio ring implementation in the Linux
kernel did not properly handle iov buffers in some situations. A local
attacker in a guest VM could use this to cause a denial of service (host
system crash). (CVE-2023-5158)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly handle queue initialization failures in certain
situations, leading to a use-after-free vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)

It was discovered that the Microchip USB Ethernet driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash). (CVE-2023-6039)
CVEs:
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-3773
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-39198
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-5158
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-6039
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-5158
- https://ubuntu.com/security/CVE-2023-3773
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-39198
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-6039

Title: USN-6543-1: GNU Tar vulnerability
URL: https://ubuntu.com/security/notices/USN-6543-1
Priorities: medium
Description:
It was discovered that tar incorrectly handled extended attributes in PAX
archives. An attacker could use this issue to cause tar to crash, resulting in a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-39804

Title: USN-6526-1: GStreamer Bad Plugins vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6526-1
Priorities: medium
Description:
It was discovered that GStreamer Bad Plugins incorrectly handled certain
media files. A remote attacker could use this issue to cause GStreamer
Bad Plugins to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-40476
- https://ubuntu.com/security/CVE-2023-44429
- https://ubuntu.com/security/CVE-2023-40474
- https://ubuntu.com/security/CVE-2023-44446
- https://ubuntu.com/security/CVE-2023-40475
- https://ubuntu.com/security/CVE-2023-37329

Title: USN-6552-1: Netatalk vulnerability
URL: https://ubuntu.com/security/notices/USN-6552-1
Priorities: medium
Description:
Florent Saudel and Arnaud Gatignol discovered that Netatalk incorrectly
handled certain specially crafted Spotlight requests. A remote attacker could
possibly use this issue to cause heap corruption and execute arbitrary code.
(CVE-2023-42464)
CVEs:
- https://ubuntu.com/security/CVE-2023-42464
- https://ubuntu.com/security/CVE-2023-42464

Title: USN-6545-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6545-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-42917
- https://ubuntu.com/security/CVE-2023-42916

Title: USN-6530-1: HAProxy vulnerability
URL: https://ubuntu.com/security/notices/USN-6530-1
Priorities: medium
Description:
It was discovered that HAProxy incorrectly handled URI components
containing the hash character (#). A remote attacker could possibly use
this issue to obtain sensitive information, or to bypass certain path_end
rules.
CVEs:
- https://ubuntu.com/security/CVE-2023-45539

Title: USN-6535-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6535-1
Priorities: medium,low
Description:
Harry Sintonen discovered that curl incorrectly handled mixed case cookie
domains. A remote attacker could possibly use this issue to set cookies
that get sent to different and unrelated sites and domains.
(CVE-2023-46218)

Maksymilian Arciemowicz discovered that curl incorrectly handled long file
names when saving HSTS data. This could result in curl losing HSTS data,
and subsequent requests to a site would be done without it, contrary to
expectations. This issue only affected Ubuntu 23.04 and Ubuntu 23.10.
(CVE-2023-46219)
CVEs:
- https://ubuntu.com/security/CVE-2023-46218
- https://ubuntu.com/security/CVE-2023-46219
- https://ubuntu.com/security/CVE-2023-46219
- https://ubuntu.com/security/CVE-2023-46218

Title: USN-6551-1: Ghostscript vulnerability
URL: https://ubuntu.com/security/notices/USN-6551-1
Priorities: medium
Description:
It was discovered that Ghostscript incorrectly handled writing TIFF files.
A remote attacker could possibly use this issue to cause Ghostscript to
crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-46751

Title: USN-6533-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6533-1
Priorities: medium
Description:
Tom Dohrmann discovered that the Secure Encrypted Virtualization (SEV)
implementation for AMD processors in the Linux kernel contained a race
condition when accessing MMIO registers. A local attacker in a SEV guest VM
could possibly use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-46813)

It was discovered that the io_uring subsystem in the Linux kernel contained
a race condition, leading to a null pointer dereference vulnerability. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-46862)
CVEs:
- https://ubuntu.com/security/CVE-2023-46813
- https://ubuntu.com/security/CVE-2023-46862
- https://ubuntu.com/security/CVE-2023-46862
- https://ubuntu.com/security/CVE-2023-46813

Title: USN-6541-1: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6541-1
Priorities: low,medium
Description:
It was discovered that the GNU C Library was not properly handling certain
memory operations. An attacker could possibly use this issue to cause a
denial of service (application crash). (CVE-2023-4806, CVE-2023-4813)

It was discovered that the GNU C library was not properly implementing a
fix for CVE-2023-4806 in certain cases, which could lead to a memory leak.
An attacker could possibly use this issue to cause a denial of service
(application crash). This issue only affected Ubuntu 22.04 LTS and Ubuntu
23.04. (CVE-2023-5156)
CVEs:
- https://ubuntu.com/security/CVE-2023-4806
- https://ubuntu.com/security/CVE-2023-4813
- https://ubuntu.com/security/CVE-2023-4806
- https://ubuntu.com/security/CVE-2023-5156
- https://ubuntu.com/security/CVE-2023-4806
- https://ubuntu.com/security/CVE-2023-4813
- https://ubuntu.com/security/CVE-2023-5156

Title: USN-6538-1: PostgreSQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6538-1
Priorities: medium
Description:
Jingzhou Fu discovered that PostgreSQL incorrectly handled certain unknown
arguments in aggregate function calls. A remote attacker could possibly use
this issue to obtain sensitive information. (CVE-2023-5868)

Pedro Gallegos discovered that PostgreSQL incorrectly handled modifying
certain SQL array values. A remote attacker could use this issue to obtain
sensitive information, or possibly execute arbitrary code. (CVE-2023-5869)

Hemanth Sandrana and Mahendrakar Srinivasarao discovered that PostgreSQL
allowed the pg_signal_backend role to signal certain superuser processes,
contrary to expectations. (CVE-2023-5870)
CVEs:
- https://ubuntu.com/security/CVE-2023-5868
- https://ubuntu.com/security/CVE-2023-5869
- https://ubuntu.com/security/CVE-2023-5870
- https://ubuntu.com/security/CVE-2023-5869
- https://ubuntu.com/security/CVE-2023-5870
- https://ubuntu.com/security/CVE-2023-5868

Title: USN-6555-1: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6555-1
Priorities: medium
Description:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled XKB
button actions. An attacker could possibly use this issue to cause the X
Server to crash, execute arbitrary code, or escalate privileges.
(CVE-2023-6377)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the RRChangeOutputProperty and
RRChangeProviderProperty APIs. An attacker could possibly use this issue to
cause the X Server to crash, or obtain sensitive information.
(CVE-2023-6478)
CVEs:
- https://ubuntu.com/security/CVE-2023-6377
- https://ubuntu.com/security/CVE-2023-6478
- https://ubuntu.com/security/CVE-2023-6377
- https://ubuntu.com/security/CVE-2023-6478

1.318

Available in the Broadcom Support portal

Release Date: December 04, 2023

Metadata:

BOSH Agent Version: 2.607.0

USNs:


Title: USN-6521-1: GIMP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6521-1
Priorities: low,medium
Description:
It was discovered that GIMP incorrectly handled certain image files. If a
user were tricked into opening a specially crafted image, an attacker could
use this issue to cause GIMP to crash, resulting in a denial of service, or
possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-30067
- https://ubuntu.com/security/CVE-2023-44444
- https://ubuntu.com/security/CVE-2023-44442
- https://ubuntu.com/security/CVE-2023-44441
- https://ubuntu.com/security/CVE-2022-32990
- https://ubuntu.com/security/CVE-2023-44443

Title: LSN-0099-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0099-1
Priorities: medium,high
Description:
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability).(CVE-2022-3643)

It was discovered that the virtual terminal driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information (kernel memory).(CVE-2023-3567)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-3609)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code.(CVE-2023-3777)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code.(CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code.(CVE-2023-4004)

Bing-Jhong Billy Jheng discovered that the Unix domain socket
implementation in the Linux kernel contained a race condition in certain
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2023-4622)

Budimir Markovic discovered that the qdisc implementation in the Linux
kernel did not properly validate inner classes, leading to a use-after-free
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-4623)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash).(CVE-2023-4881)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code.(CVE-2023-5197)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-31436)

Ross Lagerwall discovered that the Xen netback backend driver in the Linux
kernel did not properly handle certain unusual packets from a
paravirtualized network frontend, leading to a buffer overflow. An attacker
in a guest VM could use this to cause a denial of service (host system
crash) or possibly execute arbitrary code.(CVE-2023-34319)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-40283)

Kyle Zeng discovered that the networking stack implementation in the Linux
kernel did not properly validate skb object size in certain conditions. An
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-42752)

Kyle Zeng discovered that the netfiler subsystem in the Linux kernel did
not properly calculate array offsets, leading to a out-of-bounds write
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-42753)
CVEs:
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2023-31436

Title: USN-6524-1: PyPy vulnerability
URL: https://ubuntu.com/security/notices/USN-6524-1
Priorities: medium
Description:
Nicky Mouha discovered that PyPy incorrectly handled certain SHA-3
operations. An attacker could possibly use this issue to cause PyPy to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2022-37454

Title: USN-6513-2: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-6513-2
Priorities: medium
Description:
USN-6513-1 fixed vulnerabilities in Python. This update provides the
corresponding updates for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04.

Original advisory details:

It was discovered that Python incorrectly handled certain plist files.
If a user or an automated system were tricked into processing a specially
crafted plist file, an attacker could possibly use this issue to consume
resources, resulting in a denial of service. (CVE-2022-48564)

It was discovered that Python instances of ssl.SSLSocket were vulnerable
to a bypass of the TLS handshake. An attacker could possibly use this
issue to cause applications to treat unauthenticated received data before
TLS handshake as authenticated data after TLS handshake. (CVE-2023-40217)
CVEs:
- https://ubuntu.com/security/CVE-2022-48564
- https://ubuntu.com/security/CVE-2023-40217
- https://ubuntu.com/security/CVE-2023-40217

Title: USN-6520-1: Linux kernel (StarFive) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6520-1
Priorities: medium,low,high
Description:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)

Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)

Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate SMB request protocol IDs, leading to a out-of-
bounds read vulnerability. A remote attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-38430)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate command payload size, leading to a out-of-bounds
read vulnerability. A remote attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-38432)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
did not properly validate a buffer size in certain situations, leading to
an out-of-bounds read vulnerability. A remote attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-3865)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
contained a null pointer dereference vulnerability when handling handling
chained requests. A remote attacker could use this to cause a denial of
service (system crash). (CVE-2023-3866)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly handle session setup requests, leading to an out-of-bounds read
vulnerability. A remote attacker could use this to expose sensitive
information. (CVE-2023-3867)

It was discovered that the Siano USB MDTV receiver device driver in the
Linux kernel did not properly handle device initialization failures in
certain situations, leading to a use-after-free vulnerability. A physically
proximate attacker could use this cause a denial of service (system crash).
(CVE-2023-4132)

It was discovered that a race condition existed in the Cypress touchscreen
driver in the Linux kernel during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4134)

Thelford Williams discovered that the Ceph file system messenger protocol
implementation in the Linux kernel did not properly validate frame segment
length in certain situation, leading to a buffer overflow vulnerability. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-44466)

Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)

It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)
CVEs:
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-3867
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3867
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3772

Title: USN-6516-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6516-1
Priorities: medium,low
Description:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)

Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)

Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)

Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)
CVEs:
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-31085

Title: USN-6502-3: Linux kernel (NVIDIA) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6502-3
Priorities: medium,low,high
Description:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)

Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)

It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)
CVEs:
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-45871

Title: USN-6502-4: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6502-4
Priorities: medium,low,high
Description:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)

Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)

It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)
CVEs:
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-31085

Title: USN-6515-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6515-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-6206, CVE-2023-6212)

It was discovered that Thudnerbird did not properly manage memory when
images were created on the canvas element. An attacker could potentially
exploit this issue to obtain sensitive information. (CVE-2023-6204)

It discovered that Thunderbird incorrectly handled certain memory when
using a MessagePort. An attacker could potentially exploit this issue to
cause a denial of service. (CVE-2023-6205)

It discovered that Thunderbird incorrectly did not properly manage ownership
in ReadableByteStreams. An attacker could potentially exploit this issue
to cause a denial of service. (CVE-2023-6207)

It discovered that Thudnerbird incorrectly did not properly manage copy
operations when using Selection API in X11. An attacker could potentially
exploit this issue to obtain sensitive information. (CVE-2023-6208)

Rachmat Abdul Rokhim discovered that Thunderbird incorrectly handled
parsing of relative URLS starting with “///”. An attacker could potentially
exploit this issue to cause a denial of service. (CVE-2023-6209)
CVEs:
- https://ubuntu.com/security/CVE-2023-6206
- https://ubuntu.com/security/CVE-2023-6212
- https://ubuntu.com/security/CVE-2023-6204
- https://ubuntu.com/security/CVE-2023-6205
- https://ubuntu.com/security/CVE-2023-6207
- https://ubuntu.com/security/CVE-2023-6208
- https://ubuntu.com/security/CVE-2023-6209
- https://ubuntu.com/security/CVE-2023-6206
- https://ubuntu.com/security/CVE-2023-6212
- https://ubuntu.com/security/CVE-2023-6204
- https://ubuntu.com/security/CVE-2023-6207
- https://ubuntu.com/security/CVE-2023-6209
- https://ubuntu.com/security/CVE-2023-6208
- https://ubuntu.com/security/CVE-2023-6205

1.309

Available in the Broadcom Support portal

Release Date: November 27, 2023

Metadata:

BOSH Agent Version: 2.604.0

USNs:


Title: USN-6473-2: pip vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6473-2
Priorities: medium
Description:
USN-6473-1 fixed vulnerabilities in urllib3. This update provides the
corresponding updates for the urllib3 module bundled into pip.

Original advisory details:

It was discovered that urllib3 didn’t strip HTTP Authorization header
on cross-origin redirects. A remote attacker could possibly use this
issue to obtain sensitive information. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-25091)

It was discovered that urllib3 didn’t strip HTTP Cookie header on
cross-origin redirects. A remote attacker could possibly use this
issue to obtain sensitive information. (CVE-2023-43804)

It was discovered that urllib3 didn’t strip HTTP body on status code
303 redirects under certain circumstances. A remote attacker could
possibly use this issue to obtain sensitive information. (CVE-2023-45803)
CVEs:
- https://ubuntu.com/security/CVE-2018-25091
- https://ubuntu.com/security/CVE-2023-43804
- https://ubuntu.com/security/CVE-2023-45803
- https://ubuntu.com/security/CVE-2023-45803
- https://ubuntu.com/security/CVE-2018-25091
- https://ubuntu.com/security/CVE-2023-43804

Title: USN-6449-2: FFmpeg regression
URL: https://ubuntu.com/security/notices/USN-6449-2
Priorities: medium
Description:
USN-6449-1 fixed vulnerabilities in FFmpeg. Unfortunately that update
could introduce a regression in tools using an FFmpeg library, like VLC.

This updated fixes the problem. We apologize for the inconvenience.

Original advisory details:

It was discovered that FFmpeg incorrectly managed memory resulting
in a memory leak. An attacker could possibly use this issue to cause
a denial of service via application crash. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-22038)

It was discovered that FFmpeg incorrectly handled certain input files,
leading to an integer overflow. An attacker could possibly use this issue
to cause a denial of service via application crash. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-20898, CVE-2021-38090,
CVE-2021-38091, CVE-2021-38092, CVE-2021-38093, CVE-2021-38094)

It was discovered that FFmpeg incorrectly managed memory, resulting in
a memory leak. If a user or automated system were tricked into
processing a specially crafted input file, a remote attacker could
possibly use this issue to cause a denial of service, or execute
arbitrary code. (CVE-2022-48434)
CVEs:
- https://ubuntu.com/security/CVE-2020-22038
- https://ubuntu.com/security/CVE-2020-20898
- https://ubuntu.com/security/CVE-2021-38090
- https://ubuntu.com/security/CVE-2021-38091
- https://ubuntu.com/security/CVE-2021-38092
- https://ubuntu.com/security/CVE-2021-38093
- https://ubuntu.com/security/CVE-2021-38094
- https://ubuntu.com/security/CVE-2022-48434

Title: USN-6483-1: HTML Tidy vulnerability
URL: https://ubuntu.com/security/notices/USN-6483-1
Priorities: medium
Description:
Neeraj Pal discovered that HTML Tidy incorrectly handled parsing certain
HTML data. If a user or automated system were tricked into parsing
specially crafted HTML data, a remote attacker could cause HTML Tidy to
consume resources, leading to a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-33391

Title: USN-6492-1: Mosquitto vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6492-1
Priorities: medium
Description:
Kathrin Kleinhammer discovered that Mosquitto incorrectly handled certain
inputs. If a user or an automated system were provided with a specially crafted
input, a remote attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-34431)

Zhanxiang Song discovered that Mosquitto incorrectly handled certain inputs. If
a user or an automated system were provided with a specially crafted input, a
remote attacker could possibly use this issue to cause an authorisation bypass.
This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2021-34434)

Zhanxiang Song, Bin Yuan, DeQing Zou, and Hai Jin discovered that Mosquitto
incorrectly handled certain inputs. If a user or an automated system were
provided with a specially crafted input, a remote attacker could possibly use
this issue to cause a denial of service. This issue only affected Ubuntu 20.04
LTS and Ubuntu 22.04 LTS. (CVE-2021-41039)

Zhengjie Du discovered that Mosquitto incorrectly handled certain inputs. If a
user or an automated system were provided with a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service.
(CVE-2023-0809)

It was discovered that Mosquitto incorrectly handled certain inputs. If a user
or an automated system were provided with a specially crafted input, a remote
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-3592)

Mischa Bachmann discovered that Mosquitto incorrectly handled certain inputs.
If a user or an automated system were provided with a specially crafted input,
a remote attacker could possibly use this issue to cause a denial of service.
This issue was only fixed in Ubuntu 22.04 LTS and Ubuntu 23.04.
(CVE-2023-28366)
CVEs:
- https://ubuntu.com/security/CVE-2021-34431
- https://ubuntu.com/security/CVE-2021-34434
- https://ubuntu.com/security/CVE-2021-41039
- https://ubuntu.com/security/CVE-2023-0809
- https://ubuntu.com/security/CVE-2023-3592
- https://ubuntu.com/security/CVE-2023-28366
- https://ubuntu.com/security/CVE-2023-0809
- https://ubuntu.com/security/CVE-2021-34434
- https://ubuntu.com/security/CVE-2023-28366
- https://ubuntu.com/security/CVE-2021-41039
- https://ubuntu.com/security/CVE-2023-3592
- https://ubuntu.com/security/CVE-2021-34431

Title: USN-6485-1: Intel Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-6485-1
Priorities: high
Description:
Benoit Morgan, Paul Grosen, Thais Moreira Hamasaki, Ke Sun, Alyssa Milburn,
Hisham Shafi, Nir Shlomovich, Tavis Ormandy, Daniel Moghimi, Josh Eads, Salman
Qazi, Alexandra Sandulescu, Andy Nguyen, Eduardo Vela, Doug Kwan, and Kostik
Shtoyk discovered that some Intel(R) Processors did not properly handle certain
sequences of processor instructions. A local attacker could possibly use this to
cause a core hang (resulting in a denial of service), gain access to sensitive
information or possibly escalate their privileges.
CVEs:
- https://ubuntu.com/security/CVE-2023-23583

Title: USN-6496-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6496-1
Priorities: medium,low
Description:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)

Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)
CVEs:
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-31085

Title: USN-6502-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6502-1
Priorities: medium,low,high
Description:
Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)

Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)

It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)
CVEs:
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-45871

Title: USN-6480-1: .NET vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6480-1
Priorities: medium
Description:
Barry Dorrans discovered that .NET did not properly implement certain
security features for Blazor server forms. An attacker could possibly
use this issue to bypass validation, which could trigger unintended
actions. (CVE-2023-36558)

Piotr Bazydlo discovered that .NET did not properly handle untrusted
URIs provided to System.Net.WebRequest.Create. An attacker could possibly
use this issue to inject arbitrary commands to backend FTP servers.
(CVE-2023-36049)
CVEs:
- https://ubuntu.com/security/CVE-2023-36558
- https://ubuntu.com/security/CVE-2023-36049
- https://ubuntu.com/security/CVE-2023-36049
- https://ubuntu.com/security/CVE-2023-36558

Title: USN-6498-1: FRR vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6498-1
Priorities: medium
Description:
It was discovered that FRR incorrectly handled certain BGP messages. A
remote attacker could possibly use this issue to cause FRR to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-38407
- https://ubuntu.com/security/CVE-2023-38406
- https://ubuntu.com/security/CVE-2023-47235
- https://ubuntu.com/security/CVE-2023-47234

Title: USN-6490-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6490-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-41983
- https://ubuntu.com/security/CVE-2023-42852

Title: USN-6479-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6479-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the netfilter subsystem in the Linux kernel
contained a race condition in IP set operations in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-42756)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-5197)
CVEs:
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-5197

Title: USN-6501-1: RabbitMQ vulnerability
URL: https://ubuntu.com/security/notices/USN-6501-1
Priorities: medium
Description:
It was discovered that RabbitMQ incorrectly handled certain HTTP requests.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-46118

Title: USN-6500-1: Squid vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6500-1
Priorities: medium
Description:
Joshua Rogers discovered that Squid incorrectly handled validating certain
SSL certificates. A remote attacker could possibly use this issue to cause
Squid to crash, resulting in a denial of service. This issue only affected
Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-46724)

Joshua Rogers discovered that Squid incorrectly handled the Gopher
protocol. A remote attacker could possibly use this issue to cause Squid to
crash, resulting in a denial of service. Gopher support has been disabled
in this update. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04
LTS, and Ubuntu 23.04. (CVE-2023-46728)

Keran Mu and Jianjun Chen discovered that Squid incorrectly handled the
chunked decoder. A remote attacker could possibly use this issue to perform
HTTP request smuggling attacks. (CVE-2023-46846)

Joshua Rogers discovered that Squid incorrectly handled HTTP Digest
Authentication. A remote attacker could possibly use this issue to cause
Squid to crash, resulting in a denial of service. (CVE-2023-46847)

Joshua Rogers discovered that Squid incorrectly handled certain FTP urls.
A remote attacker could possibly use this issue to cause Squid to crash,
resulting in a denial of service. (CVE-2023-46848)
CVEs:
- https://ubuntu.com/security/CVE-2023-46724
- https://ubuntu.com/security/CVE-2023-46728
- https://ubuntu.com/security/CVE-2023-46846
- https://ubuntu.com/security/CVE-2023-46847
- https://ubuntu.com/security/CVE-2023-46848
- https://ubuntu.com/security/CVE-2023-46724
- https://ubuntu.com/security/CVE-2023-46848
- https://ubuntu.com/security/CVE-2023-46846
- https://ubuntu.com/security/CVE-2023-46847
- https://ubuntu.com/security/CVE-2023-46728

Title: USN-6497-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6497-1
Priorities: high,medium
Description:
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly handle queue initialization failures in certain
situations, leading to a use-after-free vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel
did not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-5717)
CVEs:
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-5717

Title: USN-6497-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6497-1
Priorities: high,medium
Description:
Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle x2AVIC MSRs. An attacker in a guest VM could use this to cause a
denial of service (host kernel crash). (CVE-2023-5090)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem in the Linux kernel
did not properly handle queue initialization failures in certain
situations, leading to a use-after-free vulnerability. A remote attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-5178)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle events grouping, leading to an out-of-bounds write. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-5717)
CVEs:
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-5090
- https://ubuntu.com/security/CVE-2023-5178
- https://ubuntu.com/security/CVE-2023-5717

Title: USN-6504-1: tracker-miners vulnerability
URL: https://ubuntu.com/security/notices/USN-6504-1
Priorities: medium
Description:
It was discovered that tracker-miners incorrectly handled sandboxing. If a
second security issue was discovered in tracker-miners, an attacker
could possibly use this issue in combination with it to escape the sandbox.
CVEs:
- https://ubuntu.com/security/CVE-2023-5557

Title: USN-6499-1: GnuTLS vulnerability
URL: https://ubuntu.com/security/notices/USN-6499-1
Priorities: medium
Description:
It was discovered that GnuTLS had a timing side-channel when handling
certain RSA-PSK key exchanges. A remote attacker could possibly use this
issue to recover sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-5981

Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.301…ubuntu-jammy/v1.309

1.301

Available in the Broadcom Support portal

Release Date: November 17, 2023

Metadata:

BOSH Agent Version: 2.602.0

USNs:


Title: USN-6465-3: Linux kernel (GKE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6465-3
Priorities: low,medium
Description:
Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)
CVEs:
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-31083

Title: USN-6477-1: procps-ng vulnerability
URL: https://ubuntu.com/security/notices/USN-6477-1
Priorities: low
Description:
It was discovered that the procps-ng ps tool incorrectly handled memory.
An attacker could possibly use this issue to cause procps-ng to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-4016

Title: USN-6476-1: Memcached vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6476-1
Priorities: medium
Description:
It was discovered that Memcached incorrectly handled certain multiget
requests in proxy mode. A remote attacker could use this issue to cause
Memcached to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2023-46852)

It was discovered that Memcached incorrectly handled certain proxy requests
in proxy mode. A remote attacker could use this issue to cause Memcached to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2023-46853)
CVEs:
- https://ubuntu.com/security/CVE-2023-46852
- https://ubuntu.com/security/CVE-2023-46853
- https://ubuntu.com/security/CVE-2023-46852
- https://ubuntu.com/security/CVE-2023-46853

1.298

Available in the Broadcom Support portal

Release Date: November 15, 2023

Metadata:

BOSH Agent Version: 2.600.0

Notice:

azure blobstore cli did not calculate the correct blobsize fixed in pr 13

USNs:


Title: USN-6465-2: Linux kernel (Raspberry Pi) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6465-2
Priorities: low,medium
Description:
Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)
CVEs:
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3772

Title: USN-6467-2: Kerberos vulnerability
URL: https://ubuntu.com/security/notices/USN-6467-2
Priorities: medium
Description:
USN-6467-1 fixed a vulnerability in Kerberos. This update provides the
corresponding update for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu
23.04.

Original advisory details:

Robert Morris discovered that Kerberos did not properly handle memory
access when processing RPC data through kadmind, which could lead to the
freeing of uninitialized memory. An authenticated remote attacker could
possibly use this issue to cause kadmind to crash, resulting in a denial
of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-36054

Title: USN-6479-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6479-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the netfilter subsystem in the Linux kernel
contained a race condition in IP set operations in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-42756)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-5197)
CVEs:
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-5197

1.289

Available in the Broadcom Support portal

Release Date: November 08, 2023

Metadata:

BOSH Agent Version: 2.600.0

USNs:


Title: USN-6452-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6452-1
Priorities:
Description:
It was discovered that Vim could be made to divide by zero. An attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 23.04. (CVE-2023-3896)

It was discovered that Vim did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2023-4733, CVE-2023-4750)

It was discovered that Vim contained an arithmetic overflow. An attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10.
(CVE-2023-4734)

It was discovered that Vim could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2023-4735, CVE-2023-5344)

It was discovered that Vim could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 23.04 and Ubuntu
23.10. (CVE-2023-4738)

It was discovered that Vim could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu
16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04. (CVE-2023-4751)

It was discovered that Vim did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04
LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-4752, CVE-2023-5535)

It was discovered that Vim could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu
22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-4781)

It was discovered that Vim could be made to dereference invalid memory. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-5441)
CVEs:


Title: USN-6362-2: .Net regressions
URL: https://ubuntu.com/security/notices/USN-6362-2
Priorities: unknown,medium
Description:
USN-6362-1 fixed vulnerabilities in .Net. It was discovered that the fix
for CVE-2023-36799 was incomplete. This update fixes the problem.

Original advisory details:

Kevin Jones discovered that .NET did not properly process certain
X.509 certificates. An attacker could possibly use this issue to
cause a denial of service.
CVEs:
- https://ubuntu.com/security/<a href="/security/CVE-2023-36799">CVE-2023-36799</a>“><a href=”/security/CVE-2023-36799
- https://ubuntu.com/security/CVE-2023-36799

Title: USN-6449-1: FFmpeg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6449-1
Priorities: medium
Description:
It was discovered that FFmpeg incorrectly managed memory resulting
in a memory leak. An attacker could possibly use this issue to cause
a denial of service via application crash. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-22038)

It was discovered that FFmpeg incorrectly handled certain input files,
leading to an integer overflow. An attacker could possibly use this issue
to cause a denial of service via application crash. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-20898, CVE-2021-38090,
CVE-2021-38091, CVE-2021-38092, CVE-2021-38093, CVE-2021-38094)

It was discovered that FFmpeg incorrectly managed memory, resulting in
a memory leak. If a user or automated system were tricked into
processing a specially crafted input file, a remote attacker could
possibly use this issue to cause a denial of service, or execute
arbitrary code. (CVE-2022-48434)
CVEs:
- https://ubuntu.com/security/CVE-2020-22038
- https://ubuntu.com/security/CVE-2020-20898
- https://ubuntu.com/security/CVE-2021-38090
- https://ubuntu.com/security/CVE-2021-38091
- https://ubuntu.com/security/CVE-2021-38092
- https://ubuntu.com/security/CVE-2021-38093
- https://ubuntu.com/security/CVE-2021-38094
- https://ubuntu.com/security/CVE-2022-48434
- https://ubuntu.com/security/CVE-2021-38090
- https://ubuntu.com/security/CVE-2021-38093
- https://ubuntu.com/security/CVE-2022-48434
- https://ubuntu.com/security/CVE-2021-38092
- https://ubuntu.com/security/CVE-2020-22038
- https://ubuntu.com/security/CVE-2021-38094
- https://ubuntu.com/security/CVE-2021-38091
- https://ubuntu.com/security/CVE-2020-20898

Title: USN-6457-1: Node.js vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6457-1
Priorities: high,medium
Description:
Tavis Ormandy discovered that Node.js incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2022-0778)

Elison Niven discovered that Node.js incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to execute
arbitrary code. (CVE-2022-1292)

Chancen and Daniel Fiala discovered that Node.js incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to execute
arbitrary code. (CVE-2022-2068)

Alex Chernyakhovsky discovered that Node.js incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to execute
arbitrary code. (CVE-2022-2097)
CVEs:
- https://ubuntu.com/security/CVE-2022-0778
- https://ubuntu.com/security/CVE-2022-1292
- https://ubuntu.com/security/CVE-2022-2068
- https://ubuntu.com/security/CVE-2022-2097
- https://ubuntu.com/security/CVE-2022-0778
- https://ubuntu.com/security/CVE-2022-1292
- https://ubuntu.com/security/CVE-2022-2097
- https://ubuntu.com/security/CVE-2022-2068

Title: USN-6458-1: Slurm vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6458-1
Priorities: high,medium
Description:
It was discovered that Slurm did not properly handle credential
management, which could allow an unprivileged user to impersonate the
SlurmUser account. An attacker could possibly use this issue to execute
arbitrary code as the root user. (CVE-2022-29500)

It was discovered that Slurm did not properly handle access control when
dealing with RPC traffic through PMI2 and PMIx, which could allow an
unprivileged user to send data to an arbitrary unix socket in the host.
An attacker could possibly use this issue to execute arbitrary code as
the root user. (CVE-2022-29501)

It was discovered that Slurm did not properly handle validation logic when
processing input and output data with the srun client, which could lead to
the interception of process I/O. An attacker could possibly use this issue
to expose sensitive information or execute arbitrary code. This issue only
affected Ubuntu 22.04 LTS. (CVE-2022-29502)
CVEs:
- https://ubuntu.com/security/CVE-2022-29500
- https://ubuntu.com/security/CVE-2022-29501
- https://ubuntu.com/security/CVE-2022-29502
- https://ubuntu.com/security/CVE-2022-29501
- https://ubuntu.com/security/CVE-2022-29500
- https://ubuntu.com/security/CVE-2022-29502

Title: USN-6466-1: Linux kernel (NVIDIA) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6466-1
Priorities: low,medium,high
Description:
Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel
contained a race condition during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-45886, CVE-2022-45919)

Hyunwoo Kim discovered that the Technotrend/Hauppauge USB DEC driver in the
Linux kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2022-45887)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate MFT flags in certain situations. An
attacker could use this to construct a malicious NTFS image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-48425)

It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

Daniel Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory. (CVE-2023-20569)

Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

It was discovered that the ARM64 KVM implementation in the Linux kernel did
not properly restrict hypervisor memory access. An attacker in a guest VM
could use this to execute arbitrary code in the host OS. (CVE-2023-21264)

It was discovered that the IPv6 RPL protocol implementation in the Linux
kernel did not properly handle user-supplied data. A remote attacker could
use this to cause a denial of service (system crash). (CVE-2023-2156)

Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

Ross Lagerwall discovered that the Xen netback backend driver in the Linux
kernel did not properly handle certain unusual packets from a
paravirtualized network frontend, leading to a buffer overflow. An attacker
in a guest VM could use this to cause a denial of service (host system
crash) or possibly execute arbitrary code. (CVE-2023-34319)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an integer
underflow and out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38427)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate SMB request protocol IDs, leading to a out-of-
bounds read vulnerability. A remote attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-38430)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate packet header sizes in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38431)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate command payload size, leading to a out-of-bounds
read vulnerability. A remote attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-38432)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
did not properly validate a buffer size in certain situations, leading to
an out-of-bounds read vulnerability. A remote attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-3865)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
contained a null pointer dereference vulnerability when handling handling
chained requests. A remote attacker could use this to cause a denial of
service (system crash). (CVE-2023-3866)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly handle session setup requests, leading to an out-of-bounds read
vulnerability. A remote attacker could use this to expose sensitive
information. (CVE-2023-3867)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)

It was discovered that the Siano USB MDTV receiver device driver in the
Linux kernel did not properly handle device initialization failures in
certain situations, leading to a use-after-free vulnerability. A physically
proximate attacker could use this cause a denial of service (system crash).
(CVE-2023-4132)

It was discovered that a race condition existed in the Cypress touchscreen
driver in the Linux kernel during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4134)

Andy Nguyen discovered that the KVM implementation for AMD processors in
the Linux kernel with Secure Encrypted Virtualization (SEV) contained a
race condition when accessing the GHCB page. A local attacker in a SEV
guest VM could possibly use this to cause a denial of service (host system
crash). (CVE-2023-4155)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-4194)

Bien Pham discovered that the netfiler subsystem in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local user could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-4244)

Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)

Kyle Zeng discovered that the networking stack implementation in the Linux
kernel did not properly validate skb object size in certain conditions. An
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-42752)

Kyle Zeng discovered that the netfiler subsystem in the Linux kernel did
not properly calculate array offsets, leading to a out-of-bounds write
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-42753)

Kyle Zeng discovered that the IPv4 Resource Reservation Protocol (RSVP)
classifier implementation in the Linux kernel contained an out-of-bounds
read vulnerability. A local attacker could use this to cause a denial of
service (system crash). Please note that kernel packet classifier support
for RSVP has been removed to resolve this vulnerability. (CVE-2023-42755)

Kyle Zeng discovered that the netfilter subsystem in the Linux kernel
contained a race condition in IP set operations in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-42756)

Thelford Williams discovered that the Ceph file system messenger protocol
implementation in the Linux kernel did not properly validate frame segment
length in certain situation, leading to a buffer overflow vulnerability. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-44466)

Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2023-4569)

Bing-Jhong Billy Jheng discovered that the Unix domain socket
implementation in the Linux kernel contained a race condition in certain
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4622)

Budimir Markovic discovered that the qdisc implementation in the Linux
kernel did not properly validate inner classes, leading to a use-after-free
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-4623)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-5197)
CVEs:
- https://ubuntu.com/security/CVE-2022-45886
- https://ubuntu.com/security/CVE-2022-45919
- https://ubuntu.com/security/CVE-2022-45887
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-21264
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-38427
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-38431
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-3867
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-4244
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-3867
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-38427
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2022-45886
- https://ubuntu.com/security/CVE-2022-45919
- https://ubuntu.com/security/CVE-2023-38431
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2022-45887
- https://ubuntu.com/security/CVE-2023-21264
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-4244
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-5197

Title: USN-6445-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6445-1
Priorities: medium,high,low
Description:
It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

Daniel Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory. (CVE-2023-20569)

It was discovered that the IPv6 RPL protocol implementation in the Linux
kernel did not properly handle user-supplied data. A remote attacker could
use this to cause a denial of service (system crash). (CVE-2023-2156)

Davide Ornaghi discovered that the DECnet network protocol implementation
in the Linux kernel contained a null pointer dereference vulnerability. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. Please note that kernel support for the
DECnet has been removed to resolve this CVE. (CVE-2023-3338)

Ross Lagerwall discovered that the Xen netback backend driver in the Linux
kernel did not properly handle certain unusual packets from a
paravirtualized network frontend, leading to a buffer overflow. An attacker
in a guest VM could use this to cause a denial of service (host system
crash) or possibly execute arbitrary code. (CVE-2023-34319)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate command payload size, leading to a out-of-bounds
read vulnerability. A remote attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-38432)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
did not properly validate a buffer size in certain situations, leading to
an out-of-bounds read vulnerability. A remote attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-3865)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
contained a null pointer dereference vulnerability when handling handling
chained requests. A remote attacker could use this to cause a denial of
service (system crash). (CVE-2023-3866)

It was discovered that the Siano USB MDTV receiver device driver in the
Linux kernel did not properly handle device initialization failures in
certain situations, leading to a use-after-free vulnerability. A physically
proximate attacker could use this cause a denial of service (system crash).
(CVE-2023-4132)

Andy Nguyen discovered that the KVM implementation for AMD processors in
the Linux kernel with Secure Encrypted Virtualization (SEV) contained a
race condition when accessing the GHCB page. A local attacker in a SEV
guest VM could possibly use this to cause a denial of service (host system
crash). (CVE-2023-4155)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-4194)

Bien Pham discovered that the netfiler subsystem in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local user could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-4244)

Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)

Kyle Zeng discovered that the networking stack implementation in the Linux
kernel did not properly validate skb object size in certain conditions. An
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-42752)

Kyle Zeng discovered that the netfiler subsystem in the Linux kernel did
not properly calculate array offsets, leading to a out-of-bounds write
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-42753)

Kyle Zeng discovered that the IPv4 Resource Reservation Protocol (RSVP)
classifier implementation in the Linux kernel contained an out-of-bounds
read vulnerability. A local attacker could use this to cause a denial of
service (system crash). Please note that kernel packet classifier support
for RSVP has been removed to resolve this vulnerability. (CVE-2023-42755)

Kyle Zeng discovered that the netfilter subsystem in the Linux kernel
contained a race condition in IP set operations in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-42756)

Thelford Williams discovered that the Ceph file system messenger protocol
implementation in the Linux kernel did not properly validate frame segment
length in certain situation, leading to a buffer overflow vulnerability. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-44466)

Bing-Jhong Billy Jheng discovered that the Unix domain socket
implementation in the Linux kernel contained a race condition in certain
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4622)

Budimir Markovic discovered that the qdisc implementation in the Linux
kernel did not properly validate inner classes, leading to a use-after-free
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-4623)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-5197)
CVEs:
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-3338
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-4244
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-3338
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-4244
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42755

Title: USN-6416-3: Linux kernel (Raspberry Pi) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6416-3
Priorities: medium,high,low
Description:
It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

Daniel Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory. (CVE-2023-20569)

It was discovered that the IPv6 RPL protocol implementation in the Linux
kernel did not properly handle user-supplied data. A remote attacker could
use this to cause a denial of service (system crash). (CVE-2023-2156)

Davide Ornaghi discovered that the DECnet network protocol implementation
in the Linux kernel contained a null pointer dereference vulnerability. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. Please note that kernel support for the
DECnet has been removed to resolve this CVE. (CVE-2023-3338)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate command payload size, leading to a out-of-bounds
read vulnerability. A remote attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-38432)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
did not properly validate a buffer size in certain situations, leading to
an out-of-bounds read vulnerability. A remote attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-3865)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
contained a null pointer dereference vulnerability when handling handling
chained requests. A remote attacker could use this to cause a denial of
service (system crash). (CVE-2023-3866)

It was discovered that the Siano USB MDTV receiver device driver in the
Linux kernel did not properly handle device initialization failures in
certain situations, leading to a use-after-free vulnerability. A physically
proximate attacker could use this cause a denial of service (system crash).
(CVE-2023-4132)

Andy Nguyen discovered that the KVM implementation for AMD processors in
the Linux kernel with Secure Encrypted Virtualization (SEV) contained a
race condition when accessing the GHCB page. A local attacker in a SEV
guest VM could possibly use this to cause a denial of service (host system
crash). (CVE-2023-4155)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-4194)

Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)

Thelford Williams discovered that the Ceph file system messenger protocol
implementation in the Linux kernel did not properly validate frame segment
length in certain situation, leading to a buffer overflow vulnerability. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-44466)
CVEs:
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-3338
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-3338
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-20569

Title: USN-6459-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6459-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.35 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
Ubuntu 23.04, and Ubuntu 23.10.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-35.html
https://www.oracle.com/security-alerts/cpuoct2023.html
CVEs:
- https://ubuntu.com/security/CVE-2023-22079
- https://ubuntu.com/security/CVE-2023-22066
- https://ubuntu.com/security/CVE-2023-22114
- https://ubuntu.com/security/CVE-2023-22112
- https://ubuntu.com/security/CVE-2023-22059
- https://ubuntu.com/security/CVE-2023-22068
- https://ubuntu.com/security/CVE-2023-22070
- https://ubuntu.com/security/CVE-2023-22103
- https://ubuntu.com/security/CVE-2023-22084
- https://ubuntu.com/security/CVE-2023-22032
- https://ubuntu.com/security/CVE-2023-22097
- https://ubuntu.com/security/CVE-2023-22092
- https://ubuntu.com/security/CVE-2023-22064
- https://ubuntu.com/security/CVE-2023-22078

Title: USN-6465-2: Linux kernel (Raspberry Pi) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6465-2
Priorities: low,medium
Description:
Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)
CVEs:
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3772

Title: USN-6465-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6465-1
Priorities: low,medium
Description:
Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)
CVEs:
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3772

Title: USN-6464-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6464-1
Priorities: low,medium
Description:
Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate SMB request protocol IDs, leading to a out-of-
bounds read vulnerability. A remote attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-38430)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate command payload size, leading to a out-of-bounds
read vulnerability. A remote attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-38432)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
did not properly validate a buffer size in certain situations, leading to
an out-of-bounds read vulnerability. A remote attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-3865)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
contained a null pointer dereference vulnerability when handling handling
chained requests. A remote attacker could use this to cause a denial of
service (system crash). (CVE-2023-3866)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly handle session setup requests, leading to an out-of-bounds read
vulnerability. A remote attacker could use this to expose sensitive
information. (CVE-2023-3867)

It was discovered that the Siano USB MDTV receiver device driver in the
Linux kernel did not properly handle device initialization failures in
certain situations, leading to a use-after-free vulnerability. A physically
proximate attacker could use this cause a denial of service (system crash).
(CVE-2023-4132)

It was discovered that a race condition existed in the Cypress touchscreen
driver in the Linux kernel during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4134)

Thelford Williams discovered that the Ceph file system messenger protocol
implementation in the Linux kernel did not properly validate frame segment
length in certain situation, leading to a buffer overflow vulnerability. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-44466)
CVEs:
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-3867
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-3867
- https://ubuntu.com/security/CVE-2023-4134
- https://ubuntu.com/security/CVE-2023-3866

Title: USN-6461-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6461-1
Priorities: low,medium,high
Description:
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Marek Marczykowski-Górecki discovered that the Xen event channel
infrastructure implementation in the Linux kernel contained a race
condition. An attacker in a guest VM could possibly use this to cause a
denial of service (paravirtualized device unavailability). (CVE-2023-34324)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Bien Pham discovered that the netfiler subsystem in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local user could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-4244)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)

It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)
CVEs:
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-34324
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-4244
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-4244
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-34324

Title: USN-6448-1: Sofia-SIP vulnerability
URL: https://ubuntu.com/security/notices/USN-6448-1
Priorities: medium
Description:
Xu Biang discovered that Sofia-SIP did not properly manage memory when
handling STUN packets. An attacker could use this issue to cause
Sofia-SIP to crash, resulting in a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-32307

Title: USN-6463-1: Open VM Tools vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6463-1
Priorities: medium
Description:
It was discovered that Open VM Tools incorrectly handled SAML tokens. A
remote attacker Guest Operations privileges could possibly use this issue
to escalate privileges. (CVE-2023-34058)

Matthias Gerstner discovered that Open VM Tools incorrectly handled file
descriptors when dropping privileges. A local attacker could possibly use
this issue to hijack /dev/uinput and simulate user inputs. (CVE-2023-34059)
CVEs:
- https://ubuntu.com/security/CVE-2023-34058
- https://ubuntu.com/security/CVE-2023-34059
- https://ubuntu.com/security/CVE-2023-34059
- https://ubuntu.com/security/CVE-2023-34058

Title: USN-6444-2: Linux kernel (StarFive) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6444-2
Priorities: medium,high
Description:
Ross Lagerwall discovered that the Xen netback backend driver in the Linux
kernel did not properly handle certain unusual packets from a
paravirtualized network frontend, leading to a buffer overflow. An attacker
in a guest VM could use this to cause a denial of service (host system
crash) or possibly execute arbitrary code. (CVE-2023-34319)

Bien Pham discovered that the netfiler subsystem in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local user could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-4244)

Kyle Zeng discovered that the networking stack implementation in the Linux
kernel did not properly validate skb object size in certain conditions. An
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-42752)

Kyle Zeng discovered that the netfiler subsystem in the Linux kernel did
not properly calculate array offsets, leading to a out-of-bounds write
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-42753)

Kyle Zeng discovered that the IPv4 Resource Reservation Protocol (RSVP)
classifier implementation in the Linux kernel contained an out-of-bounds
read vulnerability. A local attacker could use this to cause a denial of
service (system crash). Please note that kernel packet classifier support
for RSVP has been removed to resolve this vulnerability. (CVE-2023-42755)

Kyle Zeng discovered that the netfilter subsystem in the Linux kernel
contained a race condition in IP set operations in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-42756)

Bing-Jhong Billy Jheng discovered that the Unix domain socket
implementation in the Linux kernel contained a race condition in certain
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4622)

Budimir Markovic discovered that the qdisc implementation in the Linux
kernel did not properly validate inner classes, leading to a use-after-free
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-4623)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-5197)
CVEs:
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-4244
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-4244
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-42753

Title: USN-6431-2: iperf3 vulnerability
URL: https://ubuntu.com/security/notices/USN-6431-2
Priorities: medium
Description:
USN-6431-1 fixed a vulnerability in iperf3. This update provides
the corresponding update for Ubuntu 22.04 LTS and Ubuntu 23.04.

Original advisory details:

It was discovered that iperf3 did not properly manage certain inputs,
which could lead to a crash. A remote attacker could possibly use this
issue to cause a denial of service. (CVE-2023-38403)
CVEs:
- https://ubuntu.com/security/CVE-2023-38403
- https://ubuntu.com/security/CVE-2023-38403

Title: USN-6436-1: FRR vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6436-1
Priorities: medium,low
Description:
It was discovered that the FRR did not properly check the attribute length
in NRLI. A remote attacker could possibly use this issue to cause a denial
of service. (CVE-2023-41358)

It was discovered that the FRR did not properly manage memory when reading
initial bytes of ORF header. A remote attacker could possibly use this
issue to cause a denial of service. (CVE-2023-41360)

It was discovered that FRR did not properly validate the attributes in the
BGP FlowSpec functionality. A remote attacker could possibly use this issue
to cause a denial of service. (CVE-2023-41909)
CVEs:
- https://ubuntu.com/security/CVE-2023-41358
- https://ubuntu.com/security/CVE-2023-41360
- https://ubuntu.com/security/CVE-2023-41909
- https://ubuntu.com/security/CVE-2023-41360
- https://ubuntu.com/security/CVE-2023-41909
- https://ubuntu.com/security/CVE-2023-41358

Title: USN-6434-1: PMIx vulnerability
URL: https://ubuntu.com/security/notices/USN-6434-1
Priorities: high
Description:
Francois Diakhate discovered that PMIx did not properly handle race
conditions in the pmix library, which could lead to unwanted privilege
escalation. An attacker could possibly use this issue to obtain ownership
of an arbitrary file on the filesystem, under the default configuration
of the application.
CVEs:
- https://ubuntu.com/security/CVE-2023-41915

Title: USN-6455-1: Exim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6455-1
Priorities: medium
Description:
It was discovered that Exim incorrectly handled validation of user-supplied
data, which could lead to memory corruption. A remote attacker could
possibly use this issue to execute arbitrary code. (CVE-2023-42117)

It was discovered that Exim incorrectly handled validation of user-supplied
data, which could lead to an out-of-bounds read. An attacker could possibly
use this issue to expose sensitive information. (CVE-2023-42119)
CVEs:
- https://ubuntu.com/security/CVE-2023-42117
- https://ubuntu.com/security/CVE-2023-42119
- https://ubuntu.com/security/CVE-2023-42117
- https://ubuntu.com/security/CVE-2023-42119

Title: USN-6443-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6443-1
Priorities: high,medium
Description:
Bien Pham discovered that the netfiler subsystem in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local user could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-4244)

Kyle Zeng discovered that the networking stack implementation in the Linux
kernel did not properly validate skb object size in certain conditions. An
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-42752)

Kyle Zeng discovered that the IPv4 Resource Reservation Protocol (RSVP)
classifier implementation in the Linux kernel contained an out-of-bounds
read vulnerability. A local attacker could use this to cause a denial of
service (system crash). Please note that kernel packet classifier support
for RSVP has been removed to resolve this vulnerability. (CVE-2023-42755)

Kyle Zeng discovered that the netfilter subsystem in the Linux kernel
contained a race condition in IP set operations in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-42756)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-5197)
CVEs:
- https://ubuntu.com/security/CVE-2023-4244
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-42756
- https://ubuntu.com/security/CVE-2023-4244

Title: USN-6433-1: Ghostscript vulnerability
URL: https://ubuntu.com/security/notices/USN-6433-1
Priorities: medium
Description:
It was discovered that Ghostscript incorrectly handled certain PDF
documents. If a user or automated system were tricked into opening a
specially crafted PDF file, a remote attacker could use this issue to
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-43115

Title: USN-6450-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6450-1
Priorities: medium,low
Description:
Tony Battersby discovered that OpenSSL incorrectly handled key and
initialization vector (IV) lengths. This could lead to truncation issues
and result in loss of confidentiality for some symmetric cipher modes.
(CVE-2023-5363)

Juerg Wullschleger discovered that OpenSSL incorrectly handled the AES-SIV
cipher. This could lead to empty data entries being ignored, resulting in
certain applications being misled. This issue only affected Ubuntu 22.04
LTS and Ubuntu 23.04. (CVE-2023-2975)

It was discovered that OpenSSL incorrectly handled checking excessively
long DH keys or parameters. A remote attacker could possibly use this issue
to cause OpenSSL to consume resources, leading to a denial of service. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-3446,
CVE-2023-3817)
CVEs:
- https://ubuntu.com/security/CVE-2023-5363
- https://ubuntu.com/security/CVE-2023-2975
- https://ubuntu.com/security/CVE-2023-3446
- https://ubuntu.com/security/CVE-2023-3817
- https://ubuntu.com/security/CVE-2023-5363
- https://ubuntu.com/security/CVE-2023-3817
- https://ubuntu.com/security/CVE-2023-3446
- https://ubuntu.com/security/CVE-2023-2975

Title: USN-6453-1: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6453-1
Priorities: medium
Description:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
prepending values to certain properties. An attacker could possibly use
this issue to cause the X Server to crash, execute arbitrary code, or
escalate privileges. (CVE-2023-5367)

Sri discovered that the X.Org X Server incorrectly handled detroying
windows in certain legacy multi-screen setups. An attacker could possibly
use this issue to cause the X Server to crash, execute arbitrary code, or
escalate privileges. (CVE-2023-5380)
CVEs:
- https://ubuntu.com/security/CVE-2023-5367
- https://ubuntu.com/security/CVE-2023-5380
- https://ubuntu.com/security/CVE-2023-5367
- https://ubuntu.com/security/CVE-2023-5380

Title: USN-6468-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6468-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-5724, CVE-2023-5728,
CVE-2023-5730, CVE-2023-5732)

Kelsey Gilbert discovered that Thunderbird did not properly manage certain
browser prompts and dialogs due to an insufficient activation-delay. An
attacker could potentially exploit this issue to perform clickjacking.
(CVE-2023-5721)

Shaheen Fazim discovered that Thunderbird did not properly validate the URLs
open by installed WebExtension. An attacker could potentially exploit this
issue to obtain sensitive information. (CVE-2023-5725)
CVEs:
- https://ubuntu.com/security/CVE-2023-5724
- https://ubuntu.com/security/CVE-2023-5728
- https://ubuntu.com/security/CVE-2023-5730
- https://ubuntu.com/security/CVE-2023-5732
- https://ubuntu.com/security/CVE-2023-5721
- https://ubuntu.com/security/CVE-2023-5725
- https://ubuntu.com/security/CVE-2023-5724
- https://ubuntu.com/security/CVE-2023-5730
- https://ubuntu.com/security/CVE-2023-5732
- https://ubuntu.com/security/CVE-2023-5721
- https://ubuntu.com/security/CVE-2023-5728
- https://ubuntu.com/security/CVE-2023-5725

1.260

Available in the Broadcom Support portal

Release Date: October 11, 2023

Metadata:

BOSH Agent Version: 2.592.0

USNs:


Title: USN-6420-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6420-1
Priorities: medium,low
Description:
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possibly execute arbitrary code. This
issue only affected Ubuntu 22.04 LTS. (CVE-2022-3235, CVE-2022-3278,
CVE-2022-3297, CVE-2022-3491)

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-3352, CVE-2022-4292)

It was discovered that Vim incorrectly handled memory when replacing in
virtualedit mode. An attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, and Ubuntu 22.04 LTS. (CVE-2022-3234)

It was discovered that Vim incorrectly handled memory when autocmd changes
mark. An attacker could possibly use this issue to cause a denial of
service. (CVE-2022-3256)

It was discovered that Vim did not properly perform checks on array index
with negative width window. An attacker could possibly use this issue to
cause a denial of service, or execute arbitrary code. (CVE-2022-3324)

It was discovered that Vim did not properly perform checks on a put command
column with a visual block. An attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-3520)

It was discovered that Vim incorrectly handled memory when using autocommand
to open a window. An attacker could possibly use this issue to cause a
denial of service. (CVE-2022-3591)

It was discovered that Vim incorrectly handled memory when updating buffer
of the component autocmd handler. An attacker could possibly use this issue
to cause a denial of service. This issue only affected Ubuntu 20.04 LTS,
and Ubuntu 22.04 LTS. (CVE-2022-3705)

It was discovered that Vim incorrectly handled floating point comparison
with incorrect operator. An attacker could possibly use this issue to cause
a denial of service. This issue only affected Ubuntu 20.04 LTS. and Ubuntu
22.04 LTS. (CVE-2022-4293)
CVEs:
- https://ubuntu.com/security/CVE-2022-3235
- https://ubuntu.com/security/CVE-2022-3278
- https://ubuntu.com/security/CVE-2022-3297
- https://ubuntu.com/security/CVE-2022-3491
- https://ubuntu.com/security/CVE-2022-3352
- https://ubuntu.com/security/CVE-2022-4292
- https://ubuntu.com/security/CVE-2022-3234
- https://ubuntu.com/security/CVE-2022-3256
- https://ubuntu.com/security/CVE-2022-3324
- https://ubuntu.com/security/CVE-2022-3520
- https://ubuntu.com/security/CVE-2022-3591
- https://ubuntu.com/security/CVE-2022-3705
- https://ubuntu.com/security/CVE-2022-4293
- https://ubuntu.com/security/CVE-2022-3591
- https://ubuntu.com/security/CVE-2022-3352
- https://ubuntu.com/security/CVE-2022-3234
- https://ubuntu.com/security/CVE-2022-4293
- https://ubuntu.com/security/CVE-2022-3520
- https://ubuntu.com/security/CVE-2022-3491
- https://ubuntu.com/security/CVE-2022-3256
- https://ubuntu.com/security/CVE-2022-3278
- https://ubuntu.com/security/CVE-2022-3297
- https://ubuntu.com/security/CVE-2022-3705
- https://ubuntu.com/security/CVE-2022-4292
- https://ubuntu.com/security/CVE-2022-3324
- https://ubuntu.com/security/CVE-2022-3235

Title: USN-6412-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6412-1
Priorities: low,medium,high
Description:
Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel
contained a race condition during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-45886, CVE-2022-45919)

Hyunwoo Kim discovered that the Technotrend/Hauppauge USB DEC driver in the
Linux kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2022-45887)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate MFT flags in certain situations. An
attacker could use this to construct a malicious NTFS image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-48425)

It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

Daniel Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory. (CVE-2023-20569)

It was discovered that the IPv6 RPL protocol implementation in the Linux
kernel did not properly handle user-supplied data. A remote attacker could
use this to cause a denial of service (system crash). (CVE-2023-2156)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an integer
underflow and out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38427)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate packet header sizes in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38431)

Andy Nguyen discovered that the KVM implementation for AMD processors in
the Linux kernel with Secure Encrypted Virtualization (SEV) contained a
race condition when accessing the GHCB page. A local attacker in a SEV
guest VM could possibly use this to cause a denial of service (host system
crash). (CVE-2023-4155)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-4194)

Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)
CVEs:
- https://ubuntu.com/security/CVE-2022-45886
- https://ubuntu.com/security/CVE-2022-45919
- https://ubuntu.com/security/CVE-2022-45887
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38427
- https://ubuntu.com/security/CVE-2023-38431
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-38427
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2022-45919
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2022-45887
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2022-45886
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38431
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-2156

Title: USN-6416-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6416-1
Priorities: medium,high,low
Description:
It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

Daniel Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory. (CVE-2023-20569)

It was discovered that the IPv6 RPL protocol implementation in the Linux
kernel did not properly handle user-supplied data. A remote attacker could
use this to cause a denial of service (system crash). (CVE-2023-2156)

Davide Ornaghi discovered that the DECnet network protocol implementation
in the Linux kernel contained a null pointer dereference vulnerability. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. Please note that kernel support for the
DECnet has been removed to resolve this CVE. (CVE-2023-3338)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate command payload size, leading to a out-of-bounds
read vulnerability. A remote attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-38432)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
did not properly validate a buffer size in certain situations, leading to
an out-of-bounds read vulnerability. A remote attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-3865)

Laurence Wit discovered that the KSMBD implementation in the Linux kernel
contained a null pointer dereference vulnerability when handling handling
chained requests. A remote attacker could use this to cause a denial of
service (system crash). (CVE-2023-3866)

It was discovered that the Siano USB MDTV receiver device driver in the
Linux kernel did not properly handle device initialization failures in
certain situations, leading to a use-after-free vulnerability. A physically
proximate attacker could use this cause a denial of service (system crash).
(CVE-2023-4132)

Andy Nguyen discovered that the KVM implementation for AMD processors in
the Linux kernel with Secure Encrypted Virtualization (SEV) contained a
race condition when accessing the GHCB page. A local attacker in a SEV
guest VM could possibly use this to cause a denial of service (host system
crash). (CVE-2023-4155)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-4194)

Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)

Thelford Williams discovered that the Ceph file system messenger protocol
implementation in the Linux kernel did not properly validate frame segment
length in certain situation, leading to a buffer overflow vulnerability. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-44466)
CVEs:
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-3338
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-3865
- https://ubuntu.com/security/CVE-2023-3338
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-3866
- https://ubuntu.com/security/CVE-2023-44466
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-2156

Title: USN-6415-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6415-1
Priorities: high,medium
Description:
Daniel Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory. (CVE-2023-20569)

Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleem
discovered that the InfiniBand RDMA driver in the Linux kernel did not
properly check for zero-length STAG or MR registration. A remote attacker
could possibly use this to execute arbitrary code. (CVE-2023-25775)

It was discovered that the USB subsystem in the Linux kernel contained a
race condition while handling device descriptors in certain situations,
leading to a out-of-bounds read vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-37453)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel did not properly initialize a policy data structure, leading
to an out-of-bounds vulnerability. A local privileged attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information (kernel memory). (CVE-2023-3773)

Kyle Zeng discovered that the netfiler subsystem in the Linux kernel did
not properly calculate array offsets, leading to a out-of-bounds write
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-42753)

Bing-Jhong Billy Jheng discovered that the Unix domain socket
implementation in the Linux kernel contained a race condition in certain
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4622)

Budimir Markovic discovered that the qdisc implementation in the Linux
kernel did not properly validate inner classes, leading to a use-after-free
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-4623)
CVEs:
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-3773
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-3773
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-37453
- https://ubuntu.com/security/CVE-2023-25775
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4623

Title: LSN-0098-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0098-1
Priorities: high
Description:
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.(CVE-2023-3090)

It was discovered that the virtual terminal driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information (kernel memory).(CVE-2023-3567)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-3609)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code.(CVE-2023-3777)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code.(CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code.(CVE-2023-4004)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code.(CVE-2023-4128)

Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-21400)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-40283)
CVEs:
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-4128

Title: USN-6429-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6429-1
Priorities: high,low
Description:
Jay Satiro discovered that curl incorrectly handled hostnames when using a
SOCKS5 proxy. In environments where curl is configured to use a SOCKS5
proxy, a remote attacker could possibly use this issue to execute arbitrary
code. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-38545)

It was discovered that curl incorrectly handled cookies when an application
duplicated certain handles. A local attacker could possibly create a cookie
file and inject arbitrary cookies into subsequent connections.
(CVE-2023-38546)
CVEs:
- https://ubuntu.com/security/CVE-2023-38545
- https://ubuntu.com/security/CVE-2023-38546
- https://ubuntu.com/security/CVE-2023-38546
- https://ubuntu.com/security/CVE-2023-38545

Title: USN-6425-1: Samba vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6425-1
Priorities: medium
Description:
Sri Nagasubramanian discovered that the Samba acl_xattr VFS module
incorrectly handled read-only files. When Samba is configured to ignore
system ACLs, a remote attacker could possibly use this issue to truncate
read-only files. (CVE-2023-4091)

Andrew Bartlett discovered that Samba incorrectly handled the DirSync
control. A remote attacker with an RODC DC account could possibly use this
issue to obtain all domain secrets. (CVE-2023-4154)

Andrew Bartlett discovered that Samba incorrectly handled the rpcecho
development server. A remote attacker could possibly use this issue to
cause Samba to stop responding, resulting in a denial of service.
(CVE-2023-42669)

Kirin van der Veer discovered that Samba incorrectly handled certain RPC
service listeners. A remote attacker could possibly use this issue to cause
Samba to start multiple incompatible RPC listeners, resulting in a denial
of service. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-42670)
CVEs:
- https://ubuntu.com/security/CVE-2023-4091
- https://ubuntu.com/security/CVE-2023-4154
- https://ubuntu.com/security/CVE-2023-42669
- https://ubuntu.com/security/CVE-2023-42670
- https://ubuntu.com/security/CVE-2023-4091
- https://ubuntu.com/security/CVE-2023-42670
- https://ubuntu.com/security/CVE-2023-42669
- https://ubuntu.com/security/CVE-2023-4154

Title: USN-6426-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6426-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-41993
- https://ubuntu.com/security/CVE-2023-39928
- https://ubuntu.com/security/CVE-2023-41074

Title: USN-6423-1: CUE vulnerability
URL: https://ubuntu.com/security/notices/USN-6423-1
Priorities: medium
Description:
It was discovered that CUE incorrectly handled certain files.
An attacker could possibly use this issue to expose sensitive
information or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-43641

Title: USN-6414-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-6414-1
Priorities: medium
Description:
Wenchao Li discovered that the Django Truncator function incorrectly
handled very long HTML input. A remote attacker could possibly use this
issue to cause Django to consume resources, leading to a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-43665

1.250

Available in the Broadcom Support portal

Release Date: October 04, 2023

Metadata:

BOSH Agent Version: 2.588.0

USNs:


Title: USN-6398-1: ReadyMedia vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6398-1
Priorities: medium
Description:
It was discovered that ReadyMedia was vulnerable to DNS rebinding attacks.
A remote attacker could possibly use this issue to trick the local DLNA
server to leak information. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-26505)

It was discovered that ReadyMedia incorrectly handled certain HTTP requests
using chunked transport encoding. A remote attacker could possibly use this
issue to cause buffer overflows, resulting in out-of-bounds reads and writes.
(CVE-2023-33476)
CVEs:
- https://ubuntu.com/security/CVE-2022-26505
- https://ubuntu.com/security/CVE-2023-33476
- https://ubuntu.com/security/CVE-2022-26505
- https://ubuntu.com/security/CVE-2023-33476

Title: USN-6385-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6385-1
Priorities: medium,high,low
Description:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)

Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the
do_prlimit() function in the Linux kernel did not properly handle
speculative execution barriers. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2023-0458)

It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076, CVE-2023-4194)

It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)

It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)

Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski
discovered that the BPF verifier in the Linux kernel did not properly mark
registers for precision tracking in certain situations, leading to an out-
of-bounds access vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-2163)

It was discovered that the perf subsystem in the Linux kernel contained a
use-after-free vulnerability. A privileged local attacker could possibly
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-2235)

Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)

It was discovered that a race condition existed in the TLS subsystem in the
Linux kernel, leading to a use-after-free or a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-28466)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)

It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

It was discovered that the Qualcomm MSM DPU driver in the Linux kernel did
not properly validate memory allocations in certain situations, leading to
a null pointer dereference vulnerability. A local attacker could use this
to cause a denial of service (system crash). (CVE-2023-3220)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)

Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)

Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2023-4569)
CVEs:
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-3220
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-3220
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-4569

Title: USN-6412-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6412-1
Priorities: low,medium,high
Description:
Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel
contained a race condition during device removal, leading to a use-after-
free vulnerability. A physically proximate attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-45886, CVE-2022-45919)

Hyunwoo Kim discovered that the Technotrend/Hauppauge USB DEC driver in the
Linux kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2022-45887)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate MFT flags in certain situations. An
attacker could use this to construct a malicious NTFS image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-48425)

It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

Daniel Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory. (CVE-2023-20569)

It was discovered that the IPv6 RPL protocol implementation in the Linux
kernel did not properly handle user-supplied data. A remote attacker could
use this to cause a denial of service (system crash). (CVE-2023-2156)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an integer
underflow and out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38427)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate packet header sizes in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-38431)

Andy Nguyen discovered that the KVM implementation for AMD processors in
the Linux kernel with Secure Encrypted Virtualization (SEV) contained a
race condition when accessing the GHCB page. A local attacker in a SEV
guest VM could possibly use this to cause a denial of service (host system
crash). (CVE-2023-4155)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-4194)

Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)
CVEs:
- https://ubuntu.com/security/CVE-2022-45886
- https://ubuntu.com/security/CVE-2022-45919
- https://ubuntu.com/security/CVE-2022-45887
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38427
- https://ubuntu.com/security/CVE-2023-38431
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-38427
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2022-45919
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2022-45887
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2022-45886
- https://ubuntu.com/security/CVE-2023-20569
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38431
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-2156

Title: USN-6386-2: Linux kernel (Raspberry Pi) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6386-2
Priorities: high
Description:
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)

Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2023-4569)
CVEs:
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4569

Title: USN-6386-3: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6386-3
Priorities: high
Description:
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)

Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2023-4569)
CVEs:
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-40283

Title: USN-6402-1: LibTomMath vulnerability
URL: https://ubuntu.com/security/notices/USN-6402-1
Priorities: medium
Description:
It was discovered that LibTomMath incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code
and cause a denial of service (DoS).
CVEs:
- https://ubuntu.com/security/CVE-2023-36328

Title: USN-6401-1: FreeRDP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6401-1
Priorities: medium,unknown,low
Description:
It was discovered that FreeRDP did not properly manage certain inputs. A
malicious server could use this issue to cause FreeRDP clients to crash,
resulting in a denial of service, or possibly obtain sensitive
information. (cve-2023-39350, cve-2023-39351, CVE-2023-39353,
CVE-2023-39354, CVE-2023-40181, CVE-2023-40188, CVE-2023-40589)

It was discovered that FreeRDP did not properly manage certain inputs. A
malicious server could use this issue to cause FreeRDP clients to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(cve-2023-40186 CVE-2023-40567, CVE-2023-40569)
CVEs:
- https://ubuntu.com/security/CVE-2023-39353
- https://ubuntu.com/security/CVE-2023-39354
- https://ubuntu.com/security/CVE-2023-40181
- https://ubuntu.com/security/CVE-2023-40188
- https://ubuntu.com/security/CVE-2023-40589
- https://ubuntu.com/security/CVE-2023-40567
- https://ubuntu.com/security/CVE-2023-40569
- https://ubuntu.com/security/CVE-2023-39351
- https://ubuntu.com/security/CVE-2023-40186
- https://ubuntu.com/security/CVE-2023-40569
- https://ubuntu.com/security/CVE-2023-40589
- https://ubuntu.com/security/CVE-2023-39354
- https://ubuntu.com/security/CVE-2023-40181
- https://ubuntu.com/security/CVE-2023-39353
- https://ubuntu.com/security/CVE-2023-39350
- https://ubuntu.com/security/CVE-2023-40188
- https://ubuntu.com/security/CVE-2023-40567

Title: USN-6389-1: Indent vulnerability
URL: https://ubuntu.com/security/notices/USN-6389-1
Priorities: medium
Description:
It was discovered that Indent incorrectly handled parsing certain source
files. If a user or automated system were tricked into processing a
specially crafted source file, a remote attacker could use this issue to
cause Indent to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-40305

Title: USN-6406-1: SpiderMonkey vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6406-1
Priorities: medium
Description:
Several security issues were discovered in the SpiderMonkey JavaScript
library. If a user were tricked into opening malicious JavaScript
applications or processing malformed data, a remote attacker could exploit
a variety of issues related to JavaScript security, including denial of
service attacks, and arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-4046

Title: USN-6405-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6405-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-4057, CVE-2023-4577,
CVE-2023-4578, CVE-2023-4583, CVE-2023-4585, CVE-2023-5169, CVE-2023-5171,
CVE-2023-5176)

Andrew McCreight discovered that Thunderbird did not properly manage during
the worker lifecycle. An attacker could potentially exploit this issue to
cause a denial of service. (CVE-2023-3600)

Harveer Singh discovered that Thunderbird did not store push notifications
in private browsing mode in encrypted form. An attacker could potentially
exploit this issue to obtain sensitive information. (CVE-2023-4580)

Clément Lecigne discovered that Thunderbird did not properly manage memory
when handling VP8 media stream. An attacker-controlled VP8 media stream
could lead to a heap buffer overflow in the content process, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2023-5217)
CVEs:
- https://ubuntu.com/security/CVE-2023-4057
- https://ubuntu.com/security/CVE-2023-4577
- https://ubuntu.com/security/CVE-2023-4578
- https://ubuntu.com/security/CVE-2023-4583
- https://ubuntu.com/security/CVE-2023-4585
- https://ubuntu.com/security/CVE-2023-5169
- https://ubuntu.com/security/CVE-2023-5171
- https://ubuntu.com/security/CVE-2023-5176
- https://ubuntu.com/security/CVE-2023-3600
- https://ubuntu.com/security/CVE-2023-4580
- https://ubuntu.com/security/CVE-2023-5217
- https://ubuntu.com/security/CVE-2023-5176
- https://ubuntu.com/security/CVE-2023-4580
- https://ubuntu.com/security/CVE-2023-5169
- https://ubuntu.com/security/CVE-2023-4577
- https://ubuntu.com/security/CVE-2023-5171
- https://ubuntu.com/security/CVE-2023-5217
- https://ubuntu.com/security/CVE-2023-3600
- https://ubuntu.com/security/CVE-2023-4585
- https://ubuntu.com/security/CVE-2023-4578
- https://ubuntu.com/security/CVE-2023-4583
- https://ubuntu.com/security/CVE-2023-4057

Title: USN-6407-1: libx11 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6407-1
Priorities: medium
Description:
Gregory James Duck discovered that libx11 incorrectly handled certain
keyboard symbols. If a user were tricked into connecting to a malicious X
server, a remote attacker could use this issue to cause libx11 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-43785)

Yair Mizrahi discovered that libx11 incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could possibly use this issue to consume
memory, leading to a denial of service. (CVE-2023-43786)

Yair Mizrahi discovered that libx11 incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could use this issue to cause libx11 to
crash, leading to a denial of service, or possibly execute arbitrary code.
(CVE-2023-43787)
CVEs:
- https://ubuntu.com/security/CVE-2023-43785
- https://ubuntu.com/security/CVE-2023-43786
- https://ubuntu.com/security/CVE-2023-43787
- https://ubuntu.com/security/CVE-2023-43785
- https://ubuntu.com/security/CVE-2023-43787
- https://ubuntu.com/security/CVE-2023-43786

Title: USN-6408-1: libXpm vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6408-1
Priorities: medium
Description:
Yair Mizrahi discovered that libXpm incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could possibly use this issue to consume
memory, leading to a denial of service. (CVE-2023-43786)

Yair Mizrahi discovered that libXpm incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could use this issue to cause libXpm to
crash, leading to a denial of service, or possibly execute arbitrary code.
(CVE-2023-43787)

Alan Coopersmith discovered that libXpm incorrectly handled certain
malformed XPM image files. If a user were tricked into opening a specially
crafted XPM image file, a remote attacker could possibly use this issue to
cause libXpm to crash, leading to a denial of service. (CVE-2023-43788,
CVE-2023-43789)
CVEs:
- https://ubuntu.com/security/CVE-2023-43786
- https://ubuntu.com/security/CVE-2023-43787
- https://ubuntu.com/security/CVE-2023-43788
- https://ubuntu.com/security/CVE-2023-43789
- https://ubuntu.com/security/CVE-2023-43786
- https://ubuntu.com/security/CVE-2023-43789
- https://ubuntu.com/security/CVE-2023-43788
- https://ubuntu.com/security/CVE-2023-43787

Title: USN-6403-1: libvpx vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6403-1
Priorities: medium
Description:
It was discovered that libvpx did not properly handle certain malformed
media files. If an application using libvpx opened a specially crafted
file, a remote attacker could cause a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-44488
- https://ubuntu.com/security/CVE-2023-5217

Title: USN-6410-1: GRUB2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6410-1
Priorities: medium
Description:
It was discovered that a specially crafted file system image could cause a
heap-based out-of-bounds write. A local attacker could potentially use this
to perform arbitrary code execution bypass and bypass secure boot
protections. (CVE-2023-4692)

It was discovered that a specially crafted file system image could cause an
out-of-bounds read. A physically-present attacker could possibly use this
to leak sensitive information to the GRUB pager. (CVE-2023-4693)
CVEs:
- https://ubuntu.com/security/CVE-2023-4692
- https://ubuntu.com/security/CVE-2023-4693
- https://ubuntu.com/security/CVE-2023-4692
- https://ubuntu.com/security/CVE-2023-4693

Title: USN-6409-1: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6409-1
Priorities: high,medium
Description:
It was discovered that the GNU C Library incorrectly handled the
GLIBC_TUNABLES environment variable. An attacker could possibly use this
issue to perform a privilege escalation attack. (CVE-2023-4911)

It was discovered that the GNU C Library incorrectly handled certain DNS
responses when the system was configured in no-aaaa mode. A remote attacker
could possibly use this issue to cause the GNU C Library to crash,
resulting in a denial of service. This issue only affected Ubuntu 23.04.
(CVE-2023-4527)
CVEs:
- https://ubuntu.com/security/CVE-2023-4911
- https://ubuntu.com/security/CVE-2023-4527
- https://ubuntu.com/security/CVE-2023-4911
- https://ubuntu.com/security/CVE-2023-4527

1.232

Available in the Broadcom Support portal

Release Date: September 20, 2023

Metadata:

BOSH Agent Version: 2.581.0

USNs:


Title: USN-6360-1: FLAC vulnerability
URL: https://ubuntu.com/security/notices/USN-6360-1
Priorities: medium
Description:
It was discovered that FLAC incorrectly handled encoding certain files. A
remote attacker could use this issue to cause FLAC to crash, resulting in a
denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-22219

Title: USN-6355-1: GRUB2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6355-1
Priorities: medium,low
Description:
Daniel Axtens discovered that specially crafted images could cause a
heap-based out-of-bonds write. A local attacker could possibly use
this to circumvent secure boot protections. (CVE-2021-3695)

Daniel Axtens discovered that specially crafted images could cause
out-of-bonds read and write. A local attacker could possibly use this
to circumvent secure boot protections. (CVE-2021-3696)

Daniel Axtens discovered that specially crafted images could cause
buffer underwrite which allows arbitrary data to be written to a heap.
A local attacker could possibly use this to circumvent secure
boot protections. (CVE-2021-3697)

It was discovered that GRUB2 configuration files were created with
the wrong permissions. An attacker could possibly use this to leak
encrypted passwords. (CVE-2021-3981)

Daniel Axtens discovered that specially crafted IP packets could cause
an integer underflow and write past the end of a bugger. An attacker
could possibly use this to circumvent secure boot protections.
(CVE-2022-28733)

Daniel Axtens discovered that specially crafted HTTP headers can cause
an out-of-bounds write of a NULL byte. An attacker could possibly use
this to corrupt GRUB2’s internal data. (CVE-2022-28734)

Julian Andres Klode discovered that GRUB2 shim_lock allowed non-
kernel files to be loaded. A local attack could possibly use this to
circumvent secure boot protections. (CVE-2022-28735)

Chris Coulson discovered that executing chainloaders more than once
caused a use-after-free vulnerability. A local attack could possibly
use this to circumvent secure boot protections. (CVE-2022-28736)

Chris Coulson discovered that specially crafted executables could
cause shim to make out-of-bound writes. A local attack could possibly
use this to circumvent secure boot protections. (CVE-2022-28737)

Zhang Boyang discovered that specially crafted unicode sequences
could lead to an out-of-bounds write to a heap. A local attacker could
possibly use this to circumvent secure boot protections.
(CVE-2022-3775)
CVEs:
- https://ubuntu.com/security/CVE-2021-3695
- https://ubuntu.com/security/CVE-2021-3696
- https://ubuntu.com/security/CVE-2021-3697
- https://ubuntu.com/security/CVE-2021-3981
- https://ubuntu.com/security/CVE-2022-28733
- https://ubuntu.com/security/CVE-2022-28734
- https://ubuntu.com/security/CVE-2022-28735
- https://ubuntu.com/security/CVE-2022-28736
- https://ubuntu.com/security/CVE-2022-28737
- https://ubuntu.com/security/CVE-2022-3775
- https://ubuntu.com/security/CVE-2022-28737
- https://ubuntu.com/security/CVE-2022-28734
- https://ubuntu.com/security/CVE-2022-28735
- https://ubuntu.com/security/CVE-2021-3697
- https://ubuntu.com/security/CVE-2021-3981
- https://ubuntu.com/security/CVE-2021-3696
- https://ubuntu.com/security/CVE-2021-3695
- https://ubuntu.com/security/CVE-2022-3775
- https://ubuntu.com/security/CVE-2022-28736
- https://ubuntu.com/security/CVE-2022-28733

Title: USN-6370-1: ModSecurity vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6370-1
Priorities: medium
Description:
It was discovered that ModSecurity incorrectly handled certain nested JSON
objects. An attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
and Ubuntu 20.04 LTS. (CVE-2021-42717)

It was discovered that ModSecurity incorrectly handled certain HTTP
multipart requests. A remote attacker could possibly use this issue
to bypass ModSecurity restrictions. (CVE-2022-48279)

It was discovered that ModSecurity incorrectly handled certain file
uploads. A remote attacker could possibly use this issue to cause a
buffer overflow and a firewall failure. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2023-24021)
CVEs:
- https://ubuntu.com/security/CVE-2021-42717
- https://ubuntu.com/security/CVE-2022-48279
- https://ubuntu.com/security/CVE-2023-24021
- https://ubuntu.com/security/CVE-2021-42717
- https://ubuntu.com/security/CVE-2023-24021
- https://ubuntu.com/security/CVE-2022-48279

Title: USN-6385-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6385-1
Priorities: medium,high,low
Description:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)

Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the
do_prlimit() function in the Linux kernel did not properly handle
speculative execution barriers. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2023-0458)

It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076, CVE-2023-4194)

It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)

It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)

Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski
discovered that the BPF verifier in the Linux kernel did not properly mark
registers for precision tracking in certain situations, leading to an out-
of-bounds access vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-2163)

It was discovered that the perf subsystem in the Linux kernel contained a
use-after-free vulnerability. A privileged local attacker could possibly
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-2235)

Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)

It was discovered that a race condition existed in the TLS subsystem in the
Linux kernel, leading to a use-after-free or a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-28466)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)

It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

It was discovered that the Qualcomm MSM DPU driver in the Linux kernel did
not properly validate memory allocations in certain situations, leading to
a null pointer dereference vulnerability. A local attacker could use this
to cause a denial of service (system crash). (CVE-2023-3220)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)

Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)

Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2023-4569)
CVEs:
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-3220
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-3220
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-4569

Title: USN-6348-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6348-1
Priorities: medium,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-21400

Title: USN-6350-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6350-1
Priorities: medium,low
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate MFT flags in certain situations. An
attacker could use this to construct a malicious NTFS image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-48425)

Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)
CVEs:
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2022-48425

Title: USN-6339-3: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6339-3
Priorities: medium,low
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate MFT flags in certain situations. An
attacker could use this to construct a malicious NTFS image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-48425)

Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)
CVEs:
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-21255

Title: USN-6359-1: file vulnerability
URL: https://ubuntu.com/security/notices/USN-6359-1
Priorities: medium
Description:
It was discovered that file incorrectly handled certain malformed files. An
attacker could use this issue to cause a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-48554

Title: USN-6383-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6383-1
Priorities: high
Description:
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

It was discovered that the ARM64 KVM implementation in the Linux kernel did
not properly restrict hypervisor memory access. An attacker in a guest VM
could use this to execute arbitrary code in the host OS. (CVE-2023-21264)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)

Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2023-4569)
CVEs:
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-21264
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-21264
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-20588

Title: USN-6384-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6384-1
Priorities: high
Description:
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2023-4569)
CVEs:
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-4569

Title: USN-6365-1: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-6365-1
Priorities: medium
Description:
It was discovered that Open VM Tools incorrectly handled SAML tokens. A
remote attacker could possibly use this issue to bypass SAML token
signature verification and perform VMware Tools Guest Operations.
CVEs:
- https://ubuntu.com/security/CVE-2023-20900

Title: USN-6338-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6338-2
Priorities: medium,low
Description:
Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly handle session setup requests. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2023-32247)

Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)

It was discovered that a race condition existed in the KSMBD implementation
in the Linux kernel when handling session connections, leading to a use-
after-free vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32258)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)
CVEs:
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-32258
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32258

Title: USN-6358-1: RedCloth vulnerability
URL: https://ubuntu.com/security/notices/USN-6358-1
Priorities: medium
Description:
It was discovered that RedCloth incorrectly handled certain inputs during
html sanitisation. An attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-31606

Title: USN-6361-1: CUPS vulnerability
URL: https://ubuntu.com/security/notices/USN-6361-1
Priorities: medium
Description:
It was discovered that CUPS incorrectly authenticated certain remote
requests. A remote attacker could possibly use this issue to obtain
recently printed documents.
CVEs:
- https://ubuntu.com/security/CVE-2023-32360

Title: USN-6362-1: .NET vulnerability
URL: https://ubuntu.com/security/notices/USN-6362-1
Priorities: medium
Description:
Kevin Jones discovered that .NET did not properly process certain
X.509 certificates. An attacker could possibly use this issue to
cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-36799

Title: USN-6378-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-6378-1
Priorities: medium
Description:
It was discovered that Django incorrectly handled certain URIs with a very
large number of Unicode characters. A remote attacker could possibly use
this issue to cause Django to consume resources or crash, leading to a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-41164

Title: USN-6373-1: gawk vulnerability
URL: https://ubuntu.com/security/notices/USN-6373-1
Priorities: medium
Description:
It was discovered that gawk could be made to read out of bounds when
processing certain inputs. If a user or an automated system were tricked
into opening a specially crafted input, an attacker could possibly use
this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-4156

Title: USN-6368-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6368-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-4573, CVE-2023-4574,
CVE-2023-4575, CVE-2023-4581, CVE-2023-4584)

It was discovered that Thunderbird did not properly manage memory when
handling WebP images. If a user were tricked into opening a malicious WebP
image file, an attacker could potentially exploit these to cause a denial
of service or execute arbitrary code. (CVE-2023-4863)
CVEs:
- https://ubuntu.com/security/CVE-2023-4573
- https://ubuntu.com/security/CVE-2023-4574
- https://ubuntu.com/security/CVE-2023-4575
- https://ubuntu.com/security/CVE-2023-4581
- https://ubuntu.com/security/CVE-2023-4584
- https://ubuntu.com/security/CVE-2023-4863
- https://ubuntu.com/security/CVE-2023-4863
- https://ubuntu.com/security/CVE-2023-4574
- https://ubuntu.com/security/CVE-2023-4584
- https://ubuntu.com/security/CVE-2023-4575
- https://ubuntu.com/security/CVE-2023-4581
- https://ubuntu.com/security/CVE-2023-4573

Title: USN-6369-1: libwebp vulnerability
URL: https://ubuntu.com/security/notices/USN-6369-1
Priorities: medium
Description:
It was discovered that libwebp incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a
specially crafted image file, a remote attacker could use this issue to
cause libwebp to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-4863

Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.222…ubuntu-jammy/v1.232

1.222

Available in the Broadcom Support portal

Release Date: September 07, 2023

Metadata:

BOSH Agent Version: 2.578.0

USNs:


Title: USN-6336-1: Docker Registry vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6336-1
Priorities: low,medium
Description:
It was discovered that Docker Registry incorrectly handled certain crafted
input, which allowed remote attackers to cause a denial of service. This
issue only affected Ubuntu 16.04 LTS. (CVE-2017-11468)

It was discovered that Docker Registry incorrectly handled certain crafted
input. An attacker could possibly use this issue to cause a denial of
service. (CVE-2017-11468)
CVEs:
- https://ubuntu.com/security/CVE-2017-11468
- https://ubuntu.com/security/CVE-2017-11468
- https://ubuntu.com/security/CVE-2023-2253
- https://ubuntu.com/security/CVE-2017-11468

Title: USN-6306-1: Fast DDS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6306-1
Priorities: medium
Description:
It was discovered that Fast DDS incorrectly handled certain inputs.
A remote attacker could possibly use this issue to cause a denial of
service and information exposure. This issue only affected Ubuntu
22.04 LTS. (CVE-2021-38425)

It was discovered that Fast DDS incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash.
(CVE-2023-39534, CVE-2023-39945, CVE-2023-39946, CVE-2023-39947,
CVE-2023-39948, CVE-2023-39949)
CVEs:
- https://ubuntu.com/security/CVE-2021-38425
- https://ubuntu.com/security/CVE-2023-39534
- https://ubuntu.com/security/CVE-2023-39945
- https://ubuntu.com/security/CVE-2023-39946
- https://ubuntu.com/security/CVE-2023-39947
- https://ubuntu.com/security/CVE-2023-39948
- https://ubuntu.com/security/CVE-2023-39949
- https://ubuntu.com/security/CVE-2023-39534
- https://ubuntu.com/security/CVE-2021-38425
- https://ubuntu.com/security/CVE-2023-39945
- https://ubuntu.com/security/CVE-2023-39948
- https://ubuntu.com/security/CVE-2023-39947
- https://ubuntu.com/security/CVE-2023-39946
- https://ubuntu.com/security/CVE-2023-39949

Title: USN-6332-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6332-1
Priorities: medium,low,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly check buffer indexes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48502)

Seth Jenkins discovered that the Linux kernel did not properly perform
address randomization for a per-cpu memory management structure. A local
attacker could use this to expose sensitive information (kernel memory) or
in conjunction with another kernel vulnerability. (CVE-2023-0597)

It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)

It was discovered that the APM X-Gene SoC hardware monitoring driver in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or expose sensitive information (kernel memory).
(CVE-2023-1855)

It was discovered that the ST NCI NFC driver did not properly handle device
removal events. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2023-1990)

Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)

Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)

Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski
discovered that the BPF verifier in the Linux kernel did not properly mark
registers for precision tracking in certain situations, leading to an out-
of-bounds access vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-2163)

It was discovered that the SLIMpro I2C device driver in the Linux kernel
did not properly validate user-supplied data in some situations, leading to
an out-of-bounds write vulnerability. A privileged attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-2194)

It was discovered that the perf subsystem in the Linux kernel contained a
use-after-free vulnerability. A privileged local attacker could possibly
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-2235)

Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

It was discovered that the ARM Mali Display Processor driver implementation
in the Linux kernel did not properly handle certain error conditions. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-23004)

It was discovered that a race condition existed in the TLS subsystem in the
Linux kernel, leading to a use-after-free or a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-28466)

It was discovered that the DA9150 charger driver in the Linux kernel did
not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-30772)

It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)

Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly validate pointers in some situations, leading to a
null pointer dereference vulnerability. A remote attacker could use this to
cause a denial of service (system crash). (CVE-2023-32248)

It was discovered that the kernel->user space relay implementation in the
Linux kernel did not properly perform certain buffer calculations, leading
to an out-of-bounds read vulnerability. A local attacker could use this to
cause a denial of service (system crash) or expose sensitive information
(kernel memory). (CVE-2023-3268)

It was discovered that the Qualcomm EMAC ethernet driver in the Linux
kernel did not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-33203)

It was discovered that the BQ24190 charger driver in the Linux kernel did
not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-33288)

It was discovered that the video4linux driver for Philips based TV cards in
the Linux kernel contained a race condition during device removal, leading
to a use-after-free vulnerability. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-35823)

It was discovered that the SDMC DM1105 PCI device driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-35824)

It was discovered that the Renesas USB controller driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35828)

It was discovered that the Rockchip Video Decoder IP driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35829)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-2194
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-23004
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-30772
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-32248
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-33203
- https://ubuntu.com/security/CVE-2023-33288
- https://ubuntu.com/security/CVE-2023-35823
- https://ubuntu.com/security/CVE-2023-35824
- https://ubuntu.com/security/CVE-2023-35828
- https://ubuntu.com/security/CVE-2023-35829
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-33288
- https://ubuntu.com/security/CVE-2023-35824
- https://ubuntu.com/security/CVE-2023-32248
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-35829
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-33203
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-35823
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-2194
- https://ubuntu.com/security/CVE-2023-35828
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-23004
- https://ubuntu.com/security/CVE-2023-30772
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2022-4269

Title: USN-6315-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6315-1
Priorities: medium,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3609

Title: USN-6325-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6325-1
Priorities: medium,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-20593

Title: USN-6318-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6318-1
Priorities: medium,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004

Title: USN-6316-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6316-1
Priorities: medium,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-3777)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2023-4004)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle bound chain deactivation in certain circumstances. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-4015)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2023-4015
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004

Title: USN-6311-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6311-1
Priorities: medium,low
Description:
William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly check buffer indexes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48502)

Seth Jenkins discovered that the Linux kernel did not properly perform
address randomization for a per-cpu memory management structure. A local
attacker could use this to expose sensitive information (kernel memory) or
in conjunction with another kernel vulnerability. (CVE-2023-0597)

It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)

It was discovered that the APM X-Gene SoC hardware monitoring driver in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or expose sensitive information (kernel memory).
(CVE-2023-1855)

It was discovered that the ST NCI NFC driver did not properly handle device
removal events. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2023-1990)

Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)

It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)

Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski
discovered that the BPF verifier in the Linux kernel did not properly mark
registers for precision tracking in certain situations, leading to an out-
of-bounds access vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-2163)

It was discovered that the SLIMpro I2C device driver in the Linux kernel
did not properly validate user-supplied data in some situations, leading to
an out-of-bounds write vulnerability. A privileged attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-2194)

It was discovered that the perf subsystem in the Linux kernel contained a
use-after-free vulnerability. A privileged local attacker could possibly
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-2235)

Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

It was discovered that the ARM Mali Display Processor driver implementation
in the Linux kernel did not properly handle certain error conditions. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-23004)

It was discovered that a race condition existed in the TLS subsystem in the
Linux kernel, leading to a use-after-free or a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-28466)

It was discovered that the DA9150 charger driver in the Linux kernel did
not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-30772)

It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)

Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly validate pointers in some situations, leading to a
null pointer dereference vulnerability. A remote attacker could use this to
cause a denial of service (system crash). (CVE-2023-32248)

It was discovered that the kernel->user space relay implementation in the
Linux kernel did not properly perform certain buffer calculations, leading
to an out-of-bounds read vulnerability. A local attacker could use this to
cause a denial of service (system crash) or expose sensitive information
(kernel memory). (CVE-2023-3268)

It was discovered that the Qualcomm EMAC ethernet driver in the Linux
kernel did not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-33203)

It was discovered that the BQ24190 charger driver in the Linux kernel did
not properly handle device removal, leading to a user-after free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-33288)

It was discovered that the video4linux driver for Philips based TV cards in
the Linux kernel contained a race condition during device removal, leading
to a use-after-free vulnerability. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-35823)

It was discovered that the SDMC DM1105 PCI device driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-35824)

It was discovered that the Renesas USB controller driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35828)

It was discovered that the Rockchip Video Decoder IP driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35829)
CVEs:
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-2194
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-23004
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-30772
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-32248
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-33203
- https://ubuntu.com/security/CVE-2023-33288
- https://ubuntu.com/security/CVE-2023-35823
- https://ubuntu.com/security/CVE-2023-35824
- https://ubuntu.com/security/CVE-2023-35828
- https://ubuntu.com/security/CVE-2023-35829
- https://ubuntu.com/security/CVE-2023-33203
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2163
- https://ubuntu.com/security/CVE-2023-2235
- https://ubuntu.com/security/CVE-2023-35823
- https://ubuntu.com/security/CVE-2023-32248
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-35828
- https://ubuntu.com/security/CVE-2023-33288
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-35824
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-2194
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-23004
- https://ubuntu.com/security/CVE-2023-30772
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-35829
- https://ubuntu.com/security/CVE-2023-2269

Title: USN-6339-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6339-1
Priorities: medium,low
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate MFT flags in certain situations. An
attacker could use this to construct a malicious NTFS image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-48425)

Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)
CVEs:
- https://ubuntu.com/security/CVE-2022-48425
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2022-48425

Title: USN-6343-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6343-1
Priorities: medium,high
Description:
It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

Ross Lagerwall discovered that the Xen netback backend driver in the Linux
kernel did not properly handle certain unusual packets from a
paravirtualized network frontend, leading to a buffer overflow. An attacker
in a guest VM could use this to cause a denial of service (host system
crash) or possibly execute arbitrary code. (CVE-2023-34319)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)

Andy Nguyen discovered that the KVM implementation for AMD processors in
the Linux kernel with Secure Encrypted Virtualization (SEV) contained a
race condition when accessing the GHCB page. A local attacker in a SEV
guest VM could possibly use this to cause a denial of service (host system
crash). (CVE-2023-4155)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-4194)

Maxim Suhanov discovered that the exFAT file system implementation in the
Linux kernel did not properly check a file name length, leading to an out-
of-bounds write vulnerability. An attacker could use this to construct a
malicious exFAT image that, when mounted and operated on, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-4273)
CVEs:
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-4273
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-4155
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4194
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-4128

Title: USN-6319-1: AMD Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-6319-1
Priorities: medium
Description:
Daniël Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory.
CVEs:
- https://ubuntu.com/security/CVE-2023-20569

Title: USN-6338-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6338-1
Priorities: medium,low
Description:
Zi Fan Tan discovered that the binder IPC implementation in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-21255)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

Quentin Minster discovered that the KSMBD implementation in the Linux
kernel did not properly handle session setup requests. A remote attacker
could possibly use this to cause a denial of service (memory exhaustion).
(CVE-2023-32247)

Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250, CVE-2023-32252,
CVE-2023-32257)

It was discovered that a race condition existed in the KSMBD implementation
in the Linux kernel when handling session connections, leading to a use-
after-free vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32258)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer sizes in certain operations, leading to an out-of-
bounds read vulnerability. A remote attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information.
(CVE-2023-38426, CVE-2023-38428)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly calculate the size of certain buffers. A remote attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-38429)
CVEs:
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-32258
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-38426
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32257
- https://ubuntu.com/security/CVE-2023-32252
- https://ubuntu.com/security/CVE-2023-21255
- https://ubuntu.com/security/CVE-2023-32258
- https://ubuntu.com/security/CVE-2023-38429
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-38428
- https://ubuntu.com/security/CVE-2023-32247
- https://ubuntu.com/security/CVE-2023-31084

Title: LSN-0097-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0097-1
Priorities: high
Description:
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.(CVE-2023-3090)

Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-3389)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-3390)

Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code.(CVE-2023-31248)

Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges.(CVE-2023-32629)

Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-35001)

Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2023-35788)
CVEs:
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3389

Title: USN-6323-1: FRR vulnerability
URL: https://ubuntu.com/security/notices/USN-6323-1
Priorities: medium
Description:
Ben Cartwright-Cox discovered that FRR did not handle RFC 7606
attributes properly. A remote attacker could possibly use this to
cause denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-31490

Title: USN-6345-1: SoX vulnerability
URL: https://ubuntu.com/security/notices/USN-6345-1
Priorities: medium
Description:
It was discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, an attacker could possibly use this issue to cause a denial
of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-32627

Title: USN-6333-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6333-1
Priorities: medium
Description:
Junsung Lee discovered that Thunderbird did not properly validate the text
direction override unicode character in filenames. An attacker could
potentially exploits this issue by spoofing file extension while attaching
a file in emails. (CVE-2023-3417)

Max Vlasov discovered that Thunderbird Offscreen Canvas did not properly
track cross-origin tainting. An attacker could potentially exploit this
issue to access image data from another site in violation of same-origin
policy. (CVE-2023-4045)

Alexander Guryanov discovered that Thunderbird did not properly update the
value of a global variable in WASM JIT analysis in some circumstances. An
attacker could potentially exploit this issue to cause a denial of service.
(CVE-2023-4046)

Mark Brand discovered that Thunderbird did not properly validate the size
of an untrusted input stream. An attacker could potentially exploit this
issue to cause a denial of service. (CVE-2023-4050)

Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-4047, CVE-2023-4048,
CVE-2023-4049, CVE-2023-4055, CVE-2023-4056)
CVEs:
- https://ubuntu.com/security/CVE-2023-3417
- https://ubuntu.com/security/CVE-2023-4045
- https://ubuntu.com/security/CVE-2023-4046
- https://ubuntu.com/security/CVE-2023-4050
- https://ubuntu.com/security/CVE-2023-4047
- https://ubuntu.com/security/CVE-2023-4048
- https://ubuntu.com/security/CVE-2023-4049
- https://ubuntu.com/security/CVE-2023-4055
- https://ubuntu.com/security/CVE-2023-4056
- https://ubuntu.com/security/CVE-2023-4049
- https://ubuntu.com/security/CVE-2023-4056
- https://ubuntu.com/security/CVE-2023-4047
- https://ubuntu.com/security/CVE-2023-4045
- https://ubuntu.com/security/CVE-2023-4050
- https://ubuntu.com/security/CVE-2023-4046
- https://ubuntu.com/security/CVE-2023-3417
- https://ubuntu.com/security/CVE-2023-4048
- https://ubuntu.com/security/CVE-2023-4055

Title: USN-6307-1: JOSE for C/C++ vulnerability
URL: https://ubuntu.com/security/notices/USN-6307-1
Priorities: medium
Description:
It was discovered that JOSE for C/C++ AES GCM decryption routine incorrectly
uses the Tag length from the actual Authentication Tag provided in the JWE.
An attacker could use this to cause a denial of service (system crash) or
might expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-37464

Title: USN-6305-1: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6305-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain XML files.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2023-3823)

It was discovered that PHP incorrectly handled certain PHAR files.
An attacker could possibly use this issue to cause a crash,
expose sensitive information or execute arbitrary code.
(CVE-2023-3824)
CVEs:
- https://ubuntu.com/security/CVE-2023-3823
- https://ubuntu.com/security/CVE-2023-3824
- https://ubuntu.com/security/CVE-2023-3824
- https://ubuntu.com/security/CVE-2023-3823

1.207

Available in the Broadcom Support portal

Release Date: August 29, 2023

Metadata:

BOSH Agent Version: 2.572.0

Notice

  • update the azure blobstore

USNs:


Title: USN-6295-1: Podman vulnerability
URL: https://ubuntu.com/security/notices/USN-6295-1
Priorities: medium
Description:
It was discovered that Podman incorrectly handled certain supplementary groups.
An attacker could possibly use this issue to expose sensitive information
or execute binary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-2989

Title: USN-6286-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6286-1
Priorities: medium
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly clear
microarchitectural state after speculative execution of various instructions. A
local unprivileged user could use this to obtain to sensitive
information. (CVE-2022-40982)

It was discovered that some Intel(R) Xeon(R) Processors did not properly
restrict error injection for Intel(R) SGX or Intel(R) TDX. A local privileged
user could use this to further escalate their privileges. (CVE-2022-41804)

It was discovered that some 3rd Generation Intel(R) Xeon(R) Scalable processors
did not properly restrict access in some situations. A local privileged attacker
could use this to obtain sensitive information. (CVE-2023-23908)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2022-41804
- https://ubuntu.com/security/CVE-2023-23908
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-23908
- https://ubuntu.com/security/CVE-2022-41804

Title: USN-6290-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6290-1
Priorities: medium,low
Description:
It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files with the tiffcrop utility. If a
user were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-48281)

It was discovered that LibTIFF incorrectly handled certain image files. If
a user were tricked into opening a specially crafted image file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 23.04. (CVE-2023-2731)

It was discovered that LibTIFF incorrectly handled certain image files
with the tiffcp utility. If a user were tricked into opening a specially
crafted image file, an attacker could possibly use this issue to cause
tiffcp to crash, resulting in a denial of service. (CVE-2023-2908)

It was discovered that LibTIFF incorrectly handled certain file paths. If
a user were tricked into specifying certain output paths, an attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-3316)

It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files. If a user were tricked into
opening a specially crafted image file, an attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code. (CVE-2023-3618)

It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files. If a user were tricked into
opening a specially crafted image file, an attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04. (CVE-2023-25433, CVE-2023-26966)

It was discovered that LibTIFF did not properly managed memory when
processing certain malformed image files with the tiffcrop utility. If a
user were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-26965)

It was discovered that LibTIFF contained an arithmetic overflow. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause a denial of service.
(CVE-2023-38288, CVE-2023-38289)
CVEs:
- https://ubuntu.com/security/CVE-2022-48281
- https://ubuntu.com/security/CVE-2023-2731
- https://ubuntu.com/security/CVE-2023-2908
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-3618
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-26966
- https://ubuntu.com/security/CVE-2023-26965
- https://ubuntu.com/security/CVE-2023-38288
- https://ubuntu.com/security/CVE-2023-38289
- https://ubuntu.com/security/CVE-2022-48281
- https://ubuntu.com/security/CVE-2023-2908
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-3618
- https://ubuntu.com/security/CVE-2023-38288
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-38289
- https://ubuntu.com/security/CVE-2023-2731
- https://ubuntu.com/security/CVE-2023-26966
- https://ubuntu.com/security/CVE-2023-26965

Title: USN-6293-1: OpenStack Heat vulnerability
URL: https://ubuntu.com/security/notices/USN-6293-1
Priorities: medium
Description:
It was discovered that OpenStack Heat incorrectly handled certain hidden
parameter values. A remote authenticated user could possibly use this issue
to obtain sensitive data.
CVEs:
- https://ubuntu.com/security/CVE-2023-1625

Title: USN-6288-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6288-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.34 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-34.html
https://www.oracle.com/security-alerts/cpujul2023.html
CVEs:
- https://ubuntu.com/security/CVE-2023-22038
- https://ubuntu.com/security/CVE-2023-22005
- https://ubuntu.com/security/CVE-2023-22056
- https://ubuntu.com/security/CVE-2023-22046
- https://ubuntu.com/security/CVE-2023-22008
- https://ubuntu.com/security/CVE-2023-22054
- https://ubuntu.com/security/CVE-2023-22053
- https://ubuntu.com/security/CVE-2023-22058
- https://ubuntu.com/security/CVE-2023-22033
- https://ubuntu.com/security/CVE-2023-22057
- https://ubuntu.com/security/CVE-2023-22048

Title: USN-6289-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6289-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-38572
- https://ubuntu.com/security/CVE-2023-38600
- https://ubuntu.com/security/CVE-2023-38592
- https://ubuntu.com/security/CVE-2023-38611
- https://ubuntu.com/security/CVE-2023-38599
- https://ubuntu.com/security/CVE-2023-38133
- https://ubuntu.com/security/CVE-2023-38594
- https://ubuntu.com/security/CVE-2023-38595
- https://ubuntu.com/security/CVE-2023-38597

Title: USN-6294-1: HAProxy vulnerability
URL: https://ubuntu.com/security/notices/USN-6294-1
Priorities: medium
Description:
Ben Kallus discovered that HAProxy incorrectly handled empty Content-Length
headers. A remote attacker could possibly use this issue to manipulate the
payload and bypass certain restrictions.
CVEs:
- https://ubuntu.com/security/CVE-2023-40225

1.199

Available in the Broadcom Support portal

Release Date: August 14, 2023

Metadata:

BOSH Agent Version: 2.568.0

Important Notice.

  • the kernel has been updated to 6.2 see #296
  • added support for the azure blob storage #295

USNs:

Title: USN-6277-2: Dompdf vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6277-2
Priorities: low,medium
Description:
USN-6277-1 fixed vulnerabilities in Dompdf. This update provides the
corresponding updates for Ubuntu 22.04 LTS.

Original advisory details:

It was discovered that Dompdf was not properly validating untrusted input when
processing HTML content under certain circumstances. An attacker could
possibly use this issue to expose sensitive information or execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS.
(CVE-2014-5011, CVE-2014-5012, CVE-2014-5013)

It was discovered that Dompdf was not properly validating processed HTML
content that referenced PHAR files, which could result in the deserialization
of untrusted data. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2021-3838)

It was discovered that Dompdf was not properly validating processed HTML
content that referenced both a remote base and a local file, which could
result in the bypass of a chroot check. An attacker could possibly use this
issue to expose sensitive information. (CVE-2022-2400)
CVEs:
- https://ubuntu.com/security/CVE-2014-5011
- https://ubuntu.com/security/CVE-2014-5012
- https://ubuntu.com/security/CVE-2014-5013
- https://ubuntu.com/security/CVE-2021-3838
- https://ubuntu.com/security/CVE-2022-2400
- https://ubuntu.com/security/CVE-2021-3838
- https://ubuntu.com/security/CVE-2022-2400

Title: USN-6273-1: poppler vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6273-1
Priorities: low,medium
Description:
Jieyong Ma discovered that poppler incorrectly handled certain malformed
PDF files. A remote attacker could possibly use this issue to cause poppler
to crash, resulting in a denial of service. This issue only affected Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-27337)

It was discovered that poppler incorrectly handled certain malformed PDF
files. A remote attacker could possibly use this issue to cause poppler to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 23.04. (CVE-2023-34872)
CVEs:
- https://ubuntu.com/security/CVE-2022-27337
- https://ubuntu.com/security/CVE-2023-34872
- https://ubuntu.com/security/CVE-2022-27337
- https://ubuntu.com/security/CVE-2023-34872

Title: USN-6285-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6285-1
Priorities: medium,high,low
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly check buffer indexes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48502)

Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS
implementation in the Ubuntu Linux kernel did not properly perform
permission checks in certain situations. A local attacker could possibly
use this to gain elevated privileges. (CVE-2023-2640)

It was discovered that a race condition existed in the f2fs file system in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to construct a malicious f2fs image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-2898)

Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-31248)

Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges. (CVE-2023-32629)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)

Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3609)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle certain error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3610)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate SMB request protocol IDs, leading to a out-of-
bounds read vulnerability. A remote attacker could possibly use this to
cause a denial of service (system crash). (CVE-2023-38430)

Chih-Yen Chang discovered that the KSMBD implementation in the Linux kernel
did not properly validate command payload size, leading to a out-of-bounds
read vulnerability. A remote attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-38432)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)
CVEs:
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-2640
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-38430
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-2898
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-3610
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-2640
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-38432
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3609

Title: USN-6260-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6260-1
Priorities: medium,high,low
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly check buffer indexes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48502)

Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS
implementation in the Ubuntu Linux kernel did not properly perform
permission checks in certain situations. A local attacker could possibly
use this to gain elevated privileges. (CVE-2023-2640)

It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)

Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-31248)

It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)

Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges. (CVE-2023-32629)

Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3389)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)

Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)
CVEs:
- https://ubuntu.com/security/CVE-2022-48502
- https://ubuntu.com/security/CVE-2023-2640
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-2640
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2022-48502

Title: USN-6257-1: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-6257-1
Priorities: low
Description:
It was discovered that Open VM Tools incorrectly handled certain
authentication requests. A fully compromised ESXi host can force Open VM
Tools to fail to authenticate host-to-guest operations, impacting the
confidentiality and integrity of the guest virtual machine. (CVE-2023-20867)
CVEs:
- https://ubuntu.com/security/CVE-2023-20867
- https://ubuntu.com/security/CVE-2023-20867

Title: USN-6263-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6263-1
Priorities: medium,low
Description:
Motoyasu Saburi discovered that OpenJDK incorrectly handled special
characters in file name parameters. An attacker could possibly use
this issue to insert, edit or obtain sensitive information. This issue
only affected OpenJDK 11 and OpenJDK 17. (CVE-2023-22006)

Eirik Bjørsnøs discovered that OpenJDK incorrectly handled certain ZIP
archives. An attacker could possibly use this issue to cause a denial
of service. This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-22036)

David Stancu discovered that OpenJDK had a flaw in the AES cipher
implementation. An attacker could possibly use this issue to obtain
sensitive information. This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-22041)

Zhiqiang Zang discovered that OpenJDK incorrectly handled array accesses
when using the binary ‘%’ operator. An attacker could possibly use this
issue to obtain sensitive information. This issue only affected OpenJDK 17.
(CVE-2023-22044)

Zhiqiang Zang discovered that OpenJDK incorrectly handled array accesses.
An attacker could possibly use this issue to obtain sensitive information.
(CVE-2023-22045)

It was discovered that OpenJDK incorrectly sanitized URIs strings. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-22049)

It was discovered that OpenJDK incorrectly handled certain glyphs. An
attacker could possibly use this issue to cause a denial of service.
This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-25193)
CVEs:
- https://ubuntu.com/security/CVE-2023-22006
- https://ubuntu.com/security/CVE-2023-22036
- https://ubuntu.com/security/CVE-2023-22041
- https://ubuntu.com/security/CVE-2023-22044
- https://ubuntu.com/security/CVE-2023-22045
- https://ubuntu.com/security/CVE-2023-22049
- https://ubuntu.com/security/CVE-2023-25193
- https://ubuntu.com/security/CVE-2023-22045
- https://ubuntu.com/security/CVE-2023-22036
- https://ubuntu.com/security/CVE-2023-22044
- https://ubuntu.com/security/CVE-2023-25193
- https://ubuntu.com/security/CVE-2023-22049
- https://ubuntu.com/security/CVE-2023-22006
- https://ubuntu.com/security/CVE-2023-22041

Title: USN-6258-1: LLVM Toolchain vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6258-1
Priorities: medium
Description:
It was discovered that LLVM Toolchain did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted MLIR file, an attacker could possibly use this issue to cause LLVM
Toolchain to crash, resulting in a denial of service. (CVE-2023-29932,
CVE-2023-29934, CVE-2023-29939)

It was discovered that LLVM Toolchain did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted MLIR file, an attacker could possibly use this issue to cause LLVM
Toolchain to crash, resulting in a denial of service. This issue only
affected llvm-toolchain-15. (CVE-2023-29933)
CVEs:
- https://ubuntu.com/security/CVE-2023-29932
- https://ubuntu.com/security/CVE-2023-29934
- https://ubuntu.com/security/CVE-2023-29939
- https://ubuntu.com/security/CVE-2023-29933
- https://ubuntu.com/security/CVE-2023-29939
- https://ubuntu.com/security/CVE-2023-29934
- https://ubuntu.com/security/CVE-2023-29932
- https://ubuntu.com/security/CVE-2023-29933

Title: USN-6264-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6264-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-32393
- https://ubuntu.com/security/CVE-2023-37450
- https://ubuntu.com/security/CVE-2023-32435
- https://ubuntu.com/security/CVE-2023-32373
- https://ubuntu.com/security/CVE-2023-32439
- https://ubuntu.com/security/CVE-2023-28204

Title: USN-6249-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6249-1
Priorities: medium,high
Description:
Ruihan Li discovered that the memory management subsystem in the Linux
kernel contained a race condition when accessing VMAs in certain
conditions, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-3269)

Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3389)
CVEs:
- https://ubuntu.com/security/CVE-2023-3269
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3269

Title: USN-6278-2: .NET vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6278-2
Priorities: medium
Description:
USN-6278-1 fixed several vulnerabilities in .NET. This update
provides the corresponding updates for Ubuntu 22.04 LTS.

Original advisory details:

It was discovered that .NET did properly handle the execution of
certain commands. An attacker could possibly use this issue to
achieve remote code execution. (CVE-2023-35390)

Benoit Foucher discovered that .NET did not properly implement the
QUIC stream limit in HTTP/3. An attacker could possibly use this
issue to cause a denial of service. (CVE-2023-38178)

It was discovered that .NET did not properly handle the disconnection
of potentially malicious clients interfacing with a Kestrel server. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-38180)
CVEs:
- https://ubuntu.com/security/CVE-2023-35390
- https://ubuntu.com/security/CVE-2023-38178
- https://ubuntu.com/security/CVE-2023-38180
- https://ubuntu.com/security/CVE-2023-38180
- https://ubuntu.com/security/CVE-2023-35390
- https://ubuntu.com/security/CVE-2023-38178

Title: USN-6269-1: GStreamer Good Plugins vulnerability
URL: https://ubuntu.com/security/notices/USN-6269-1
Priorities: medium
Description:
It was discovered that GStreamer Good Plugins incorrectly handled certain
FLAC image tags. A remote attacker could use this issue to cause GStreamer
Good Plugins to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-37327)
CVEs:
- https://ubuntu.com/security/CVE-2023-37327
- https://ubuntu.com/security/CVE-2023-37327

Title: USN-6268-1: GStreamer Base Plugins vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6268-1
Priorities: medium
Description:
It was discovered that GStreamer Base Plugins incorrectly handled certain
FLAC image tags. A remote attacker could use this issue to cause GStreamer
Base Plugins to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-37327)

It was discovered that GStreamer Base Plugins incorrectly handled certain
subtitles. A remote attacker could use this issue to cause GStreamer Base
Plugins to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2023-37328)
CVEs:
- https://ubuntu.com/security/CVE-2023-37327
- https://ubuntu.com/security/CVE-2023-37328
- https://ubuntu.com/security/CVE-2023-37328
- https://ubuntu.com/security/CVE-2023-37327

Title: USN-6266-1: librsvg vulnerability
URL: https://ubuntu.com/security/notices/USN-6266-1
Priorities: medium
Description:
Zac Sims discovered that librsvg incorrectly handled decoding URLs. A
remote attacker could possibly use this issue to read arbitrary files by
using an include element.
CVEs:
- https://ubuntu.com/security/CVE-2023-38633

1.181

Available in the Broadcom Support portal

Release Date: July 26, 2023

Metadata:

BOSH Agent Version: 2.560.0

USNs:


Title: USN-6243-1: Graphite-Web vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6243-1
Priorities: medium
Description:
It was discovered that Graphite-Web incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to perform
server-side request forgery and obtain sensitive information. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2017-18638)

It was discovered that Graphite-Web incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to perform
cross site scripting and obtain sensitive information. (CVE-2022-4728,
CVE-2022-4729, CVE-2022-4730)
CVEs:
- https://ubuntu.com/security/CVE-2017-18638
- https://ubuntu.com/security/CVE-2022-4728
- https://ubuntu.com/security/CVE-2022-4729
- https://ubuntu.com/security/CVE-2022-4730
- https://ubuntu.com/security/CVE-2022-4730
- https://ubuntu.com/security/CVE-2017-18638
- https://ubuntu.com/security/CVE-2022-4728
- https://ubuntu.com/security/CVE-2022-4729

Title: USN-6244-1: AMD Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-6244-1
Priorities: high
Description:
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local attacker
could use this to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-20593

Title: USN-6241-1: OpenStack vulnerability
URL: https://ubuntu.com/security/notices/USN-6241-1
Priorities: medium
Description:
Jan Wasilewski and Gorka Eguileor discovered that OpenStack incorrectly
handled deleted volume attachments. An authenticated user or attacker could
possibly use this issue to gain access to sensitive information.

This update may require configuration changes, please see the upstream
advisory and the other links below for more information:

https://security.openstack.org/ossa/OSSA-2023-003.html
https://discourse.ubuntu.com/t/cve-2023-2088-for-charmed-openstack/37051
https://lists.openstack.org/pipermail/openstack-discuss/2023-July/034439.html
CVEs:
- https://ubuntu.com/security/CVE-2023-2088

Title: USN-6246-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6246-1
Priorities: high,medium
Description:
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)

Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-31248)

Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-3389)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)

Lin Ma discovered that a race condition existed in the MCTP implementation
in the Linux kernel, leading to a use-after-free vulnerability. A
privileged attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-3439)

Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)
CVEs:
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-3439
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3439
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-35001

1.179

Available in the Broadcom Support portal

Release Date: July 24, 2023

Metadata:

BOSH Agent Version: 2.560.0

USNs:


Title: USN-6200-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6200-1
Priorities: negligible,medium,low
Description:
It was discovered that ImageMagick incorrectly handled the “-authenticate”
option for password-protected PDF files. An attacker could possibly use
this issue to inject additional shell commands and perform arbitrary code
execution. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-29599)

It was discovered that ImageMagick incorrectly handled certain values
when processing PDF files. If a user or automated system using ImageMagick
were tricked into opening a specially crafted PDF file, an attacker could
exploit this to cause a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20224)

Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20241, CVE-2021-20243)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20244, CVE-2021-20309)

It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20246)

It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20312)

It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20313)

It was discovered that ImageMagick did not use the correct rights when
specifically excluded by a module policy. An attacker could use this issue
to read and write certain restricted files. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-39212)

It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
20.04 LTS. (CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547)

It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2021-3610, CVE-2023-1906,
CVE-2023-3428)

It was discovered that ImageMagick incorrectly handled certain values
when processing specially crafted SVG files. By tricking a user into
opening a specially crafted SVG file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-1289)

It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
tiff file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-3195)

It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. (CVE-2023-34151)
CVEs:
- https://ubuntu.com/security/CVE-2020-29599
- https://ubuntu.com/security/CVE-2021-20224
- https://ubuntu.com/security/CVE-2021-20241
- https://ubuntu.com/security/CVE-2021-20243
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-39212
- https://ubuntu.com/security/CVE-2022-28463
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-32546
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2021-3610
- https://ubuntu.com/security/CVE-2023-1906
- https://ubuntu.com/security/CVE-2023-3428
- https://ubuntu.com/security/CVE-2023-1289
- https://ubuntu.com/security/CVE-2023-3195
- https://ubuntu.com/security/CVE-2023-34151
- https://ubuntu.com/security/CVE-2023-1289
- https://ubuntu.com/security/CVE-2021-20243
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-3610
- https://ubuntu.com/security/CVE-2021-20224
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2023-3428
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-39212
- https://ubuntu.com/security/CVE-2021-20241
- https://ubuntu.com/security/CVE-2023-3195
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-28463
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2023-1906
- https://ubuntu.com/security/CVE-2023-34151
- https://ubuntu.com/security/CVE-2020-29599
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2022-32546

Title: USN-6236-1: ConnMan vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6236-1
Priorities: medium
Description:
It was discovered that ConnMan could be made to write out of bounds. A
remote attacker could possibly use this issue to cause ConnMan to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-26675, CVE-2021-33833)

It was discovered that ConnMan could be made to leak sensitive information
via the gdhcp component. A remote attacker could possibly use this issue
to obtain information for further exploitation. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676)

It was discovered that ConnMan could be made to read out of bounds. A
remote attacker could possibly use this issue to case ConnMan to crash,
resulting in a denial of service. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-23096, CVE-2022-23097)

It was discovered that ConnMan could be made to run into an infinite loop.
A remote attacker could possibly use this issue to cause ConnMan to
consume resources and to stop operating, resulting in a denial of service.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098)

It was discovered that ConnMan could be made to write out of bounds via
the gweb component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292)

It was discovered that ConnMan did not properly manage memory under
certain circumstances. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293)

It was discovered that ConnMan could be made to write out of bounds via
the gdhcp component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-28488)
CVEs:
- https://ubuntu.com/security/CVE-2021-26675
- https://ubuntu.com/security/CVE-2021-33833
- https://ubuntu.com/security/CVE-2021-26676
- https://ubuntu.com/security/CVE-2022-23096
- https://ubuntu.com/security/CVE-2022-23097
- https://ubuntu.com/security/CVE-2022-23098
- https://ubuntu.com/security/CVE-2022-32292
- https://ubuntu.com/security/CVE-2022-32293
- https://ubuntu.com/security/CVE-2023-28488
- https://ubuntu.com/security/CVE-2021-26676
- https://ubuntu.com/security/CVE-2022-32293
- https://ubuntu.com/security/CVE-2023-28488
- https://ubuntu.com/security/CVE-2022-23098
- https://ubuntu.com/security/CVE-2021-26675
- https://ubuntu.com/security/CVE-2021-33833
- https://ubuntu.com/security/CVE-2022-23097
- https://ubuntu.com/security/CVE-2022-23096
- https://ubuntu.com/security/CVE-2022-32292

Title: USN-6189-1: etcd vulnerability
URL: https://ubuntu.com/security/notices/USN-6189-1
Priorities: medium
Description:
It was discovered that etcd leaked credentials when debugging
was enabled. This allowed remote attackers to discover etcd
authentication credentials and possibly escalate privileges on
systems using etcd.
CVEs:
- https://ubuntu.com/security/CVE-2021-28235

Title: USN-6195-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6195-1
Priorities: medium,low
Description:
It was discovered that Vim contained an out-of-bounds read vulnerability.
An attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2022-0128)

It was discovered that Vim did not properly manage memory when freeing
allocated memory. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. (CVE-2022-0156)

It was discovered that Vim contained a heap-based buffer overflow
vulnerability. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2022-0158)

It was discovered that Vim did not properly manage memory when recording
and using select mode. An attacker could possibly use this issue to cause
a denial of service. (CVE-2022-0393)

It was discovered that Vim incorrectly handled certain memory operations
during a visual block yank. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2022-0407)

It was discovered that Vim contained a NULL pointer dereference
vulnerability when switching tabpages. An attacker could possible use this
issue to cause a denial of service. (CVE-2022-0696)
CVEs:
- https://ubuntu.com/security/CVE-2022-0128
- https://ubuntu.com/security/CVE-2022-0156
- https://ubuntu.com/security/CVE-2022-0158
- https://ubuntu.com/security/CVE-2022-0393
- https://ubuntu.com/security/CVE-2022-0407
- https://ubuntu.com/security/CVE-2022-0696
- https://ubuntu.com/security/CVE-2022-0696
- https://ubuntu.com/security/CVE-2022-0393
- https://ubuntu.com/security/CVE-2022-0158
- https://ubuntu.com/security/CVE-2022-0407
- https://ubuntu.com/security/CVE-2022-0156
- https://ubuntu.com/security/CVE-2022-0128

Title: USN-6238-1: Samba vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6238-1
Priorities: medium
Description:
It was discovered that Samba incorrectly handled Winbind NTLM
authentication responses. An attacker could possibly use this issue to
cause Samba to crash, resulting in a denial of service. (CVE-2022-2127)

Andreas Schneider discovered that Samba incorrectly enforced SMB2 packet
signing. A remote attacker could possibly use this issue to obtain or
modify sensitive information. This issue only affected Ubuntu 23.04.
(CVE-2023-3347)

Florent Saudel and Arnaud Gatignolof discovered that Samba incorrectly
handled certain Spotlight requests. A remote attacker could possibly use
this issue to cause Samba to consume resources, leading to a denial of
service. (CVE-2023-34966, CVE-2023-34967)

Ralph Boehme and Stefan Metzmacher discovered that Samba incorrectly
handled paths returned by Spotlight requests. A remote attacker could
possibly use this issue to obtain sensitive information. (CVE-2023-34968)
CVEs:
- https://ubuntu.com/security/CVE-2022-2127
- https://ubuntu.com/security/CVE-2023-3347
- https://ubuntu.com/security/CVE-2023-34966
- https://ubuntu.com/security/CVE-2023-34967
- https://ubuntu.com/security/CVE-2023-34968
- https://ubuntu.com/security/CVE-2023-3347
- https://ubuntu.com/security/CVE-2023-34967
- https://ubuntu.com/security/CVE-2023-34968
- https://ubuntu.com/security/CVE-2023-34966
- https://ubuntu.com/security/CVE-2022-2127

Title: USN-6225-1: Knot Resolver vulnerability
URL: https://ubuntu.com/security/notices/USN-6225-1
Priorities: medium
Description:
It was discovered that Knot Resolver did not correctly handle certain
client options. A remote attacker could send requests to malicous domains
and cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40188

Title: USN-6235-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6235-1
Priorities: medium,low,high
Description:
It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)

Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)

Seth Jenkins discovered that the CPU data to memory implementation for x86
processors in the Linux kernel did not properly perform address
randomization. A local attacker could use this to expose sensitive
information (kernel memory) or in conjunction with another kernel
vulnerability. (CVE-2023-0597)

It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)

It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)

Wei Chen discovered that the InfiniBand RDMA communication manager
implementation in the Linux kernel contained an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-2176)

Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the
Linux kernel did not properly handle locking when IOPOLL mode is being
used. A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-2430)

Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)

It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2176
- https://ubuntu.com/security/CVE-2023-2430
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-2176
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2430
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2022-4842

Title: USN-6223-1: Linux kernel (Azure CVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6223-1
Priorities: medium,low,high
Description:
It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076)

It was discovered that the Real-Time Scheduling Class implementation in the
Linux kernel contained a type confusion vulnerability in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-1077)

It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)

It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)

It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (guest crash) or expose sensitive information (guest
kernel memory). (CVE-2023-1859)

Jose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)

It was discovered that the BigBen Interactive Kids’ gamepad driver in the
Linux kernel did not properly handle device removal, leading to a use-
after-free vulnerability. A local attacker with physical access could plug
in a specially crafted USB device to cause a denial of service (system
crash). (CVE-2023-25012)

It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)

Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)

It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1859
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-1859

Title: USN-6231-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6231-1
Priorities: low,high
Description:
It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)

It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)
CVEs:
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-3090

Title: USN-6202-1: containerd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6202-1
Priorities: medium
Description:
David Korczynski and Adam Korczynski discovered that containerd
incorrectly processed certain images with large files. An attacker
could possibly use this issue to cause containerd to crash,
resulting in a denial of service. (CVE-2023-25153)

It was discovered that containerd incorrectly set up supplementary
groups inside a container. An attacker with direct access to the
container could possibly use this issue to obtain sensitive information
or execute code with higher privileges. (CVE-2023-25173)
CVEs:
- https://ubuntu.com/security/CVE-2023-25153
- https://ubuntu.com/security/CVE-2023-25173
- https://ubuntu.com/security/CVE-2023-25153
- https://ubuntu.com/security/CVE-2023-25173

Title: USN-6237-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6237-1
Priorities: low,medium
Description:
Hiroki Kurosawa discovered that curl incorrectly handled validating certain
certificate wildcards. A remote attacker could possibly use this issue to
spoof certain website certificates using IDN hosts. (CVE-2023-28321)

Hiroki Kurosawa discovered that curl incorrectly handled callbacks when
certain options are set by applications. This could cause applications
using curl to misbehave, resulting in information disclosure, or a denial
of service. (CVE-2023-28322)

It was discovered that curl incorrectly handled saving cookies to files. A
local attacker could possibly use this issue to create or overwrite files.
This issue only affected Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-32001)
CVEs:
- https://ubuntu.com/security/CVE-2023-28321
- https://ubuntu.com/security/CVE-2023-28322
- https://ubuntu.com/security/CVE-2023-32001
- https://ubuntu.com/security/CVE-2023-28321
- https://ubuntu.com/security/CVE-2023-28322
- https://ubuntu.com/security/CVE-2023-32001

Title: USN-6219-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6219-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 20.10 and Ubuntu 20.04 LTS.
(CVE-2023-28755)

It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue exists because of an incomplete fix for CVE-2023-28755.
(CVE-2023-36617)
CVEs:
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-36617
- https://ubuntu.com/security/CVE-2023-36617
- https://ubuntu.com/security/CVE-2023-28755

Title: USN-6199-1: PHP vulnerability
URL: https://ubuntu.com/security/notices/USN-6199-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain Digest
authentication for SOAP. An attacker could possibly use this issue
to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-3247

Title: USN-6217-1: .NET vulnerability
URL: https://ubuntu.com/security/notices/USN-6217-1
Priorities: medium
Description:
McKee-Harris, Matt Cotterell, and Jack Moran discovered that .NET did
not properly update account lockout maximum failed attempts. An
attacker could possibly use this issue to bypass the security feature
and attempt to guess more passwords for an account.
CVEs:
- https://ubuntu.com/security/CVE-2023-33170

Title: USN-6204-1: CPDB vulnerability
URL: https://ubuntu.com/security/notices/USN-6204-1
Priorities: medium
Description:
Seth Arnold discovered that CPDB incorrectly handled certain characters.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-34095

Title: USN-6214-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6214-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-34414, CVE-2023-34416,
CVE-2023-37201, CVE-2023-37202, CVE-2023-37207, CVE-2023-37211)

P Umar Farooq discovered that Thunderbird did not properly provide warning
when opening Diagcab files. If a user were tricked into opening a
malicicous Diagcab file, an attacker could execute arbitrary code.
(CVE-2023-37208)
CVEs:
- https://ubuntu.com/security/CVE-2023-34414
- https://ubuntu.com/security/CVE-2023-34416
- https://ubuntu.com/security/CVE-2023-37201
- https://ubuntu.com/security/CVE-2023-37202
- https://ubuntu.com/security/CVE-2023-37207
- https://ubuntu.com/security/CVE-2023-37211
- https://ubuntu.com/security/CVE-2023-37208
- https://ubuntu.com/security/CVE-2023-37211
- https://ubuntu.com/security/CVE-2023-37201
- https://ubuntu.com/security/CVE-2023-37207
- https://ubuntu.com/security/CVE-2023-34416
- https://ubuntu.com/security/CVE-2023-37208
- https://ubuntu.com/security/CVE-2023-34414
- https://ubuntu.com/security/CVE-2023-37202

Title: USN-6206-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6206-1
Priorities: high,medium,low
Description:
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)

It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)

Seth Jenkins discovered that the CPU data to memory implementation for x86
processors in the Linux kernel did not properly perform address
randomization. A local attacker could use this to expose sensitive
information (kernel memory) or in conjunction with another kernel
vulnerability. (CVE-2023-0597)

It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)

It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0597

Title: USN-6194-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6194-1
Priorities: high,medium
Description:
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)

Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the
Linux kernel did not properly handle locking when IOPOLL mode is being
used. A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-2430)

Wei Chen discovered that the InfiniBand RDMA communication manager
implementation in the Linux kernel contained an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-2176)

It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-2430
- https://ubuntu.com/security/CVE-2023-2176
- https://ubuntu.com/security/CVE-2023-2176
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-2430

Title: USN-6212-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6212-1
Priorities: high
Description:
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)

It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-35788

Title: USN-6203-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-6203-1
Priorities: medium
Description:
Seokchan Yoon discovered that Django incorrectly handled certain regular
expressions. A remote attacker could possibly use this issue to cause
Django to consume resources, leading to a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-36053

Title: USN-6213-1: Ghostscript vulnerability
URL: https://ubuntu.com/security/notices/USN-6213-1
Priorities: medium
Description:
It was discovered that Ghostscript incorrectly handled pipe devices. If a
user or automated system were tricked into opening a specially crafted PDF
file, a remote attacker could use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-36664

Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.147…ubuntu-jammy/v1.179

1.148

Available in the Broadcom Support portal

Release Date: June 29, 2023

Metadata:

BOSH Agent Version: 2.548.0

USNs:


Title: USN-6161-2: .NET regression
URL: https://ubuntu.com/security/notices/USN-6161-2
Priorities: medium
Description:
USN-6161-1 fixed vulnerabilities in .NET. The update introduced
a regression with regards to how the runtime imported X.509
certificates. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that .NET did not properly enforce certain
restrictions when deserializing a DataSet or DataTable from
XML. An attacker could possibly use this issue to elevate their
privileges. (CVE-2023-24936)

Kevin Jones discovered that .NET did not properly handle the
AIA fetching process for X.509 client certificates. An attacker
could possibly use this issue to cause a denial of service.
(CVE-2023-29331)

Kalle Niemitalo discovered that the .NET package manager,
NuGet, was susceptible to a potential race condition. An
attacker could possibly use this issue to perform remote
code execution. (CVE-2023-29337)

Tom Deseyn discovered that .NET did not properly process certain
arguments when extracting the contents of a tar file. An attacker
could possibly use this issue to elevate their privileges. This
issue only affected the dotnet7 package. (CVE-2023-32032)

It was discovered that .NET did not properly handle memory in
certain circumstances. An attacker could possibly use this issue
to cause a denial of service or perform remote code execution.
(CVE-2023-33128)
CVEs:
- https://ubuntu.com/security/CVE-2023-24936
- https://ubuntu.com/security/CVE-2023-29331
- https://ubuntu.com/security/CVE-2023-29337
- https://ubuntu.com/security/CVE-2023-32032
- https://ubuntu.com/security/CVE-2023-33128

Title: USN-6184-1: CUPS vulnerability
URL: https://ubuntu.com/security/notices/USN-6184-1
Priorities: medium
Description:
It was discovered that CUPS incorrectly handled certain memory operations.
An attacker could possibly use this issue to cause CUPS to crash, resulting
in a denial of service, or possibly obtain sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-34241

Title: USN-6192-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6192-1
Priorities: high
Description:
Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-35788, LP: #2023577)

Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the
Linux kernel did not properly handle locking when IOPOLL mode is being
used. A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-2430)

It was discovered that for some Intel processors the INVLPG instruction
implementation did not properly flush global TLB entries when PCIDs are
enabled. An attacker could use this to expose sensitive information
(kernel memory) or possibly cause undesired behaviors. (LP: #2023220)
CVEs:
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-2430
- https://ubuntu.com/security/CVE-2023-2430
- https://ubuntu.com/security/CVE-2023-35788

1.147

Available in the Broadcom Support portal

Release Date: June 26, 2023

Metadata:

BOSH Agent Version: 2.548.0

USNs:


Title: USN-6180-1: VLC media player vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6180-1
Priorities: low,medium
Description:
It was discovered that VLC could be made to read out of bounds when
decoding image files. If a user were tricked into opening a crafted image
file, a remote attacker could possibly use this issue to cause VLC to
crash, leading to a denial of service. This issue only affected Ubuntu
16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-19721)

It was discovered that VLC could be made to write out of bounds when
processing H.264 video files. If a user were tricked into opening a
crafted H.264 video file, a remote attacker could possibly use this issue
to cause VLC to crash, leading to a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-13428)

It was discovered that VLC could be made to read out of bounds when
processing AVI video files. If a user were tricked into opening a crafted
AVI video file, a remote attacker could possibly use this issue to cause
VLC to crash, leading to a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-25801,
CVE-2021-25802, CVE-2021-25803, CVE-2021-25804)

It was discovered that the VNC module of VLC contained an arithmetic
overflow. If a user were tricked into opening a crafted playlist or
connecting to a rouge VNC server, a remote attacker could possibly use
this issue to cause VLC to crash, leading to a denial of service, or
possibly execute arbitrary code. (CVE-2022-41325)
CVEs:
- https://ubuntu.com/security/CVE-2019-19721
- https://ubuntu.com/security/CVE-2020-13428
- https://ubuntu.com/security/CVE-2021-25801
- https://ubuntu.com/security/CVE-2021-25802
- https://ubuntu.com/security/CVE-2021-25803
- https://ubuntu.com/security/CVE-2021-25804
- https://ubuntu.com/security/CVE-2022-41325
- https://ubuntu.com/security/CVE-2021-25801
- https://ubuntu.com/security/CVE-2021-25802
- https://ubuntu.com/security/CVE-2022-41325
- https://ubuntu.com/security/CVE-2019-19721
- https://ubuntu.com/security/CVE-2021-25804
- https://ubuntu.com/security/CVE-2021-25803
- https://ubuntu.com/security/CVE-2020-13428

Title: USN-6163-1: pano13 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6163-1
Priorities: medium
Description:
It was discovered that pano13 did not properly validate the prefix provided
for PTcrop’s output. An attacker could use this issue to cause pano13 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-20307)

It was discovered that pano13 did not properly handle certain crafted TIFF
images. An attacker could use this issue to cause pano13 to crash,
resulting in a denial of service. (CVE-2021-33293)
CVEs:
- https://ubuntu.com/security/CVE-2021-20307
- https://ubuntu.com/security/CVE-2021-33293
- https://ubuntu.com/security/CVE-2021-20307
- https://ubuntu.com/security/CVE-2021-33293

Title: USN-6146-1: Netatalk vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6146-1
Priorities: medium,high
Description:
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the DSI structures. A remote attacker could possibly
use this issue to execute arbitrary code with the privileges of the user
invoking the programs. This issue only affected Ubuntu 20.04 LTS and Ubuntu
22.04 LTS. (CVE-2021-31439)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the ad_addcomment function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-0194)

It was discovered that Netatalk did not properly handle errors when parsing
AppleDouble entries. A remote attacker could possibly use this issue to
execute arbitrary code with root privileges. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-23121)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the setfilparams function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-23122)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the getdirparams function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04
LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-23123)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the get_finderinfo function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-23124)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the copyapplfile function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04
LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-23125)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the dsi_writeinit function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu
22.10. (CVE-2022-43634)

It was discovered that Netatalk did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted .appl file, a remote attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-45188)
CVEs:
- https://ubuntu.com/security/CVE-2021-31439
- https://ubuntu.com/security/CVE-2022-0194
- https://ubuntu.com/security/CVE-2022-23121
- https://ubuntu.com/security/CVE-2022-23122
- https://ubuntu.com/security/CVE-2022-23123
- https://ubuntu.com/security/CVE-2022-23124
- https://ubuntu.com/security/CVE-2022-23125
- https://ubuntu.com/security/CVE-2022-43634
- https://ubuntu.com/security/CVE-2022-45188
- https://ubuntu.com/security/CVE-2022-23123
- https://ubuntu.com/security/CVE-2022-43634
- https://ubuntu.com/security/CVE-2022-23122
- https://ubuntu.com/security/CVE-2021-31439
- https://ubuntu.com/security/CVE-2022-23121
- https://ubuntu.com/security/CVE-2022-23124
- https://ubuntu.com/security/CVE-2022-23125
- https://ubuntu.com/security/CVE-2022-0194
- https://ubuntu.com/security/CVE-2022-45188

Title: USN-6167-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6167-1
Priorities: low,medium
Description:
It was discovered that QEMU did not properly manage the guest drivers when
shared buffers are not allocated. A malicious guest driver could use this
issue to cause QEMU to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-1050)

It was discovered that QEMU did not properly check the size of the
structure pointed to by the guest physical address pqxl. A malicious guest
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.
(CVE-2022-4144)

It was discovered that QEMU did not properly manage memory in the ACPI
Error Record Serialization Table (ERST) device. A malicious guest attacker
could use this issue to cause QEMU to crash, resulting in a denial of
service. This issue only affected Ubuntu 22.10. (CVE-2022-4172)

It was discovered that QEMU did not properly manage memory when DMA memory
writes happen repeatedly in the lsi53c895a device. A malicious guest
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service. (CVE-2023-0330)
CVEs:
- https://ubuntu.com/security/CVE-2022-1050
- https://ubuntu.com/security/CVE-2022-4144
- https://ubuntu.com/security/CVE-2022-4172
- https://ubuntu.com/security/CVE-2023-0330
- https://ubuntu.com/security/CVE-2022-4172
- https://ubuntu.com/security/CVE-2022-4144
- https://ubuntu.com/security/CVE-2022-1050
- https://ubuntu.com/security/CVE-2023-0330

Title: USN-6169-1: GNU SASL vulnerability
URL: https://ubuntu.com/security/notices/USN-6169-1
Priorities: low
Description:
It was discovered that GNU SASL’s GSSAPI server could make an
out-of-bounds reads if given specially crafted GSS-API authentication
data. A remote attacker could possibly use this issue to cause a
denial of service or to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-2469

Title: USN-6145-1: Sysstat vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6145-1
Priorities: medium
Description:
It was discovered that Sysstat incorrectly handled certain arithmetic
multiplications. An attacker could use this issue to cause Sysstat to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue was only fixed for Ubuntu 16.04 LTS. (CVE-2022-39377)

It was discovered that Sysstat incorrectly handled certain arithmetic
multiplications in 64-bit systems, as a result of an incomplete fix for
CVE-2022-39377. An attacker could use this issue to cause Sysstat to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2023-33204)
CVEs:
- https://ubuntu.com/security/CVE-2022-39377
- https://ubuntu.com/security/CVE-2022-39377
- https://ubuntu.com/security/CVE-2023-33204
- https://ubuntu.com/security/CVE-2023-33204
- https://ubuntu.com/security/CVE-2022-39377

Title: USN-6171-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6171-1
Priorities: medium,low
Description:
William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076)

It was discovered that the Real-Time Scheduling Class implementation in the
Linux kernel contained a type confusion vulnerability in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-1077)

It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)

It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)

It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (guest crash) or expose sensitive information (guest
kernel memory). (CVE-2023-1859)

Jose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)

It was discovered that the BigBen Interactive Kids’ gamepad driver in the
Linux kernel did not properly handle device removal, leading to a use-
after-free vulnerability. A local attacker with physical access could plug
in a specially crafted USB device to cause a denial of service (system
crash). (CVE-2023-25012)

It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)
CVEs:
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1859
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-1859

Title: LSN-0095-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0095-1
Priorities: high,medium
Description:
It was discovered that the OverlayFS implementation in the Linux kernel did
not properly handle copy up operation in some conditions. A local attacker
could possibly use this to gain elevated privileges.(CVE-2023-0386)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information.(CVE-2023-1380)

It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-1872)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock).(CVE-2023-2612)



Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-31436)

Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code.(CVE-2023-32233)
CVEs:
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-31436

Title: USN-6144-1: LibreOffice vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6144-1
Priorities: medium
Description:
It was discovered that LibreOffice did not properly validate the number of
parameters passed to the formula interpreter, leading to an array index
underflow attack. If a user were tricked into opening a specially crafted
spreadsheet file, an attacker could possibly use this issue to execute
arbitrary code. (CVE-2023-0950)

Amel Bouziane-Leblond discovered that LibreOffice did not prompt the user
before loading the host document inside an IFrame. If a user were tricked
into opening a specially crafted input file, an attacker could possibly use
this issue to cause information disclosure or execute arbitrary code.
(CVE-2023-2255)
CVEs:
- https://ubuntu.com/security/CVE-2023-0950
- https://ubuntu.com/security/CVE-2023-2255
- https://ubuntu.com/security/CVE-2023-2255
- https://ubuntu.com/security/CVE-2023-0950

Title: USN-6179-1: Jettison vulnerability
URL: https://ubuntu.com/security/notices/USN-6179-1
Priorities: medium
Description:
It was discovered that Jettison incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-1436

Title: USN-6138-1: libssh vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6138-1
Priorities: medium
Description:
Philip Turnbull discovered that libssh incorrectly handled rekeying with
algorithm guessing. A remote attacker could use this issue to cause libssh
to crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2023-1667)

Kevin Backhouse discovered that libssh incorrectly handled verifying data
signatures. A remote attacker could possibly use this issue to bypass
authorization. (CVE-2023-2283)
CVEs:
- https://ubuntu.com/security/CVE-2023-1667
- https://ubuntu.com/security/CVE-2023-2283
- https://ubuntu.com/security/CVE-2023-1667
- https://ubuntu.com/security/CVE-2023-2283

Title: USN-6137-1: LibRaw vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6137-1
Priorities: medium,low
Description:
It was discovered that LibRaw incorrectly handled photo files. If a user or
automated system were tricked into processing a specially crafted photo
file, a remote attacker could cause applications linked against LibRaw to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2023-1729
- https://ubuntu.com/security/CVE-2021-32142

Title: USN-6133-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6133-1
Priorities: high,medium,low,negligible
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)

It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)

Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)

It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)

It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)

Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)

It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1872)

It was discovered that the Android Binder IPC subsystem in the Linux kernel
did not properly validate inputs in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-20938)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-20938
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-20938
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-2162

Title: USN-6129-1: Avahi vulnerability
URL: https://ubuntu.com/security/notices/USN-6129-1
Priorities: medium
Description:
It was discovered that Avahi incorrectly handled certain DBus messages. A
local attacker could possibly use this issue to cause Avahi to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-1981

Title: USN-6154-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6154-1
Priorities: medium
Description:
It was discovered that Vim was using uninitialized memory when fuzzy
matching, which could lead to invalid memory access. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu
23.04. (CVE-2023-2426)

It was discovered that Vim was not properly performing bounds checks when
processing register contents, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2023-2609)

It was discovered that Vim was not properly limiting the length of
substitution expression strings, which could lead to excessive memory
consumption. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-2610)
CVEs:
- https://ubuntu.com/security/CVE-2023-2426
- https://ubuntu.com/security/CVE-2023-2609
- https://ubuntu.com/security/CVE-2023-2610
- https://ubuntu.com/security/CVE-2023-2609
- https://ubuntu.com/security/CVE-2023-2610
- https://ubuntu.com/security/CVE-2023-2426

Title: USN-6139-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-6139-1
Priorities: medium
Description:
Yebo Cao discovered that Python incorrectly handled certain URLs.
An attacker could use this issue to bypass blockinglisting methods.
This issue was first addressed in USN-5960-1, but was incomplete.
Here we address an additional fix to that issue. (CVE-2023-24329)
CVEs:
- https://ubuntu.com/security/CVE-2023-24329
- https://ubuntu.com/security/CVE-2023-24329

Title: USN-6161-1: .NET vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6161-1
Priorities: medium
Description:
It was discovered that .NET did not properly enforce certain
restrictions when deserializing a DataSet or DataTable from
XML. An attacker could possibly use this issue to elevate their
privileges. (CVE-2023-24936)

Kevin Jones discovered that .NET did not properly handle the
AIA fetching process for X.509 client certificates. An attacker
could possibly use this issue to cause a denial of service.
(CVE-2023-29331)

Kalle Niemitalo discovered that the .NET package manager,
NuGet, was susceptible to a potential race condition. An
attacker could possibly use this issue to perform remote
code execution. (CVE-2023-29337)

Tom Deseyn discovered that .NET did not properly process certain
arguments when extracting the contents of a tar file. An attacker
could possibly use this issue to elevate their privileges. This
issue only affected the dotnet7 package. (CVE-2023-32032)

It was discovered that .NET did not properly handle memory in
certain circumstances. An attacker could possibly use this issue
to cause a denial of service or perform remote code execution.
(CVE-2023-33128)
CVEs:
- https://ubuntu.com/security/CVE-2023-24936
- https://ubuntu.com/security/CVE-2023-29331
- https://ubuntu.com/security/CVE-2023-29337
- https://ubuntu.com/security/CVE-2023-32032
- https://ubuntu.com/security/CVE-2023-33128
- https://ubuntu.com/security/CVE-2023-32032
- https://ubuntu.com/security/CVE-2023-33128
- https://ubuntu.com/security/CVE-2023-29337
- https://ubuntu.com/security/CVE-2023-29331
- https://ubuntu.com/security/CVE-2023-24936

Title: USN-6148-1: SNI Proxy vulnerability
URL: https://ubuntu.com/security/notices/USN-6148-1
Priorities: high
Description:
It was discovered that SNI Proxy did not properly handle wildcard backend
hosts. An attacker could possibly use this issue to cause a buffer overflow,
resulting in a denial of service, or arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-25076

Title: USN-6166-1: libcap2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6166-1
Priorities: low,medium
Description:
David Gstir discovered that libcap2 incorrectly handled certain return
codes. An attacker could possibly use this issue to cause libcap2 to
consume memory, leading to a denial of service. (CVE-2023-2602)

Richard Weinberger discovered that libcap2 incorrectly handled certain long
input strings. An attacker could use this issue to cause libcap2 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-2603)
CVEs:
- https://ubuntu.com/security/CVE-2023-2602
- https://ubuntu.com/security/CVE-2023-2603
- https://ubuntu.com/security/CVE-2023-2602
- https://ubuntu.com/security/CVE-2023-2603

Title: USN-6183-1: Bind vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6183-1
Priorities: medium
Description:
Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered
that Bind incorrectly handled the cache size limit. A remote attacker could
possibly use this issue to consume memory, leading to a denial of service.
(CVE-2023-2828)

It was discovered that Bind incorrectly handled the recursive-clients
quota. A remote attacker could possibly use this issue to cause Bind to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-2911)
CVEs:
- https://ubuntu.com/security/CVE-2023-2828
- https://ubuntu.com/security/CVE-2023-2911
- https://ubuntu.com/security/CVE-2023-2911
- https://ubuntu.com/security/CVE-2023-2828

Title: USN-6164-1: c-ares vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6164-1
Priorities: medium
Description:
Hannes Moesl discovered that c-ares incorrectly handled certain ipv6
addresses. An attacker could use this issue to cause c-ares to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-31130)

Xiang Li discovered that c-ares incorrectly handled certain UDP packets. A
remote attacker could possibly use this issue to cause c-res to crash,
resulting in a denial of service. (CVE-2023-32067)
CVEs:
- https://ubuntu.com/security/CVE-2023-31130
- https://ubuntu.com/security/CVE-2023-32067
- https://ubuntu.com/security/CVE-2023-31130
- https://ubuntu.com/security/CVE-2023-32067

Title: USN-6168-1: libx11 vulnerability
URL: https://ubuntu.com/security/notices/USN-6168-1
Priorities: medium
Description:
Gregory James Duck discovered that libx11 incorrectly handled certain
Request, Event, or Error IDs. If a user were tricked into connecting to a
malicious X Server, a remote attacker could possibly use this issue to
cause libx11 to crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-3138

Title: USN-6173-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6173-1
Priorities: high,medium
Description:
Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)

Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)

It was discovered that the IPv6 RPL protocol implementation in the Linux
kernel did not properly handle user-supplied data. A remote attacker could
use this to cause a denial of service (system crash). (CVE-2023-2156)

Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel when handling sessions operations. A
remote attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-32250)

Quentin Minster discovered that a race condition existed in the KSMBD
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A remote attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-32254)
CVEs:
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-32254
- https://ubuntu.com/security/CVE-2023-32254
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-2156
- https://ubuntu.com/security/CVE-2023-32250
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-31436

Title: USN-6112-2: Perl vulnerability
URL: https://ubuntu.com/security/notices/USN-6112-2
Priorities: medium
Description:
USN-6112-1 fixed vulnerabilities in Perl. This update provides the
corresponding updates for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu
22.10, and Ubuntu 23.04.

Original advisory details:

It was discovered that Perl was not properly verifying TLS certificates
when using CPAN together with HTTP::Tiny to download modules over HTTPS.
If a remote attacker were able to intercept communications, this flaw
could potentially be used to install altered modules.
CVEs:
- https://ubuntu.com/security/CVE-2023-31484

Title: USN-6136-1: FRR vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6136-1
Priorities: medium
Description:
It was discovered that FRR incorrectly handled parsing certain BGP
messages. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service. This issue only affected Ubuntu
23.04. (CVE-2023-31489)

It was discovered that FRR incorrectly handled parsing certain BGP
messages. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service. (CVE-2023-31490)
CVEs:
- https://ubuntu.com/security/CVE-2023-31489
- https://ubuntu.com/security/CVE-2023-31490
- https://ubuntu.com/security/CVE-2023-31489
- https://ubuntu.com/security/CVE-2023-31490

Title: USN-6150-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6150-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-31436

Title: USN-6135-1: Linux kernel (Azure CVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6135-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456

Title: USN-6127-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6127-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456

Title: USN-6128-1: CUPS vulnerability
URL: https://ubuntu.com/security/notices/USN-6128-1
Priorities: medium
Description:
It was discovered that CUPS incorrectly handled logging. A remote attacker
could use this issue to cause CUPS to crash, resulting in a denial of
service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-32324

Title: USN-6165-1: GLib vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6165-1
Priorities: medium,low
Description:
It was discovered that GLib incorrectly handled non-normal GVariants. An
attacker could use this issue to cause GLib to crash, resulting in a denial
of service, or perform other unknown attacks.
CVEs:
- https://ubuntu.com/security/CVE-2023-32636
- https://ubuntu.com/security/CVE-2023-32665
- https://ubuntu.com/security/CVE-2023-24593
- https://ubuntu.com/security/CVE-2023-32611
- https://ubuntu.com/security/CVE-2023-29499
- https://ubuntu.com/security/CVE-2023-25180
- https://ubuntu.com/security/CVE-2023-32643

Title: USN-6147-1: SpiderMonkey vulnerability
URL: https://ubuntu.com/security/notices/USN-6147-1
Priorities: medium
Description:
Several security issues were discovered in the SpiderMonkey JavaScript
library. If a user were tricked into opening malicious JavaScript
applications or processing malformed data, a remote attacker could exploit
a variety of issues related to JavaScript security, including denial of
service attacks, and arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-34416

1.125

Available in the Broadcom Support portal

Release Date: June 02, 2023

Metadata:

BOSH Agent Version: 2.536.0

USNs:


Title: USN-6117-1: Apache Batik vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6117-1
Priorities: medium
Description:
It was discovered that Apache Batik incorrectly handled certain inputs. An
attacker could possibly use this to perform a cross site request forgery
attack. (CVE-2019-17566, CVE-2020-11987, CVE-2022-38398, CVE-2022-38648)

It was discovered that Apache Batik incorrectly handled Jar URLs in some
situations. A remote attacker could use this issue to access files on the
server. (CVE-2022-40146)

It was discovered that Apache Batik allowed running untrusted Java code from
an SVG. An attacker could use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2022-41704, CVE-2022-42890)
CVEs:
- https://ubuntu.com/security/CVE-2019-17566
- https://ubuntu.com/security/CVE-2020-11987
- https://ubuntu.com/security/CVE-2022-38398
- https://ubuntu.com/security/CVE-2022-38648
- https://ubuntu.com/security/CVE-2022-40146
- https://ubuntu.com/security/CVE-2022-41704
- https://ubuntu.com/security/CVE-2022-42890
- https://ubuntu.com/security/CVE-2022-40146
- https://ubuntu.com/security/CVE-2020-11987
- https://ubuntu.com/security/CVE-2022-41704
- https://ubuntu.com/security/CVE-2022-38648
- https://ubuntu.com/security/CVE-2022-38398
- https://ubuntu.com/security/CVE-2019-17566
- https://ubuntu.com/security/CVE-2022-42890

Title: USN-6099-1: ncurses vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6099-1
Priorities: negligible,medium
Description:
It was discovered that ncurses was incorrectly performing bounds
checks when processing invalid hashcodes. An attacker could possibly
use this issue to cause a denial of service or to expose sensitive
information. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-17594)

It was discovered that ncurses was incorrectly handling
end-of-string characters when processing terminfo and termcap files.
An attacker could possibly use this issue to cause a denial of
service or to expose sensitive information. This issue only affected
Ubuntu 18.04 LTS. (CVE-2019-17595)

It was discovered that ncurses was incorrectly handling
end-of-string characters when converting between termcap and
terminfo formats. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-39537)

It was discovered that ncurses was incorrectly performing bounds
checks when dealing with corrupt terminfo data while reading a
terminfo file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-29458)

It was discovered that ncurses was parsing environment variables when
running with setuid applications and not properly handling the
processing of malformed data when doing so. A local attacker could
possibly use this issue to cause a denial of service (application
crash) or execute arbitrary code. (CVE-2023-29491)
CVEs:
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2019-17595
- https://ubuntu.com/security/CVE-2021-39537
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2023-29491
- https://ubuntu.com/security/CVE-2021-39537
- https://ubuntu.com/security/CVE-2023-29491
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2019-17595

Title: USN-6102-1: xmldom vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6102-1
Priorities: medium
Description:
It was discovered that xmldom incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause
unexpected syntactic changes during XML processing. This issue only affected
Ubuntu 20.04 LTS. (CVE-2021-21366)

It was discovered that xmldom incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2022-37616, CVE-2022-39353)
CVEs:
- https://ubuntu.com/security/CVE-2021-21366
- https://ubuntu.com/security/CVE-2022-37616
- https://ubuntu.com/security/CVE-2022-39353
- https://ubuntu.com/security/CVE-2021-21366
- https://ubuntu.com/security/CVE-2022-37616
- https://ubuntu.com/security/CVE-2022-39353

Title: USN-6108-1: Jhead vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6108-1
Priorities: medium
Description:
It was discovered that Jhead did not properly handle certain crafted images
while rotating them. An attacker could possibly use this issue to crash Jhead,
resulting in a denial of service. (CVE-2021-34055)

Kyle Brown discovered that Jhead did not properly handle certain crafted
images while regenerating the Exif thumbnail. An attacker could possibly use
this issue to execute arbitrary commands. (CVE-2022-41751)
CVEs:
- https://ubuntu.com/security/CVE-2021-34055
- https://ubuntu.com/security/CVE-2022-41751
- https://ubuntu.com/security/CVE-2022-41751
- https://ubuntu.com/security/CVE-2021-34055

Title: USN-6110-1: Jhead vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6110-1
Priorities: medium
Description:
It was discovered that Jhead did not properly handle certain crafted Canon
images when processing them. An attacker could possibly use this issue to
crash Jhead, resulting in a denial of service. (CVE-2021-3496)

It was discovered that Jhead did not properly handle certain crafted images
when printing Canon-specific information. An attacker could possibly use this
issue to crash Jhead, resulting in a denial of service. (CVE-2021-28275)

It was discovered that Jhead did not properly handle certain crafted images
when removing unknown sections. An attacker could possibly use this issue to
crash Jhead, resulting in a denial of service. (CVE-2021-28275)

Kyle Brown discovered that Jhead did not properly handle certain crafted
images when editing their comments. An attacker could possibly use this to
crash Jhead, resulting in a denial of service. (LP: #2020068)
CVEs:
- https://ubuntu.com/security/CVE-2021-3496
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-28277
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-3496

Title: USN-6126-1: libvirt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6126-1
Priorities: low,medium
Description:
It was discovered that libvirt incorrectly handled the nwfilter driver. A
local attacker could possibly use this issue to cause libvirt to crash,
resulting in a denial of service. This issue only affected Ubuntu 22.04
LTS. (CVE-2022-0897)

It was discovered that libvirt incorrectly handled queries for the SR-IOV
PCI device capabilities. A local attacker could possibly use this issue to
cause libvirt to consume resources, leading to a denial of service.
(CVE-2023-2700)
CVEs:
- https://ubuntu.com/security/CVE-2022-0897
- https://ubuntu.com/security/CVE-2023-2700
- https://ubuntu.com/security/CVE-2022-0897
- https://ubuntu.com/security/CVE-2023-2700

Title: USN-6116-1: hawk vulnerability
URL: https://ubuntu.com/security/notices/USN-6116-1
Priorities: medium
Description:
It was discovered that hawk incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-29167

Title: USN-6089-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-6089-1
Priorities: medium
Description:
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-4139

Title: USN-6125-1: snapd vulnerability
URL: https://ubuntu.com/security/notices/USN-6125-1
Priorities: medium
Description:
It was discovered that the snap sandbox did not restrict the use of the
ioctl system call with a TIOCLINUX request. This could be exploited by a
malicious snap to inject commands into the controlling terminal which would
then be executed outside of the snap sandbox once the snap had exited. This
could allow an attacker to execute arbitrary commands outside of the
confined snap sandbox. Note: graphical terminal emulators like xterm,
gnome-terminal and others are not affected - this can only be exploited
when snaps are run on a virtual console.
CVEs:
- https://ubuntu.com/security/CVE-2023-1523

Title: USN-6101-1: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6101-1
Priorities: medium,low
Description:
It was discovered that GNU binutils incorrectly handled certain DWARF
files. An attacker could possibly use this issue to cause a crash or
execute arbitrary code. This issue only affected Ubuntu 22.10.
(CVE-2023-1579)

It was discovered that GNU binutils did not properly verify the version
definitions in zer0-lengthverdef table. An attacker could possibly use this
issue to cause a crash or execute arbitrary code. This issue only affected
Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu 23.04. (CVE-2023-1972)

It was discovered that GNU binutils did not properly validate the size of
length parameter in vms-alpha. An attacker could possibly use this issue to
cause a crash or access sensitive information. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.
(CVE-2023-25584)

It was discovered that GNU binutils did not properly initialized the
file_table field of struct module and the_bfd field of asymbol. An attacker
could possibly use this issue to cause a crash. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-25585, CVE-2023-25586)
CVEs:
- https://ubuntu.com/security/CVE-2023-1579
- https://ubuntu.com/security/CVE-2023-1972
- https://ubuntu.com/security/CVE-2023-25584
- https://ubuntu.com/security/CVE-2023-25585
- https://ubuntu.com/security/CVE-2023-25586
- https://ubuntu.com/security/CVE-2023-1972
- https://ubuntu.com/security/CVE-2023-25588
- https://ubuntu.com/security/CVE-2023-25585
- https://ubuntu.com/security/CVE-2023-25584
- https://ubuntu.com/security/CVE-2023-1579

Title: USN-6104-1: PostgreSQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6104-1
Priorities: medium
Description:
Alexander Lakhin discovered that PostgreSQL incorrectly handled certain
CREATE privileges. An authenticated user could possibly use this issue to
execute arbitrary code as the bootstrap supervisor. (CVE-2023-2454)

Wolfgang Walther discovered that PostgreSQL incorrectly handled certain row
security policies. An authenticated user could possibly use this issue to
complete otherwise forbidden reads and modifications. (CVE-2023-2455)
CVEs:
- https://ubuntu.com/security/CVE-2023-2454
- https://ubuntu.com/security/CVE-2023-2455
- https://ubuntu.com/security/CVE-2023-2454
- https://ubuntu.com/security/CVE-2023-2455

Title: USN-6119-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6119-1
Priorities: medium,low
Description:
Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1
object identifiers. A remote attacker could possibly use this issue to
cause OpenSSL to consume resources, resulting in a denial of service.
(CVE-2023-2650)

Anton Romanov discovered that OpenSSL incorrectly handled AES-XTS cipher
decryption on 64-bit ARM platforms. An attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04.
(CVE-2023-1255)
CVEs:
- https://ubuntu.com/security/CVE-2023-2650
- https://ubuntu.com/security/CVE-2023-1255
- https://ubuntu.com/security/CVE-2023-1255
- https://ubuntu.com/security/CVE-2023-2650

Title: USN-6120-1: SpiderMonkey vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6120-1
Priorities: medium
Description:
Several security issues were discovered in the SpiderMonkey JavaScript
library. If a user were tricked into opening malicious JavaScript
applications or processing malformed data, a remote attacker could exploit
a variety of issues related to JavaScript security, including denial of
service attacks, and arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-29535
- https://ubuntu.com/security/CVE-2023-29536
- https://ubuntu.com/security/CVE-2023-25739
- https://ubuntu.com/security/CVE-2023-32211
- https://ubuntu.com/security/CVE-2023-32215
- https://ubuntu.com/security/CVE-2023-25751
- https://ubuntu.com/security/CVE-2023-29550
- https://ubuntu.com/security/CVE-2023-25735
- https://ubuntu.com/security/CVE-2023-29548

Title: USN-6111-1: Flask vulnerability
URL: https://ubuntu.com/security/notices/USN-6111-1
Priorities: medium
Description:
It was discovered that Flask incorrectly handled certain data responses.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-30861

Title: USN-6122-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6122-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-2612

Title: USN-6124-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6124-1
Priorities: high,medium,low
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)

It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)

It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2023-1670

Title: USN-6123-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6123-1
Priorities: high,low,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly handle a loop termination condition, leading to an
out-of-bounds read vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-26606)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2023-32233

Title: USN-6127-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6127-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)

Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2023-2612)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-2612
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456

Title: USN-6115-1: TeX Live vulnerability
URL: https://ubuntu.com/security/notices/USN-6115-1
Priorities: medium
Description:
Max Chernoff discovered that LuaTeX (TeX Live) did not properly disable
shell escape. An attacker could possibly use this issue to execute
arbitrary shell commands.
CVEs:
- https://ubuntu.com/security/CVE-2023-32700

1.117

Available in the Broadcom Support portal

Release Date: May 22, 2023

Metadata:

BOSH Agent Version: 2.533.0

USNs:


Title: USN-6049-1: Netty vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6049-1
Priorities: medium
Description:
It was discovered that Netty’s Zlib decoders did not limit memory
allocations. A remote attacker could possibly use this issue to cause
Netty to exhaust memory via malicious input, leading to a denial of
service. This issue only affected Ubuntu 16.04 ESM and Ubuntu 20.04 ESM.
(CVE-2020-11612)

It was discovered that Netty created temporary files with excessive
permissions. A local attacker could possibly use this issue to expose
sensitive information. This issue only affected Ubuntu 16.04 ESM, Ubuntu
18.04 ESM, and Ubuntu 20.04 ESM. (CVE-2021-21290)

It was discovered that Netty did not properly validate content-length
headers. A remote attacker could possibly use this issue to smuggle
requests. This issue was only fixed in Ubuntu 20.04 ESM. (CVE-2021-21295,
CVE-2021-21409)

It was discovered that Netty’s Bzip2 decompression decoder did not limit
the decompressed output data size. A remote attacker could possibly use
this issue to cause Netty to exhaust memory via malicious input, leading
to a denial of service. This issue only affected Ubuntu 18.04 ESM, Ubuntu
20.04 ESM, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2021-37136)

It was discovered that Netty’s Snappy frame decoder function did not limit
chunk lengths. A remote attacker could possibly use this issue to cause
Netty to exhaust memory via malicious input, leading to a denial of
service. (CVE-2021-37137)

It was discovered that Netty did not properly handle control chars at the
beginning and end of header names. A remote attacker could possibly use
this issue to smuggle requests. This issue only affected Ubuntu 18.04 ESM,
Ubuntu 20.04 ESM, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2021-43797)

It was discovered that Netty could be made into an infinite recursion when
parsing a malformed crafted message. A remote attacker could possibly use
this issue to cause Netty to crash, leading to a denial of service. This
issue only affected Ubuntu 20.04 ESM, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-41881)

It was discovered that Netty did not validate header values under certain
circumstances. A remote attacker could possibly use this issue to perform
HTTP response splitting via malicious header values. This issue only
affected Ubuntu 18.04 ESM, Ubuntu 20.04 ESM, Ubuntu 22.04 LTS, and Ubuntu
22.10. (CVE-2022-41915)
CVEs:
- https://ubuntu.com/security/CVE-2020-11612
- https://ubuntu.com/security/CVE-2021-21290
- https://ubuntu.com/security/CVE-2021-21295
- https://ubuntu.com/security/CVE-2021-21409
- https://ubuntu.com/security/CVE-2021-37136
- https://ubuntu.com/security/CVE-2021-37137
- https://ubuntu.com/security/CVE-2021-43797
- https://ubuntu.com/security/CVE-2022-41881
- https://ubuntu.com/security/CVE-2022-41915
- https://ubuntu.com/security/CVE-2021-21295
- https://ubuntu.com/security/CVE-2022-41881
- https://ubuntu.com/security/CVE-2021-37137
- https://ubuntu.com/security/CVE-2021-21290
- https://ubuntu.com/security/CVE-2021-37136
- https://ubuntu.com/security/CVE-2021-21409
- https://ubuntu.com/security/CVE-2020-11612
- https://ubuntu.com/security/CVE-2022-41915
- https://ubuntu.com/security/CVE-2021-43797

Title: USN-6067-1: OpenStack Neutron vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6067-1
Priorities: medium
Description:
David Sinquin discovered that OpenStack Neutron incorrectly handled the
default Open vSwitch firewall rules. An attacker could possibly use this
issue to impersonate the IPv6 addresses of other systems on the network.
This issue only affected Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS.
(CVE-2021-20267)

Jake Yip and Justin Mammarella discovered that OpenStack Neutron
incorrectly handled the linuxbridge driver when ebtables-nft is being
used. An attacker could possibly use this issue to impersonate the hardware
addresss of other systems on the network. This issue only affected Ubuntu
18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-38598)

Pavel Toporkov discovered that OpenStack Neutron incorrectly handled
extra_dhcp_opts values. An attacker could possibly use this issue to
reconfigure dnsmasq. This issue only affected Ubuntu 18.04 LTS, and Ubuntu
20.04 LTS. (CVE-2021-40085)

Slawek Kaplonski discovered that OpenStack Neutron incorrectly handled the
routes middleware. An attacker could possibly use this issue to cause the
API worker to consume memory, leading to a denial of service. This issue
only affected Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-40797)

It was discovered that OpenStack Neutron incorrectly handled certain
queries. A remote authenticated user could possibly use this issue to cause
resource consumption, leading to a denial of service. (CVE-2022-3277)
CVEs:
- https://ubuntu.com/security/CVE-2021-20267
- https://ubuntu.com/security/CVE-2021-38598
- https://ubuntu.com/security/CVE-2021-40085
- https://ubuntu.com/security/CVE-2021-40797
- https://ubuntu.com/security/CVE-2022-3277
- https://ubuntu.com/security/CVE-2021-20267
- https://ubuntu.com/security/CVE-2022-3277
- https://ubuntu.com/security/CVE-2021-40085
- https://ubuntu.com/security/CVE-2021-40797
- https://ubuntu.com/security/CVE-2021-38598

Title: USN-6037-1: Apache Commons Net vulnerability
URL: https://ubuntu.com/security/notices/USN-6037-1
Priorities: medium
Description:
ZeddYu Lu discovered that the FTP client from Apache Commons Net trusted
the host from PASV responses by default. A remote attacker with a
malicious FTP server could redirect the client to another server, which
could possibly result in leaked information about services running on the
private network of the client.
CVEs:
- https://ubuntu.com/security/CVE-2021-37533

Title: USN-6063-1: Ceph vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6063-1
Priorities: low,medium
Description:
Mark Kirkwood discovered that Ceph incorrectly handled certain key lengths.
An attacker could possibly use this issue to create non-random encryption
keys. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-3979)

It was discovered that Ceph incorrectly handled the volumes plugin. An
attacker could possibly use this issue to obtain access to any share. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-0670)

It was discovered that Ceph incorrectly handled crash dumps. A local
attacker could possibly use this issue to escalate privileges to root. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-3650)

It was discovered that Ceph incorrectly handled URL processing on RGW
backends. An attacker could possibly use this issue to cause RGW to crash,
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS
and Ubuntu 22.10. (CVE-2022-3854)
CVEs:
- https://ubuntu.com/security/CVE-2021-3979
- https://ubuntu.com/security/CVE-2022-0670
- https://ubuntu.com/security/CVE-2022-3650
- https://ubuntu.com/security/CVE-2022-3854
- https://ubuntu.com/security/CVE-2021-3979
- https://ubuntu.com/security/CVE-2022-3854
- https://ubuntu.com/security/CVE-2022-3650
- https://ubuntu.com/security/CVE-2022-0670

Title: USN-6079-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6079-1
Priorities: medium,low,negligible
Description:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)

Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)

Haowei Yan discovered that a race condition existed in the Layer 2
Tunneling Protocol (L2TP) implementation in the Linux kernel. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-4129)

It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds write vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-48423)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48424)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer lengths, leading to a heap-based buffer overflow.
A remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2023-0210)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)

Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the
do_prlimit() function in the Linux kernel did not properly handle
speculative execution barriers. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2023-0458)

Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)

It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)

It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)

It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)

It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)

Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)

It was discovered that the NFS implementation in the Linux kernel did not
properly handle pending tasks in some situations. A local attacker could
use this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2023-1652)

It was discovered that the ARM64 EFI runtime services implementation in the
Linux kernel did not properly manage concurrency calls. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-21102)

It was discovered that a race condition existed in Adreno GPU DRM driver in
the Linux kernel, leading to a double-free vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2023-21106)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

Kyle Zeng discovered that the class-based queuing discipline implementation
in the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23454)

Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate the size of attributes when parsing MFT. A
local attacker could possibly use this to cause a denial of service (system
crash) or expose sensitive information (kernel memory). (CVE-2023-26544)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2022-48423
- https://ubuntu.com/security/CVE-2022-48424
- https://ubuntu.com/security/CVE-2023-0210
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-21102
- https://ubuntu.com/security/CVE-2023-21106
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-23454
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-26544
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-26544
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0210
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-21106
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2022-48423
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-21102
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2022-48424
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-23454
- https://ubuntu.com/security/CVE-2023-0459

Title: USN-6080-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6080-1
Priorities: medium,low,negligible
Description:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)

Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)

It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)

It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)

Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)

It was discovered that the Android Binder IPC subsystem in the Linux kernel
did not properly validate inputs in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-20938)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-20938
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-20938

Title: USN-6085-1: Linux kernel (Raspberry Pi) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6085-1
Priorities: medium,low,negligible
Description:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-3707)

Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)

It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)

It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)

Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)

It was discovered that the Android Binder IPC subsystem in the Linux kernel
did not properly validate inputs in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-20938)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-20938
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2022-3707
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-20938
- https://ubuntu.com/security/CVE-2023-1075

Title: USN-6039-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6039-1
Priorities: low,negligible
Description:
It was discovered that OpenSSL was not properly managing file locks when
processing policy constraints. If a user or automated system were tricked
into processing a certificate chain with specially crafted policy
constraints, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu
22.10. (CVE-2022-3996)

David Benjamin discovered that OpenSSL was not properly performing the
verification of X.509 certificate chains that include policy constraints,
which could lead to excessive resource consumption. If a user or automated
system were tricked into processing a specially crafted X.509 certificate
chain that includes policy constraints, a remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-0464)

David Benjamin discovered that OpenSSL was not properly handling invalid
certificate policies in leaf certificates, which would result in certain
policy checks being skipped for the certificate. If a user or automated
system were tricked into processing a specially crafted certificate, a
remote attacker could possibly use this issue to assert invalid
certificate policies and circumvent policy checking. (CVE-2023-0465)

David Benjamin discovered that OpenSSL incorrectly documented the
functionalities of function X509_VERIFY_PARAM_add0_policy, stating that
it would implicitly enable certificate policy checks when doing
certificate verifications, contrary to its implementation. This could
cause users and applications to not perform certificate policy checks
even when expected to do so. (CVE-2023-0466)
CVEs:
- https://ubuntu.com/security/CVE-2022-3996
- https://ubuntu.com/security/CVE-2023-0464
- https://ubuntu.com/security/CVE-2023-0465
- https://ubuntu.com/security/CVE-2023-0466
- https://ubuntu.com/security/CVE-2022-3996
- https://ubuntu.com/security/CVE-2023-0464
- https://ubuntu.com/security/CVE-2023-0466

Title: USN-6057-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6057-1
Priorities: high,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1281)

It was discovered that the OverlayFS implementation in the Linux kernel did
not properly handle copy up operation in some conditions. A local attacker
could possibly use this to gain elevated privileges. (CVE-2023-0386)

Haowei Yan discovered that a race condition existed in the Layer 2
Tunneling Protocol (L2TP) implementation in the Linux kernel. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-4129)

It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)

It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)

It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)

It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)

It was discovered that the NFS implementation in the Linux kernel did not
properly handle pending tasks in some situations. A local attacker could
use this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2023-1652)

Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2023-0394

Title: USN-6042-1: Cloud-init vulnerability
URL: https://ubuntu.com/security/notices/USN-6042-1
Priorities: medium
Description:
James Golovich discovered that sensitive data could be exposed in logs. An
attacker could use this information to find hashed passwords and possibly
escalate their privilege.
CVEs:
- https://ubuntu.com/security/CVE-2023-1786

Title: USN-6044-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6044-1
Priorities: high,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)

It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1872)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872

Title: USN-6051-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6051-1
Priorities: high,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)

It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1872)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872

Title: USN-6070-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6070-1
Priorities: high,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)

It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1872)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1872

Title: USN-6056-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-6056-1
Priorities: medium
Description:
It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (guest crash) or expose sensitive information (guest
kernel memory).
CVEs:
- https://ubuntu.com/security/CVE-2023-1859

Title: USN-6078-1: libwebp vulnerability
URL: https://ubuntu.com/security/notices/USN-6078-1
Priorities: medium
Description:
Irvan Kurniawan discovered that libwebp incorrectly handled certain memory
operations. If a user or automated system were tricked into opening a
specially crafted image file, a remote attacker could use this issue to
cause libwebp to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-1999

Title: USN-6073-2: Glance_store vulnerability
URL: https://ubuntu.com/security/notices/USN-6073-2
Priorities: medium
Description:
Jan Wasilewski and Gorka Eguileor discovered that Glance_store incorrectly
handled deleted volume attachments. An authenticated user or attacker could
possibly use this issue to gain access to sensitive information.

This update may require configuration changes to be completely effective,
please see the upstream advisory for more information:

https://security.openstack.org/ossa/OSSA-2023-003.html
CVEs:
- https://ubuntu.com/security/CVE-2023-2088

Title: USN-6077-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6077-1
Priorities: medium
Description:
Ben Smyth discovered that OpenJDK incorrectly handled half-duplex
connections during TLS handshake. A remote attacker could possibly use
this issue to insert, edit or obtain sensitive information.
(CVE-2023-21930)

It was discovered that OpenJDK incorrectly handled certain inputs. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-21937)

It was discovered that OpenJDK incorrectly handled command arguments. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-21938)

It was discovered that OpenJDK incorrectly validated HTML documents. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-21939)

Ramki Ramakrishna discovered that OpenJDK incorrectly handled garbage
collection. An attacker could possibly use this issue to bypass Java
sandbox restrictions. (CVE-2023-21954)

Jonathan Looney discovered that OpenJDK incorrectly handled certificate
chains during TLS session negotiation. A remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-21967)

Adam Reziouk discovered that OpenJDK incorrectly sanitized URIs. An
attacker could possibly use this issue to bypass Java sandbox
restrictions. (CVE-2023-21968)
CVEs:
- https://ubuntu.com/security/CVE-2023-21930
- https://ubuntu.com/security/CVE-2023-21937
- https://ubuntu.com/security/CVE-2023-21938
- https://ubuntu.com/security/CVE-2023-21939
- https://ubuntu.com/security/CVE-2023-21954
- https://ubuntu.com/security/CVE-2023-21967
- https://ubuntu.com/security/CVE-2023-21968
- https://ubuntu.com/security/CVE-2023-21937
- https://ubuntu.com/security/CVE-2023-21938
- https://ubuntu.com/security/CVE-2023-21968
- https://ubuntu.com/security/CVE-2023-21939
- https://ubuntu.com/security/CVE-2023-21930
- https://ubuntu.com/security/CVE-2023-21967
- https://ubuntu.com/security/CVE-2023-21954

Title: USN-6083-1: cups-filters vulnerability
URL: https://ubuntu.com/security/notices/USN-6083-1
Priorities: medium
Description:
It was discovered that cups-filters incorrectly handled the beh CUPS
backend. A remote attacker could possibly use this issue to cause the
backend to stop responding or to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-24805

Title: USN-6050-1: Git vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6050-1
Priorities: medium
Description:
It was discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to overwriting some paths.
(CVE-2023-25652)

Maxime Escourbiac and Yassine BENGANA discovered that Git incorrectly
handled some gettext machinery. An attacker could possibly use this issue
to allows the malicious placement of crafted messages. (CVE-2023-25815)

André Baptista and Vítor Pinho discovered that Git incorrectly handled
certain configurations. An attacker could possibly use this issue
to arbitrary configuration injection. (CVE-2023-29007)
CVEs:
- https://ubuntu.com/security/CVE-2023-25652
- https://ubuntu.com/security/CVE-2023-25815
- https://ubuntu.com/security/CVE-2023-29007
- https://ubuntu.com/security/CVE-2023-25815
- https://ubuntu.com/security/CVE-2023-29007
- https://ubuntu.com/security/CVE-2023-25652

Title: USN-6054-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-6054-1
Priorities: low
Description:
Moataz Al-Sharida and nawaik discovered that Django incorrectly handled
uploading multiple files using one form field. A remote attacker could
possibly use this issue to bypass certain validations.
CVEs:
- https://ubuntu.com/security/CVE-2023-31047

Title: USN-6075-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6075-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-32205, CVE-2023-32207,
CVE-2023-32211, CVE-2023-32212, CVE-2023-32213, CVE-2023-32215)

Irvan Kurniawan discovered that Thunderbird did not properly manage memory
when using RLBox Expat driver. An attacker could potentially exploits this
issue to cause a denial of service. (CVE-2023-32206)
CVEs:
- https://ubuntu.com/security/CVE-2023-32205
- https://ubuntu.com/security/CVE-2023-32207
- https://ubuntu.com/security/CVE-2023-32211
- https://ubuntu.com/security/CVE-2023-32212
- https://ubuntu.com/security/CVE-2023-32213
- https://ubuntu.com/security/CVE-2023-32215
- https://ubuntu.com/security/CVE-2023-32206
- https://ubuntu.com/security/CVE-2023-32206
- https://ubuntu.com/security/CVE-2023-32215
- https://ubuntu.com/security/CVE-2023-32211
- https://ubuntu.com/security/CVE-2023-32207
- https://ubuntu.com/security/CVE-2023-32213
- https://ubuntu.com/security/CVE-2023-32212
- https://ubuntu.com/security/CVE-2023-32205

1.108

Available in the Broadcom Support portal

Release Date: April 28, 2023

Metadata:

BOSH Agent Version: 2.528.0

USNs:


Title: USN-6032-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6032-1
Priorities: medium,low,negligible
Description:
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)

Gerald Lee discovered that the USB Gadget file system implementation in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability in some situations. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-4382)

It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)

It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)

It was discovered that the file system writeback functionality in the Linux
kernel contained a user-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2023-26605)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2023-26607)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-26605
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2023-26605
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-26607

Title: USN-6036-1: PatchELF vulnerability
URL: https://ubuntu.com/security/notices/USN-6036-1
Priorities: medium
Description:
It was discovered that PatchELF was not properly performing bounds
checks, which could lead to an out-of-bounds read via a specially
crafted file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information. (CVE-2022-44940)
CVEs:
- https://ubuntu.com/security/CVE-2022-44940
- https://ubuntu.com/security/CVE-2022-44940

Title: USN-6033-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6033-1
Priorities: high,medium,low,negligible
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)

William Zhao discovered that the Traffic Control (TC) subsystem in the
Linux kernel did not properly handle network packet retransmission in
certain situations. A local attacker could use this to cause a denial of
service (kernel deadlock). (CVE-2022-4269)

Thadeu Cascardo discovered that the io_uring subsystem contained a double-
free vulnerability in certain memory allocation error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-1032)

It was discovered that the TUN/TAP driver in the Linux kernel did not
properly initialize socket data. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-1076)

It was discovered that the Real-Time Scheduling Class implementation in the
Linux kernel contained a type confusion vulnerability in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-1077)

It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)

It was discovered that the io_uring subsystem in the Linux kernel did not
properly perform file table updates in some situations, leading to a null
pointer dereference vulnerability. A local attacker could use this to cause
a denial of service (system crash). (CVE-2023-1583)

It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)

It was discovered that the APM X-Gene SoC hardware monitoring driver in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or expose sensitive information (kernel memory).
(CVE-2023-1855)

It was discovered that a race condition existed in the Bluetooth HCI SDIO
driver, leading to a use-after-free vulnerability. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-1989)

It was discovered that the ST NCI NFC driver did not properly handle device
removal events. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2023-1990)

José Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)

It was discovered that the BigBen Interactive Kids’ gamepad driver in the
Linux kernel did not properly handle device removal, leading to a use-
after-free vulnerability. A local attacker with physical access could plug
in a specially crafted USB device to cause a denial of service (system
crash). (CVE-2023-25012)

It was discovered that a race condition existed in the TLS subsystem in the
Linux kernel, leading to a use-after-free or a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-28466)

It was discovered that the Bluetooth subsystem in the Linux kernel did not
properly initialize some data structures, leading to an out-of-bounds
access vulnerability in certain situations. An attacker could use this to
expose sensitive information (kernel memory). (CVE-2023-28866)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2022-4269
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-1583
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-1989
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-28866
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1076
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-25012
- https://ubuntu.com/security/CVE-2023-1855
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-28866
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-1077
- https://ubuntu.com/security/CVE-2023-1583
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-28466
- https://ubuntu.com/security/CVE-2023-1989
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2022-4269

Title: USN-6043-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6043-1
Priorities: high
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)

It was discovered that the OverlayFS implementation in the Linux kernel did
not properly handle copy up operation in some conditions. A local attacker
could possibly use this to gain elevated privileges. (CVE-2023-0386)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2023-1829

Title: USN-6034-1: Dnsmasq vulnerability
URL: https://ubuntu.com/security/notices/USN-6034-1
Priorities: low
Description:
It was discovered that Dnsmasq was sending large DNS messages
over UDP, possibly causing transmission failures due to IP
fragmentation. This update lowers the default maximum size of
DNS messages to improve transmission reliability over UDP.
CVEs:
- https://ubuntu.com/security/CVE-2023-28450

1.105

Available in the Broadcom Support portal

Release Date: April 21, 2023

Metadata:

BOSH Agent Version: 2.525.0

USNs:


Title: USN-6011-1: Json-smart vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6011-1
Priorities: medium
Description:
It was discovered that Json-smart incorrectly handled memory
when processing input containing unclosed quotes.
A remote attacker could possibly use this issue to cause
applications using Json-smart to crash, leading to a
denial of service. (CVE-2021-31684)

It was discovered that Json-smart incorrectly handled memory
when processing input containing unclosed brackets.
A remote attacker could possibly use this issue to cause
applications using Json-smart to crash, leading to a
denial of service. (CVE-2023-1370)
CVEs:
- https://ubuntu.com/security/CVE-2021-31684
- https://ubuntu.com/security/CVE-2023-1370
- https://ubuntu.com/security/CVE-2021-31684
- https://ubuntu.com/security/CVE-2023-1370

Title: USN-6026-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6026-1
Priorities: medium,low
Description:
It was discovered that Vim was incorrectly processing Vim buffers. An
attacker could possibly use this issue to perform illegal memory access and
expose sensitive information. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-4166)

It was discovered that Vim was using freed memory when dealing with regular
expressions inside a visual selection. If a user were tricked into opening a
specially crafted file, an attacker could crash the application, leading to a
denial of service, or possibly achieve code execution with user privileges.
This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu
20.04 LTS. (CVE-2021-4192)

It was discovered that Vim was incorrectly handling virtual column position
operations, which could result in an out-of-bounds read. An attacker could
possibly use this issue to expose sensitive information. This issue only
affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-4193)

It was discovered that Vim was not properly performing bounds checks when
updating windows present on a screen, which could result in a heap buffer
overflow. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2022-0213)

It was discovered that Vim was incorrectly performing read and write
operations when in visual block mode, going beyond the end of a line and
causing a heap buffer overflow. If a user were tricked into opening a
specially crafted file, an attacker could crash the application, leading to a
denial of service, or possibly achieve code execution with user privileges.
This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu
22.04 LTS. (CVE-2022-0261, CVE-2022-0318)

It was discovered that Vim was incorrectly handling window exchanging
operations when in Visual mode, which could result in an out-of-bounds read.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2022-0319)

It was discovered that Vim was incorrectly handling recursion when parsing
conditional expressions. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary code. (CVE-2022-0351)

It was discovered that Vim was not properly handling memory allocation when
processing data in Ex mode, which could result in a heap buffer overflow.
An attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2022-0359)

It was discovered that Vim was not properly performing bounds checks when
executing line operations in Visual mode, which could result in a heap
buffer overflow. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-0361,
CVE-2022-0368)

It was discovered that Vim was not properly handling loop conditions when
looking for spell suggestions, which could result in a stack buffer
overflow. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2022-0408)

It was discovered that Vim was incorrectly handling memory access when
executing buffer operations, which could result in the usage of freed
memory. An attacker could possibly use this issue to execute arbitrary
code. (CVE-2022-0443)

It was discovered that Vim was incorrectly processing Vim buffers. An
attacker could possibly use this issue to perform illegal memory access and
expose sensitive information. (CVE-2022-0554)

It was discovered that Vim was not properly performing bounds checks for
column numbers when replacing tabs with spaces or spaces with tabs, which
could cause a heap buffer overflow. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary code.
(CVE-2022-0572)

It was discovered that Vim was incorrectly processing Vim buffers. An
attacker could possibly use this issue to perform illegal memory access and
expose sensitive information. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-0629)

It was discovered that Vim was not properly performing validation of data
that contained special multi-byte characters, which could cause an
out-of-bounds read. An attacker could possibly use this issue to cause a
denial of service. (CVE-2022-0685)

It was discovered that Vim was incorrectly processing data used to define
indentation in a file, which could cause a heap buffer overflow. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2022-0714)

It was discovered that Vim was incorrectly processing certain regular
expression patterns and strings, which could cause an out-of-bounds read.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-0729)

It was discovered that Vim incorrectly handled memory access. An attacker
could potentially use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution. (CVE-2022-2207)
CVEs:
- https://ubuntu.com/security/CVE-2021-4166
- https://ubuntu.com/security/CVE-2021-4192
- https://ubuntu.com/security/CVE-2021-4193
- https://ubuntu.com/security/CVE-2022-0213
- https://ubuntu.com/security/CVE-2022-0261
- https://ubuntu.com/security/CVE-2022-0318
- https://ubuntu.com/security/CVE-2022-0319
- https://ubuntu.com/security/CVE-2022-0351
- https://ubuntu.com/security/CVE-2022-0359
- https://ubuntu.com/security/CVE-2022-0361
- https://ubuntu.com/security/CVE-2022-0368
- https://ubuntu.com/security/CVE-2022-0408
- https://ubuntu.com/security/CVE-2022-0443
- https://ubuntu.com/security/CVE-2022-0554
- https://ubuntu.com/security/CVE-2022-0572
- https://ubuntu.com/security/CVE-2022-0629
- https://ubuntu.com/security/CVE-2022-0685
- https://ubuntu.com/security/CVE-2022-0714
- https://ubuntu.com/security/CVE-2022-0729
- https://ubuntu.com/security/CVE-2022-2207
- https://ubuntu.com/security/CVE-2022-0729
- https://ubuntu.com/security/CVE-2022-2207
- https://ubuntu.com/security/CVE-2022-0714
- https://ubuntu.com/security/CVE-2022-0408
- https://ubuntu.com/security/CVE-2022-0572
- https://ubuntu.com/security/CVE-2022-0685
- https://ubuntu.com/security/CVE-2022-0261
- https://ubuntu.com/security/CVE-2022-0351
- https://ubuntu.com/security/CVE-2022-0359
- https://ubuntu.com/security/CVE-2021-4166
- https://ubuntu.com/security/CVE-2022-0319
- https://ubuntu.com/security/CVE-2022-0213
- https://ubuntu.com/security/CVE-2022-0443
- https://ubuntu.com/security/CVE-2021-4193
- https://ubuntu.com/security/CVE-2022-0368
- https://ubuntu.com/security/CVE-2022-0554
- https://ubuntu.com/security/CVE-2022-0361
- https://ubuntu.com/security/CVE-2022-0318
- https://ubuntu.com/security/CVE-2021-4192
- https://ubuntu.com/security/CVE-2022-0629

Title: USN-6012-1: Smarty vulnerability
URL: https://ubuntu.com/security/notices/USN-6012-1
Priorities: medium
Description:
It was discovered that Smarty incorrectly parsed blocks’ names and
included files’ names. A remote attacker with template writing permissions
could use this issue to execute arbitrary PHP code. (CVE-2022-29221)
CVEs:
- https://ubuntu.com/security/CVE-2022-29221
- https://ubuntu.com/security/CVE-2022-29221

Title: USN-6008-1: Exo vulnerability
URL: https://ubuntu.com/security/notices/USN-6008-1
Priorities: medium
Description:
It was discovered that Exo did not properly sanitized desktop files.
A remote attacker could possibly use this issue to to cause a crash or
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-32278

Title: USN-6025-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6025-1
Priorities: high,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1281)

It was discovered that the OverlayFS implementation in the Linux kernel did
not properly handle copy up operation in some conditions. A local attacker
could possibly use this to gain elevated privileges. (CVE-2023-0386)

Haowei Yan discovered that a race condition existed in the Layer 2
Tunneling Protocol (L2TP) implementation in the Linux kernel. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-4129)

It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)

It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)

It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)

It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)

It was discovered that the NFS implementation in the Linux kernel did not
properly handle pending tasks in some situations. A local attacker could
use this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2023-1652)

Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1652
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0386
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-4129
- https://ubuntu.com/security/CVE-2023-0394

Title: USN-6024-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6024-1
Priorities: high,medium,low
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1281)

Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)

It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)

Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)

It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)

Thadeu Cascardo discovered that the io_uring subsystem contained a double-
free vulnerability in certain memory allocation error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-1032)

It was discovered that the module decompression implementation in the Linux
kernel did not properly handle return values in certain error conditions. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-22997)

Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly handle a loop termination condition, leading to an
out-of-bounds read vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-26606)

Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2023-22997
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2023-22997
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2023-28328

Title: USN-6018-1: Apport vulnerability
URL: https://ubuntu.com/security/notices/USN-6018-1
Priorities: medium
Description:
Chen Lu, Lei Wang, and YiQi Sun discovered a privilege escalation
vulnerability in apport-cli when viewing crash reports and unprivileged
users are allowed to run sudo less. A local attacker on a specially
configured system could use this to escalate their privilege.
CVEs:
- https://ubuntu.com/security/CVE-2023-1326

Title: USN-6015-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6015-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-1945, CVE-2023-29548,
CVE-2023-29550)

Paul Menzel discovered that Thunderbird did not properly validate OCSP
revocation status of recipient certificates when sending S/Mime encrypted
email. An attacker could potentially exploits this issue to perform
spoofing attack. (CVE-2023-0547)

Ribose RNP Team discovered that Thunderbird did not properly manage memory
when parsing certain OpenPGP messages. An attacker could potentially
exploits this issue to cause a denial of service. (CVE-2023-29479)

Irvan Kurniawan discovered that Thunderbird did not properly manage
fullscreen notifications using a combination of window.open, fullscreen
requests, window.name assignments, and setInterval calls. An attacker could
potentially exploit this issue to perform spoofing attacks.
(CVE-2023-29533)

Lukas Bernhard discovered that Thunderbird did not properly manage memory
when doing Garbage Collector compaction. An attacker could potentially
exploits this issue to cause a denial of service. (CVE-2023-29535)

Zx from qriousec discovered that Thunderbird did not properly validate the
address to free a pointer provided to the memory manager. An attacker could
potentially exploits this issue to cause a denial of service.
(CVE-2023-29536)

Trung Pham discovered that Thunderbird did not properly validate the
filename directive in the Content-Disposition header. An attacker could
possibly exploit this to perform reflected file download attacks
potentially tricking users to install malware. (CVE-2023-29539)

Ameen Basha M K discovered that Thunderbird did not properly validate
downloads of files ending in .desktop. An attacker could potentially
exploits this issue to execute arbitrary code. (CVE-2023-29541)
CVEs:
- https://ubuntu.com/security/CVE-2023-1945
- https://ubuntu.com/security/CVE-2023-29548
- https://ubuntu.com/security/CVE-2023-29550
- https://ubuntu.com/security/CVE-2023-0547
- https://ubuntu.com/security/CVE-2023-29479
- https://ubuntu.com/security/CVE-2023-29533
- https://ubuntu.com/security/CVE-2023-29535
- https://ubuntu.com/security/CVE-2023-29536
- https://ubuntu.com/security/CVE-2023-29539
- https://ubuntu.com/security/CVE-2023-29541
- https://ubuntu.com/security/CVE-2023-29535
- https://ubuntu.com/security/CVE-2023-29479
- https://ubuntu.com/security/CVE-2023-29548
- https://ubuntu.com/security/CVE-2023-29536
- https://ubuntu.com/security/CVE-2023-1945
- https://ubuntu.com/security/CVE-2023-29533
- https://ubuntu.com/security/CVE-2023-29550
- https://ubuntu.com/security/CVE-2023-29541
- https://ubuntu.com/security/CVE-2023-0547
- https://ubuntu.com/security/CVE-2023-29539

Title: USN-6006-1: .NET vulnerability
URL: https://ubuntu.com/security/notices/USN-6006-1
Priorities: medium
Description:
It was discovered that .NET did not properly manage dll files. An
attacker could potentially use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-28260

1.102

Available in the Broadcom Support portal

Release Date: April 12, 2023

Metadata:

BOSH Agent Version: 2.523.0

USNs:


Title: USN-5995-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5995-1
Priorities: medium,low
Description:
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
and Ubuntu 22.04 LTS. (CVE-2022-0413, CVE-2022-1629, CVE-2022-1674,
CVE-2022-1733, CVE-2022-1735, CVE-2022-1785, CVE-2022-1796, CVE-2022-1851,
CVE-2022-1898, CVE-2022-1942, CVE-2022-1968, CVE-2022-2124, CVE-2022-2125,
CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2183, CVE-2022-2206,
CVE-2022-2304, CVE-2022-2345, CVE-2022-2581)

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-1720, CVE-2022-2571, CVE-2022-2845, CVE-2022-2849,
CVE-2022-2923)

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-1927,
CVE-2022-2344)

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
and Ubuntu 22.10. (CVE-2022-2946)

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-2980)
CVEs:
- https://ubuntu.com/security/CVE-2022-0413
- https://ubuntu.com/security/CVE-2022-1629
- https://ubuntu.com/security/CVE-2022-1674
- https://ubuntu.com/security/CVE-2022-1733
- https://ubuntu.com/security/CVE-2022-1735
- https://ubuntu.com/security/CVE-2022-1785
- https://ubuntu.com/security/CVE-2022-1796
- https://ubuntu.com/security/CVE-2022-1851
- https://ubuntu.com/security/CVE-2022-1898
- https://ubuntu.com/security/CVE-2022-1942
- https://ubuntu.com/security/CVE-2022-1968
- https://ubuntu.com/security/CVE-2022-2124
- https://ubuntu.com/security/CVE-2022-2125
- https://ubuntu.com/security/CVE-2022-2126
- https://ubuntu.com/security/CVE-2022-2129
- https://ubuntu.com/security/CVE-2022-2175
- https://ubuntu.com/security/CVE-2022-2183
- https://ubuntu.com/security/CVE-2022-2206
- https://ubuntu.com/security/CVE-2022-2304
- https://ubuntu.com/security/CVE-2022-2345
- https://ubuntu.com/security/CVE-2022-2581
- https://ubuntu.com/security/CVE-2022-1720
- https://ubuntu.com/security/CVE-2022-2571
- https://ubuntu.com/security/CVE-2022-2845
- https://ubuntu.com/security/CVE-2022-2849
- https://ubuntu.com/security/CVE-2022-2923
- https://ubuntu.com/security/CVE-2022-1927
- https://ubuntu.com/security/CVE-2022-2344
- https://ubuntu.com/security/CVE-2022-2946
- https://ubuntu.com/security/CVE-2022-2980
- https://ubuntu.com/security/CVE-2022-1968
- https://ubuntu.com/security/CVE-2022-2125
- https://ubuntu.com/security/CVE-2022-2304
- https://ubuntu.com/security/CVE-2022-2946
- https://ubuntu.com/security/CVE-2022-1629
- https://ubuntu.com/security/CVE-2022-0413
- https://ubuntu.com/security/CVE-2022-1785
- https://ubuntu.com/security/CVE-2022-2845
- https://ubuntu.com/security/CVE-2022-1927
- https://ubuntu.com/security/CVE-2022-2345
- https://ubuntu.com/security/CVE-2022-2581
- https://ubuntu.com/security/CVE-2022-2126
- https://ubuntu.com/security/CVE-2022-1898
- https://ubuntu.com/security/CVE-2022-1720
- https://ubuntu.com/security/CVE-2022-1674
- https://ubuntu.com/security/CVE-2022-2183
- https://ubuntu.com/security/CVE-2022-2124
- https://ubuntu.com/security/CVE-2022-2344
- https://ubuntu.com/security/CVE-2022-1735
- https://ubuntu.com/security/CVE-2022-1733
- https://ubuntu.com/security/CVE-2022-2206
- https://ubuntu.com/security/CVE-2022-2849
- https://ubuntu.com/security/CVE-2022-2129
- https://ubuntu.com/security/CVE-2022-2923
- https://ubuntu.com/security/CVE-2022-1796
- https://ubuntu.com/security/CVE-2022-2980
- https://ubuntu.com/security/CVE-2022-1851
- https://ubuntu.com/security/CVE-2022-2175
- https://ubuntu.com/security/CVE-2022-1942
- https://ubuntu.com/security/CVE-2022-2571

Title: USN-5987-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5987-1
Priorities: medium,low
Description:
It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or other guest VMs. (CVE-2022-2196)

It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)

Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)

Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)

Gerald Lee discovered that the USB Gadget file system implementation in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability in some situations. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-4382)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds write vulnerability. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-48423)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2022-48424)

José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)

It was discovered that the KSMBD implementation in the Linux kernel did not
properly validate buffer lengths, leading to a heap-based buffer overflow.
A remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2023-0210)

It was discovered that a use-after-free vulnerability existed in the
Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-0266)

Kyle Zeng discovered that the class-based queuing discipline implementation
in the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23454)

Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)

It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly handle a loop termination condition, leading to an
out-of-bounds read vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-26606)

Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2022-48423
- https://ubuntu.com/security/CVE-2022-48424
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0210
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-23454
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-0210
- https://ubuntu.com/security/CVE-2023-23454
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2023-26606
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2022-48423
- https://ubuntu.com/security/CVE-2022-48424
- https://ubuntu.com/security/CVE-2022-2196

Title: USN-5979-1: Linux kernel (HWE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5979-1
Priorities: medium,low
Description:
It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or other guest VMs. (CVE-2022-2196)

It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)

Gerald Lee discovered that the USB Gadget file system implementation in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability in some situations. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-4382)

José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)

It was discovered that a use-after-free vulnerability existed in the
Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-0266)

It was discovered that the io_uring subsystem in the Linux kernel contained
a use-after-free vulnerability. A local attacker could possibly use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2023-0469)

It was discovered that the CIFS network file system implementation in the
Linux kernel contained a user-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2023-1195)

It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)
CVEs:
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-0469
- https://ubuntu.com/security/CVE-2023-1195
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-0469
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-1195
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4382

Title: USN-5968-1: GitPython vulnerability
URL: https://ubuntu.com/security/notices/USN-5968-1
Priorities: medium
Description:
It was discovered that GitPython did not properly sanitize user inputs for
remote URLs in the clone command. By injecting a maliciously crafted
remote URL, an attacker could possibly use this issue to execute arbitrary
commands on the host.
CVEs:
- https://ubuntu.com/security/CVE-2022-24439

Title: USN-5966-2: amanda regression
URL: https://ubuntu.com/security/notices/USN-5966-2
Priorities: low,medium,high
Description:
USN-5966-1 fixed vulnerabilities in amanda. Unfortunately it introduced
a regression in GNUTAR-based backups. This update reverts all of the
changes in amanda until a better fix is provided.

We apologize for the inconvenience.

Original advisory details:

Maher Azzouzi discovered an information disclosure vulnerability in the
calcsize binary within amanda. calcsize is a suid binary owned by root that
could possibly be used by a malicious local attacker to expose sensitive
file system information. (CVE-2022-37703)

Maher Azzouzi discovered a privilege escalation vulnerability in the
rundump binary within amanda. rundump is a suid binary owned by root that
did not perform adequate sanitization of environment variables or
commandline options and could possibly be used by a malicious local
attacker to escalate privileges. (CVE-2022-37704)

Maher Azzouzi discovered a privilege escalation vulnerability in the runtar
binary within amanda. runtar is a suid binary owned by root that did not
perform adequate sanitization of commandline options and could possibly be
used by a malicious local attacker to escalate privileges. (CVE-2022-37705)
CVEs:
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705

Title: USN-5966-1: amanda vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5966-1
Priorities: low,medium,high
Description:
Maher Azzouzi discovered an information disclosure vulnerability in the
calcsize binary within amanda. calcsize is a suid binary owned by root that
could possibly be used by a malicious local attacker to expose sensitive
file system information. (CVE-2022-37703)

Maher Azzouzi discovered a privilege escalation vulnerability in the
rundump binary within amanda. rundump is a suid binary owned by root that
did not perform adequate sanitization of environment variables or
commandline options and could possibly be used by a malicious local
attacker to escalate privileges. (CVE-2022-37704)

Maher Azzouzi discovered a privilege escalation vulnerability in the runtar
binary within amanda. runtar is a suid binary owned by root that did not
perform adequate sanitization of commandline options and could possibly be
used by a malicious local attacker to escalate privileges. (CVE-2022-37705)
CVEs:
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705

Title: USN-5966-3: amanda regression
URL: https://ubuntu.com/security/notices/USN-5966-3
Priorities: low,medium,high
Description:
USN-5966-1 fixed vulnerabilities in amanda. Unfortunately that update
caused a regression and was reverted in USN-5966-2. This update provides
security fixes for Ubuntu 22.10, Ubuntu 22.04 LTS, Ubuntu 20.04
LTS and Ubuntu 18.04 LTS.

We apologize for the inconvenience.

Original advisory details:

Maher Azzouzi discovered an information disclosure vulnerability in the
calcsize binary within amanda. calcsize is a suid binary owned by root that
could possibly be used by a malicious local attacker to expose sensitive
file system information. (CVE-2022-37703)

Maher Azzouzi discovered a privilege escalation vulnerability in the
rundump binary within amanda. rundump is a suid binary owned by root that
did not perform adequate sanitization of environment variables or
commandline options and could possibly be used by a malicious local
attacker to escalate privileges. (CVE-2022-37704)

Maher Azzouzi discovered a privilege escalation vulnerability in the runtar
binary within amanda. runtar is a suid binary owned by root that did not
perform adequate sanitization of commandline options and could possibly be
used by a malicious local attacker to escalate privileges. (CVE-2022-37705)
CVEs:
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37705

Title: LSN-0093-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0093-1
Priorities: high
Description:
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2023-0179)

It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-0461)
CVEs:
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179

Title: USN-5976-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5976-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)

It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or other guest VMs. (CVE-2022-2196)

It was discovered that the Intel 740 frame buffer driver in the Linux
kernel contained a divide by zero vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3061)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)

It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)

Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)

It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3646

Title: USN-5992-1: ldb vulnerability
URL: https://ubuntu.com/security/notices/USN-5992-1
Priorities: medium
Description:
Demi Marie Obenour discovered that ldb, when used with Samba, incorrectly
handled certain confidential attribute values. A remote authenticated
attacker could possibly use this issue to obtain certain sensitive
information.
CVEs:
- https://ubuntu.com/security/CVE-2023-0614

Title: USN-5978-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5978-1
Priorities: high,medium,low
Description:
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-1281)

It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or other guest VMs. (CVE-2022-2196)

It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

Gerald Lee discovered that the USB Gadget file system implementation in the
Linux kernel contained a race condition, leading to a use-after-free
vulnerability in some situations. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-4382)

It was discovered that the NTFS file system implementation in the Linux
kernel contained a null pointer dereference in some situations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-4842)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)

It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)

It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)

It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. (CVE-2023-1075)

It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). (CVE-2023-1078)

It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)

Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-1078
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1075
- https://ubuntu.com/security/CVE-2022-4842
- https://ubuntu.com/security/CVE-2022-4382
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2022-2196

Title: USN-5977-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5977-1
Priorities: high,medium
Description:
It was discovered that the network queuing discipline implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-1281)

It was discovered that the KVM VMX implementation in the Linux kernel did
not properly handle indirect branch prediction isolation between L1 and L2
VMs. An attacker in a guest VM could use this to expose sensitive
information from the host OS or other guest VMs. (CVE-2022-2196)

Thadeu Cascardo discovered that the io_uring subsystem contained a double-
free vulnerability in certain memory allocation error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-1032)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2022-2196
- https://ubuntu.com/security/CVE-2023-1032
- https://ubuntu.com/security/CVE-2023-1281

Title: USN-5996-1: Liblouis vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5996-1
Priorities: medium
Description:
It was discovered that Liblouis incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-26767, CVE-2023-26768, CVE-2023-26769)
CVEs:
- https://ubuntu.com/security/CVE-2023-26767
- https://ubuntu.com/security/CVE-2023-26768
- https://ubuntu.com/security/CVE-2023-26769
- https://ubuntu.com/security/CVE-2023-26769
- https://ubuntu.com/security/CVE-2023-26768
- https://ubuntu.com/security/CVE-2023-26767

Title: USN-6005-1: Sudo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6005-1
Priorities: medium
Description:
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
escaped control characters in log messages and sudoreplay output. An
attacker could possibly use these issues to inject terminal control
characters that alter output when being viewed.
CVEs:
- https://ubuntu.com/security/CVE-2023-28486
- https://ubuntu.com/security/CVE-2023-28487

1.95

Available in the Broadcom Support portal

Release Date: March 22, 2023

Metadata:

BOSH Agent Version: 2.516.0

USNs:


Title: USN-5956-1: PHPMailer vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5956-1
Priorities: medium,low
Description:
Dawid Golunski discovered that PHPMailer was not properly escaping user
input data used as arguments to functions executed by the system shell. An
attacker could possibly use this issue to execute arbitrary code. This
issue only affected Ubuntu 16.04 ESM. (CVE-2016-10033, CVE-2016-10045)

It was discovered that PHPMailer was not properly escaping characters
in certain fields of the code_generator.php example code. An attacker
could possibly use this issue to conduct cross-site scripting (XSS)
attacks. This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 18.04
ESM. (CVE-2017-11503)

Yongxiang Li discovered that PHPMailer was not properly converting
relative paths provided as user input when adding attachments to messages,
which could lead to relative image URLs being treated as absolute local
file paths and added as attachments. An attacker could possibly use this
issue to access unauthorized resources and expose sensitive information.
This issue only affected Ubuntu 16.04 ESM. (CVE-2017-5223)

Sehun Oh discovered that PHPMailer was not properly processing untrusted
non-local file attachments, which could lead to an object injection. An
attacker could possibly use this issue to execute arbitrary code. This
issue only affected Ubuntu 16.04 ESM. (CVE-2018-19296)

Elar Lang discovered that PHPMailer was not properly escaping file
attachment names, which could lead to a misinterpretation of file types
by entities processing the message. An attacker could possibly use this
issue to bypass attachment filters. This issue was only fixed in Ubuntu
16.04 ESM and Ubuntu 20.04 ESM. (CVE-2020-13625)

It was discovered that PHPMailer was not properly handling callables in
its validateAddress function, which could result in untrusted code being
called should the global namespace contain a function called ‘php’. An
attacker could possibly use this issue to execute arbitrary code. This
issue was only fixed in Ubuntu 20.04 ESM and Ubuntu 22.04 ESM.
(CVE-2021-3603)
CVEs:
- https://ubuntu.com/security/CVE-2016-10033
- https://ubuntu.com/security/CVE-2016-10045
- https://ubuntu.com/security/CVE-2017-11503
- https://ubuntu.com/security/CVE-2017-5223
- https://ubuntu.com/security/CVE-2018-19296
- https://ubuntu.com/security/CVE-2020-13625
- https://ubuntu.com/security/CVE-2021-3603
- https://ubuntu.com/security/CVE-2021-3603
- https://ubuntu.com/security/CVE-2016-10045
- https://ubuntu.com/security/CVE-2017-5223
- https://ubuntu.com/security/CVE-2016-10033
- https://ubuntu.com/security/CVE-2018-19296
- https://ubuntu.com/security/CVE-2017-11503
- https://ubuntu.com/security/CVE-2020-13625

Title: USN-5961-1: abcm2ps vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5961-1
Priorities: medium,low
Description:
It was discovered that abcm2ps incorrectly
handled memory when parsing specially crafted ABC files.
An attacker could use this issue to cause abcm2ps to crash,
leading to a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 16.04 ESM
and Ubuntu 18.04 LTS.
(CVE-2018-10753, CVE-2018-10771, CVE-2019-1010069)

Chiba of Topsec Alpha Lab discovered that abcm2ps incorrectly
handled memory when parsing specially crafted ABC files.
An attacker could use this issue to cause abcm2ps to crash,
leading to a denial of service.
(CVE-2021-32434, CVE-2021-32435, CVE-2021-32436)
CVEs:
- https://ubuntu.com/security/CVE-2018-10753
- https://ubuntu.com/security/CVE-2018-10771
- https://ubuntu.com/security/CVE-2019-1010069
- https://ubuntu.com/security/CVE-2021-32434
- https://ubuntu.com/security/CVE-2021-32435
- https://ubuntu.com/security/CVE-2021-32436
- https://ubuntu.com/security/CVE-2021-32435
- https://ubuntu.com/security/CVE-2018-10771
- https://ubuntu.com/security/CVE-2019-1010069
- https://ubuntu.com/security/CVE-2021-32434
- https://ubuntu.com/security/CVE-2021-32436
- https://ubuntu.com/security/CVE-2018-10753

Title: USN-5947-1: Twig vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5947-1
Priorities: medium
Description:
Fabien Potencier discovered that Twig was not properly enforcing sandbox
policies when dealing with objects automatically cast to strings by PHP.
An attacker could possibly use this issue to expose sensitive information.
This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 18.04 ESM.
(CVE-2019-9942)

Marlon Starkloff discovered that Twig was not properly enforcing closure
constraints in some of its array filtering functions. An attacker could
possibly use this issue to execute arbitrary code. This issue was only
fixed in Ubuntu 20.04 ESM. (CVE-2022-23614)

Dariusz Tytko discovered that Twig was not properly verifying input data
utilized when defining pathnames used to access files in a system. An
attacker could possibly use this issue to access unauthorized resources
and expose sensitive information. (CVE-2022-39261)
CVEs:
- https://ubuntu.com/security/CVE-2019-9942
- https://ubuntu.com/security/CVE-2022-23614
- https://ubuntu.com/security/CVE-2022-39261
- https://ubuntu.com/security/CVE-2019-9942
- https://ubuntu.com/security/CVE-2022-23614
- https://ubuntu.com/security/CVE-2022-39261

Title: USN-5945-1: Protocol Buffers vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5945-1
Priorities: low
Description:
It was discovered that Protocol Buffers did not properly validate field
com.google.protobuf.UnknownFieldSet in protobuf-java. An attacker could
possibly use this issue to perform a denial of service attack. This issue
only affected protobuf Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2021-22569)

It was discovered that Protocol Buffers did not properly parse certain
symbols. An attacker could possibly use this issue to cause a denial of
service or other unspecified impact. (CVE-2021-22570)

It was discovered that Protocol Buffers did not properly manage memory when
parsing specifically crafted messages. An attacker could possibly use this
issue to cause applications using protobuf to crash, resulting in a denial
of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-1941)
CVEs:
- https://ubuntu.com/security/CVE-2021-22569
- https://ubuntu.com/security/CVE-2021-22570
- https://ubuntu.com/security/CVE-2022-1941
- https://ubuntu.com/security/CVE-2021-22570
- https://ubuntu.com/security/CVE-2022-1941
- https://ubuntu.com/security/CVE-2021-22569

Title: USN-5946-1: XStream vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5946-1
Priorities: medium
Description:
Lai Han discovered that XStream incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-39140)

It was discovered that XStream incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to execute
arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04
LTS. (CVE-2021-39139, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145,
CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149,
CVE-2021-39151, CVE-2021-39153, CVE-2021-39154)

It was discovered that XStream incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2021-39150, CVE-2021-39152)

Lai Han discovered that XStream incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a denial
of service. (CVE-2022-41966)
CVEs:
- https://ubuntu.com/security/CVE-2021-39140
- https://ubuntu.com/security/CVE-2021-39139
- https://ubuntu.com/security/CVE-2021-39141
- https://ubuntu.com/security/CVE-2021-39144
- https://ubuntu.com/security/CVE-2021-39145
- https://ubuntu.com/security/CVE-2021-39146
- https://ubuntu.com/security/CVE-2021-39147
- https://ubuntu.com/security/CVE-2021-39148
- https://ubuntu.com/security/CVE-2021-39149
- https://ubuntu.com/security/CVE-2021-39151
- https://ubuntu.com/security/CVE-2021-39153
- https://ubuntu.com/security/CVE-2021-39154
- https://ubuntu.com/security/CVE-2021-39150
- https://ubuntu.com/security/CVE-2021-39152
- https://ubuntu.com/security/CVE-2022-41966
- https://ubuntu.com/security/CVE-2021-39141
- https://ubuntu.com/security/CVE-2021-39150
- https://ubuntu.com/security/CVE-2021-39139
- https://ubuntu.com/security/CVE-2021-39147
- https://ubuntu.com/security/CVE-2021-39152
- https://ubuntu.com/security/CVE-2021-39149
- https://ubuntu.com/security/CVE-2021-39148
- https://ubuntu.com/security/CVE-2022-41966
- https://ubuntu.com/security/CVE-2021-39144
- https://ubuntu.com/security/CVE-2021-39146
- https://ubuntu.com/security/CVE-2021-39151
- https://ubuntu.com/security/CVE-2021-39154
- https://ubuntu.com/security/CVE-2021-39145
- https://ubuntu.com/security/CVE-2021-39140
- https://ubuntu.com/security/CVE-2021-39153

Title: USN-5944-1: SnakeYAML vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5944-1
Priorities: low,medium
Description:
It was discovered that SnakeYAML did not limit the maximal nested depth
for collections when parsing YAML data. If a user or automated system were
tricked into opening a specially crafted YAML file, an attacker could
possibly use this issue to cause applications using SnakeYAML to crash,
resulting in a denial of service. (CVE-2022-25857, CVE-2022-38749,
CVE-2022-38750)

It was discovered that SnakeYAML did not limit the maximal data matched
with regular expressions when parsing YAML data. If a user or automated
system were tricked into opening a specially crafted YAML file, an
attacker could possibly use this issue to cause applications using
SnakeYAML to crash, resulting in a denial of service. (CVE-2022-38751)
CVEs:
- https://ubuntu.com/security/CVE-2022-25857
- https://ubuntu.com/security/CVE-2022-38749
- https://ubuntu.com/security/CVE-2022-38750
- https://ubuntu.com/security/CVE-2022-38751
- https://ubuntu.com/security/CVE-2022-38750
- https://ubuntu.com/security/CVE-2022-25857
- https://ubuntu.com/security/CVE-2022-38749
- https://ubuntu.com/security/CVE-2022-38751

Title: USN-5958-1: FFmpeg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5958-1
Priorities: medium
Description:
It was discovered that FFmpeg could be made to dereference a null
pointer. An attacker could possibly use this to cause a denial of
service via application crash. These issues only affected Ubuntu
16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04
LTS. (CVE-2022-3109, CVE-2022-3341)

It was discovered that FFmpeg could be made to access an out-of-bounds
frame by the Apple RPZA encoder. An attacker could possibly use this
to cause a denial of service via application crash or access sensitive
information. This issue only affected Ubuntu 20.04 LTS and Ubuntu
22.10. (CVE-2022-3964)

It was discovered that FFmpeg could be made to access an out-of-bounds
frame by the QuickTime encoder. An attacker could possibly use this to
cause a denial of service via application crash or access sensitive
information. This issue only affected Ubuntu 22.10. (CVE-2022-3965)
CVEs:
- https://ubuntu.com/security/CVE-2022-3109
- https://ubuntu.com/security/CVE-2022-3341
- https://ubuntu.com/security/CVE-2022-3964
- https://ubuntu.com/security/CVE-2022-3965
- https://ubuntu.com/security/CVE-2022-3341
- https://ubuntu.com/security/CVE-2022-3109
- https://ubuntu.com/security/CVE-2022-3965
- https://ubuntu.com/security/CVE-2022-3964

Title: USN-5928-1: systemd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5928-1
Priorities: medium
Description:
It was discovered that systemd did not properly validate the time and
accuracy values provided to the format_timespan() function. An attacker
could possibly use this issue to cause a buffer overrun, leading to a
denial of service attack. This issue only affected Ubuntu 14.04 ESM, Ubuntu
16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-3821)

It was discovered that systemd did not properly manage the fs.suid_dumpable
kernel configurations. A local attacker could possibly use this issue to
expose sensitive information. This issue only affected Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-4415)

It was discovered that systemd did not properly manage a crash with long
backtrace data. A local attacker could possibly use this issue to cause a
deadlock, leading to a denial of service attack. This issue only affected
Ubuntu 22.10. (CVE-2022-45873)
CVEs:
- https://ubuntu.com/security/CVE-2022-3821
- https://ubuntu.com/security/CVE-2022-4415
- https://ubuntu.com/security/CVE-2022-45873
- https://ubuntu.com/security/CVE-2022-3821
- https://ubuntu.com/security/CVE-2022-45873
- https://ubuntu.com/security/CVE-2022-4415

Title: LSN-0092-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0092-1
Priorities: high
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-4378)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2022-42896)

It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2022-43945)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-43945

Title: USN-5855-2: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5855-2
Priorities: medium
Description:
USN-5855-1 fixed a vulnerability in ImageMagick. This update provides
the corresponding update for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu
22.10.

Original advisory details:

It was discovered that ImageMagick incorrectly handled certain PNG images.
If a user or automated system were tricked into opening a specially crafted
PNG file, an attacker could use this issue to cause ImageMagick to stop
responding, resulting in a denial of service, or possibly obtain the
contents of arbitrary files by including them into images.
CVEs:
- https://ubuntu.com/security/CVE-2022-44267
- https://ubuntu.com/security/CVE-2022-44268

Title: USN-5937-1: Opusfile vulnerability
URL: https://ubuntu.com/security/notices/USN-5937-1
Priorities: medium
Description:
It was discovered that Opusfile was not properly validating pointer
arguments in some of its functions, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or have other unspecified impacts.
CVEs:
- https://ubuntu.com/security/CVE-2022-47021

Title: USN-5963-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5963-1
Priorities: medium
Description:
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 18.04
LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-47024,
CVE-2023-0049, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433)

It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 22.04
LTS, and Ubuntu 22.10. (CVE-2023-0051)

It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2023-1170, CVE-2023-1175)

It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 20.04
LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2023-1264)
CVEs:
- https://ubuntu.com/security/CVE-2022-47024
- https://ubuntu.com/security/CVE-2023-0049
- https://ubuntu.com/security/CVE-2023-0054
- https://ubuntu.com/security/CVE-2023-0288
- https://ubuntu.com/security/CVE-2023-0433
- https://ubuntu.com/security/CVE-2023-0051
- https://ubuntu.com/security/CVE-2023-1170
- https://ubuntu.com/security/CVE-2023-1175
- https://ubuntu.com/security/CVE-2023-1264
- https://ubuntu.com/security/CVE-2023-0054
- https://ubuntu.com/security/CVE-2023-1175
- https://ubuntu.com/security/CVE-2023-0049
- https://ubuntu.com/security/CVE-2023-1264
- https://ubuntu.com/security/CVE-2023-0433
- https://ubuntu.com/security/CVE-2022-47024
- https://ubuntu.com/security/CVE-2023-0051
- https://ubuntu.com/security/CVE-2023-0288
- https://ubuntu.com/security/CVE-2023-1170

Title: USN-5938-1: Linux kernel (GKE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5938-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)

Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)

It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)

Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)

It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)

It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)

It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)

It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)

Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2023-0179

Title: USN-5941-1: Linux kernel (KVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5941-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)

Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)

It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)

Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)

It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)

It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)

It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)

It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)

Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3169

Title: USN-5935-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5935-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)

Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)

It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)

Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)

It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)

It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)

It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)

It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)

Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-4139

Title: USN-5962-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5962-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)

Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)

It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)

Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)

It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)

It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)

It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)

It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)

Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)

It was discovered that the file system writeback functionality in the Linux
kernel contained a user-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2023-26605)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2023-26605
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2023-26605
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2023-0461

Title: USN-5943-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5943-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-0616, CVE-2023-25735,
CVE-2023-25737, CVE-2023-25739, CVE-2023-25729, CVE-2023-25742,
CVE-2023-25746)

Johan Carlsson discovered that Thunderbird did not properly implement CSP
policy on a header when using iframes. An attacker could potentially
exploits this to exfiltrate data. (CVE-2023-25728)

Irvan Kurniawan discovered that Thunderbird was not properly handling
background fullscreen scripts when the window goes into fullscreen mode.
An attacker could possibly use this issue to spoof the user and obtain
sensitive information. (CVE-2023-25730)

Christian Holler discovered that Thunderbird did not properly check the
Safe Bag attributes in PKCS 12 certificate bundle. An attacker could
possibly use this issue to write to arbitrary memory by sending malicious
PKCS 12 certificate. (CVE-2023-0767)

Ronald Crane discovered that Thunderbird did not properly check the size of
the input being encoded in xpcom. An attacker could possibly use this issue
to perform out of bound memory write operations. (CVE-2023-25732)
CVEs:
- https://ubuntu.com/security/CVE-2023-0616
- https://ubuntu.com/security/CVE-2023-25735
- https://ubuntu.com/security/CVE-2023-25737
- https://ubuntu.com/security/CVE-2023-25739
- https://ubuntu.com/security/CVE-2023-25729
- https://ubuntu.com/security/CVE-2023-25742
- https://ubuntu.com/security/CVE-2023-25746
- https://ubuntu.com/security/CVE-2023-25728
- https://ubuntu.com/security/CVE-2023-25730
- https://ubuntu.com/security/CVE-2023-0767
- https://ubuntu.com/security/CVE-2023-25732
- https://ubuntu.com/security/CVE-2023-25737
- https://ubuntu.com/security/CVE-2023-25729
- https://ubuntu.com/security/CVE-2023-0767
- https://ubuntu.com/security/CVE-2023-25728
- https://ubuntu.com/security/CVE-2023-25739
- https://ubuntu.com/security/CVE-2023-25735
- https://ubuntu.com/security/CVE-2023-25746
- https://ubuntu.com/security/CVE-2023-0616
- https://ubuntu.com/security/CVE-2023-25732
- https://ubuntu.com/security/CVE-2023-25742
- https://ubuntu.com/security/CVE-2023-25730

Title: USN-5923-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5923-1
Priorities: medium
Description:
It was discovered that LibTIFF could be made to read out of bounds when
processing certain malformed image files with the tiffcrop tool. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service. (CVE-2023-0795, CVE-2023-0796, CVE-2023-0797,
CVE-2023-0798, CVE-2023-0799)

It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files with the tiffcrop tool. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2023-0800,
CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804)
CVEs:
- https://ubuntu.com/security/CVE-2023-0795
- https://ubuntu.com/security/CVE-2023-0796
- https://ubuntu.com/security/CVE-2023-0797
- https://ubuntu.com/security/CVE-2023-0798
- https://ubuntu.com/security/CVE-2023-0799
- https://ubuntu.com/security/CVE-2023-0800
- https://ubuntu.com/security/CVE-2023-0801
- https://ubuntu.com/security/CVE-2023-0802
- https://ubuntu.com/security/CVE-2023-0803
- https://ubuntu.com/security/CVE-2023-0804
- https://ubuntu.com/security/CVE-2023-0802
- https://ubuntu.com/security/CVE-2023-0796
- https://ubuntu.com/security/CVE-2023-0803
- https://ubuntu.com/security/CVE-2023-0799
- https://ubuntu.com/security/CVE-2023-0800
- https://ubuntu.com/security/CVE-2023-0801
- https://ubuntu.com/security/CVE-2023-0798
- https://ubuntu.com/security/CVE-2023-0795
- https://ubuntu.com/security/CVE-2023-0797
- https://ubuntu.com/security/CVE-2023-0804

Title: USN-5933-1: Libtpms vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5933-1
Priorities: medium
Description:
Francisco Falcon discovered that Libtpms did not properly manage memory
when performing certain cryptographic operations. An attacker could
possibly use this issue to cause a denial of service, or possibly execute
arbitrary code. (CVE-2023-1017, CVE-2023-1018)

It was discovered that Libtpms did not properly manage memory when
handling certain commands. An attacker could possibly use this issue
to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-1017
- https://ubuntu.com/security/CVE-2023-1018
- https://ubuntu.com/security/CVE-2023-1017
- https://ubuntu.com/security/CVE-2023-1018

Title: USN-5948-1: Werkzeug vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5948-1
Priorities: medium
Description:
It was discovered that Werkzeug did not properly handle the parsing of
nameless cookies. A remote attacker could possibly use this issue to
shadow other cookies. (CVE-2023-23934)

It was discovered that Werkzeug could be made to process unlimited number
of multipart form data parts. A remote attacker could possibly use this
issue to cause Werkzeug to consume resources, leading to a denial of
service. (CVE-2023-25577)
CVEs:
- https://ubuntu.com/security/CVE-2023-23934
- https://ubuntu.com/security/CVE-2023-25577
- https://ubuntu.com/security/CVE-2023-23934
- https://ubuntu.com/security/CVE-2023-25577

Title: USN-5960-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-5960-1
Priorities: medium
Description:
Yebo Cao discovered that Python incorrectly handled certain URLs.
An attacker could possibly use this issue to bypass blocklisting
methods by supplying a URL that starts with blank characters.
CVEs:
- https://ubuntu.com/security/CVE-2023-24329

Title: USN-5942-1: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5942-1
Priorities: medium
Description:
Lars Krapf discovered that the Apache HTTP Server mod_proxy module
incorrectly handled certain configurations. A remote attacker could
possibly use this issue to perform an HTTP Request Smuggling attack.
(CVE-2023-25690)

Dimas Fariski Setyawan Putra discovered that the Apache HTTP Server
mod_proxy_uwsgi module incorrectly handled certain special characters. A
remote attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04
LTS, and Ubuntu 22.10. (CVE-2023-27522)
CVEs:
- https://ubuntu.com/security/CVE-2023-25690
- https://ubuntu.com/security/CVE-2023-27522
- https://ubuntu.com/security/CVE-2023-27522
- https://ubuntu.com/security/CVE-2023-25690

Title: USN-5964-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5964-1
Priorities: low,medium
Description:
Harry Sintonen discovered that curl incorrectly handled certain TELNET
connection options. Due to lack of proper input scrubbing, curl could pass
on user name and telnet options to the server as provided, contrary to
expectations. (CVE-2023-27533)

Harry Sintonen discovered that curl incorrectly handled special tilde
characters when used with SFTP paths. A remote attacker could possibly use
this issue to circumvent filtering. (CVE-2023-27534)

Harry Sintonen discovered that curl incorrectly reused certain FTP
connections. This could lead to the wrong credentials being reused,
contrary to expectations. (CVE-2023-27535)

Harry Sintonen discovered that curl incorrectly reused connections when the
GSS delegation option had been changed. This could lead to the option being
reused, contrary to expectations. (CVE-2023-27536)

Harry Sintonen discovered that curl incorrectly reused certain SSH
connections. This could lead to the wrong credentials being reused,
contrary to expectations. (CVE-2023-27538)
CVEs:
- https://ubuntu.com/security/CVE-2023-27533
- https://ubuntu.com/security/CVE-2023-27534
- https://ubuntu.com/security/CVE-2023-27535
- https://ubuntu.com/security/CVE-2023-27536
- https://ubuntu.com/security/CVE-2023-27538
- https://ubuntu.com/security/CVE-2023-27533
- https://ubuntu.com/security/CVE-2023-27534
- https://ubuntu.com/security/CVE-2023-27536
- https://ubuntu.com/security/CVE-2023-27535
- https://ubuntu.com/security/CVE-2023-27538

1.93

Available in the Broadcom Support portal

Release Date: March 07, 2023

Metadata:

BOSH Agent Version: 2.514.0

USNs:


Title: USN-5882-1: DCMTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5882-1
Priorities: medium,low
Description:
Gjoko Krstic discovered that DCMTK incorrectly handled buffers. If a user or
an automated system were tricked into opening a certain specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-8979)

Omar Ganiev discovered that DCMTK incorrectly handled buffers. If a user or
an automated system were tricked into opening a certain specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2019-1010228)

Jinsheng Ba discovered that DCMTK incorrectly handled certain requests. If a
user or an automated system were tricked into opening a certain specially
crafted input file, a remote attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2021-41687,
CVE-2021-41688, CVE-2021-41689, and CVE-2021-41690)

Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled
certain inputs. If a user or an automated system were tricked into opening
a certain specially crafted input file, a remote attacker could possibly use
this issue to execute arbitrary code. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-2119 and CVE-2022-2120)

Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled
pointers. If a user or an automated system were tricked into opening a
certain specially crafted input file, a remote attacker could possibly use
this issue to cause a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-2121)

It was discovered that DCMTK incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a certain specially
crafted input file, a remote attacker could possibly use this issue to
cause a denial of service. This issue affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10.
(CVE-2022-43272)
CVEs:
- https://ubuntu.com/security/CVE-2015-8979
- https://ubuntu.com/security/CVE-2019-1010228
- https://ubuntu.com/security/CVE-2021-41687
- https://ubuntu.com/security/CVE-2021-41688
- https://ubuntu.com/security/CVE-2021-41689
- https://ubuntu.com/security/CVE-2021-41690
- https://ubuntu.com/security/CVE-2022-2119
- https://ubuntu.com/security/CVE-2022-2120
- https://ubuntu.com/security/CVE-2022-2121
- https://ubuntu.com/security/CVE-2022-43272
- https://ubuntu.com/security/CVE-2021-41689
- https://ubuntu.com/security/CVE-2022-43272
- https://ubuntu.com/security/CVE-2021-41687
- https://ubuntu.com/security/CVE-2019-1010228
- https://ubuntu.com/security/CVE-2022-2119
- https://ubuntu.com/security/CVE-2021-41688
- https://ubuntu.com/security/CVE-2015-8979
- https://ubuntu.com/security/CVE-2022-2121
- https://ubuntu.com/security/CVE-2022-2120
- https://ubuntu.com/security/CVE-2021-41690

Title: USN-5904-1: SoX vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5904-1
Priorities: medium,low
Description:
Helmut Grohne discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
and Ubuntu 18.04 LTS. (CVE-2019-13590)

Helmut Grohne discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2021-23159, CVE-2021-23172, CVE-2021-23210,
CVE-2021-33844, CVE-2021-3643, CVE-2021-40426, CVE-2022-31650, and
CVE-2022-31651)
CVEs:
- https://ubuntu.com/security/CVE-2019-13590
- https://ubuntu.com/security/CVE-2021-23159
- https://ubuntu.com/security/CVE-2021-23172
- https://ubuntu.com/security/CVE-2021-23210
- https://ubuntu.com/security/CVE-2021-33844
- https://ubuntu.com/security/CVE-2021-3643
- https://ubuntu.com/security/CVE-2021-40426
- https://ubuntu.com/security/CVE-2022-31650
- https://ubuntu.com/security/CVE-2022-31651
- https://ubuntu.com/security/CVE-2021-3643
- https://ubuntu.com/security/CVE-2021-23172
- https://ubuntu.com/security/CVE-2021-23159
- https://ubuntu.com/security/CVE-2022-31650
- https://ubuntu.com/security/CVE-2019-13590
- https://ubuntu.com/security/CVE-2021-40426
- https://ubuntu.com/security/CVE-2021-33844
- https://ubuntu.com/security/CVE-2021-23210
- https://ubuntu.com/security/CVE-2022-31651

Title: USN-5889-1: ZoneMinder vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5889-1
Priorities: medium,high
Description:
It was discovered that ZoneMinder was not properly sanitizing URL
parameters for certain views. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 16.04 ESM. (CVE-2019-6777)

It was discovered that ZoneMinder was not properly sanitizing stored user
input later printed to the user in certain views. An attacker could
possibly use this issue to perform a cross-site scripting (XSS) attack.
This issue was only fixed in Ubuntu 16.04 ESM. (CVE-2019-6990,
CVE-2019-6992)

It was discovered that ZoneMinder was not properly limiting data size and
not properly performing bound checks when processing username and password
data, which could lead to a stack buffer overflow. An attacker could
possibly use this issue to bypass authentication, cause a denial of
service or execute arbitrary code. This issue was only fixed in Ubuntu
16.04 ESM. (CVE-2019-6991)

It was discovered that ZoneMinder was not properly defining and filtering
data that was appended to the webroot URL of a view. An attacker could
possibly use this issue to perform cross-site scripting (XSS) attacks.
This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 20.04 ESM.
(CVE-2019-7325, CVE-2019-7329)

It was discovered that ZoneMinder was not properly sanitizing stored user
input later printed to the user in certain views. An attacker could
possibly use this issue to perform a cross-site scripting (XSS) attack.
This issue was only fixed in Ubuntu 20.04 ESM. (CVE-2019-7326)

It was discovered that ZoneMinder was not properly sanitizing URL
parameters for certain views. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 20.04 ESM. (CVE-2019-7327, CVE-2019-7328, CVE-2019-7330,
CVE-2019-7332)

It was discovered that ZoneMinder was not properly sanitizing user input
in the monitor editing view. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 16.04 ESM and Ubuntu 20.04 ESM. (CVE-2019-7331)

It was discovered that ZoneMinder was not properly sanitizing data related
to file paths in a system. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-29806)
CVEs:
- https://ubuntu.com/security/CVE-2019-6777
- https://ubuntu.com/security/CVE-2019-6990
- https://ubuntu.com/security/CVE-2019-6992
- https://ubuntu.com/security/CVE-2019-6991
- https://ubuntu.com/security/CVE-2019-7325
- https://ubuntu.com/security/CVE-2019-7329
- https://ubuntu.com/security/CVE-2019-7326
- https://ubuntu.com/security/CVE-2019-7327
- https://ubuntu.com/security/CVE-2019-7328
- https://ubuntu.com/security/CVE-2019-7330
- https://ubuntu.com/security/CVE-2019-7332
- https://ubuntu.com/security/CVE-2019-7331
- https://ubuntu.com/security/CVE-2022-29806
- https://ubuntu.com/security/CVE-2019-7332
- https://ubuntu.com/security/CVE-2019-7326
- https://ubuntu.com/security/CVE-2019-7328
- https://ubuntu.com/security/CVE-2019-7330
- https://ubuntu.com/security/CVE-2019-7329
- https://ubuntu.com/security/CVE-2019-6777
- https://ubuntu.com/security/CVE-2019-7325
- https://ubuntu.com/security/CVE-2019-6991
- https://ubuntu.com/security/CVE-2019-6992
- https://ubuntu.com/security/CVE-2019-7327
- https://ubuntu.com/security/CVE-2019-6990
- https://ubuntu.com/security/CVE-2019-7331
- https://ubuntu.com/security/CVE-2022-29806

Title: USN-5889-1: ZoneMinder vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5889-1
Priorities: medium,high
Description:
It was discovered that ZoneMinder was not properly sanitizing URL
parameters for certain views. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 16.04 ESM. (CVE-2019-6777)

It was discovered that ZoneMinder was not properly sanitizing stored user
input later printed to the user in certain views. An attacker could
possibly use this issue to perform a cross-site scripting (XSS) attack.
This issue was only fixed in Ubuntu 16.04 ESM. (CVE-2019-6990,
CVE-2019-6992)

It was discovered that ZoneMinder was not properly limiting data size and
not properly performing bound checks when processing username and password
data, which could lead to a stack buffer overflow. An attacker could
possibly use this issue to bypass authentication, cause a denial of
service or execute arbitrary code. This issue was only fixed in Ubuntu
16.04 ESM. (CVE-2019-6991)

It was discovered that ZoneMinder was not properly defining and filtering
data that was appended to the webroot URL of a view. An attacker could
possibly use this issue to perform cross-site scripting (XSS) attacks.
This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 20.04 LTS.
(CVE-2019-7325, CVE-2019-7329)

It was discovered that ZoneMinder was not properly sanitizing stored user
input later printed to the user in certain views. An attacker could
possibly use this issue to perform a cross-site scripting (XSS) attack.
This issue was only fixed in Ubuntu 20.04 LTS. (CVE-2019-7326)

It was discovered that ZoneMinder was not properly sanitizing URL
parameters for certain views. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 20.04 LTS. (CVE-2019-7327, CVE-2019-7328, CVE-2019-7330,
CVE-2019-7332)

It was discovered that ZoneMinder was not properly sanitizing user input
in the monitor editing view. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 16.04 ESM and Ubuntu 20.04 LTS. (CVE-2019-7331)

It was discovered that ZoneMinder was not properly sanitizing data related
to file paths in a system. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-29806)
CVEs:
- https://ubuntu.com/security/CVE-2019-6777
- https://ubuntu.com/security/CVE-2019-6990
- https://ubuntu.com/security/CVE-2019-6992
- https://ubuntu.com/security/CVE-2019-6991
- https://ubuntu.com/security/CVE-2019-7325
- https://ubuntu.com/security/CVE-2019-7329
- https://ubuntu.com/security/CVE-2019-7326
- https://ubuntu.com/security/CVE-2019-7327
- https://ubuntu.com/security/CVE-2019-7328
- https://ubuntu.com/security/CVE-2019-7330
- https://ubuntu.com/security/CVE-2019-7332
- https://ubuntu.com/security/CVE-2019-7331
- https://ubuntu.com/security/CVE-2022-29806
- https://ubuntu.com/security/CVE-2019-7332
- https://ubuntu.com/security/CVE-2019-7326
- https://ubuntu.com/security/CVE-2019-7328
- https://ubuntu.com/security/CVE-2019-7330
- https://ubuntu.com/security/CVE-2019-7329
- https://ubuntu.com/security/CVE-2019-6777
- https://ubuntu.com/security/CVE-2019-7325
- https://ubuntu.com/security/CVE-2019-6991
- https://ubuntu.com/security/CVE-2019-6992
- https://ubuntu.com/security/CVE-2019-7327
- https://ubuntu.com/security/CVE-2019-6990
- https://ubuntu.com/security/CVE-2019-7331
- https://ubuntu.com/security/CVE-2022-29806

Title: USN-5873-1: Go Text vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5873-1
Priorities: low,medium
Description:
It was discovered that Go Text incorrectly handled certain encodings. An
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-14040)

It was discovered that Go Text incorrectly handled certain BCP 47 language
tags. An attacker could possibly use this issue to cause a denial of service.
CVE-2020-28851, CVE-2020-28852 and CVE-2021-38561 affected only
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2020-28851, CVE-2020-28852, CVE-2021-38561, CVE-2022-32149)
CVEs:
- https://ubuntu.com/security/CVE-2020-14040
- https://ubuntu.com/security/CVE-2020-28851
- https://ubuntu.com/security/CVE-2020-28852
- https://ubuntu.com/security/CVE-2021-38561
- https://ubuntu.com/security/CVE-2020-28851
- https://ubuntu.com/security/CVE-2020-28852
- https://ubuntu.com/security/CVE-2021-38561
- https://ubuntu.com/security/CVE-2022-32149
- https://ubuntu.com/security/CVE-2020-14040
- https://ubuntu.com/security/CVE-2020-28852
- https://ubuntu.com/security/CVE-2020-28851
- https://ubuntu.com/security/CVE-2022-32149
- https://ubuntu.com/security/CVE-2021-38561

Title: USN-5847-1: Grunt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5847-1
Priorities: medium,high
Description:
It was discovered that Grunt was not properly loading YAML files before
parsing them. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2020-7729)

It was discovered that Grunt was not properly handling symbolic links
when performing file copy operations. An attacker could possibly use this
issue to expose sensitive information or execute arbitrary code.
(CVE-2022-0436)

It was discovered that there was a race condition in the Grunt file copy
function, which could lead to an arbitrary file write. An attacker could
possibly use this issue to perform a local privilege escalation attack or
to execute arbitrary code. (CVE-2022-1537)
CVEs:
- https://ubuntu.com/security/CVE-2020-7729
- https://ubuntu.com/security/CVE-2022-0436
- https://ubuntu.com/security/CVE-2022-1537
- https://ubuntu.com/security/CVE-2020-7729
- https://ubuntu.com/security/CVE-2022-0436
- https://ubuntu.com/security/CVE-2022-1537

Title: USN-5886-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5886-1
Priorities: medium
Description:
Erik C. Bjorge discovered that some Intel(R) Atom and Intel Xeon Scalable
Processors did not properly implement access controls for out-of-band
management. This may allow a privileged network-adjacent user to potentially
escalate privileges. (CVE-2022-21216)

Cfir Cohen, Erdem Aktas, Felix Wilhelm, James Forshaw, Josh Eads, Nagaraju
Kodalapura Nagabhushana Rao, Przemyslaw Duda, Liron Shacham and Ron Anderson
discovered that some Intel(R) Xeon(R) Processors used incorrect default
permissions in some memory controller configurations when using Intel(R)
Software Guard Extensions. This may allow a privileged local user to potentially
escalate privileges. (CVE-2022-33196)

It was discovered that some 3rd Generation Intel(R) Xeon(R) Scalable Processors
did not properly calculate microkey keying. This may allow a privileged local
user to potentially disclose information. (CVE-2022-33972)

Joseph Nuzman discovered that some Intel(R) Processors when using Intel(R)
Software Guard Extensions did not properly isolate shared resources. This may
allow a privileged local user to potentially disclose
information. (CVE-2022-38090)
CVEs:
- https://ubuntu.com/security/CVE-2022-21216
- https://ubuntu.com/security/CVE-2022-33196
- https://ubuntu.com/security/CVE-2022-33972
- https://ubuntu.com/security/CVE-2022-38090
- https://ubuntu.com/security/CVE-2022-33972
- https://ubuntu.com/security/CVE-2022-38090
- https://ubuntu.com/security/CVE-2022-21216
- https://ubuntu.com/security/CVE-2022-33196

Title: USN-5903-1: lighttpd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5903-1
Priorities: low,medium
Description:
It was discovered that lighttpd incorrectly handled certain inputs, which could
result in a stack buffer overflow. A remote attacker could possibly use this
issue to cause a denial of service (DoS). (CVE-2022-22707, CVE-2022-41556)
CVEs:
- https://ubuntu.com/security/CVE-2022-22707
- https://ubuntu.com/security/CVE-2022-41556
- https://ubuntu.com/security/CVE-2022-41556
- https://ubuntu.com/security/CVE-2022-22707

Title: USN-5885-1: APR vulnerability
URL: https://ubuntu.com/security/notices/USN-5885-1
Priorities: medium
Description:
Ronald Crane discovered integer overflow vulnerabilities in the Apache
Portable Runtime (APR) that could potentially result in memory corruption.
A remote attacker could possibly use these issues to cause a denial of
service or execute arbitary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-24963

Title: USN-5870-1: apr-util vulnerability
URL: https://ubuntu.com/security/notices/USN-5870-1
Priorities: medium
Description:
Ronald Crane discovered that APR-util did not properly handled memory when
encoding or decoding certain input data. An attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2022-25147

Title: USN-5921-1: rsync vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5921-1
Priorities: medium
Description:
Koen van Hove discovered that the rsync client incorrectly validated
filenames returned by servers. If a user or automated system were tricked
into connecting to a malicious server, a remote attacker could use this
issue to write arbitrary files, and possibly excalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-29154

Title: USN-5896-1: Rack vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5896-1
Priorities: medium
Description:
It was discovered that Rack was not properly parsing data when processing
multipart POST requests. If a user or automated system were tricked into
sending a specially crafted multipart POST request to an application using
Rack, a remote attacker could possibly use this issue to cause a denial of
service. (CVE-2022-30122)

It was discovered that Rack was not properly escaping untrusted data when
performing logging operations, which could cause shell escaped sequences
to be written to a terminal. If a user or automated system were tricked
into sending a specially crafted request to an application using Rack, a
remote attacker could possibly use this issue to execute arbitrary code in
the machine running the application. (CVE-2022-30123)
CVEs:
- https://ubuntu.com/security/CVE-2022-30122
- https://ubuntu.com/security/CVE-2022-30123
- https://ubuntu.com/security/CVE-2022-30123
- https://ubuntu.com/security/CVE-2022-30122

Title: USN-5892-1: NSS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5892-1
Priorities: low,medium
Description:
It was discovered that NSS incorrectly handled client authentication
without a user certificate in the database. A remote attacker could
possibly use this issue to cause a NSS client to crash, resulting in a
denial of service. This issue only affected Ubuntu 22.10. (CVE-2022-3479)

Christian Holler discovered that NSS incorrectly handled certain PKCS 12
certificated bundles. A remote attacker could use this issue to cause NSS
to crash, leading to a denial of service, or possibly execute arbitrary
code. (CVE-2023-0767)
CVEs:
- https://ubuntu.com/security/CVE-2022-3479
- https://ubuntu.com/security/CVE-2023-0767
- https://ubuntu.com/security/CVE-2022-3479
- https://ubuntu.com/security/CVE-2023-0767

Title: USN-5851-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5851-1
Priorities: medium
Description:
It was discovered that a memory leak existed in the Unix domain socket
implementation of the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2022-3543)

It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)

It was discovered that the hugetlb implementation in the Linux kernel
contained a race condition in some situations. A local attacker could use
this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2022-3623)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)

It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)

It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

Arnaud Gatignol, Quentin Minster, Florent Saudel and Guillaume Teissier
discovered that the KSMBD implementation in the Linux kernel did not
properly validate user-supplied data in some situations. An authenticated
attacker could use this to cause a denial of service (system crash), expose
sensitive information (kernel memory) or possibly execute arbitrary code.
(CVE-2022-47940)

It was discovered that a race condition existed in the qdisc implementation
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0590)
CVEs:
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-47940
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-47940
- https://ubuntu.com/security/CVE-2022-3628

Title: USN-5876-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5876-1
Priorities: medium,low
Description:
It was discovered that a memory leak existed in the Unix domain socket
implementation of the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2022-3543)

It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)

It was discovered that the hugetlb implementation in the Linux kernel
contained a race condition in some situations. A local attacker could use
this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2022-3623)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)

It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)

It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

Arnaud Gatignol, Quentin Minster, Florent Saudel and Guillaume Teissier
discovered that the KSMBD implementation in the Linux kernel did not
properly validate user-supplied data in some situations. An authenticated
attacker could use this to cause a denial of service (system crash), expose
sensitive information (kernel memory) or possibly execute arbitrary code.
(CVE-2022-47940)

It was discovered that a race condition existed in the qdisc implementation
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0590)
CVEs:
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-47940
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-47940

Title: USN-5895-1: MPlayer vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5895-1
Priorities: medium
Description:
It was discovered that MPlayer could be made to divide by zero when
processing certain malformed media files. If a user were tricked into
opening a specially crafted media file, an attacker could possibly use
this issue to cause MPlayer to crash, resulting in a denial of service.
(CVE-2022-38850, CVE-2022-38860, CVE-2022-38865)

It was discovered that MPlayer could be made to read out of bounds when
processing certain malformed media files. If a user were tricked into
opening a specially crafted media file, an attacker could possibly use
this issue to cause MPlayer to crash, resulting in a denial of service.
(CVE-2022-38851)

It was discovered that MPlayer could be made to write out of bounds when
processing certain malformed media files. If a user were tricked into
opening a specially crafted media file, an attacker could possibly use
this issue to cause MPlayer to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2022-38855, CVE-2022-38858,
CVE-2022-38863, CVE-2022-38864, CVE-2022-38866)

It was discovered that MPlayer did not properly managed memory when
processing certain malformed media files. If a user were tricked into
opening a specially crafted media file, an attacker could possibly use
this issue to cause MPlayer to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2022-38861)
CVEs:
- https://ubuntu.com/security/CVE-2022-38850
- https://ubuntu.com/security/CVE-2022-38860
- https://ubuntu.com/security/CVE-2022-38865
- https://ubuntu.com/security/CVE-2022-38851
- https://ubuntu.com/security/CVE-2022-38855
- https://ubuntu.com/security/CVE-2022-38858
- https://ubuntu.com/security/CVE-2022-38863
- https://ubuntu.com/security/CVE-2022-38864
- https://ubuntu.com/security/CVE-2022-38866
- https://ubuntu.com/security/CVE-2022-38861
- https://ubuntu.com/security/CVE-2022-38851
- https://ubuntu.com/security/CVE-2022-38860
- https://ubuntu.com/security/CVE-2022-38855
- https://ubuntu.com/security/CVE-2022-38861
- https://ubuntu.com/security/CVE-2022-38865
- https://ubuntu.com/security/CVE-2022-38863
- https://ubuntu.com/security/CVE-2022-38864
- https://ubuntu.com/security/CVE-2022-38858
- https://ubuntu.com/security/CVE-2022-38866
- https://ubuntu.com/security/CVE-2022-38850

Title: USN-5821-3: pip regression
URL: https://ubuntu.com/security/notices/USN-5821-3
Priorities: medium
Description:
USN-5821-1 fixed a vulnerability in wheel and pip. Unfortunately,
it was missing a commit to fix it properly in pip.

We apologize for the inconvenience.

Original advisory details:

Sebastian Chnelik discovered that wheel incorrectly handled
certain file names when validated against a regex expression.
An attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40898

Title: USN-5890-1: Open vSwitch vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5890-1
Priorities: medium
Description:
Qian Chen discovered that Open vSwitch incorrectly handled certain
Organization Specific TLVs. A remote attacker could use this issue to cause
Open vSwitch to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-4338
- https://ubuntu.com/security/CVE-2022-4337

Title: USN-5860-1: Linux kernel (GKE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5860-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that a memory leak existed in the Unix domain socket
implementation of the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2022-3543)

It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)

It was discovered that the hugetlb implementation in the Linux kernel
contained a race condition in some situations. A local attacker could use
this to cause a denial of service (system crash) or expose sensitive
information (kernel memory). (CVE-2022-3623)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)

It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)

Arnaud Gatignol, Quentin Minster, Florent Saudel and Guillaume Teissier
discovered that the KSMBD implementation in the Linux kernel did not
properly validate user-supplied data in some situations. An authenticated
attacker could use this to cause a denial of service (system crash), expose
sensitive information (kernel memory) or possibly execute arbitrary code.
(CVE-2022-47940)

It was discovered that a race condition existed in the qdisc implementation
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0590)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-47940
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-3623
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3543
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-47940
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-4378

Title: USN-5879-1: Linux kernel (HWE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5879-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)

It was discovered that a race condition existed in the qdisc implementation
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0590)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2023-0590
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-3640

Title: USN-5899-1: AWStats vulnerability
URL: https://ubuntu.com/security/notices/USN-5899-1
Priorities: low
Description:
It was discovered that AWStats did not properly sanitize the content of
whois responses in the hostinfo plugin. An attacker could possibly use
this issue to conduct cross-site scripting (XSS) attacks.
CVEs:
- https://ubuntu.com/security/CVE-2022-46391

Title: USN-5857-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5857-1
Priorities: high
Description:
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-0179

Title: USN-5856-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5856-1
Priorities: high,medium
Description:
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)

Hu Jiahui discovered that multiple race conditions existed in the Advanced
Linux Sound Architecture (ALSA) framework, leading to use-after-free
vulnerabilities. A local attacker could use these to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-1048)

It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)
CVEs:
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-1048
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-1048

Title: USN-5858-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5858-1
Priorities: high,medium
Description:
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2023-0179

Title: USN-5844-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5844-1
Priorities: high,medium
Description:
David Benjamin discovered that OpenSSL incorrectly handled X.400 address
processing. A remote attacker could possibly use this issue to read
arbitrary memory contents or cause OpenSSL to crash, resulting in a denial
of service. (CVE-2023-0286)

Corey Bonnell discovered that OpenSSL incorrectly handled X.509 certificate
verification. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-4203)

Hubert Kario discovered that OpenSSL had a timing based side channel in the
OpenSSL RSA Decryption implementation. A remote attacker could possibly use
this issue to recover sensitive information. (CVE-2022-4304)

Dawei Wang discovered that OpenSSL incorrectly handled parsing certain PEM
data. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. (CVE-2022-4450)

Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly
handled streaming ASN.1 data. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-0215)

Marc Schönefeld discovered that OpenSSL incorrectly handled malformed PKCS7
data. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2023-0216)

Kurt Roeckx discovered that OpenSSL incorrectly handled validating certain
DSA public keys. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0217)

Hubert Kario and Dmitry Belyavsky discovered that OpenSSL incorrectly
validated certain signatures. A remote attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0401)
CVEs:
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2022-4203
- https://ubuntu.com/security/CVE-2022-4304
- https://ubuntu.com/security/CVE-2022-4450
- https://ubuntu.com/security/CVE-2023-0215
- https://ubuntu.com/security/CVE-2023-0216
- https://ubuntu.com/security/CVE-2023-0217
- https://ubuntu.com/security/CVE-2023-0401
- https://ubuntu.com/security/CVE-2023-0217
- https://ubuntu.com/security/CVE-2022-4304
- https://ubuntu.com/security/CVE-2023-0215
- https://ubuntu.com/security/CVE-2022-4450
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2023-0401
- https://ubuntu.com/security/CVE-2022-4203
- https://ubuntu.com/security/CVE-2023-0216

Title: USN-5912-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5912-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)

Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)

It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)

Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)

It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)

It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)

It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)

It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)

Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-0468)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3169

Title: USN-5911-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5911-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)

Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-0179)

It was discovered that the NVMe driver in the Linux kernel did not properly
handle reset events in some situations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2022-3169)

Maxim Levitsky discovered that the KVM nested virtualization (SVM)
implementation for AMD processors in the Linux kernel did not properly
handle nested shutdown execution. An attacker in a guest vm could use this
to cause a denial of service (host kernel crash) (CVE-2022-3344)

Gwangun Jung discovered a race condition in the IPv4 implementation in the
Linux kernel when deleting multipath routes, resulting in an out-of-bounds
read. An attacker could use this to cause a denial of service (system
crash) or possibly expose sensitive information (kernel memory).
(CVE-2022-3435)

It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-4139)

It was discovered that the NFSD implementation in the Linux kernel
contained a use-after-free vulnerability. A remote attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2022-4379)

It was discovered that a race condition existed in the x86 KVM subsystem
implementation in the Linux kernel when nested virtualization and the TDP
MMU are enabled. An attacker in a guest vm could use this to cause a denial
of service (host OS crash). (CVE-2022-45869)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate the number of channels, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47518)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to an out-of-bounds
write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-47519)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate offsets, leading to an out-of-bounds read
vulnerability. An attacker could use this to cause a denial of service
(system crash). (CVE-2022-47520)

It was discovered that the Atmel WILC1000 driver in the Linux kernel did
not properly validate specific attributes, leading to a heap-based buffer
overflow. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2022-47521)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2022-3169
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3344
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3435
- https://ubuntu.com/security/CVE-2022-45869
- https://ubuntu.com/security/CVE-2022-47518
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-47519
- https://ubuntu.com/security/CVE-2022-4139
- https://ubuntu.com/security/CVE-2022-4379
- https://ubuntu.com/security/CVE-2022-47521
- https://ubuntu.com/security/CVE-2022-47520
- https://ubuntu.com/security/CVE-2023-0179

Title: USN-5887-1: ClamAV vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5887-1
Priorities: medium
Description:
Simon Scannell discovered that ClamAV incorrectly handled parsing
HFS+ files. A remote attacker could possibly use this issue
to cause ClamAV to crash, resulting in a denial of service,
or execute arbitrary code. (CVE-2023-20032)

Simon Scannell discovered that ClamAV incorrectly handled parsing
DMG files. A remote attacker could possibly use this issue
to expose sensitive information. (CVE-2023-20052)
CVEs:
- https://ubuntu.com/security/CVE-2023-20032
- https://ubuntu.com/security/CVE-2023-20052
- https://ubuntu.com/security/CVE-2023-20032
- https://ubuntu.com/security/CVE-2023-20052

Title: USN-5898-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5898-1
Priorities: medium,low
Description:
It was discovered that the Serialization component of OpenJDK did not
properly handle the deserialization of some CORBA objects. An attacker
could possibly use this to bypass Java sandbox restrictions.
(CVE-2023-21830)

Markus Loewe discovered that the Java Sound subsystem in OpenJDK did not
properly validate the origin of a Soundbank. An attacker could use this to
specially craft an untrusted Java application or applet that could load a
Soundbank from an attacker controlled remote URL. (CVE-2023-21843)
CVEs:
- https://ubuntu.com/security/CVE-2023-21830
- https://ubuntu.com/security/CVE-2023-21843
- https://ubuntu.com/security/CVE-2023-21830
- https://ubuntu.com/security/CVE-2023-21843

Title: USN-5897-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5897-1
Priorities: medium,low
Description:
Juraj Somorovsky, Marcel Maehren, Nurullah Erinola, and Robert Merget
discovered that the DTLS implementation in the JSSE subsystem of OpenJDK
did not properly restrict handshake initiation requests from clients. A
remote attacker could possibly use this to cause a denial of service.
(CVE-2023-21835)

Markus Loewe discovered that the Java Sound subsystem in OpenJDK did not
properly validate the origin of a Soundbank. An attacker could use this to
specially craft an untrusted Java application or applet that could load a
Soundbank from an attacker controlled remote URL. (CVE-2023-21843)
CVEs:
- https://ubuntu.com/security/CVE-2023-21835
- https://ubuntu.com/security/CVE-2023-21843
- https://ubuntu.com/security/CVE-2023-21843
- https://ubuntu.com/security/CVE-2023-21835

Title: USN-5871-1: Git vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5871-1
Priorities: medium
Description:
It was discovered that Git incorrectly handled certain repositories.
An attacker could use this issue to make Git uses its local
clone optimization even when using a non-local transport.
(CVE-2023-22490)

Joern Schneeweisz discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to overwrite a patch outside
the working tree. (CVE-2023-23946)
CVEs:
- https://ubuntu.com/security/CVE-2023-22490
- https://ubuntu.com/security/CVE-2023-23946
- https://ubuntu.com/security/CVE-2023-23946
- https://ubuntu.com/security/CVE-2023-22490

Title: USN-5867-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5867-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-23517
- https://ubuntu.com/security/CVE-2022-42826
- https://ubuntu.com/security/CVE-2023-23518

Title: USN-5893-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5893-1
Priorities: high
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-23529

Title: USN-5891-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5891-1
Priorities: low,medium
Description:
Harry Sintonen discovered that curl incorrectly handled HSTS support
when multiple URLs are requested serially. A remote attacker could possibly
use this issue to cause curl to use unencrypted connections. This issue
only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2023-23914)

Harry Sintonen discovered that curl incorrectly handled HSTS support
when multiple URLs are requested in parallel. A remote attacker could
possibly use this issue to cause curl to use unencrypted connections. This
issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2023-23915)

Patrick Monnerat discovered that curl incorrectly handled memory when
processing requests with multi-header compression. A remote attacker could
possibly use this issue to cause curl to consume resources, leading to a
denial of service. (CVE-2023-23916)
CVEs:
- https://ubuntu.com/security/CVE-2023-23914
- https://ubuntu.com/security/CVE-2023-23915
- https://ubuntu.com/security/CVE-2023-23916
- https://ubuntu.com/security/CVE-2023-23915
- https://ubuntu.com/security/CVE-2023-23914
- https://ubuntu.com/security/CVE-2023-23916

Title: USN-5868-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-5868-1
Priorities: medium
Description:
Jakob Ackermann discovered that Django incorrectly handled certain file
uploads. A remote attacker could possibly use this issue to cause Django to
consume resources, leading to a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-24580

Title: USN-5869-1: HAProxy vulnerability
URL: https://ubuntu.com/security/notices/USN-5869-1
Priorities: medium
Description:
Bahruz Jabiyev, Anthony Gavazzi, Engin Kirda, Kaan Onarlioglu, Adi Peleg,
and Harvey Tuch discovered that HAProxy incorrectly handled empty header
names. A remote attacker could possibly use this issue to manipulate
headers and bypass certain authentication checks and restrictions.
CVEs:
- https://ubuntu.com/security/CVE-2023-25725

Title: USN-5908-1: Sudo vulnerability
URL: https://ubuntu.com/security/notices/USN-5908-1
Priorities: medium
Description:
It was discovered that Sudo incorrectly handled the per-command chroot
feature. In certain environments where Sudo is configured with a rule that
contains a CHROOT setting, a local attacker could use this issue to cause
Sudo to crash, resulting in a denial of service, or possibly escalate
privileges.
CVEs:
- https://ubuntu.com/security/CVE-2023-27320

1.83

Available in the Broadcom Support portal

Release Date: February 09, 2023

Metadata:

BOSH Agent Version: 2.504.0

USNs:


Title: USN-5828-1: Kerberos vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5828-1
Priorities: medium
Description:
It was discovered that Kerberos incorrectly handled certain S4U2Self
requests. An attacker could possibly use this issue to cause a denial of
service. This issue was only addressed in Ubuntu 16.04 ESM and Ubuntu
18.04 LTS. (CVE-2018-20217)

Greg Hudson discovered that Kerberos PAC implementation incorrectly
handled certain parsing operations. A remote attacker could use this
issue to cause a denial of service, or possibly execute arbitrary code.
(CVE-2022-42898)
CVEs:
- https://ubuntu.com/security/CVE-2018-20217
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2018-20217

Title: USN-5822-1: Samba vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5822-1
Priorities: low,medium,unknown
Description:
It was discovered that Samba incorrectly handled the bad password count
logic. A remote attacker could possibly use this issue to bypass bad
passwords lockouts. This issue was only addressed in Ubuntu 22.10.
(CVE-2021-20251)

Evgeny Legerov discovered that Samba incorrectly handled buffers in
certain GSSAPI routines of Heimdal. A remote attacker could possibly use
this issue to cause Samba to crash, resulting in a denial of service.
(CVE-2022-3437)

Tom Tervoort discovered that Samba incorrectly used weak rc4-hmac Kerberos
keys. A remote attacker could possibly use this issue to elevate
privileges. (CVE-2022-37966, CVE-2022-37967)

It was discovered that Samba supported weak RC4/HMAC-MD5 in NetLogon Secure
Channel. A remote attacker could possibly use this issue to elevate
privileges. (CVE-2022-38023)

Greg Hudson discovered that Samba incorrectly handled PAC parsing. On
32-bit systems, a remote attacker could use this issue to escalate
privileges, or possibly execute arbitrary code. (CVE-2022-42898)

Joseph Sutton discovered that Samba could be forced to issue rc4-hmac
encrypted Kerberos tickets. A remote attacker could possibly use this issue
to escalate privileges. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-45141)

WARNING: The fixes included in these updates introduce several important
behavior changes which may cause compatibility problems interacting with
systems still expecting the former behavior. Please see the following
upstream advisories for more information:

https://www.samba.org/samba/security/CVE-2022-37966.html
https://www.samba.org/samba/security/CVE-2022-37967.html
https://www.samba.org/samba/security/CVE-2022-38023.html
CVEs:
- https://ubuntu.com/security/CVE-2021-20251
- https://ubuntu.com/security/CVE-2022-3437
- https://ubuntu.com/security/CVE-2022-37966
- https://ubuntu.com/security/CVE-2022-37967
- https://ubuntu.com/security/CVE-2022-38023
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2022-45141
- https://www.samba.org/samba/security/CVE-2022-37966
- https://www.samba.org/samba/security/CVE-2022-37967
- https://www.samba.org/samba/security/CVE-2022-38023
- https://ubuntu.com/security/CVE-2022-37966
- https://ubuntu.com/security/CVE-2022-37967
- https://ubuntu.com/security/CVE-2022-38023
- https://ubuntu.com/security/CVE-2021-20251
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2022-3437
- https://ubuntu.com/security/CVE-2022-45141

Title: USN-5806-2: Ruby vulnerability
URL: https://ubuntu.com/security/notices/USN-5806-2
Priorities: medium
Description:
USN-5806-1 fixed vulnerabilities in Ruby. This update fixes the problem
for Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.10.

Original advisory details:

Hiroshi Tokumaru discovered that Ruby did not properly handle certain
user input for applications which generate HTTP responses using cgi gem.
An attacker could possibly use this issue to maliciously modify the
response a user would receive from a vulnerable application.
CVEs:
- https://ubuntu.com/security/CVE-2021-33621

Title: USN-5827-1: Bind vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5827-1
Priorities: medium
Description:
Rob Schulhof discovered that Bind incorrectly handled a large number of
UPDATE messages. A remote attacker could possibly use this issue to cause
Bind to consume resources, resulting in a denial of service.
(CVE-2022-3094)

Borja Marcos discovered that Bind incorrectly handled certain RRSIG
queries. A remote attacker could possibly use this issue to cause Bind to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-3736)

Maksym Odinintsev discovered that Bind incorrectly handled certain answers
from stale cache. A remote attacker could possibly use this issue to cause
Bind to crash, resulting in a denial of service. This issue only affected
Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-3924)
CVEs:
- https://ubuntu.com/security/CVE-2022-3094
- https://ubuntu.com/security/CVE-2022-3736
- https://ubuntu.com/security/CVE-2022-3924
- https://ubuntu.com/security/CVE-2022-3094
- https://ubuntu.com/security/CVE-2022-3924
- https://ubuntu.com/security/CVE-2022-3736

Title: USN-5818-1: PHP vulnerability
URL: https://ubuntu.com/security/notices/USN-5818-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-31631

Title: USN-5817-1: Setuptools vulnerability
URL: https://ubuntu.com/security/notices/USN-5817-1
Priorities: medium
Description:
Sebastian Chnelik discovered that setuptools incorrectly handled
certain regex inputs. An attacker could possibly use this issue
to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40897

Title: USN-5821-1: wheel vulnerability
URL: https://ubuntu.com/security/notices/USN-5821-1
Priorities: medium
Description:
Sebastian Chnelik discovered that wheel incorrectly handled
certain file names when validated against a regex expression.
An attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40898

Title: USN-5833-1: python-future vulnerability
URL: https://ubuntu.com/security/notices/USN-5833-1
Priorities: medium
Description:
Sebastian Chnelik discovered that python-future incorrectly handled
certain HTTP header field. An attacker could possibly use this issue
to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40899

Title: USN-5831-1: Linux kernel (Azure CVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5831-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934

Title: USN-5814-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5814-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643

Title: USN-5820-1: exuberant-ctags vulnerability
URL: https://ubuntu.com/security/notices/USN-5820-1
Priorities: medium
Description:
Lorenz Hipp discovered a flaw in exuberant-ctags handling of the tag
filename command-line argument. A crafted tag filename specified
in the command line or in the configuration file could result in
arbitrary command execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-4515

Title: USN-5824-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5824-1
Priorities: medium,unknown
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2022-45403, CVE-2022-45404,
CVE-2022-45405, CVE-2022-45406, CVE-2022-45408, CVE-2022-45409,
CVE-2022-45410, CVE-2022-45411, CVE-2022-45418, CVE-2022-45420,
CVE-2022-45421, CVE-2022-46878, CVE-2022-46880, CVE-2022-46881,
CVE-2022-46882, CVE-2023-23605)

Armin Ebert discovered that Thunderbird did not properly manage memory
while resolving file symlink. If a user were tricked into opening a
specially crafted weblink, an attacker could potentially exploit these to
cause a denial of service. (CVE-2022-45412)

Sarah Jamie Lewis discovered that Thunderbird did not properly manage
network request while handling HTML emails with certain tags. If a user
were tricked into opening a specially HTML email, an attacker could
potentially exploit these issue and load remote content regardless of a
configuration to block remote content. (CVE-2022-45414)

Erik Kraft, Martin Schwarzl, and Andrew McCreight discovered that
Thunderbird incorrectly handled keyboard events. An attacker could possibly
use this issue to perform a timing side-channel attack and possibly figure
out which keys are being pressed. (CVE-2022-45416)

It was discovered that Thunderbird was using an out-of-date libusrsctp
library. An attacker could possibly use this library to perform a
reentrancy issue on Thunderbird. (CVE-2022-46871)

Nika Layzell discovered that Thunderbird was not performing a check on
paste received from cross-processes. An attacker could potentially
exploit this to obtain sensitive information. (CVE-2022-46872)

Matthias Zoellner discovered that Thunderbird was not keeping the filename
ending intact when using the drag-and-drop event. An attacker could
possibly use this issue to add a file with a malicious extension, leading
to execute arbitrary code. (CVE-2022-46874)

Hafiizh discovered that Thunderbird was not properly handling fullscreen
notifications when the window goes into fullscreen mode. An attacker could
possibly use this issue to spoof the user and obtain sensitive information.
(CVE-2022-46877)

Tom Schuster discovered that Thunderbird was not performing a validation
check on GTK drag data. An attacker could potentially exploits this to
obtain sensitive information. (CVE-2023-23598)

Vadim discovered that Thunderbird was not properly sanitizing a curl
command output when copying a network request from the developer tools
panel. An attacker could potentially exploits this to hide and execute
arbitrary commands. (CVE-2023-23599)

Luan Herrera discovered that Thunderbird was not stopping navigation when
dragging a URL from a cross-origin iframe into the same tab. An attacker
potentially exploits this to spoof the user. (CVE-2023-23601)

Dave Vandyke discovered that Thunderbird did not properly implement CSP
policy when creating a WebSocket in a WebWorker. An attacker who was able
to inject markup into a page otherwise protected by a Content Security
Policy may have been able to inject an executable script. (CVE-2023-23602)

Dan Veditz discovered that Thunderbird did not properly implement CSP
policy on regular expression when using console.log. An attacker
potentially exploits this to exfiltrate data. (CVE-2023-23603)

It was discovered that Thunderbird did not properly check the Certificate
OCSP revocation status when verifying S/Mime signatures. An attacker could
possibly use this issue to bypass signature validation check by sending
email signed with a revoked certificate. (CVE-2023-0430)
CVEs:
- https://ubuntu.com/security/CVE-2022-45403
- https://ubuntu.com/security/CVE-2022-45404
- https://ubuntu.com/security/CVE-2022-45405
- https://ubuntu.com/security/CVE-2022-45406
- https://ubuntu.com/security/CVE-2022-45408
- https://ubuntu.com/security/CVE-2022-45409
- https://ubuntu.com/security/CVE-2022-45410
- https://ubuntu.com/security/CVE-2022-45411
- https://ubuntu.com/security/CVE-2022-45418
- https://ubuntu.com/security/CVE-2022-45420
- https://ubuntu.com/security/CVE-2022-45421
- https://ubuntu.com/security/CVE-2022-46878
- https://ubuntu.com/security/CVE-2022-46880
- https://ubuntu.com/security/CVE-2022-46881
- https://ubuntu.com/security/CVE-2022-46882
- https://ubuntu.com/security/CVE-2023-23605
- https://ubuntu.com/security/CVE-2022-45412
- https://ubuntu.com/security/CVE-2022-45414
- https://ubuntu.com/security/CVE-2022-45416
- https://ubuntu.com/security/CVE-2022-46871
- https://ubuntu.com/security/CVE-2022-46872
- https://ubuntu.com/security/CVE-2022-46874
- https://ubuntu.com/security/CVE-2022-46877
- https://ubuntu.com/security/CVE-2023-23598
- https://ubuntu.com/security/CVE-2023-23599
- https://ubuntu.com/security/CVE-2023-23601
- https://ubuntu.com/security/CVE-2023-23602
- https://ubuntu.com/security/CVE-2023-23603
- https://ubuntu.com/security/CVE-2023-0430
- https://ubuntu.com/security/CVE-2022-45409
- https://ubuntu.com/security/CVE-2022-45408
- https://ubuntu.com/security/CVE-2022-46874
- https://ubuntu.com/security/CVE-2023-23601
- https://ubuntu.com/security/CVE-2023-23602
- https://ubuntu.com/security/CVE-2022-45411
- https://ubuntu.com/security/CVE-2022-46871
- https://ubuntu.com/security/CVE-2022-45414
- https://ubuntu.com/security/CVE-2022-45420
- https://ubuntu.com/security/CVE-2022-46872
- https://ubuntu.com/security/CVE-2022-45405
- https://ubuntu.com/security/CVE-2023-0430
- https://ubuntu.com/security/CVE-2022-45404
- https://ubuntu.com/security/CVE-2022-46880
- https://ubuntu.com/security/CVE-2022-45410
- https://ubuntu.com/security/CVE-2022-46881
- https://ubuntu.com/security/CVE-2023-23603
- https://ubuntu.com/security/CVE-2022-45403
- https://ubuntu.com/security/CVE-2022-45406
- https://ubuntu.com/security/CVE-2023-23605
- https://ubuntu.com/security/CVE-2022-46882
- https://ubuntu.com/security/CVE-2022-45412
- https://ubuntu.com/security/CVE-2022-46877
- https://ubuntu.com/security/CVE-2022-46878
- https://ubuntu.com/security/CVE-2022-45418
- https://ubuntu.com/security/CVE-2023-23598
- https://ubuntu.com/security/CVE-2022-45416
- https://ubuntu.com/security/CVE-2022-45421
- https://ubuntu.com/security/CVE-2023-23599

Title: USN-5835-1: Cinder vulnerability
URL: https://ubuntu.com/security/notices/USN-5835-1
Priorities: medium
Description:
Guillaume Espanel, Pierre Libeau, Arnaud Morin, and Damien Rannou
discovered that Cinder incorrectly handled VMDK image processing. An
authenticated attacker could possibly supply a specially crafted VMDK flat
image and obtain arbitrary files from the server containing sensitive
information.
CVEs:
- https://ubuntu.com/security/CVE-2022-47951

Title: USN-5835-2: OpenStack Glance vulnerability
URL: https://ubuntu.com/security/notices/USN-5835-2
Priorities: medium
Description:
Guillaume Espanel, Pierre Libeau, Arnaud Morin, and Damien Rannou
discovered that OpenStack Glance incorrectly handled VMDK image processing.
An authenticated attacker could possibly supply a specially crafted VMDK
flat image and obtain arbitrary files from the server containing sensitive
information.
CVEs:
- https://ubuntu.com/security/CVE-2022-47951

Title: USN-5819-1: HAProxy vulnerability
URL: https://ubuntu.com/security/notices/USN-5819-1
Priorities: medium
Description:
It was discovered that HAProxy incorrectly handled certain messages. A
remote attacker could possibly use this issue to cause HAProxy to stop
responding, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-0056

Title: USN-5844-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5844-1
Priorities: high,medium
Description:
David Benjamin discovered that OpenSSL incorrectly handled X.400 address
processing. A remote attacker could possibly use this issue to read
arbitrary memory contents or cause OpenSSL to crash, resulting in a denial
of service. (CVE-2023-0286)

Corey Bonnell discovered that OpenSSL incorrectly handled X.509 certificate
verification. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-4203)

Hubert Kario discovered that OpenSSL had a timing based side channel in the
OpenSSL RSA Decryption implementation. A remote attacker could possibly use
this issue to recover sensitive information. (CVE-2022-4304)

Dawei Wang discovered that OpenSSL incorrectly handled parsing certain PEM
data. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. (CVE-2022-4450)

Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly
handled streaming ASN.1 data. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-0215)

Marc Schönefeld discovered that OpenSSL incorrectly handled malformed PKCS7
data. A remote attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2023-0216)

Kurt Roeckx discovered that OpenSSL incorrectly handled validating certain
DSA public keys. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. This issue only
affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0217)

Hubert Kario and Dmitry Belyavsky discovered that OpenSSL incorrectly
validated certain signatures. A remote attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0401)
CVEs:
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2022-4203
- https://ubuntu.com/security/CVE-2022-4304
- https://ubuntu.com/security/CVE-2022-4450
- https://ubuntu.com/security/CVE-2023-0215
- https://ubuntu.com/security/CVE-2023-0216
- https://ubuntu.com/security/CVE-2023-0217
- https://ubuntu.com/security/CVE-2023-0401
- https://ubuntu.com/security/CVE-2023-0217
- https://ubuntu.com/security/CVE-2022-4304
- https://ubuntu.com/security/CVE-2023-0215
- https://ubuntu.com/security/CVE-2022-4450
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2023-0401
- https://ubuntu.com/security/CVE-2022-4203
- https://ubuntu.com/security/CVE-2023-0216

Title: USN-5823-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5823-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.32 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 22.10. Ubuntu 18.04 LTS has been updated to MySQL 5.7.41.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-41.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-32.html
https://www.oracle.com/security-alerts/cpujan2023.html
CVEs:
- https://ubuntu.com/security/CVE-2023-21869
- https://ubuntu.com/security/CVE-2023-21878
- https://ubuntu.com/security/CVE-2023-21880
- https://ubuntu.com/security/CVE-2023-21836
- https://ubuntu.com/security/CVE-2023-21840
- https://ubuntu.com/security/CVE-2022-32221
- https://ubuntu.com/security/CVE-2023-21873
- https://ubuntu.com/security/CVE-2023-21883
- https://ubuntu.com/security/CVE-2023-21877
- https://ubuntu.com/security/CVE-2023-21871
- https://ubuntu.com/security/CVE-2023-21882
- https://ubuntu.com/security/CVE-2023-21870
- https://ubuntu.com/security/CVE-2023-21876
- https://ubuntu.com/security/CVE-2023-21867
- https://ubuntu.com/security/CVE-2023-21881
- https://ubuntu.com/security/CVE-2023-21863
- https://ubuntu.com/security/CVE-2023-21887
- https://ubuntu.com/security/CVE-2023-21879
- https://ubuntu.com/security/CVE-2023-21868
- https://ubuntu.com/security/CVE-2023-21875

1.80

Available in the Broadcom Support portal

Release Date: January 20, 2023

Metadata:

BOSH Agent Version: 2.499.0

USNs:


Title: USN-5785-1: FreeRADIUS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5785-1
Priorities: low,medium
Description:
It was discovered that FreeRADIUS incorrectly handled multiple EAP-pwd
handshakes. An attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-17185)

Shane Guan discovered that FreeRADIUS incorrectly handled memory when
checking unknown SIM option sent by EAP-SIM supplicant. An attacker could
possibly use this issue to cause a denial of service on the server. This
issue only affected Ubuntu 16.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04
LTS. (CVE-2022-41860)

It was discovered that FreeRADIUS incorrectly handled memory when
processing certain abinary attributes. An attacker could possibly use this
issue to cause a denial of service on the server. (CVE-2022-41861)
CVEs:
- https://ubuntu.com/security/CVE-2019-17185
- https://ubuntu.com/security/CVE-2022-41860
- https://ubuntu.com/security/CVE-2022-41861
- https://ubuntu.com/security/CVE-2019-17185
- https://ubuntu.com/security/CVE-2022-41860
- https://ubuntu.com/security/CVE-2022-41861

Title: USN-5792-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5792-1
Priorities: medium,low
Description:
Mingwei Zhang discovered that the KVM implementation for AMD processors in
the Linux kernel did not properly handle cache coherency with Secure
Encrypted Virtualization (SEV). A local attacker could possibly use this to
cause a denial of service (host system crash). (CVE-2022-0171)

It was discovered that a race condition existed in the Android Binder IPC
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-20421)

David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)

It was discovered that the Intel 740 frame buffer driver in the Linux
kernel contained a divide by zero vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3061)

It was discovered that the sound subsystem in the Linux kernel contained a
race condition in some situations. A local attacker could use this to cause
a denial of service (system crash). (CVE-2022-3303)

Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)

It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)

Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)

Jann Horn discovered a race condition existed in the Linux kernel when
unmapping VMAs in certain situations, resulting in possible use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-39188)

Hyunwoo Kim discovered that an integer overflow vulnerability existed in
the PXA3xx graphics driver in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2022-39842)

It was discovered that a race condition existed in the EFI capsule loader
driver in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-40307)

Zheng Wang and Zhuorao Yang discovered that the RealTek RTL8712U wireless
driver in the Linux kernel contained a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-4095)

It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)
CVEs:
- https://ubuntu.com/security/CVE-2022-0171
- https://ubuntu.com/security/CVE-2022-20421
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-40307
- https://ubuntu.com/security/CVE-2022-4095
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-20421
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-0171
- https://ubuntu.com/security/CVE-2022-40307
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-4095
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-3303

Title: USN-5801-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5801-1
Priorities: medium
Description:
It was discovered that Vim makes illegal memory calls when pasting
brackets in Ex mode. An attacker could possibly use this to crash Vim,
access or modify memory, or execute arbitrary commands. This issue
affected only Ubuntu 20.04 and 22.04 (CVE-2022-0392)

It was discovered that Vim makes illegal memory calls when making
certain retab calls. An attacker could possibly use this to crash Vim,
access or modify memory, or execute arbitrary commands. (CVE-2022-0417)
CVEs:
- https://ubuntu.com/security/CVE-2022-0392
- https://ubuntu.com/security/CVE-2022-0417
- https://ubuntu.com/security/CVE-2022-0392
- https://ubuntu.com/security/CVE-2022-0417

Title: USN-5810-1: Git vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5810-1
Priorities: medium
Description:
Markus Vervier and Eric Sesterhenn discovered that Git incorrectly handled certain
gitattributes. An attacker could possibly use this issue to cause a crash
or execute arbitrary code. (CVE-2022-23521)

Joern Schneeweisz discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. (CVE-2022-41903)
CVEs:
- https://ubuntu.com/security/CVE-2022-23521
- https://ubuntu.com/security/CVE-2022-41903
- https://ubuntu.com/security/CVE-2022-41903
- https://ubuntu.com/security/CVE-2022-23521

Title: USN-5780-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5780-1
Priorities: medium,high
Description:
It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)

It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
CVEs:
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42896

Title: USN-5786-1: GNOME Files vulnerability
URL: https://ubuntu.com/security/notices/USN-5786-1
Priorities: medium
Description:
It was discovered that GNOME Files incorrectly handled certain filenames.
An attacker could possibly use this issue to cause GNOME Files to crash,
leading to a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-37290

Title: USN-5796-1: w3m vulnerability
URL: https://ubuntu.com/security/notices/USN-5796-1
Priorities: medium
Description:
It was discovered that w3m incorrectly handled certain HTML files. A remote
attacker could use this issue to cause w3m to crash, resulting in a denial
of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-38223

Title: USN-5788-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5788-1
Priorities: medium
Description:
Hiroki Kurosawa discovered that curl incorrectly handled HSTS support
when certain hostnames included IDN characters. A remote attacker could
possibly use this issue to cause curl to use unencrypted connections. This
issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-43551)

It was discovered that curl incorrectly handled denials when using HTTP
proxies. A remote attacker could use this issue to cause curl to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2022-43552)
CVEs:
- https://ubuntu.com/security/CVE-2022-43551
- https://ubuntu.com/security/CVE-2022-43552
- https://ubuntu.com/security/CVE-2022-43551
- https://ubuntu.com/security/CVE-2022-43552

Title: USN-5799-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5799-1
Priorities: high
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-4378

Title: USN-5803-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5803-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-45934

Title: USN-5814-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5814-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643

Title: USN-5807-1: libXpm vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5807-1
Priorities: medium
Description:
Martin Ettl discovered that libXpm incorrectly handled certain XPM files.
If a user or automated system were tricked into opening a specially crafted
XPM file, a remote attacker could possibly use this issue to cause libXpm
to stop responding, resulting in a denial of service. (CVE-2022-44617)

Marco Ivaldi discovered that libXpm incorrectly handled certain XPM files.
If a user or automated system were tricked into opening a specially crafted
XPM file, a remote attacker could possibly use this issue to cause libXpm
to stop responding, resulting in a denial of service. (CVE-2022-46285)

Alan Coopersmith discovered that libXpm incorrectly handled calling
external helper binaries. If libXpm was being used by a setuid binary, a
local attacker could possibly use this issue to escalate privileges.
(CVE-2022-4883)
CVEs:
- https://ubuntu.com/security/CVE-2022-44617
- https://ubuntu.com/security/CVE-2022-46285
- https://ubuntu.com/security/CVE-2022-4883
- https://ubuntu.com/security/CVE-2022-46285
- https://ubuntu.com/security/CVE-2022-44617
- https://ubuntu.com/security/CVE-2022-4883

Title: USN-5795-1: Net-SNMP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5795-1
Priorities: medium
Description:
It was discovered that Net-SNMP incorrectly handled certain requests. A
remote attacker could possibly use these issues to cause Net-SNMP to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-44792
- https://ubuntu.com/security/CVE-2022-44793

Title: USN-5787-1: Libksba vulnerability
URL: https://ubuntu.com/security/notices/USN-5787-1
Priorities: medium
Description:
It was discovered that Libksba incorrectly handled parsing CRL signatures.
A remote attacker could use this issue to cause Libksba to crash, resulting
in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-47629

Title: USN-5798-1: .NET 6 vulnerability
URL: https://ubuntu.com/security/notices/USN-5798-1
Priorities: medium
Description:
Johan Gorter discovered that .NET 6 incorrectly processed certain
invalid HTTP requests. An attacker could possibly use this issue to
cause a denial of service condition for an exposed endpoint.
CVEs:
- https://ubuntu.com/security/CVE-2023-21538

Title: USN-5811-1: Sudo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5811-1
Priorities: medium
Description:
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
handled user-specified editors when using the sudoedit command. A local
attacker that has permission to use the sudoedit command could possibly use
this issue to edit arbitrary files. (CVE-2023-22809)

It was discovered that the Protobuf-c library, used by Sudo, incorrectly
handled certain arithmetic shifts. An attacker could possibly use this
issue to cause Sudo to crash, resulting in a denial of service. This issue
only affected Ubuntu 22.04 LTS. (CVE-2022-33070)
CVEs:
- https://ubuntu.com/security/CVE-2023-22809
- https://ubuntu.com/security/CVE-2022-33070
- https://ubuntu.com/security/CVE-2023-22809
- https://ubuntu.com/security/CVE-2022-33070

1.75

Available in the Broadcom Support portal

Release Date: December 20, 2022

Metadata:


BOSH Agent Version: 2.489.0

What’s Changed


- The new BOSH Agent reliably identifies the root filesystem disk, reducing the chance of Agent timeouts on deploy.

USNs:


Title: USN-5780-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5780-1
Priorities: medium,high
Description:
It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)

It was discovered that the Bluetooth HCI implementation in the Linux kernel
did not properly deallocate memory in some situations. An attacker could
possibly use this cause a denial of service (memory exhaustion).
(CVE-2022-3619)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)
CVEs:
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3619
- https://ubuntu.com/security/CVE-2022-42896

Title: USN-5783-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5783-1
Priorities: high
Description:
Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-42896

Title: USN-5779-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5779-1
Priorities: high,medium,low
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)

It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)

It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)

It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)

It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)

It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)

It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3567

Title: USN-5778-1: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5778-1
Priorities: medium
Description:
Jan-Niklas Sohn discovered that X.Org X Server extensions contained
multiple security issues. An attacker could possibly use these issues to
cause the X Server to crash, execute arbitrary code, or escalate
privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-46341
- https://ubuntu.com/security/CVE-2022-46342
- https://ubuntu.com/security/CVE-2022-46340
- https://ubuntu.com/security/CVE-2022-4283
- https://ubuntu.com/security/CVE-2022-46344
- https://ubuntu.com/security/CVE-2022-46343

Full Changelog: https://github.com/cloudfoundry/bosh-linux-stemcell-builder/compare/ubuntu-jammy/v1.71…ubuntu-jammy/v1.75

1.71

Available in the Broadcom Support portal

Release Date: December 14, 2022

Metadata:

BOSH Agent Version: 2.488.0

USNs:


Title: USN-5763-1: NumPy vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5763-1
Priorities: medium
Description:
It was discovered that NumPy did not properly manage memory when specifying
arrays of large dimensions. If a user were tricked into running malicious
Python file, an attacker could cause a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-33430)

It was discovered that NumPy did not properly perform string comparison
operations under certain circumstances. An attacker could possibly use
this issue to cause NumPy to crash, resulting in a denial of service.
(CVE-2021-34141)

It was discovered that NumPy did not properly manage memory under certain
circumstances. An attacker could possibly use this issue to cause NumPy to
crash, resulting in a denial of service. (CVE-2021-41495, CVE-2021-41496)
CVEs:
- https://ubuntu.com/security/CVE-2021-33430
- https://ubuntu.com/security/CVE-2021-34141
- https://ubuntu.com/security/CVE-2021-41495
- https://ubuntu.com/security/CVE-2021-41496
- https://ubuntu.com/security/CVE-2021-41495
- https://ubuntu.com/security/CVE-2021-34141
- https://ubuntu.com/security/CVE-2021-41496
- https://ubuntu.com/security/CVE-2021-33430

Title: USN-5772-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5772-1
Priorities: medium,low
Description:
It was discovered that QEMU incorrectly handled bulk transfers from SPICE
clients. A remote attacker could use this issue to cause QEMU to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2021-3682)

It was discovered that QEMU did not properly manage memory when it
transfers the USB packets. A malicious guest attacker could use this issue
to cause QEMU to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2021-3750)

It was discovered that the QEMU SCSI device emulation incorrectly handled
certain MODE SELECT commands. An attacker inside the guest could possibly
use this issue to cause QEMU to crash, resulting in a denial of service.
This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
(CVE-2021-3930)

It was discovered that QEMU did not properly manage memory when it
processing repeated messages to cancel the current SCSI request. A
malicious privileged guest attacker could use this issue to cause QEMU to
crash, resulting in a denial of service. (CVE-2022-0216)

It was discovered that QEMU did not properly manage memory when it
using Tulip device emulation. A malicious guest attacker could use this
issue to cause QEMU to crash, resulting in a denial of service. This issue
only affected Ubuntu 22.10. (CVE-2022-2962)

It was discovered that QEMU did not properly manage memory when processing
ClientCutText messages. A attacker could use this issue to cause QEMU to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-3165)
CVEs:
- https://ubuntu.com/security/CVE-2021-3682
- https://ubuntu.com/security/CVE-2021-3750
- https://ubuntu.com/security/CVE-2021-3930
- https://ubuntu.com/security/CVE-2022-0216
- https://ubuntu.com/security/CVE-2022-2962
- https://ubuntu.com/security/CVE-2022-3165
- https://ubuntu.com/security/CVE-2021-3682
- https://ubuntu.com/security/CVE-2022-3165
- https://ubuntu.com/security/CVE-2022-0216
- https://ubuntu.com/security/CVE-2021-3750
- https://ubuntu.com/security/CVE-2021-3930
- https://ubuntu.com/security/CVE-2022-2962

Title: USN-5759-1: LibBPF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5759-1
Priorities: medium
Description:
It was discovered that LibBPF incorrectly handled certain memory operations
under certain circumstances. An attacker could possibly use this issue to
cause LibBPF to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 22.10.
(CVE-2021-45940, CVE-2021-45941, CVE-2022-3533)

It was discovered that LibBPF incorrectly handled certain memory operations
under certain circumstances. An attacker could possibly use this issue to
cause LibBPF to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2022-3534, CVE-2022-3606)
CVEs:
- https://ubuntu.com/security/CVE-2021-45940
- https://ubuntu.com/security/CVE-2021-45941
- https://ubuntu.com/security/CVE-2022-3533
- https://ubuntu.com/security/CVE-2022-3534
- https://ubuntu.com/security/CVE-2022-3606
- https://ubuntu.com/security/CVE-2021-45941
- https://ubuntu.com/security/CVE-2022-3534
- https://ubuntu.com/security/CVE-2022-3606
- https://ubuntu.com/security/CVE-2022-3533
- https://ubuntu.com/security/CVE-2021-45940

Title: USN-5760-1: libxml2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5760-1
Priorities: low,medium
Description:
It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to cause a crash.
(CVE-2022-2309)

It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to expose sensitive information
or cause a crash. (CVE-2022-40303)

It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2022-40304)
CVEs:
- https://ubuntu.com/security/CVE-2022-2309
- https://ubuntu.com/security/CVE-2022-40303
- https://ubuntu.com/security/CVE-2022-40304
- https://ubuntu.com/security/CVE-2022-40304
- https://ubuntu.com/security/CVE-2022-40303
- https://ubuntu.com/security/CVE-2022-2309

Title: USN-5764-1: U-Boot vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5764-1
Priorities: medium
Description:
It was discovered that U-Boot incorrectly handled certain USB DFU download
setup packets. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2022-2347)

Nicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled
certain fragmented IP packets. A local attacker could use this issue to
cause U-Boot to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-30552, CVE-2022-30790)

It was discovered that U-Boot incorrectly handled certain NFS lookup
replies. A remote attacker could use this issue to cause U-Boot to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-30767)

Jincheng Wang discovered that U-Boot incorrectly handled certain SquashFS
structures. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33103)

Tatsuhiko Yasumatsu discovered that U-Boot incorrectly handled certain
SquashFS structures. A local attacker could use this issue to cause U-Boot
to crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33967)

It was discovered that U-Boot incorrectly handled the i2c command. A local
attacker could use this issue to cause U-Boot to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-34835)
CVEs:
- https://ubuntu.com/security/CVE-2022-2347
- https://ubuntu.com/security/CVE-2022-30552
- https://ubuntu.com/security/CVE-2022-30790
- https://ubuntu.com/security/CVE-2022-30767
- https://ubuntu.com/security/CVE-2022-33103
- https://ubuntu.com/security/CVE-2022-33967
- https://ubuntu.com/security/CVE-2022-34835
- https://ubuntu.com/security/CVE-2022-30767
- https://ubuntu.com/security/CVE-2022-30552
- https://ubuntu.com/security/CVE-2022-33967
- https://ubuntu.com/security/CVE-2022-34835
- https://ubuntu.com/security/CVE-2022-30790
- https://ubuntu.com/security/CVE-2022-33103
- https://ubuntu.com/security/CVE-2022-2347

Title: USN-5776-1: containerd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5776-1
Priorities: medium
Description:
It was discovered that containerd incorrectly handled memory
when receiving certain faulty Exec or ExecSync commands. A remote
attacker could possibly use this issue to cause a denial of service
or crash containerd. (CVE-2022-23471, CVE-2022-31030)

It was discovered that containerd incorrectly set up inheritable file
capabilities. An attacker could possibly use this issue to escalate
privileges inside a container. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-24769)

It was discovered that containerd incorrectly handled access to encrypted
container images when using imgcrypt library. A remote attacker could
possibly use this issue to access encrypted images from other users.
This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-24778)
CVEs:
- https://ubuntu.com/security/CVE-2022-23471
- https://ubuntu.com/security/CVE-2022-31030
- https://ubuntu.com/security/CVE-2022-24769
- https://ubuntu.com/security/CVE-2022-24778
- https://ubuntu.com/security/CVE-2022-24778
- https://ubuntu.com/security/CVE-2022-24769
- https://ubuntu.com/security/CVE-2022-23471
- https://ubuntu.com/security/CVE-2022-31030

Title: USN-5767-1: Python vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5767-1
Priorities: medium
Description:
Nicky Mouha discovered that Python incorrectly handled certain SHA-3 internals.
An attacker could possibly use this issue to cause a crash or execute arbitrary code.
(CVE-2022-37454)

It was discovered that Python incorrectly handled certain IDNA inputs.
An attacker could possibly use this issue to expose sensitive information
denial of service, or cause a crash.
(CVE-2022-45061)
CVEs:
- https://ubuntu.com/security/CVE-2022-37454
- https://ubuntu.com/security/CVE-2022-45061
- https://ubuntu.com/security/CVE-2022-45061
- https://ubuntu.com/security/CVE-2022-37454

Title: USN-5762-1: GNU binutils vulnerability
URL: https://ubuntu.com/security/notices/USN-5762-1
Priorities: medium
Description:
It was discovered that GNU binutils incorrectly handled certain COFF files.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-38533

Title: USN-5773-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5773-1
Priorities: high,medium,low
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)

Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)

It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)

It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)

It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)

It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)

It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-3567

Title: USN-5755-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5755-2
Priorities: high,medium,low
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)

It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)

It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)

It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)

It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)

It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)

It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3594

1.64

Available in the Broadcom Support portal

Release Date: December 02, 2022

Metadata:

BOSH Agent Version: 2.481.0

What’s Changed


* Fixed issue with BOSH service-broker tasks failing under heavy usage with error “Cannot connect to the monit daemon.” https://github.com/cloudfoundry/bosh-linux-stemcell-builder/pull/264
* Stemcells now include the networking utility, ethtool, useful for troubleshooting & resolving networking issues. https://github.com/cloudfoundry/bosh-linux-stemcell-builder/pull/263

USNs:


Title: USN-5752-1: Linux kernel (Azure CVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5752-1
Priorities: high,medium
Description:
David Bouman and Billy Jheng Bing Jhong discovered that a race condition
existed in the io_uring subsystem in the Linux kernel, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-2602)

Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)

Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2022-42722)
CVEs:
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42721

Title: USN-5753-1: snapd vulnerability
URL: https://ubuntu.com/security/notices/USN-5753-1
Priorities: high
Description:
The Qualys Research Team discovered that a race condition existed in the
snapd snap-confine binary when preparing the private /tmp mount for a
snap. A local attacker could possibly use this issue to escalate privileges
and execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-3328

Title: USN-5741-1: Exim vulnerability
URL: https://ubuntu.com/security/notices/USN-5741-1
Priorities: medium
Description:
It was discovered that Exim incorrectly handled certain regular
expressions. An attacker could use this issue to cause Exim to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-3559

Title: USN-5748-1: Sysstat vulnerability
URL: https://ubuntu.com/security/notices/USN-5748-1
Priorities: medium
Description:
It was discovered that Sysstat incorrectly handled certain arithmetic
multiplications. An attacker could use this issue to cause Sysstat to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2022-39377

Title: USN-5743-2: LibTIFF vulnerability
URL: https://ubuntu.com/security/notices/USN-5743-2
Priorities: medium
Description:
USN-5743-1 fixed a vulnerability in LibTIFF. This update provides the
corresponding updates for Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 22.10.

Original advisory details:

It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image, a remote attacker could crash the application, leading to a
denial of service, or possibly execute arbitrary code with user privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-3970

Title: USN-5755-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5755-2
Priorities: high,medium,low
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)

It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)

It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)

It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)

It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)

It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)

It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3594

Title: USN-5755-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5755-1
Priorities: high,medium,low
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)

It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)

It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)

It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)

It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)

It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)

It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3594

1.55

Available in the Broadcom Support portal

Release Date: November 29, 2022

Metadata:

BOSH Agent Version: 2.479.0

PR’s
- fix rsyslog crash in case of connection abort .#255 by @h0nIg
-

USNs:

1.49

Available in the Broadcom Support portal

Release Date: November 17, 2022

Metadata:

BOSH Agent Version: 2.475.0

USNs:


Title: USN-5719-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5719-1
Priorities: medium
Description:
It was discovered that OpenJDK incorrectly handled long client hostnames.
An attacker could possibly use this issue to cause the corruption of
sensitive information. (CVE-2022-21619)

It was discovered that OpenJDK incorrectly randomized DNS port numbers. A
remote attacker could possibly use this issue to perform spoofing attacks.
(CVE-2022-21624)

It was discovered that OpenJDK did not limit the number of connections
accepted from HTTP clients. An attacker could possibly use this issue to
cause a denial of service. (CVE-2022-21628)

It was discovered that OpenJDK incorrectly handled X.509 certificates. An
attacker could possibly use this issue to cause a denial of service. This
issue only affected OpenJDK 8 and OpenJDK 11. (CVE-2022-21626)

It was discovered that OpenJDK incorrectly handled cached server
connections. An attacker could possibly use this issue to perform spoofing
attacks. This issue only affected OpenJDK 11, OpenJDK 17 and OpenJDK 19.
(CVE-2022-39399)

It was discovered that OpenJDK incorrectly handled byte conversions. An
attacker could possibly use this issue to obtain sensitive information.
This issue only affected OpenJDK 11, OpenJDK 17 and OpenJDK 19.
(CVE-2022-21618)
CVEs:
- https://ubuntu.com/security/CVE-2022-21619
- https://ubuntu.com/security/CVE-2022-21624
- https://ubuntu.com/security/CVE-2022-21628
- https://ubuntu.com/security/CVE-2022-21626
- https://ubuntu.com/security/CVE-2022-39399
- https://ubuntu.com/security/CVE-2022-21618
- https://ubuntu.com/security/CVE-2022-21618
- https://ubuntu.com/security/CVE-2022-21626
- https://ubuntu.com/security/CVE-2022-39399
- https://ubuntu.com/security/CVE-2022-21628
- https://ubuntu.com/security/CVE-2022-21619
- https://ubuntu.com/security/CVE-2022-21624

Title: USN-5714-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5714-1
Priorities: medium,low
Description:
It was discovered that LibTIFF incorrectly handled certain memory operations
when using tiffcrop. An attacker could trick a user into processing a specially
crafted tiff image file and potentially use this issue to cause a denial of
service. This issue only affected Ubuntu 22.10. (CVE-2022-2519, CVE-2022-2520,
CVE-2022-2521, CVE-2022-2953)

It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffcrop. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash. This
issue only affected to Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-2867, CVE-2022-2868, CVE-2022-2869)

It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffsplit. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash. This
issue only affected to Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-34526)

Chintan Shah discovered that LibTIFF incorrectly handled memory in certain
conditions when using tiffcrop. An attacker could trick a user into processing
a specially crafted image file and potentially use this issue to allow for
information disclosure or to cause the application to crash. This issue only
affected to Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04
LTS and Ubuntu 22.10. (CVE-2022-3570)

It was discovered that LibTIFF incorrectly handled memory in certain conditions
when using tiffcrop. An attacker could trick a user into processing a specially
crafted tiff file and potentially use this issue to cause a denial of service.
This issue only affected to Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-3598)

It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffcrop. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash.
(CVE-2022-3599)

It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffcrop. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash. This
issue only affected to Ubuntu 22.10. (CVE-2022-3626, CVE-2022-3627)
CVEs:
- https://ubuntu.com/security/CVE-2022-2519
- https://ubuntu.com/security/CVE-2022-2520
- https://ubuntu.com/security/CVE-2022-2521
- https://ubuntu.com/security/CVE-2022-2953
- https://ubuntu.com/security/CVE-2022-2867
- https://ubuntu.com/security/CVE-2022-2868
- https://ubuntu.com/security/CVE-2022-2869
- https://ubuntu.com/security/CVE-2022-34526
- https://ubuntu.com/security/CVE-2022-3570
- https://ubuntu.com/security/CVE-2022-3598
- https://ubuntu.com/security/CVE-2022-3599
- https://ubuntu.com/security/CVE-2022-3626
- https://ubuntu.com/security/CVE-2022-3627
- https://ubuntu.com/security/CVE-2022-2869
- https://ubuntu.com/security/CVE-2022-3627
- https://ubuntu.com/security/CVE-2022-3599
- https://ubuntu.com/security/CVE-2022-2519
- https://ubuntu.com/security/CVE-2022-3598
- https://ubuntu.com/security/CVE-2022-34526
- https://ubuntu.com/security/CVE-2022-2867
- https://ubuntu.com/security/CVE-2022-2868
- https://ubuntu.com/security/CVE-2022-2520
- https://ubuntu.com/security/CVE-2022-2521
- https://ubuntu.com/security/CVE-2022-3570
- https://ubuntu.com/security/CVE-2022-2953
- https://ubuntu.com/security/CVE-2022-3626

Title: USN-5717-1: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5717-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain gzip files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-31628)

It was discovered that PHP incorrectly handled certain cookies.
An attacker could possibly use this issue to compromise the data
(CVE-2022-31629)

It was discovered that PHP incorrectly handled certain image fonts.
An attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.10, and Ubuntu 22.04 LTS.
(CVE-2022-31630)

Nicky Mouha discovered that PHP incorrectly handled certain SHA-3 operations.
An attacker could possibly use this issue to cause a crash
or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS,
Ubuntu 22.10, and Ubuntu 22.04 LTS. (CVE-2022-37454)
CVEs:
- https://ubuntu.com/security/CVE-2022-31628
- https://ubuntu.com/security/CVE-2022-31629
- https://ubuntu.com/security/CVE-2022-31630
- https://ubuntu.com/security/CVE-2022-37454
- https://ubuntu.com/security/CVE-2022-31630
- https://ubuntu.com/security/CVE-2022-37454
- https://ubuntu.com/security/CVE-2022-31628
- https://ubuntu.com/security/CVE-2022-31629

Title: USN-5724-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5724-1
Priorities: medium,low
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
bypass Content Security Policy (CSP) or other security restrictions, or
execute arbitrary code. These issues only affect Ubuntu 18.04 LTS, Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-3266, CVE-2022-40956,
CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960,
CVE-2022-40962)

Multiple security issues were discovered in the Matrix SDK bundled with
Thunderbird. An attacker could potentially exploit these in order to
impersonate another user. These issues only affect Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-39236, CVE-2022-39249,
CVE-2022-39250, CVE-2022-39251)

Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, or execute arbitrary code. (CVE-2022-42927,
CVE-2022-42928, CVE-2022-42929, CVE-2022-42932)
CVEs:
- https://ubuntu.com/security/CVE-2022-3266
- https://ubuntu.com/security/CVE-2022-40956
- https://ubuntu.com/security/CVE-2022-40957
- https://ubuntu.com/security/CVE-2022-40958
- https://ubuntu.com/security/CVE-2022-40959
- https://ubuntu.com/security/CVE-2022-40960
- https://ubuntu.com/security/CVE-2022-40962
- https://ubuntu.com/security/CVE-2022-39236
- https://ubuntu.com/security/CVE-2022-39249
- https://ubuntu.com/security/CVE-2022-39250
- https://ubuntu.com/security/CVE-2022-39251
- https://ubuntu.com/security/CVE-2022-42927
- https://ubuntu.com/security/CVE-2022-42928
- https://ubuntu.com/security/CVE-2022-42929
- https://ubuntu.com/security/CVE-2022-42932
- https://ubuntu.com/security/CVE-2022-40956
- https://ubuntu.com/security/CVE-2022-39236
- https://ubuntu.com/security/CVE-2022-42928
- https://ubuntu.com/security/CVE-2022-39251
- https://ubuntu.com/security/CVE-2022-40962
- https://ubuntu.com/security/CVE-2022-42927
- https://ubuntu.com/security/CVE-2022-39249
- https://ubuntu.com/security/CVE-2022-3266
- https://ubuntu.com/security/CVE-2022-42932
- https://ubuntu.com/security/CVE-2022-40958
- https://ubuntu.com/security/CVE-2022-40957
- https://ubuntu.com/security/CVE-2022-40960
- https://ubuntu.com/security/CVE-2022-39250
- https://ubuntu.com/security/CVE-2022-42929
- https://ubuntu.com/security/CVE-2022-40959

Title: USN-5716-1: SQLite vulnerability
URL: https://ubuntu.com/security/notices/USN-5716-1
Priorities: medium
Description:
It was discovered that SQLite incorrectly handled certain long string
arguments. An attacker could use this issue to cause SQLite to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-35737

Title: USN-5711-1: NTFS-3G vulnerability
URL: https://ubuntu.com/security/notices/USN-5711-1
Priorities: medium
Description:
Yuchen Zeng and Eduardo Vela discovered that NTFS-3G incorrectly validated
certain NTFS metadata. A local attacker could possibly use this issue to
gain privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-40284

Title: USN-5713-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-5713-1
Priorities: high
Description:
Devin Jeanpierre discovered that Python incorrectly handled sockets when
the multiprocessing module was being used. A local attacker could possibly
use this issue to execute arbitrary code and escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-42919

Title: USN-5718-1: pixman vulnerability
URL: https://ubuntu.com/security/notices/USN-5718-1
Priorities: medium
Description:
Maddie Stone discovered that pixman incorrectly handled certain memory
operations. A remote attacker could use this issue to cause pixman to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2022-44638

1.44

Available in the Broadcom Support portal

Release Date: November 02, 2022

Metadata:

BOSH Agent Version: 2.475.0

Bug Fixes:
- rsyslog on aws starts a boot again. #242
- clang is introduced to speedup the bosh director #251

USNs:


Title: USN-5703-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5703-1
Priorities: medium
Description:
Selim Enes Karaduman discovered that a race condition existed in the
General notification queue implementation of the Linux kernel, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1882)

Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)

Eric Biggers discovered that a use-after-free vulnerability existed in the
io_uring subsystem in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-3176)

It was discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36879)

Jann Horn discovered that the KVM subsystem in the Linux kernel did not
properly handle TLB flush operations in some situations. A local attacker
in a guest VM could use this to cause a denial of service (guest crash) or
possibly execute arbitrary code in the guest kernel. (CVE-2022-39189)
CVEs:
- https://ubuntu.com/security/CVE-2022-1882
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-3176
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-39189
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-3176
- https://ubuntu.com/security/CVE-2022-1882
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-39189

Title: USN-5696-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5696-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.31 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
Ubuntu 18.04 LTS has been updated to MySQL 5.7.40.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-40.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-31.html
https://www.oracle.com/security-alerts/cpuoct2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21632
- https://ubuntu.com/security/CVE-2022-21633
- https://ubuntu.com/security/CVE-2022-21589
- https://ubuntu.com/security/CVE-2022-39400
- https://ubuntu.com/security/CVE-2022-21611
- https://ubuntu.com/security/CVE-2022-21599
- https://ubuntu.com/security/CVE-2022-21604
- https://ubuntu.com/security/CVE-2022-21637
- https://ubuntu.com/security/CVE-2022-21592
- https://ubuntu.com/security/CVE-2022-39410
- https://ubuntu.com/security/CVE-2022-21608
- https://ubuntu.com/security/CVE-2022-21617
- https://ubuntu.com/security/CVE-2022-39408
- https://ubuntu.com/security/CVE-2022-21640
- https://ubuntu.com/security/CVE-2022-21625
- https://ubuntu.com/security/CVE-2022-21594

Title: USN-5697-1: Barbican vulnerability
URL: https://ubuntu.com/security/notices/USN-5697-1
Priorities: medium
Description:
Douglas Mendizabal discovered that Barbican incorrectly handled certain
query strings. A remote attacker could possibly use this issue to bypass
the access policy.
CVEs:
- https://ubuntu.com/security/CVE-2022-3100

Title: USN-5702-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5702-1
Priorities: medium,low
Description:
Robby Simpson discovered that curl incorrectly handled certain POST
operations after PUT operations. This issue could cause applications using
curl to send the wrong data, perform incorrect memory operations, or crash.
(CVE-2022-32221)

Hiroki Kurosawa discovered that curl incorrectly handled parsing .netrc
files. If an attacker were able to provide a specially crafted .netrc file,
this issue could cause curl to crash, resulting in a denial of service.
This issue only affected Ubuntu 22.10. (CVE-2022-35260)

It was discovered that curl incorrectly handled certain HTTP proxy return
codes. A remote attacker could use this issue to cause curl to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-42915)

Hiroki Kurosawa discovered that curl incorrectly handled HSTS support
when certain hostnames included IDN characters. A remote attacker could
possibly use this issue to cause curl to use unencrypted connections. This
issue only affected Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-42916)
CVEs:
- https://ubuntu.com/security/CVE-2022-32221
- https://ubuntu.com/security/CVE-2022-35260
- https://ubuntu.com/security/CVE-2022-42915
- https://ubuntu.com/security/CVE-2022-42916
- https://ubuntu.com/security/CVE-2022-32221
- https://ubuntu.com/security/CVE-2022-35260
- https://ubuntu.com/security/CVE-2022-42916
- https://ubuntu.com/security/CVE-2022-42915

Title: USN-5710-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5710-1
Priorities: high,low
Description:
It was discovered that OpenSSL incorrectly handled certain X.509 Email
Addresses. If a certificate authority were tricked into signing a
specially-crafted certificate, a remote attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. The
default compiler options for affected releases reduce the vulnerability to
a denial of service. (CVE-2022-3602, CVE-2022-3786)

It was discovered that OpenSSL incorrectly handled applications creating
custom ciphers via the legacy EVP_CIPHER_meth_new() function. This issue
could cause certain applications that mishandled values to the function to
possibly end up with a NULL cipher and messages in plaintext.
(CVE-2022-3358)
CVEs:
- https://ubuntu.com/security/CVE-2022-3602
- https://ubuntu.com/security/CVE-2022-3786
- https://ubuntu.com/security/CVE-2022-3358
- https://ubuntu.com/security/CVE-2022-3358
- https://ubuntu.com/security/CVE-2022-3602
- https://ubuntu.com/security/CVE-2022-3786

Title: USN-5708-1: backport-iwlwifi-dkms vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5708-1
Priorities: medium
Description:
Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)

Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.10.
(CVE-2022-42722)
CVEs:
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720

Title: USN-5704-1: DBus vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5704-1
Priorities: medium
Description:
It was discovered that DBus incorrectly handled messages with invalid type
signatures. A local attacker could possibly use this issue to cause DBus to
crash, resulting in a denial of service. (CVE-2022-42010)

It was discovered that DBus was incorrectly validating the length of arrays of
fixed-length items. A local attacker could possibly use this issue to cause
DBus to crash, resulting in a denial of service. (CVE-2022-42011)

It was discovered that DBus incorrectly handled the body DBus message with
attached file descriptors. A local attacker could possibly use this issue to
cause DBus to crash, resulting in a denial of service. (CVE-2022-42012)
CVEs:
- https://ubuntu.com/security/CVE-2022-42010
- https://ubuntu.com/security/CVE-2022-42011
- https://ubuntu.com/security/CVE-2022-42012
- https://ubuntu.com/security/CVE-2022-42010
- https://ubuntu.com/security/CVE-2022-42012
- https://ubuntu.com/security/CVE-2022-42011

1.30

Available in the Broadcom Support portal

Release Date: October 24, 2022

Metadata:

BOSH Agent Version: 2.471.0

USNs:


Title: USN-5689-1: Perl vulnerability
URL: https://ubuntu.com/security/notices/USN-5689-1
Priorities: medium
Description:
It was discovered that Perl incorrectly handled certain signature verification.
An remote attacker could possibly use this issue to bypass signature verification.
CVEs:
- https://ubuntu.com/security/CVE-2020-16156

Title: USN-5659-1: kitty vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5659-1
Priorities: medium
Description:
Stephane Chauveau discovered that kitty incorrectly handled image
filenames with special characters in error messages. A remote
attacker could possibly use this to execute arbitrary commands.
This issue only affected Ubuntu 20.04 LTS. (CVE-2020-35605)

Carter Sande discovered that kitty incorrectly handled escape
sequences in desktop notifications. A remote attacker could possibly
use this to execute arbitrary commands. This issue only affected
Ubuntu 22.04 LTS. (CVE-2022-41322)
CVEs:
- https://ubuntu.com/security/CVE-2020-35605
- https://ubuntu.com/security/CVE-2022-41322
- https://ubuntu.com/security/CVE-2022-41322
- https://ubuntu.com/security/CVE-2020-35605

Title: USN-5633-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5633-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)

Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)

Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)

It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494, CVE-2022-34495)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-2318

Title: USN-5655-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5655-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)

Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)

Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)

It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494, CVE-2022-34495)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-2318

Title: USN-5640-1: Linux kernel (Oracle) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5640-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)

Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)

Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)

It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494, CVE-2022-34495)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-34494

Title: USN-5635-1: Linux kernel (GKE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5635-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)

Jan Beulich discovered that the Xen network device frontend driver in the
Linux kernel incorrectly handled socket buffers (skb) references when
communicating with certain backends. A local attacker could use this to
cause a denial of service (guest crash). (CVE-2022-33743)

Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)

It was discovered that the virtio RPMSG bus driver in the Linux kernel
contained a double-free vulnerability in certain error conditions. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-34494, CVE-2022-34495)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-34495
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-34494
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33743
- https://ubuntu.com/security/CVE-2022-33740

Title: USN-5673-1: unzip vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5673-1
Priorities: low,medium
Description:
It was discovered that unzip did not properly handle unicode strings under
certain circumstances. If a user were tricked into opening a specially crafted
zip file, an attacker could possibly use this issue to cause unzip to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2021-4217)

It was discovered that unzip did not properly perform bounds checking while
converting wide strings to local strings. If a user were tricked into opening a
specially crafted zip file, an attacker could possibly use this issue to cause
unzip to crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2022-0529, CVE-2022-0530)
CVEs:
- https://ubuntu.com/security/CVE-2021-4217
- https://ubuntu.com/security/CVE-2022-0529
- https://ubuntu.com/security/CVE-2022-0530
- https://ubuntu.com/security/CVE-2022-0529
- https://ubuntu.com/security/CVE-2021-4217
- https://ubuntu.com/security/CVE-2022-0530

Title: USN-5627-1: PCRE vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5627-1
Priorities: low
Description:
It was discovered that PCRE incorrectly handled memory when
handling certain regular expressions. An attacker could possibly
use this issue to cause applications using PCRE to expose
sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-1586
- https://ubuntu.com/security/CVE-2022-1587

Title: USN-5667-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5667-1
Priorities: medium
Description:
Selim Enes Karaduman discovered that a race condition existed in the
General notification queue implementation of the Linux kernel, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1882)

Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)

Eric Biggers discovered that a use-after-free vulnerability existed in the
io_uring subsystem in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-3176)

It was discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36879)

Jann Horn discovered that the KVM subsystem in the Linux kernel did not
properly handle TLB flush operations in some situations. A local attacker
in a guest VM could use this to cause a denial of service (guest crash) or
possibly execute arbitrary code in the guest kernel. (CVE-2022-39189)
CVEs:
- https://ubuntu.com/security/CVE-2022-1882
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-3176
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-39189
- https://ubuntu.com/security/CVE-2022-1882
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-39189
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-3176

Title: USN-5663-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5663-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
spoof the mouse pointer position, obtain sensitive information, spoof the
contents of the addressbar, bypass security restrictions, or execute
arbitrary code. (CVE-2022-2505, CVE-2022-36318, CVE-2022-36319,
CVE-2022-38472, CVE-2022-38473, CVE-2022-38476 CVE-2022-38477,
CVE-2022-38478)

Multiple security issues were discovered in Thunderbird. An attacker could
potentially exploit these in order to determine when a user opens a
specially crafted message. (CVE-2022-3032, CVE-2022-3034)

It was discovered that Thunderbird did not correctly handle HTML messages
that contain a meta tag in some circumstances. If a user were tricked into
replying to a specially crafted message, an attacker could potentially
exploit this to obtain sensitive information. (CVE-2022-3033)

A security issue was discovered with the Matrix SDK in Thunderbird. An
attacker sharing a room with a user could potentially exploit this to
cause a denial of service. (CVE-2022-36059)
CVEs:
- https://ubuntu.com/security/CVE-2022-2505
- https://ubuntu.com/security/CVE-2022-36318
- https://ubuntu.com/security/CVE-2022-36319
- https://ubuntu.com/security/CVE-2022-38472
- https://ubuntu.com/security/CVE-2022-38473
- https://ubuntu.com/security/CVE-2022-38476
- https://ubuntu.com/security/CVE-2022-38477
- https://ubuntu.com/security/CVE-2022-38478
- https://ubuntu.com/security/CVE-2022-3032
- https://ubuntu.com/security/CVE-2022-3034
- https://ubuntu.com/security/CVE-2022-3033
- https://ubuntu.com/security/CVE-2022-36059
- https://ubuntu.com/security/CVE-2022-36059
- https://ubuntu.com/security/CVE-2022-38476
- https://ubuntu.com/security/CVE-2022-3034
- https://ubuntu.com/security/CVE-2022-38472
- https://ubuntu.com/security/CVE-2022-3033
- https://ubuntu.com/security/CVE-2022-36319
- https://ubuntu.com/security/CVE-2022-3032
- https://ubuntu.com/security/CVE-2022-38473
- https://ubuntu.com/security/CVE-2022-38478
- https://ubuntu.com/security/CVE-2022-38477
- https://ubuntu.com/security/CVE-2022-2505
- https://ubuntu.com/security/CVE-2022-36318

Title: USN-5693-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5693-1
Priorities: high,medium
Description:
David Bouman and Billy Jheng Bing Jhong discovered that a race condition
existed in the io_uring subsystem in the Linux kernel, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-2602)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Hao Sun and Jiacheng Xu discovered that the NILFS file system
implementation in the Linux kernel contained a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-2978)

Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2022-3028)

Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX
storage controller driver in the Linux kernel did not properly handle
certain structures. A local attacker could potentially use this to expose
sensitive information (kernel memory). (CVE-2022-40768)

Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)

Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2022-42722)
CVEs:
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-2978
- https://ubuntu.com/security/CVE-2022-3028
- https://ubuntu.com/security/CVE-2022-40768
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-2978
- https://ubuntu.com/security/CVE-2022-3028
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-40768

Title: USN-5692-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5692-1
Priorities: high,medium
Description:
David Bouman and Billy Jheng Bing Jhong discovered that a race condition
existed in the io_uring subsystem in the Linux kernel, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-2602)

Sönke Huster discovered that an integer overflow vulnerability existed in
the WiFi driver stack in the Linux kernel, leading to a buffer overflow. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-41674)

Sönke Huster discovered that a use-after-free vulnerability existed in the
WiFi driver stack in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-42719)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly perform reference counting in some situations, leading to a
use-after-free vulnerability. A physically proximate attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-42720)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel did
not properly handle BSSID/SSID lists in some situations. A physically
proximate attacker could use this to cause a denial of service (infinite
loop). (CVE-2022-42721)

Sönke Huster discovered that the WiFi driver stack in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2022-42722)
CVEs:
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-42722
- https://ubuntu.com/security/CVE-2022-41674
- https://ubuntu.com/security/CVE-2022-42721
- https://ubuntu.com/security/CVE-2022-2602
- https://ubuntu.com/security/CVE-2022-42719
- https://ubuntu.com/security/CVE-2022-42720

Title: USN-5636-1: SoS vulnerability
URL: https://ubuntu.com/security/notices/USN-5636-1
Priorities: medium
Description:
It was discovered that SoS incorrectly handled certain data.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-2806

Title: USN-5658-1: DHCP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5658-1
Priorities: medium
Description:
It was discovered that DHCP incorrectly handled option reference counting.
A remote attacker could possibly use this issue to cause DHCP servers to
crash, resulting in a denial of service. (CVE-2022-2928)

It was discovered that DHCP incorrectly handled certain memory operations.
A remote attacker could possibly use this issue to cause DHCP clients and
servers to consume resources, leading to a denial of service.
(CVE-2022-2929)
CVEs:
- https://ubuntu.com/security/CVE-2022-2928
- https://ubuntu.com/security/CVE-2022-2929
- https://ubuntu.com/security/CVE-2022-2929
- https://ubuntu.com/security/CVE-2022-2928

Title: USN-5694-1: LibreOffice vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5694-1
Priorities: medium,low
Description:
It was discovered that LibreOffice incorrectly handled links using the
Office URI Schemes. If a user were tricked into opening a specially
crafted document, a remote attacker could use this issue to execute
arbitrary scripts. (CVE-2022-3140)

Thomas Florian discovered that LibreOffice incorrectly handled crashes when
an encrypted document is open. If the document is recovered upon restarting
LibreOffice, subsequent saves of the document were unencrypted. This issue
only affected Ubuntu 18.04 LTS. (CVE-2020-12801)

Jens Müller discovered that LibreOffice incorrectly handled certain
documents containing forms. If a user were tricked into opening a specially
crafted document, a remote attacker could overwrite arbitrary files when
the form was submitted. This issue only affected Ubuntu 18.04 LTS.
(CVE-2020-12803)

It was discovered that LibreOffice incorrectly validated macro signatures.
If a user were tricked into opening a specially crafted document, a remote
attacker could possibly use this issue to execute arbitrary macros. This
issue only affected Ubuntu 18.04 LTS. (CVE-2022-26305)

It was discovered that Libreoffice incorrectly handled encrypting the
master key provided by the user for storing passwords for web connections.
A local attacker could possibly use this issue to obtain access to
passwords stored in the user’s configuration data. This issue only affected
Ubuntu 18.04 LTS. (CVE-2022-26306, CVE-2022-26307)
CVEs:
- https://ubuntu.com/security/CVE-2022-3140
- https://ubuntu.com/security/CVE-2020-12801
- https://ubuntu.com/security/CVE-2020-12803
- https://ubuntu.com/security/CVE-2022-26305
- https://ubuntu.com/security/CVE-2022-26306
- https://ubuntu.com/security/CVE-2022-26307
- https://ubuntu.com/security/CVE-2022-3140
- https://ubuntu.com/security/CVE-2022-26307
- https://ubuntu.com/security/CVE-2022-26306
- https://ubuntu.com/security/CVE-2022-26305
- https://ubuntu.com/security/CVE-2020-12803
- https://ubuntu.com/security/CVE-2020-12801

Title: USN-5688-1: Libksba vulnerability
URL: https://ubuntu.com/security/notices/USN-5688-1
Priorities: high
Description:
It was discovered that an integer overflow could be triggered in Libksba
when decoding certain data. An attacker could use this issue to cause a
denial of service (application crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-3515

Title: USN-5634-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5634-1
Priorities: medium
Description:
Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash).
CVEs:
- https://ubuntu.com/security/CVE-2022-36946

Title: USN-5685-1: FRR vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5685-1
Priorities: medium
Description:
It was discovered that FRR incorrectly handled parsing certain BGP
messages. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service. (CVE-2022-37032)

It was discovered that FRR incorrectly handled processing certain BGP
messages. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service, obtain sensitive information,
or execute arbitrary code. (CVE-2022-37035)
CVEs:
- https://ubuntu.com/security/CVE-2022-37032
- https://ubuntu.com/security/CVE-2022-37035
- https://ubuntu.com/security/CVE-2022-37032
- https://ubuntu.com/security/CVE-2022-37035

Title: USN-5570-2: zlib vulnerability
URL: https://ubuntu.com/security/notices/USN-5570-2
Priorities: medium
Description:
USN-5570-1 fixed a vulnerability in zlib. This update provides the
corresponding update for Ubuntu 22.04 LTS and Ubuntu 20.04 LTS.

Original advisory details:

Evgeny Legerov discovered that zlib incorrectly handled memory when
performing certain inflate operations. An attacker could use this issue
to cause zlib to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-37434

Title: USN-5686-1: Git vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5686-1
Priorities: medium
Description:
Cory Snider discovered that Git incorrectly handled certain symbolic links.
An attacker could possibly use this issue to cause an unexpected behaviour.
(CVE-2022-39253)

Kevin Backhouse discovered that Git incorrectly handled certain command strings.
An attacker could possibly use this issue to arbitrary code execution.
(CVE-2022-39260)
CVEs:
- https://ubuntu.com/security/CVE-2022-39253
- https://ubuntu.com/security/CVE-2022-39260
- https://ubuntu.com/security/CVE-2022-39260
- https://ubuntu.com/security/CVE-2022-39253

Title: USN-5651-1: strongSwan vulnerability
URL: https://ubuntu.com/security/notices/USN-5651-1
Priorities: medium
Description:
Lahav Schlesinger discovered that strongSwan incorrectly handled certain OCSP URIs and
and CRL distribution points (CDP) in certificates. A remote attacker could
possibly use this issue to initiate IKE_SAs and send crafted certificates
that contain URIs pointing to servers under their control, which can lead
to a denial-of-service attack.
CVEs:
- https://ubuntu.com/security/CVE-2022-40617

Title: USN-5670-1: .NET 6 vulnerability
URL: https://ubuntu.com/security/notices/USN-5670-1
Priorities: medium
Description:
Edward Thomson discovered that .NET 6 incorrectly handled
permissions for local NuGet cache. A local attacker could
possibly use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-41032

Title: USN-5641-1: Squid vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5641-1
Priorities: medium
Description:
Mikhail Evdokimov discovered that Squid incorrectly handled cache manager
ACLs. A remote attacker could possibly use this issue to obtain sensitive
information. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-41317)

It was discovered that Squid incorrectly handled SSPI and SMB
authentication. A remote attacker could use this issue to cause Squid to
crash, resulting in a denial of service, or possibly obtain sensitive
information. (CVE-2022-41318)
CVEs:
- https://ubuntu.com/security/CVE-2022-41317
- https://ubuntu.com/security/CVE-2022-41318
- https://ubuntu.com/security/CVE-2022-41317
- https://ubuntu.com/security/CVE-2022-41318

Title: USN-5653-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-5653-1
Priorities: medium
Description:
Benjamin Balder Bach discovered that Django incorrectly handled certain
internationalized URLs. A remote attacker could possibly use this issue to
cause Django to crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-41323

1.18

Available in the Broadcom Support portal

Release Date: September 21, 2022

Metadata:

BOSH Agent Version: 2.468.0

USNs:


Title: USN-5585-1: Jupyter Notebook vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5585-1
Priorities: medium,low
Description:
It was discovered that Jupyter Notebook incorrectly handled certain notebooks.
An attacker could possibly use this issue of lack of Content Security Policy
in Nbconvert to perform cross-site scripting (XSS) attacks on the notebook
server. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-19351)

It was discovered that Jupyter Notebook incorrectly handled certain SVG
documents. An attacker could possibly use this issue to perform cross-site
scripting (XSS) attacks. This issue only affected Ubuntu 18.04 LTS.
(CVE-2018-21030)

It was discovered that Jupyter Notebook incorrectly filtered certain URLs on
the login page. An attacker could possibly use this issue to perform
open-redirect attack. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-10255)

It was discovered that Jupyter Notebook had an incomplete fix for
CVE-2019-10255. An attacker could possibly use this issue to perform
open-redirect attack using empty netloc. (CVE-2019-10856)

It was discovered that Jupyter Notebook incorrectly handled the inclusion of
remote pages on Jupyter server. An attacker could possibly use this issue to
perform cross-site script inclusion (XSSI) attacks. This issue only affected
Ubuntu 18.04 LTS. (CVE-2019-9644)

It was discovered that Jupyter Notebook incorrectly filtered certain URLs to a
notebook. An attacker could possibly use this issue to perform open-redirect
attack. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2020-26215)

It was discovered that Jupyter Notebook server access logs were not protected.
An attacker having access to the notebook server could possibly use this issue
to get access to steal sensitive information such as auth/cookies.
(CVE-2022-24758)

It was discovered that Jupyter Notebook incorrectly configured hidden files on
the server. An authenticated attacker could possibly use this issue to see
unwanted sensitive hidden files from the server which may result in getting
full access to the server. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-29238)
CVEs:
- https://ubuntu.com/security/CVE-2018-19351
- https://ubuntu.com/security/CVE-2018-21030
- https://ubuntu.com/security/CVE-2019-10255
- https://ubuntu.com/security/CVE-2019-10255
- https://ubuntu.com/security/CVE-2019-10856
- https://ubuntu.com/security/CVE-2019-9644
- https://ubuntu.com/security/CVE-2020-26215
- https://ubuntu.com/security/CVE-2022-24758
- https://ubuntu.com/security/CVE-2022-29238
- https://ubuntu.com/security/CVE-2022-24758
- https://ubuntu.com/security/CVE-2019-9644
- https://ubuntu.com/security/CVE-2022-29238
- https://ubuntu.com/security/CVE-2018-21030
- https://ubuntu.com/security/CVE-2020-26215
- https://ubuntu.com/security/CVE-2019-10856
- https://ubuntu.com/security/CVE-2019-10255
- https://ubuntu.com/security/CVE-2018-19351

Title: USN-5575-1: Libxslt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5575-1
Priorities: medium
Description:
Nicolas Grégoire discovered that Libxslt incorrectly handled certain XML.
An attacker could possibly use this issue to expose sensitive information
or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-5815)

Alexey Neyman incorrectly handled certain HTML pages.
An attacker could possibly use this issue to expose sensitive information
or execute arbitrary code. (CVE-2021-30560)
CVEs:
- https://ubuntu.com/security/CVE-2019-5815
- https://ubuntu.com/security/CVE-2021-30560
- https://ubuntu.com/security/CVE-2019-5815
- https://ubuntu.com/security/CVE-2021-30560

Title: USN-5619-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5619-1
Priorities: negligible,medium,low
Description:
It was discovered that LibTIFF was not properly performing the calculation
of data that would eventually be used as a reference for bound-checking
operations. An attacker could possibly use this issue to cause a denial of
service or to expose sensitive information. This issue only affected Ubuntu
18.04 LTS. (CVE-2020-19131)

It was discovered that LibTIFF was not properly terminating a function
execution when processing incorrect data. An attacker could possibly use
this issue to cause a denial of service or to expose sensitive information.
This issue only affected Ubuntu 18.04 LTS. (CVE-2020-19144)

It was discovered that LibTIFF did not properly manage memory under certain
circumstances. If a user were tricked into opening a specially crafted TIFF
file using tiffinfo tool, an attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-1354)

It was discovered that LibTIFF did not properly manage memory under certain
circumstances. If a user were tricked into opening a specially crafted TIFF
file using tiffcp tool, an attacker could possibly use this issue to
cause a denial of service. (CVE-2022-1355)

It was discovered that LibTIFF was not properly performing checks to avoid
division calculations where the denominator value was zero, which could
lead to an undefined behaviour situation via a specially crafted file. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
CVEs:
- https://ubuntu.com/security/CVE-2020-19131
- https://ubuntu.com/security/CVE-2020-19144
- https://ubuntu.com/security/CVE-2022-1354
- https://ubuntu.com/security/CVE-2022-1355
- https://ubuntu.com/security/CVE-2022-2056
- https://ubuntu.com/security/CVE-2022-2057
- https://ubuntu.com/security/CVE-2022-2058
- https://ubuntu.com/security/CVE-2020-19144
- https://ubuntu.com/security/CVE-2022-1354
- https://ubuntu.com/security/CVE-2022-2056
- https://ubuntu.com/security/CVE-2022-2058
- https://ubuntu.com/security/CVE-2022-2057
- https://ubuntu.com/security/CVE-2020-19131
- https://ubuntu.com/security/CVE-2022-1355

Title: USN-5596-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5596-1
Priorities: medium
Description:
Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)

It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)
CVEs:
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2021-33655

Title: USN-5594-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5594-1
Priorities: medium,low
Description:
Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)

It was discovered that the IP implementation in the Linux kernel did not
provide sufficient randomization when calculating port offsets. An attacker
could possibly use this to expose sensitive information. (CVE-2022-1012)

Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)

Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor
implementation in the Linux kernel did not properly handle an illegal
instruction in a guest, resulting in a null pointer dereference. An
attacker in a guest VM could use this to cause a denial of service (system
crash) in the host OS. (CVE-2022-1852)

It was discovered that the UDF file system implementation in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1943)

Gerald Lee discovered that the NTFS file system implementation in the Linux
kernel did not properly handle certain error conditions, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information.
(CVE-2022-1973)

It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-2503)

Zheyu Ma discovered that the Intel iSMT SMBus host controller driver in the
Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-2873)

Selim Enes Karaduman discovered that a race condition existed in the pipe
buffers implementation of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly escalate
privileges. (CVE-2022-2959)
CVEs:
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-2503

Title: USN-5599-1: Linux kernel (Oracle) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5599-1
Priorities: medium,low
Description:
Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)

It was discovered that the IP implementation in the Linux kernel did not
provide sufficient randomization when calculating port offsets. An attacker
could possibly use this to expose sensitive information. (CVE-2022-1012)

Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)

Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor
implementation in the Linux kernel did not properly handle an illegal
instruction in a guest, resulting in a null pointer dereference. An
attacker in a guest VM could use this to cause a denial of service (system
crash) in the host OS. (CVE-2022-1852)

It was discovered that the UDF file system implementation in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1943)

Gerald Lee discovered that the NTFS file system implementation in the Linux
kernel did not properly handle certain error conditions, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information.
(CVE-2022-1973)

It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-2503)

Zheyu Ma discovered that the Intel iSMT SMBus host controller driver in the
Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-2873)

Selim Enes Karaduman discovered that a race condition existed in the pipe
buffers implementation of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly escalate
privileges. (CVE-2022-2959)
CVEs:
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-2873

Title: USN-5602-1: Linux kernel (Raspberry Pi) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5602-1
Priorities: medium,low
Description:
Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)

It was discovered that the IP implementation in the Linux kernel did not
provide sufficient randomization when calculating port offsets. An attacker
could possibly use this to expose sensitive information. (CVE-2022-1012)

Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)

Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor
implementation in the Linux kernel did not properly handle an illegal
instruction in a guest, resulting in a null pointer dereference. An
attacker in a guest VM could use this to cause a denial of service (system
crash) in the host OS. (CVE-2022-1852)

It was discovered that the UDF file system implementation in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1943)

Gerald Lee discovered that the NTFS file system implementation in the Linux
kernel did not properly handle certain error conditions, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information.
(CVE-2022-1973)

It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-2503)

Zheyu Ma discovered that the Intel iSMT SMBus host controller driver in the
Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-2873)

Selim Enes Karaduman discovered that a race condition existed in the pipe
buffers implementation of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly escalate
privileges. (CVE-2022-2959)
CVEs:
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-2873

Title: USN-5616-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5616-1
Priorities: medium,low
Description:
Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe)
Ethernet driver for the Linux kernel performed insufficient control flow
management. A local attacker could possibly use this to cause a denial of
service. (CVE-2021-33061)

Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation
in the Linux kernel did notprovide sufficient randomization when
calculating port offsets. An attacker could possibly use this to expose
sensitive information. (CVE-2022-1012, CVE-2022-32296)

Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)

Qiuhao Li, Gaoning Pan, and Yongkang Jia discovered that the KVM hypervisor
implementation in the Linux kernel did not properly handle an illegal
instruction in a guest, resulting in a null pointer dereference. An
attacker in a guest VM could use this to cause a denial of service (system
crash) in the host OS. (CVE-2022-1852)

It was discovered that the UDF file system implementation in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-1943)

Gerald Lee discovered that the NTFS file system implementation in the Linux
kernel did not properly handle certain error conditions, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly expose sensitive information.
(CVE-2022-1973)

It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-2503)

Zheyu Ma discovered that the Intel iSMT SMBus host controller driver in the
Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2022-2873)

Selim Enes Karaduman discovered that a race condition existed in the pipe
buffers implementation of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly escalate
privileges. (CVE-2022-2959)
CVEs:
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2022-1973
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1852
- https://ubuntu.com/security/CVE-2022-2959
- https://ubuntu.com/security/CVE-2021-33061
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-1943
- https://ubuntu.com/security/CVE-2022-2873
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-2503

Title: USN-5614-1: Wayland vulnerability
URL: https://ubuntu.com/security/notices/USN-5614-1
Priorities: medium
Description:
It was discovered that Wayland incorrectly handled reference counting
certain objects. An attacker could use this issue to cause Wayland to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2021-3782

Title: USN-5607-1: GDK-PixBuf vulnerability
URL: https://ubuntu.com/security/notices/USN-5607-1
Priorities: medium
Description:
It was discovered that GDK-PixBuf incorrectly handled certain images.
An attacker could possibly use this issue to execute arbitrary code
or cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2021-44648

Title: USN-5613-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5613-1
Priorities: medium
Description:
It was discovered that Vim was not properly performing bounds checks
when executing spell suggestion commands. An attacker could possibly use
this issue to cause a denial of service or execute arbitrary code.
(CVE-2022-0943)

It was discovered that Vim was using freed memory when dealing with
regular expressions through its old regular expression engine. If a user
were tricked into opening a specially crafted file, an attacker could
crash the application, leading to a denial of service, or possibly achieve
code execution. (CVE-2022-1154)

It was discovered that Vim was not properly performing checks on name of
lambda functions. An attacker could possibly use this issue to cause a
denial of service. This issue affected only Ubuntu 22.04 LTS.
(CVE-2022-1420)

It was discovered that Vim was incorrectly performing bounds checks
when processing invalid commands with composing characters in Ex
mode. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2022-1616)

It was discovered that Vim was not properly processing latin1 data
when issuing Ex commands. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2022-1619)

It was discovered that Vim was not properly performing memory
management when dealing with invalid regular expression patterns in
buffers. An attacker could possibly use this issue to cause a denial of
service. (CVE-2022-1620)

It was discovered that Vim was not properly processing invalid bytes
when performing spell check operations. An attacker could possibly use
this issue to cause a denial of service or execute arbitrary code.
(CVE-2022-1621)
CVEs:
- https://ubuntu.com/security/CVE-2022-0943
- https://ubuntu.com/security/CVE-2022-1154
- https://ubuntu.com/security/CVE-2022-1420
- https://ubuntu.com/security/CVE-2022-1616
- https://ubuntu.com/security/CVE-2022-1619
- https://ubuntu.com/security/CVE-2022-1620
- https://ubuntu.com/security/CVE-2022-1621
- https://ubuntu.com/security/CVE-2022-1621
- https://ubuntu.com/security/CVE-2022-1616
- https://ubuntu.com/security/CVE-2022-1620
- https://ubuntu.com/security/CVE-2022-1154
- https://ubuntu.com/security/CVE-2022-1420
- https://ubuntu.com/security/CVE-2022-0943
- https://ubuntu.com/security/CVE-2022-1619

Title: USN-5612-1: Intel Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-5612-1
Priorities: medium
Description:
Pietro Borrello, Andreas Kogler, Martin Schwarzl, Daniel Gruss, Michael
Schwarz and Moritz Lipp discovered that some Intel processors did not
properly clear data between subsequent xAPIC MMIO reads. This could allow a
local attacker to compromise SGX enclaves.
CVEs:
- https://ubuntu.com/security/CVE-2022-21233

Title: USN-5608-1: DPDK vulnerability
URL: https://ubuntu.com/security/notices/USN-5608-1
Priorities: medium
Description:
It was discovered that DPDK incorrectly handled certain Vhost headers. A
remote attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-2132

Title: USN-5610-1: rust-regex vulnerability
URL: https://ubuntu.com/security/notices/USN-5610-1
Priorities: medium
Description:
Addison Crump discovered that rust-regex did not properly limit
the complexity of the regular expressions (regex) it parses.
An attacker could possibly use this issue to cause a denial of
service.
CVEs:
- https://ubuntu.com/security/CVE-2022-24713

Title: USN-5576-1: Twisted vulnerability
URL: https://ubuntu.com/security/notices/USN-5576-1
Priorities: medium
Description:
It was discovered that Twisted incorrectly parsed some types of HTTP requests
in its web server implementation. In certain proxy or multi-server
configurations, a remote attacker could craft malicious HTTP requests in order
to obtain sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-24801

Title: USN-5584-1: Schroot vulnerability
URL: https://ubuntu.com/security/notices/USN-5584-1
Priorities: medium
Description:
It was discovered that Schroot incorrectly handled certain Schroot names.
An attacker could possibly use this issue to break schroot’s internal
state causing a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-2787

Title: USN-5578-1: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-5578-1
Priorities: medium
Description:
It was discovered that Open VM Tools incorrectly handled certain requests.
An attacker inside the guest could possibly use this issue to gain root
privileges inside the virtual machine.
CVEs:
- https://ubuntu.com/security/CVE-2022-31676

Title: USN-5611-1: WebKitGTK vulnerability
URL: https://ubuntu.com/security/notices/USN-5611-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-32893

Title: USN-5606-1: poppler vulnerability
URL: https://ubuntu.com/security/notices/USN-5606-1
Priorities: medium
Description:
It was discovered that poppler incorrectly handled certain
PDF. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-38784

1.8

Release Date: August 22, 2022

Metadata:

BOSH Agent Version: 2.461.0

USNs:


Title: USN-5542-1: Samba vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5542-1
Priorities: low,medium
Description:
It was discovered that Samba did not handle MaxQueryDuration when being
used in AD DC configurations, contrary to expectations. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-3670)

Luke Howard discovered that Samba incorrectly handled certain restrictions
associated with changing passwords. A remote attacker being requested to
change passwords could possibly use this issue to escalate privileges.
(CVE-2022-2031)

Luca Moro discovered that Samba incorrectly handled certain SMB1
communications. A remote attacker could possibly use this issue to obtain
sensitive memory contents. (CVE-2022-32742)

Joseph Sutton discovered that Samba incorrectly handled certain password
change requests. A remote attacker could use this issue to change passwords
of other users, resulting in privilege escalation. (CVE-2022-32744)

Joseph Sutton discovered that Samba incorrectly handled certain LDAP add or
modify requests. A remote attacker could possibly use this issue to cause
Samba to crash, resulting in a denial of service. (CVE-2022-32745)

Joseph Sutton and Andrew Bartlett discovered that Samba incorrectly handled
certain LDAP add or modify requests. A remote attacker could possibly use
this issue to cause Samba to crash, resulting in a denial of service.
(CVE-2022-32746)
CVEs:
- https://ubuntu.com/security/CVE-2021-3670
- https://ubuntu.com/security/CVE-2022-2031
- https://ubuntu.com/security/CVE-2022-32742
- https://ubuntu.com/security/CVE-2022-32744
- https://ubuntu.com/security/CVE-2022-32745
- https://ubuntu.com/security/CVE-2022-32746
- https://ubuntu.com/security/CVE-2022-32744
- https://ubuntu.com/security/CVE-2022-32745
- https://ubuntu.com/security/CVE-2022-32742
- https://ubuntu.com/security/CVE-2022-32746
- https://ubuntu.com/security/CVE-2021-3670
- https://ubuntu.com/security/CVE-2022-2031

Title: USN-5561-1: GNOME Web vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5561-1
Priorities: medium
Description:
It was discovered that GNOME Web incorrectly filtered certain strings. A
remote attacker could use this issue to perform cross-site scripting (XSS)
attacks. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-45085,
CVE-2021-45086, CVE-2021-45087)

It was discovered that GNOME Web incorrectly handled certain long page
titles. A remote attacker could use this issue to cause GNOME Web to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2022-29536)
CVEs:
- https://ubuntu.com/security/CVE-2021-45085
- https://ubuntu.com/security/CVE-2021-45086
- https://ubuntu.com/security/CVE-2021-45087
- https://ubuntu.com/security/CVE-2022-29536
- https://ubuntu.com/security/CVE-2022-29536
- https://ubuntu.com/security/CVE-2021-45086
- https://ubuntu.com/security/CVE-2021-45087
- https://ubuntu.com/security/CVE-2021-45085

Title: USN-5538-1: libtirpc vulnerability
URL: https://ubuntu.com/security/notices/USN-5538-1
Priorities: medium
Description:
It was discovered that libtirpc incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2021-46828

Title: USN-5544-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5544-1
Priorities: medium
Description:
It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

Felix Fu discovered that the Sun RPC implementation in the Linux kernel did
not properly handle socket states, leading to a use-after-free
vulnerability. A remote attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-28893)

Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)
CVEs:
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-28893
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-28893
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-34918

Title: USN-5546-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5546-1
Priorities: high,medium
Description:
Neil Madden discovered that OpenJDK did not properly verify ECDSA
signatures. A remote attacker could possibly use this issue to insert,
edit or obtain sensitive information. This issue only affected OpenJDK
17 and OpenJDK 18. (CVE-2022-21449)

It was discovered that OpenJDK incorrectly limited memory when compiling a
specially crafted XPath expression. An attacker could possibly use this
issue to cause a denial of service. This issue was fixed in OpenJDK 8 and
OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11
and OpenJDK 17. (CVE-2022-21426)

It was discovered that OpenJDK incorrectly handled converting certain
object arguments into their textual representations. An attacker could
possibly use this issue to cause a denial of service. This issue was
fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed
this issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21434)

It was discovered that OpenJDK incorrectly validated the encoded length of
certain object identifiers. An attacker could possibly use this issue to
cause a denial of service. This issue was fixed in OpenJDK 8 and OpenJDK 18.
USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11 and OpenJDK 17.
(CVE-2022-21443)

It was discovered that OpenJDK incorrectly validated certain paths. An
attacker could possibly use this issue to bypass the secure validation
feature and expose sensitive information in XML files. This issue was
fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this
issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21476)

It was discovered that OpenJDK incorrectly parsed certain URI strings. An
attacker could possibly use this issue to make applications accept
invalid of malformed URI strings. This issue was fixed in OpenJDK 8 and
OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11
and OpenJDK 17. (CVE-2022-21496)

It was discovered that OpenJDK incorrectly generated class code in the
Hotspot component. An attacker could possibly use this issue to obtain
sensitive information. (CVE-2022-21540)

It was dicovered that OpenJDK incorrectly restricted access to the
invokeBasic() method in the Hotspot component. An attacker could possibly
use this issue to insert, edit or obtain sensitive information.
(CVE-2022-21541)

It was discovered that OpenJDK incorrectly computed exponentials. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. This issue only affected OpenJDK 17.
(CVE-2022-21549)

It was discovered that OpenJDK includes a copy of Xalan that incorrectly
handled integer truncation. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-34169)
CVEs:
- https://ubuntu.com/security/CVE-2022-21449
- https://ubuntu.com/security/CVE-2022-21426
- https://ubuntu.com/security/CVE-2022-21434
- https://ubuntu.com/security/CVE-2022-21443
- https://ubuntu.com/security/CVE-2022-21476
- https://ubuntu.com/security/CVE-2022-21496
- https://ubuntu.com/security/CVE-2022-21540
- https://ubuntu.com/security/CVE-2022-21541
- https://ubuntu.com/security/CVE-2022-21549
- https://ubuntu.com/security/CVE-2022-34169
- https://ubuntu.com/security/CVE-2022-21541
- https://ubuntu.com/security/CVE-2022-21540
- https://ubuntu.com/security/CVE-2022-21549
- https://ubuntu.com/security/CVE-2022-21426
- https://ubuntu.com/security/CVE-2022-21476
- https://ubuntu.com/security/CVE-2022-34169
- https://ubuntu.com/security/CVE-2022-21443
- https://ubuntu.com/security/CVE-2022-21449
- https://ubuntu.com/security/CVE-2022-21434
- https://ubuntu.com/security/CVE-2022-21496

Title: USN-5537-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5537-1
Priorities: low,medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.30 in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
Ubuntu 18.04 LTS has been updated to MySQL 5.7.39.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-39.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-30.html
https://www.oracle.com/security-alerts/cpujul2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21517
- https://ubuntu.com/security/CVE-2022-21569
- https://ubuntu.com/security/CVE-2022-21515
- https://ubuntu.com/security/CVE-2022-21509
- https://ubuntu.com/security/CVE-2022-21530
- https://ubuntu.com/security/CVE-2022-21528
- https://ubuntu.com/security/CVE-2022-21529
- https://ubuntu.com/security/CVE-2022-21553
- https://ubuntu.com/security/CVE-2022-21525
- https://ubuntu.com/security/CVE-2022-21537
- https://ubuntu.com/security/CVE-2022-21531
- https://ubuntu.com/security/CVE-2022-21534
- https://ubuntu.com/security/CVE-2022-21526
- https://ubuntu.com/security/CVE-2022-21538
- https://ubuntu.com/security/CVE-2022-21527
- https://ubuntu.com/security/CVE-2022-21539
- https://ubuntu.com/security/CVE-2022-21547
- https://ubuntu.com/security/CVE-2022-21522

Title: USN-5568-1: WebKitGTK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5568-1
Priorities: medium
Description:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-2294
- https://ubuntu.com/security/CVE-2022-32792
- https://ubuntu.com/security/CVE-2022-32816

Title: USN-5543-1: Net-SNMP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5543-1
Priorities: medium
Description:
Yu Zhang and Nanyu Zhong discovered that Net-SNMP incorrectly handled
memory operations when processing certain requests. A remote attacker could
use this issue to cause Net-SNMP to crash, resulting in a denial of
service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-24806
- https://ubuntu.com/security/CVE-2022-24808
- https://ubuntu.com/security/CVE-2022-24809
- https://ubuntu.com/security/CVE-2022-24805
- https://ubuntu.com/security/CVE-2022-24810
- https://ubuntu.com/security/CVE-2022-24807

Title: USN-5564-1: Linux kernel (Intel IoTG) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5564-1
Priorities: high,medium,low
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)

It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)

It was discovered that the implementation of POSIX timers in the Linux
kernel did not properly clean up timers in some situations. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-2585)

It was discovered that the eBPF implementation in the Linux kernel did not
properly prevent writes to kernel objects in BPF_BTF_LOAD commands. A
privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-0500)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-1734)

Yongkang Jia discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle guest TLB mapping invalidation requests in
some situations. An attacker in a guest VM could use this to cause a denial
of service (system crash) in the host OS. (CVE-2022-1789)

Duoming Zhou discovered a race condition in the NFC subsystem in the Linux
kernel, leading to a use-after-free vulnerability. A privileged local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-1974)

Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not
properly prevent context switches from occurring during certain atomic
context operations. A privileged local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1975)

Felix Fu discovered that the Sun RPC implementation in the Linux kernel did
not properly handle socket states, leading to a use-after-free
vulnerability. A remote attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-28893)

Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)

Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)

Minh Yuan discovered that the floppy driver in the Linux kernel contained a
race condition in some situations, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-33981)

Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-0500
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-1789
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-28893
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-33981
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-33981
- https://ubuntu.com/security/CVE-2022-0500
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-28893
- https://ubuntu.com/security/CVE-2022-1789
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679

Title: USN-5566-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5566-1
Priorities: high,medium
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)

It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)

It was discovered that the implementation of POSIX timers in the Linux
kernel did not properly clean up timers in some situations. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-2585)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

Felix Fu discovered that the Sun RPC implementation in the Linux kernel did
not properly handle socket states, leading to a use-after-free
vulnerability. A remote attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-28893)

Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)

Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)

Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-28893
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-28893

Title: USN-5567-1: Linux kernel (OEM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5567-1
Priorities: high
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)

It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)

It was discovered that the implementation of POSIX timers in the Linux
kernel did not properly clean up timers in some situations. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-2585)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-2586

Title: USN-5565-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5565-1
Priorities: high,medium
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)

It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)

It was discovered that the implementation of POSIX timers in the Linux
kernel did not properly clean up timers in some situations. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-2585)

Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)

Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2585
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-2586

Title: USN-5571-1: PostgreSQL vulnerability
URL: https://ubuntu.com/security/notices/USN-5571-1
Priorities: medium
Description:
Sven Klemm discovered that PostgreSQL incorrectly handled extensions. An
attacker could possibly use this issue to execute arbitrary code when
extensions are created or updated.
CVEs:
- https://ubuntu.com/security/CVE-2022-2625

Title: USN-5569-1: Unbound vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5569-1
Priorities: medium
Description:
Xiang Li discovered that Unbound incorrectly handled delegation caching.
A remote attacker could use this issue to keep rogue domain names
resolvable long after they have been revoked.
CVEs:
- https://ubuntu.com/security/CVE-2022-30699
- https://ubuntu.com/security/CVE-2022-30698

Title: USN-5547-1: NVIDIA graphics drivers vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5547-1
Priorities: high,medium,low
Description:
Le Wu discovered that the NVIDIA graphics drivers did not properly perform
input validation in some situations. A local user could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-31607)

Tal Lossos discovered that the NVIDIA graphics drivers incorrectly handled
certain memory operations, leading to a null-pointer dereference. A local
attacker could use this to cause a denial of service. (CVE-2022-31615)

Artem S. Tashkinov discovered that the NVIDIA graphics drivers Dynamic
Boost D-Bus component did not properly restrict access to its endpoint.
When enabled in non-default configurations, a local attacker could use this
to cause a denial of service or possibly execute arbitrary code.
(CVE-2022-31608)
CVEs:
- https://ubuntu.com/security/CVE-2022-31607
- https://ubuntu.com/security/CVE-2022-31615
- https://ubuntu.com/security/CVE-2022-31608
- https://ubuntu.com/security/CVE-2022-31607
- https://ubuntu.com/security/CVE-2022-31615
- https://ubuntu.com/security/CVE-2022-31608

Title: USN-5532-1: Bottle vulnerability
URL: https://ubuntu.com/security/notices/USN-5532-1
Priorities: medium
Description:
It was discovered that Bottle incorrectly handled errors during early request
binding. An attacker could possibly use this issue to disclose sensitive
information. (CVE-2022-31799)
CVEs:
- https://ubuntu.com/security/CVE-2022-31799
- https://ubuntu.com/security/CVE-2022-31799

Title: USN-5531-1: protobuf-c vulnerability
URL: https://ubuntu.com/security/notices/USN-5531-1
Priorities: medium
Description:
Pietro Borrello discovered that protobuf-c contained an invalid
arithmetic shift. This vulnerability allowed attackers to cause a
denial of service (system crash) via unspecified vectors
(CVE-2022-33070).

It was discovered that protobuf-c contained an unsigned integer
overflow. This vulnerability allowed attackers to cause a denial of
service (system crash) via unspecified vectors.

Todd Miller discovered that protobuf-c contained a possible NULL
dereference. This could cause a vulnerability that allowed attackers to
cause a denial of service (system crash) via unspecified vectors.
CVEs:
- https://ubuntu.com/security/CVE-2022-33070
- https://ubuntu.com/security/CVE-2022-33070

Title: USN-5545-1: Linux kernel (OEM) vulnerability
URL: https://ubuntu.com/security/notices/USN-5545-1
Priorities: medium
Description:
Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations.
CVEs:
- https://ubuntu.com/security/CVE-2022-34918

1.2

Release Date: July 28, 2022

Metadata:

BOSH Agent Version: 2.461.0

First GA version of ubuntu-jammy

Xenial Stemcells

The following sections describe each Xenial stemcell release.

621.x

This section includes release notes for the 621.x line of Linux stemcells used with Tanzu Operations Manager.

621.969

Available in the Broadcom Support portal

Release Date: June 12, 2024

Metadata:

BOSH Agent Version: 2.268.258
Kernel Version: 4.15.0.225.237~16.04.1

USNs:


Title: USN-6824-1: GIFLIB vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6824-1
Priorities: low
Description:
It was discovered that GIFLIB incorrectly handled certain GIF files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2021-40633, CVE-2022-28506, CVE-2023-39742)
CVEs:
- https://ubuntu.com/security/CVE-2021-40633
- https://ubuntu.com/security/CVE-2022-28506
- https://ubuntu.com/security/CVE-2023-39742
- https://ubuntu.com/security/CVE-2023-39742
- https://ubuntu.com/security/CVE-2021-40633
- https://ubuntu.com/security/CVE-2022-28506

Title: USN-6806-1: GDK-PixBuf vulnerability
URL: https://ubuntu.com/security/notices/USN-6806-1
Priorities: medium
Description:
Pedro Ribeiro and Vitor Pedreira discovered that the GDK-PixBuf
library did not properly handle certain ANI files. An attacker
could use this flaw to cause GDK-PixBuf to crash, resulting in
a denial of service, or to possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-48622

Title: USN-6797-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6797-1
Priorities: medium
Description:
It was discovered that some 3rd and 4th Generation Intel® Xeon® Processors
did not properly restrict access to certain hardware features when using
Intel® SGX or Intel® TDX. This may allow a privileged local user to
potentially further escalate their privileges on the system. This issue only
affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 16.04 LTS. (CVE-2023-22655)

It was discovered that some Intel® Atom® Processors did not properly clear
register state when performing various operations. A local attacker could
use this to obtain sensitive information via a transient execution attack.
This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-28746)

It was discovered that some Intel® Processors did not properly clear the
state of various hardware structures when switching execution contexts. A
local attacker could use this to access privileged information. This issue only
affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 16.04 LTS. (CVE-2023-38575)

It was discovered that some Intel® Processors did not properly enforce bus
lock regulator protections. A remote attacker could use this to cause a
denial of service. This issue only affected Ubuntu 23.10, Ubuntu 22.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. (CVE-2023-39368)

It was discovered that some Intel® Xeon® D Processors did not properly
calculate the SGX base key when using Intel® SGX. A privileged local
attacker could use this to obtain sensitive information. This issue only
affected Ubuntu 23.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 16.04 LTS. (CVE-2023-43490)

It was discovered that some Intel® Processors did not properly protect against
concurrent accesses. A local attacker could use this to obtain sensitive
information. (CVE-2023-45733)

It was discovered that some Intel® Processors TDX module software did not
properly validate input. A privileged local attacker could use this information
to potentially further escalate their privileges on the system.
(CVE-2023-45745, CVE-2023-47855)

It was discovered that some Intel® Core™ Ultra processors did not properly
handle particular instruction sequences. A local attacker could use this
issue to cause a denial of service. (CVE-2023-46103)
CVEs:
- https://ubuntu.com/security/CVE-2023-22655
- https://ubuntu.com/security/CVE-2023-28746
- https://ubuntu.com/security/CVE-2023-38575
- https://ubuntu.com/security/CVE-2023-39368
- https://ubuntu.com/security/CVE-2023-43490
- https://ubuntu.com/security/CVE-2023-45733
- https://ubuntu.com/security/CVE-2023-45745
- https://ubuntu.com/security/CVE-2023-47855
- https://ubuntu.com/security/CVE-2023-46103
- https://ubuntu.com/security/CVE-2023-46103
- https://ubuntu.com/security/CVE-2023-22655
- https://ubuntu.com/security/CVE-2023-39368
- https://ubuntu.com/security/CVE-2023-38575
- https://ubuntu.com/security/CVE-2023-47855
- https://ubuntu.com/security/CVE-2023-43490
- https://ubuntu.com/security/CVE-2023-45733
- https://ubuntu.com/security/CVE-2023-45745
- https://ubuntu.com/security/CVE-2023-28746

Title: USN-6777-2: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6777-2
Priorities: low,medium,negligible
Description:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Block layer subsystem;
- Userspace I/O drivers;
- Ceph distributed file system;
- Ext4 file system;
- JFS file system;
- NILFS2 file system;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- MAC80211 subsystem;
- Netlink;
- NFC subsystem;
- Tomoyo security module;
(CVE-2023-52524, CVE-2023-52530, CVE-2023-52601, CVE-2023-52439,
CVE-2024-26635, CVE-2023-52602, CVE-2024-26614, CVE-2024-26704,
CVE-2023-52604, CVE-2023-52566, CVE-2021-46981, CVE-2024-26622,
CVE-2024-26735, CVE-2024-26805, CVE-2024-26801, CVE-2023-52583)
CVEs:
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2023-52566
- https://ubuntu.com/security/CVE-2021-46981
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2024-26735
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2021-46981
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52566
- https://ubuntu.com/security/CVE-2024-26735
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2023-52439

Title: USN-6777-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6777-1
Priorities: low,medium,negligible
Description:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Block layer subsystem;
- Userspace I/O drivers;
- Ceph distributed file system;
- Ext4 file system;
- JFS file system;
- NILFS2 file system;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- MAC80211 subsystem;
- Netlink;
- NFC subsystem;
- Tomoyo security module;
(CVE-2023-52524, CVE-2023-52530, CVE-2023-52601, CVE-2023-52439,
CVE-2024-26635, CVE-2023-52602, CVE-2024-26614, CVE-2024-26704,
CVE-2023-52604, CVE-2023-52566, CVE-2021-46981, CVE-2024-26622,
CVE-2024-26735, CVE-2024-26805, CVE-2024-26801, CVE-2023-52583)
CVEs:
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2023-52566
- https://ubuntu.com/security/CVE-2021-46981
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2024-26735
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2021-46981
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26735
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2023-52566
- https://ubuntu.com/security/CVE-2023-52583

Title: USN-6777-3: Linux kernel (GCP) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6777-3
Priorities: low,medium,negligible
Description:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Block layer subsystem;
- Userspace I/O drivers;
- Ceph distributed file system;
- Ext4 file system;
- JFS file system;
- NILFS2 file system;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- MAC80211 subsystem;
- Netlink;
- NFC subsystem;
- Tomoyo security module;
(CVE-2023-52524, CVE-2023-52530, CVE-2023-52601, CVE-2023-52439,
CVE-2024-26635, CVE-2023-52602, CVE-2024-26614, CVE-2024-26704,
CVE-2023-52604, CVE-2023-52566, CVE-2021-46981, CVE-2024-26622,
CVE-2024-26735, CVE-2024-26805, CVE-2024-26801, CVE-2023-52583)
CVEs:
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2023-52566
- https://ubuntu.com/security/CVE-2021-46981
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2024-26735
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2021-46981
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2023-52566
- https://ubuntu.com/security/CVE-2024-26735
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2024-26635

Title: USN-6778-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6778-1
Priorities: low,medium
Description:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Ext4 file system;
- JFS file system;
- NILFS2 file system;
- Core kernel;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- Logical Link layer;
- MAC80211 subsystem;
- Netlink;
- NFC subsystem;
- Tomoyo security module;
(CVE-2023-52601, CVE-2024-26622, CVE-2024-26805, CVE-2024-26635,
CVE-2023-52602, CVE-2024-26801, CVE-2023-52566, CVE-2024-26704,
CVE-2021-46939, CVE-2024-26614, CVE-2023-52604, CVE-2023-52530,
CVE-2023-52524)
CVEs:
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52566
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2021-46939
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2021-46939
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2023-52566

Title: USN-6783-1: VLC vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6783-1
Priorities: medium
Description:
It was discovered that VLC incorrectly handled certain media files.
A remote attacker could possibly use this issue to cause VLC to crash,
resulting in a denial of service, or potential arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-47360
- https://ubuntu.com/security/CVE-2023-47359

Title: USN-6803-1: FFmpeg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6803-1
Priorities: medium
Description:
Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled
certain input files. An attacker could possibly use this issue to cause
FFmpeg to crash, resulting in a denial of service, or potential arbitrary
code execution. This issue only affected Ubuntu 24.04 LTS. (CVE-2023-49501)

Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled
certain input files. An attacker could possibly use this issue to cause
FFmpeg to crash, resulting in a denial of service, or potential arbitrary
code execution. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS.
(CVE-2023-49502)

Zhang Ling and Zeng Yunxiang discovered that FFmpeg incorrectly handled
certain input files. An attacker could possibly use this issue to cause
FFmpeg to crash, resulting in a denial of service, or potential arbitrary
code execution. This issue only affected Ubuntu 23.10 and
Ubuntu 24.04 LTS. (CVE-2023-49528)

Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input
files. An attacker could possibly use this issue to cause FFmpeg to crash,
resulting in a denial of service, or potential arbitrary code execution.
This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS.
(CVE-2023-50007)

Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled
certain input files. An attacker could possibly use this issue to cause
FFmpeg to crash, resulting in a denial of service, or potential arbitrary
code execution. This issue only affected Ubuntu 23.10 and
Ubuntu 24.04 LTS. (CVE-2023-50008)

Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input
files. An attacker could possibly use this issue to cause FFmpeg to crash,
resulting in a denial of service, or potential arbitrary code execution.
This issue only affected Ubuntu 23.10. (CVE-2023-50009)

Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input
files. An attacker could possibly use this issue to cause FFmpeg to crash,
resulting in a denial of service, or potential arbitrary code execution.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-50010)

Zeng Yunxiang and Li Zeyuan discovered that FFmpeg incorrectly handled
certain input files. An attacker could possibly use this issue to cause
FFmpeg to crash, resulting in a denial of service, or potential arbitrary
code execution. This issue only affected Ubuntu 23.10 and
Ubuntu 24.04 LTS. (CVE-2023-51793)

Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input
files. An attacker could possibly use this issue to cause FFmpeg to crash,
resulting in a denial of service, or potential arbitrary code execution.
This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-51794, CVE-2023-51798)

Zeng Yunxiang discovered that FFmpeg incorrectly handled certain input
files. An attacker could possibly use this issue to cause FFmpeg to crash,
resulting in a denial of service, or potential arbitrary code execution.
This issue only affected Ubuntu 23.10. (CVE-2023-51795, CVE-2023-51796)

It was discovered that discovered that FFmpeg incorrectly handled certain
input files. An attacker could possibly use this issue to cause FFmpeg to
crash, resulting in a denial of service, or potential arbitrary code
execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS. (CVE-2024-31578)

It was discovered that discovered that FFmpeg incorrectly handled certain
input files. An attacker could possibly use this issue to cause FFmpeg to
crash, resulting in a denial of service, or potential arbitrary code
execution. This issue only affected Ubuntu 23.10 and Ubuntu 24.04 LTS.
(CVE-2024-31582)

It was discovered that discovered that FFmpeg incorrectly handled certain
input files. An attacker could possibly use this issue to cause FFmpeg to
crash, resulting in a denial of service, or potential arbitrary code
execution. This issue only affected Ubuntu 23.10. (CVE-2024-31585)
CVEs:
- https://ubuntu.com/security/CVE-2023-49501
- https://ubuntu.com/security/CVE-2023-49502
- https://ubuntu.com/security/CVE-2023-49528
- https://ubuntu.com/security/CVE-2023-50007
- https://ubuntu.com/security/CVE-2023-50008
- https://ubuntu.com/security/CVE-2023-50009
- https://ubuntu.com/security/CVE-2023-50010
- https://ubuntu.com/security/CVE-2023-51793
- https://ubuntu.com/security/CVE-2023-51794
- https://ubuntu.com/security/CVE-2023-51798
- https://ubuntu.com/security/CVE-2023-51795
- https://ubuntu.com/security/CVE-2023-51796
- https://ubuntu.com/security/CVE-2024-31578
- https://ubuntu.com/security/CVE-2024-31582
- https://ubuntu.com/security/CVE-2024-31585
- https://ubuntu.com/security/CVE-2023-51795
- https://ubuntu.com/security/CVE-2023-49502
- https://ubuntu.com/security/CVE-2024-31585
- https://ubuntu.com/security/CVE-2023-51793
- https://ubuntu.com/security/CVE-2023-51794
- https://ubuntu.com/security/CVE-2023-51798
- https://ubuntu.com/security/CVE-2023-50010
- https://ubuntu.com/security/CVE-2024-31578
- https://ubuntu.com/security/CVE-2023-50007
- https://ubuntu.com/security/CVE-2023-50008
- https://ubuntu.com/security/CVE-2024-31582
- https://ubuntu.com/security/CVE-2023-49501
- https://ubuntu.com/security/CVE-2023-51796
- https://ubuntu.com/security/CVE-2023-50009
- https://ubuntu.com/security/CVE-2023-49528

Title: USN-6764-1: libde265 vulnerability
URL: https://ubuntu.com/security/notices/USN-6764-1
Priorities: medium
Description:
It was discovered that libde265 could be made to allocate memory that
exceeds the maximum supported size. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-51792

Title: USN-6781-1: Spreadsheet::ParseExcel vulnerability
URL: https://ubuntu.com/security/notices/USN-6781-1
Priorities: medium
Description:
Le Dinh Hai discovered that Spreadsheet::ParseExcel was passing unvalidated
input from a file into a string-type “eval”. An attacker could craft a
malicious file to achieve arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2023-7101

Title: USN-6804-1: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6804-1
Priorities: medium
Description:
It was discovered that GNU C Library nscd daemon contained a stack-based buffer
overflow. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-33599)

It was discovered that GNU C Library nscd daemon did not properly check the
cache content, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2024-33600)

It was discovered that GNU C Library nscd daemon did not properly validate
memory allocation in certain situations, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-33601)

It was discovered that GNU C Library nscd daemon did not properly handle memory
allocation, which could lead to memory corruption. A local attacker could use
this to cause a denial of service (system crash). (CVE-2024-33602)
CVEs:
- https://ubuntu.com/security/CVE-2024-33599
- https://ubuntu.com/security/CVE-2024-33600
- https://ubuntu.com/security/CVE-2024-33601
- https://ubuntu.com/security/CVE-2024-33602
- https://ubuntu.com/security/CVE-2024-33601
- https://ubuntu.com/security/CVE-2024-33599
- https://ubuntu.com/security/CVE-2024-33600
- https://ubuntu.com/security/CVE-2024-33602

Title: USN-6787-1: Jinja2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6787-1
Priorities: medium
Description:
It was discovered that Jinja2 incorrectly handled certain HTML attributes
that were accepted by the xmlattr filter. An attacker could use this issue
to inject arbitrary HTML attribute keys and values to potentially execute
a cross-site scripting (XSS) attack.
CVEs:
- https://ubuntu.com/security/CVE-2024-34064

Title: USN-6799-1: Werkzeug vulnerability
URL: https://ubuntu.com/security/notices/USN-6799-1
Priorities: medium
Description:
It was discovered that the debugger in Werkzeug was not restricted to
trusted hosts. A remote attacker could possibly use this issue to execute
code on the host under certain circumstances.
CVEs:
- https://ubuntu.com/security/CVE-2024-34069

Title: USN-6780-1: idna vulnerability
URL: https://ubuntu.com/security/notices/USN-6780-1
Priorities: medium
Description:
Guido Vranken discovered that idna did not properly manage certain inputs,
which could lead to significant resource consumption. An attacker could
possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2024-3651

Full Changelog: https://github.com/pivotal-cf/bosh-linux-stemcell-builder-lts/compare/ubuntu-trusty/v3586.153…ubuntu-xenial/v621.969

621.958

Available in the Broadcom Support portal

Release Date: May 20, 2024

Metadata:

BOSH Agent Version: 2.268.254
Kernel Version: 4.15.0.225.237~16.04.1

USNs:


Title: USN-6777-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6777-1
Priorities: low,medium,negligible
Description:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Block layer subsystem;
- Userspace I/O drivers;
- Ceph distributed file system;
- Ext4 file system;
- JFS file system;
- NILFS2 file system;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- MAC80211 subsystem;
- Netlink;
- NFC subsystem;
- Tomoyo security module;
(CVE-2023-52524, CVE-2023-52530, CVE-2023-52601, CVE-2023-52439,
CVE-2024-26635, CVE-2023-52602, CVE-2024-26614, CVE-2024-26704,
CVE-2023-52604, CVE-2023-52566, CVE-2021-46981, CVE-2024-26622,
CVE-2024-26735, CVE-2024-26805, CVE-2024-26801, CVE-2023-52583)
CVEs:
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2023-52566
- https://ubuntu.com/security/CVE-2021-46981
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2024-26735
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52583
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2021-46981
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26735
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52439
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2023-52566
- https://ubuntu.com/security/CVE-2023-52583

Title: USN-6778-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6778-1
Priorities: low,medium
Description:
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could possibly
use this to cause a denial of service (system crash). (CVE-2023-47233)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Ext4 file system;
- JFS file system;
- NILFS2 file system;
- Core kernel;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- Logical Link layer;
- MAC80211 subsystem;
- Netlink;
- NFC subsystem;
- Tomoyo security module;
(CVE-2023-52601, CVE-2024-26622, CVE-2024-26805, CVE-2024-26635,
CVE-2023-52602, CVE-2024-26801, CVE-2023-52566, CVE-2024-26704,
CVE-2021-46939, CVE-2024-26614, CVE-2023-52604, CVE-2023-52530,
CVE-2023-52524)
CVEs:
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52566
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2021-46939
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2021-46939
- https://ubuntu.com/security/CVE-2023-52524
- https://ubuntu.com/security/CVE-2023-52601
- https://ubuntu.com/security/CVE-2023-52602
- https://ubuntu.com/security/CVE-2024-26635
- https://ubuntu.com/security/CVE-2024-26704
- https://ubuntu.com/security/CVE-2024-26805
- https://ubuntu.com/security/CVE-2024-26614
- https://ubuntu.com/security/CVE-2023-52604
- https://ubuntu.com/security/CVE-2024-26801
- https://ubuntu.com/security/CVE-2023-52530
- https://ubuntu.com/security/CVE-2023-47233
- https://ubuntu.com/security/CVE-2024-26622
- https://ubuntu.com/security/CVE-2023-52566

Title: USN-6764-1: libde265 vulnerability
URL: https://ubuntu.com/security/notices/USN-6764-1
Priorities: medium
Description:
It was discovered that libde265 could be made to allocate memory that
exceeds the maximum supported size. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-51792

621.944

Available in the Broadcom Support portal

Release Date: May 08, 2024

Metadata:

BOSH Agent Version: 2.268.250
Kernel Version: 4.15.0.224.236~16.04.1

USNs:


Title: USN-6736-1: klibc vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6736-1
Priorities: low,medium
Description:
It was discovered that zlib, vendored in klibc, incorrectly handled pointer
arithmetic. An attacker could use this issue to cause klibc to crash or to
possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841)

Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled
memory when performing certain deflating operations. An attacker could use
this issue to cause klibc to crash or to possibly execute arbitrary code.
(CVE-2018-25032)

Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled
memory when performing certain inflate operations. An attacker could use
this issue to cause klibc to crash or to possibly execute arbitrary code.
(CVE-2022-37434)
CVEs:
- https://ubuntu.com/security/CVE-2016-9840
- https://ubuntu.com/security/CVE-2016-9841
- https://ubuntu.com/security/CVE-2018-25032
- https://ubuntu.com/security/CVE-2022-37434
- https://ubuntu.com/security/CVE-2018-25032
- https://ubuntu.com/security/CVE-2016-9840
- https://ubuntu.com/security/CVE-2022-37434
- https://ubuntu.com/security/CVE-2016-9841

Title: USN-6731-1: YARD vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6731-1
Priorities: medium
Description:
It was discovered that YARD before 0.9.11 does not block relative paths
with an initial ../ sequence, which allows attackers to conduct
directory traversal attacks and read arbitrary files. This issue only
affected Ubuntu 16.04 LTS. (CVE-2017-17042)

It was discovered that yard before 0.9.20 is affected by a path
traversal vulnerability, allowing HTTP requests to access arbitrary
files under certain conditions. This issue only affected Ubuntu 18.04
LTS. (CVE-2019-1020001)

Aviv Keller discovered that the “frames.html” file within the Yard
Doc’s generated documentation is vulnerable to Cross-Site Scripting
(XSS) attacks due to inadequate sanitization of user input within the
JavaScript segment of the “frames.erb” template file. (CVE-2024-27285)
CVEs:
- https://ubuntu.com/security/CVE-2017-17042
- https://ubuntu.com/security/CVE-2019-1020001
- https://ubuntu.com/security/CVE-2024-27285
- https://ubuntu.com/security/CVE-2017-17042
- https://ubuntu.com/security/CVE-2019-1020001
- https://ubuntu.com/security/CVE-2024-27285

Title: USN-6754-1: nghttp2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6754-1
Priorities: medium
Description:
It was discovered that nghttp2 incorrectly handled the HTTP/2
implementation. A remote attacker could possibly use this issue to cause
nghttp2 to consume resources, leading to a denial of service. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-9511,
CVE-2019-9513)

It was discovered that nghttp2 incorrectly handled request cancellation. A
remote attacker could possibly use this issue to cause nghttp2 to consume
resources, leading to a denial of service. This issue only affected Ubuntu
16.04 LTS and Ubuntu 18.04 LTS. (CVE-2023-44487)

It was discovered that nghttp2 could be made to process an unlimited number
of HTTP/2 CONTINUATION frames. A remote attacker could possibly use this
issue to cause nghttp2 to consume resources, leading to a denial of
service. (CVE-2024-28182)
CVEs:
- https://ubuntu.com/security/CVE-2019-9511
- https://ubuntu.com/security/CVE-2019-9513
- https://ubuntu.com/security/CVE-2023-44487
- https://ubuntu.com/security/CVE-2024-28182
- https://ubuntu.com/security/CVE-2024-28182
- https://ubuntu.com/security/CVE-2019-9511
- https://ubuntu.com/security/CVE-2019-9513
- https://ubuntu.com/security/CVE-2023-44487

Title: USN-6739-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6739-1
Priorities: medium,low
Description:
It was discovered that a race condition existed in the instruction emulator
of the Linux kernel on Arm 64-bit systems. A local attacker could use this
to cause a denial of service (system crash). (CVE-2022-20422)

Wei Chen discovered that a race condition existed in the TIPC protocol
implementation in the Linux kernel, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1382)

Jose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)

Daniele Antonioli discovered that the Secure Simple Pairing and Secure
Connections pairing in the Bluetooth protocol could allow an
unauthenticated user to complete authentication without pairing
credentials. A physically proximate attacker placed between two Bluetooth
devices could use this to subsequently impersonate one of the paired
devices. (CVE-2023-24023)

shanzhulig discovered that the DRM subsystem in the Linux kernel contained
a race condition when performing certain operation while handling driver
unload, leading to a use-after-free vulnerability. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-51043)

It was discovered that a race condition existed in the Bluetooth subsystem
of the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that the device mapper driver in the Linux kernel did not
properly validate target size during certain memory allocations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-52429, CVE-2024-23851)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Architecture specifics;
- ACPI drivers;
- I2C subsystem;
- Media drivers;
- JFS file system;
- IPv4 Networking;
- Open vSwitch;
(CVE-2021-46966, CVE-2021-46936, CVE-2023-52451, CVE-2019-25162,
CVE-2023-52445, CVE-2023-52600, CVE-2021-46990, CVE-2021-46955,
CVE-2023-52603)
CVEs:
- https://ubuntu.com/security/CVE-2022-20422
- https://ubuntu.com/security/CVE-2023-1382
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-24023
- https://ubuntu.com/security/CVE-2023-51043
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-52429
- https://ubuntu.com/security/CVE-2024-23851
- https://ubuntu.com/security/CVE-2021-46966
- https://ubuntu.com/security/CVE-2021-46936
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2019-25162
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2021-46990
- https://ubuntu.com/security/CVE-2021-46955
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2023-1382
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2024-23851
- https://ubuntu.com/security/CVE-2021-46990
- https://ubuntu.com/security/CVE-2021-46955
- https://ubuntu.com/security/CVE-2019-25162
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2023-24023
- https://ubuntu.com/security/CVE-2021-46936
- https://ubuntu.com/security/CVE-2022-20422
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-52429
- https://ubuntu.com/security/CVE-2021-46966
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-51043

Title: USN-6745-1: Percona XtraBackup vulnerability
URL: https://ubuntu.com/security/notices/USN-6745-1
Priorities: medium
Description:
It was discovered that in Percona XtraBackup, a local crafted filename
could trigger arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-25834

Title: USN-6730-1: Apache Maven Shared Utils vulnerability
URL: https://ubuntu.com/security/notices/USN-6730-1
Priorities: medium
Description:
It was discovered that Apache Maven Shared Utils did not handle double-quoted
strings properly, allowing shell injection attacks. This could allow an
attacker to run arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-29599

Title: USN-6751-1: Zabbix vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6751-1
Priorities: medium
Description:
It was discovered that Zabbix incorrectly handled input data in the
discovery and graphs pages. A remote authenticated attacker could possibly
use this issue to perform reflected cross-site scripting (XSS) attacks.
(CVE-2022-35229, CVE-2022-35230)
CVEs:
- https://ubuntu.com/security/CVE-2022-35229
- https://ubuntu.com/security/CVE-2022-35230
- https://ubuntu.com/security/CVE-2022-35230
- https://ubuntu.com/security/CVE-2022-35229

Title: USN-6757-1: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6757-1
Priorities: low,medium
Description:
It was discovered that PHP incorrectly handled PHP_CLI_SERVER_WORKERS variable.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. This issue only affected Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-4900)

It was discovered that PHP incorrectly handled certain cookies.
An attacker could possibly use this issue to cookie by pass.
(CVE-2024-2756)

It was discovered that PHP incorrectly handled some passwords.
An attacker could possibly use this issue to cause an account takeover
attack. (CVE-2024-3096)
CVEs:
- https://ubuntu.com/security/CVE-2022-4900
- https://ubuntu.com/security/CVE-2024-2756
- https://ubuntu.com/security/CVE-2024-3096
- https://ubuntu.com/security/CVE-2022-4900
- https://ubuntu.com/security/CVE-2024-2756
- https://ubuntu.com/security/CVE-2024-3096

Title: USN-6740-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6740-1
Priorities: medium,low
Description:
Wei Chen discovered that a race condition existed in the TIPC protocol
implementation in the Linux kernel, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1382)

It was discovered that the virtio network implementation in the Linux
kernel did not properly handle file references in the host, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-1838)

Jose Oliveira and Rodrigo Branco discovered that the Spectre Variant 2
mitigations with prctl syscall were insufficient in some situations. A
local attacker could possibly use this to expose sensitive information.
(CVE-2023-1998)

Daniele Antonioli discovered that the Secure Simple Pairing and Secure
Connections pairing in the Bluetooth protocol could allow an
unauthenticated user to complete authentication without pairing
credentials. A physically proximate attacker placed between two Bluetooth
devices could use this to subsequently impersonate one of the paired
devices. (CVE-2023-24023)

shanzhulig discovered that the DRM subsystem in the Linux kernel contained
a race condition when performing certain operation while handling driver
unload, leading to a use-after-free vulnerability. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-51043)

It was discovered that a race condition existed in the Bluetooth subsystem
of the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-51779)

It was discovered that the device mapper driver in the Linux kernel did not
properly validate target size during certain memory allocations. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-52429, CVE-2024-23851)

Zhenghan Wang discovered that the generic ID allocator implementation in
the Linux kernel did not properly check for null bitmap when releasing IDs.
A local attacker could use this to cause a denial of service (system
crash). (CVE-2023-6915)

It was discovered that the SCTP protocol implementation in the Linux kernel
contained a race condition when handling lock acquisition in certain
situations. A local attacker could possibly use this to cause a denial of
service (kernel deadlock). (CVE-2024-0639)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Architecture specifics;
- EDAC drivers;
- Media drivers;
- JFS file system;
(CVE-2023-52603, CVE-2023-52464, CVE-2023-52600, CVE-2023-52445,
CVE-2023-52451)
CVEs:
- https://ubuntu.com/security/CVE-2023-1382
- https://ubuntu.com/security/CVE-2023-1838
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-24023
- https://ubuntu.com/security/CVE-2023-51043
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-52429
- https://ubuntu.com/security/CVE-2024-23851
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2024-0639
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2024-23851
- https://ubuntu.com/security/CVE-2023-51043
- https://ubuntu.com/security/CVE-2023-6915
- https://ubuntu.com/security/CVE-2023-1838
- https://ubuntu.com/security/CVE-2023-1998
- https://ubuntu.com/security/CVE-2023-52464
- https://ubuntu.com/security/CVE-2023-52600
- https://ubuntu.com/security/CVE-2023-52603
- https://ubuntu.com/security/CVE-2024-0639
- https://ubuntu.com/security/CVE-2023-52451
- https://ubuntu.com/security/CVE-2023-52429
- https://ubuntu.com/security/CVE-2023-24023
- https://ubuntu.com/security/CVE-2023-51779
- https://ubuntu.com/security/CVE-2023-52445
- https://ubuntu.com/security/CVE-2023-1382

Title: LSN-0102-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0102-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-1872)

Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory).(CVE-2023-4569)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code.(CVE-2023-6176)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-51781)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2024-0646)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.(CVE-2024-1086)
CVEs:
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-1872

Title: USN-6735-1: Node.js vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6735-1
Priorities: medium
Description:
It was discovered that Node.js incorrectly handled the use of invalid public
keys while creating an x509 certificate. If a user or an automated system were
tricked into opening a specially crafted input file, a remote attacker could
possibly use this issue to cause a denial of service. This issue only affected
Ubuntu 23.10. (CVE-2023-30588)

It was discovered that Node.js incorrectly handled the use of CRLF sequences to
delimit HTTP requests. If a user or an automated system were tricked into
opening a specially crafted input file, a remote attacker could possibly use
this issue to obtain unauthorised access. This issue only affected
Ubuntu 23.10. (CVE-2023-30589)

It was discovered that Node.js incorrectly described the generateKeys()
function in the documentation. This inconsistency could possibly lead to
security issues in applications that use these APIs.
(CVE-2023-30590)
CVEs:
- https://ubuntu.com/security/CVE-2023-30588
- https://ubuntu.com/security/CVE-2023-30589
- https://ubuntu.com/security/CVE-2023-30590
- https://ubuntu.com/security/CVE-2023-30588
- https://ubuntu.com/security/CVE-2023-30589
- https://ubuntu.com/security/CVE-2023-30590

Title: USN-6729-2: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6729-2
Priorities: medium
Description:
USN-6729-1 fixed several vulnerabilities in Apache. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Orange Tsai discovered that the Apache HTTP Server incorrectly handled
validating certain input. A remote attacker could possibly use this
issue to perform HTTP request splitting attacks. (CVE-2023-38709)

Keran Mu and Jianjun Chen discovered that the Apache HTTP Server
incorrectly handled validating certain input. A remote attacker could
possibly use this issue to perform HTTP request splitting attacks.
(CVE-2024-24795)

Bartek Nowotarski discovered that the Apache HTTP Server HTTP/2 module
incorrectly handled endless continuation frames. A remote attacker could
possibly use this issue to cause the server to consume resources, leading
to a denial of service. This issue was addressed only in Ubuntu 18.04 LTS.
(CVE-2024-27316)
CVEs:
- https://ubuntu.com/security/CVE-2023-38709
- https://ubuntu.com/security/CVE-2024-24795
- https://ubuntu.com/security/CVE-2024-27316
- https://ubuntu.com/security/CVE-2024-27316
- https://ubuntu.com/security/CVE-2024-24795
- https://ubuntu.com/security/CVE-2023-38709

Title: USN-6760-1: Gerbv vulnerability
URL: https://ubuntu.com/security/notices/USN-6760-1
Priorities: low
Description:
George-Andrei Iosif and David Fernandez Gonzalez discovered that Gerbv did
not properly initialize a data structure when parsing certain nested
RS-274X format files. If a user were tricked into opening a specially
crafted file, an attacker could possibly use this issue to cause a denial
of service (application crash).
CVEs:
- https://ubuntu.com/security/CVE-2023-4508

Title: USN-6753-1: CryptoJS vulnerability
URL: https://ubuntu.com/security/notices/USN-6753-1
Priorities: medium
Description:
Thomas Neil James Shadwell discovered that CryptoJS was using an insecure
cryptographic default configuration. A remote attacker could possibly use
this issue to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-46233

Title: USN-6738-1: LXD vulnerability
URL: https://ubuntu.com/security/notices/USN-6738-1
Priorities: medium
Description:
Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that LXD
incorrectly handled the handshake phase and the use of sequence numbers in SSH
Binary Packet Protocol (BPP). If a user or an automated system were tricked
into opening a specially crafted input file, a remote attacker could possibly
use this issue to bypass integrity checks.
CVEs:
- https://ubuntu.com/security/CVE-2023-48795

Title: USN-6657-2: Dnsmasq vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6657-2
Priorities: medium,low
Description:
USN-6657-1 fixed several vulnerabilities in Dnsmasq. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered
that Dnsmasq icorrectly handled validating DNSSEC messages. A remote
attacker could possibly use this issue to cause Dnsmasq to consume
resources, leading to a denial of service. (CVE-2023-50387)

It was discovered that Dnsmasq incorrectly handled preparing an NSEC3
closest encloser proof. A remote attacker could possibly use this issue to
cause Dnsmasq to consume resources, leading to a denial of service.
(CVE-2023-50868)

It was discovered that Dnsmasq incorrectly set the maximum EDNS.0 UDP
packet size as required by DNS Flag Day 2020. This issue only affected
Ubuntu 23.10. (CVE-2023-28450)
CVEs:
- https://ubuntu.com/security/CVE-2023-50387
- https://ubuntu.com/security/CVE-2023-50868
- https://ubuntu.com/security/CVE-2023-28450
- https://ubuntu.com/security/CVE-2023-50387
- https://ubuntu.com/security/CVE-2023-28450
- https://ubuntu.com/security/CVE-2023-50868

Title: USN-6744-1: Pillow vulnerability
URL: https://ubuntu.com/security/notices/USN-6744-1
Priorities: medium
Description:
Hugo van Kemenade discovered that Pillow was not properly performing
bounds checks when processing an ICC file, which could lead to a buffer
overflow. If a user or automated system were tricked into processing a
specially crafted ICC file, an attacker could possibly use this issue
to cause a denial of service or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2024-28219

Title: USN-6761-1: Anope vulnerability
URL: https://ubuntu.com/security/notices/USN-6761-1
Priorities: medium
Description:
It was discovered that Anope did not properly process credentials for
suspended accounts. An attacker could possibly use this issue to normally
login to the platform as a suspended user after changing their password.
CVEs:
- https://ubuntu.com/security/CVE-2024-30187

Title: USN-6721-2: X.Org X Server regression
URL: https://ubuntu.com/security/notices/USN-6721-2
Priorities: medium
Description:
USN-6721-1 fixed vulnerabilities in X.Org X Server. That fix was incomplete
resulting in a regression. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that X.Org X Server incorrectly handled certain data.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2024-31080, CVE-2024-31081, CVE-2024-31082)

It was discovered that X.Org X Server incorrectly handled certain glyphs.
An attacker could possibly use this issue to cause a crash or expose sensitive
information. (CVE-2024-31083)
CVEs:
- https://ubuntu.com/security/CVE-2024-31080
- https://ubuntu.com/security/CVE-2024-31081
- https://ubuntu.com/security/CVE-2024-31082
- https://ubuntu.com/security/CVE-2024-31083

621.924

Available in the Broadcom Support portal

Release Date: April 08, 2024

Metadata:

BOSH Agent Version: 2.268.247
Kernel Version: 4.15.0.223.7

Full Changelog: https://github.com/pivotal-cf/bosh-linux-stemcell-builder-lts/compare/ubuntu-xenial/v621.897…ubuntu-xenial/v621.924

USNs:


Title: USN-6700-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6700-1
Priorities: medium,low,high
Description:
It was discovered that the Layer 2 Tunneling Protocol (L2TP) implementation
in the Linux kernel contained a race condition when releasing PPPoL2TP
sockets in certain conditions, leading to a use-after-free vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-20567)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle block device modification while it is
mounted. A privileged attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-34256)

Eric Dumazet discovered that the netfilter subsystem in the Linux kernel
did not properly handle DCCP conntrack buffers in certain situations,
leading to an out-of-bounds read vulnerability. An attacker could possibly
use this to expose sensitive information (kernel memory). (CVE-2023-39197)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle the remount operation in certain cases,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2024-0775)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)
CVEs:
- https://ubuntu.com/security/CVE-2022-20567
- https://ubuntu.com/security/CVE-2023-34256
- https://ubuntu.com/security/CVE-2023-39197
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-0775
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2023-34256
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2023-39197
- https://ubuntu.com/security/CVE-2024-0775
- https://ubuntu.com/security/CVE-2022-20567
- https://ubuntu.com/security/CVE-2024-1086

Title: USN-6700-2: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6700-2
Priorities: medium,low,high
Description:
It was discovered that the Layer 2 Tunneling Protocol (L2TP) implementation
in the Linux kernel contained a race condition when releasing PPPoL2TP
sockets in certain conditions, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-20567)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle block device modification while it is
mounted. A privileged attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-34256)

Eric Dumazet discovered that the netfilter subsystem in the Linux kernel
did not properly handle DCCP conntrack buffers in certain situations,
leading to an out-of-bounds read vulnerability. An attacker could possibly
use this to expose sensitive information (kernel memory). (CVE-2023-39197)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle the remount operation in certain cases,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2024-0775)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)
CVEs:
- https://ubuntu.com/security/CVE-2022-20567
- https://ubuntu.com/security/CVE-2023-34256
- https://ubuntu.com/security/CVE-2023-39197
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-0775
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2024-0775
- https://ubuntu.com/security/CVE-2022-20567
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2023-39197
- https://ubuntu.com/security/CVE-2023-34256

Title: LSN-0102-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0102-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the io_uring subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-1872)

Lonial Con discovered that the netfilter subsystem in the Linux kernel
contained a memory leak when handling certain element flush operations. A
local attacker could use this to expose sensitive information (kernel
memory).(CVE-2023-4569)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code.(CVE-2023-6176)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-51781)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2024-0646)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.(CVE-2024-1086)
CVEs:
- https://ubuntu.com/security/CVE-2023-1872
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-4569
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-1872

Title: USN-6701-2: Linux kernel (GCP) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6701-2
Priorities: medium,low,high
Description:
Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)

It was discovered that the NVIDIA Tegra XUSB pad controller driver in the
Linux kernel did not properly handle return values in certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-23000)

It was discovered that Spectre-BHB mitigations were missing for Ampere
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2023-3006)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle block device modification while it is
mounted. A privileged attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-34256)

Eric Dumazet discovered that the netfilter subsystem in the Linux kernel
did not properly handle DCCP conntrack buffers in certain situations,
leading to an out-of-bounds read vulnerability. An attacker could possibly
use this to expose sensitive information (kernel memory). (CVE-2023-39197)

It was discovered that the Siano USB MDTV receiver device driver in the
Linux kernel did not properly handle device initialization failures in
certain situations, leading to a use-after-free vulnerability. A physically
proximate attacker could use this cause a denial of service (system crash).
(CVE-2023-4132)

Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel
did not properly handle connect command payloads in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2023-6121)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle the remount operation in certain cases,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2024-0775)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)
CVEs:
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2023-3006
- https://ubuntu.com/security/CVE-2023-34256
- https://ubuntu.com/security/CVE-2023-39197
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2024-0775
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2023-34256
- https://ubuntu.com/security/CVE-2024-0775
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-39197
- https://ubuntu.com/security/CVE-2023-3006
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2023-46838

Title: USN-6701-3: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6701-3
Priorities: medium,low,high
Description:
Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)

It was discovered that the NVIDIA Tegra XUSB pad controller driver in the
Linux kernel did not properly handle return values in certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-23000)

It was discovered that Spectre-BHB mitigations were missing for Ampere
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2023-3006)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle block device modification while it is
mounted. A privileged attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-34256)

Eric Dumazet discovered that the netfilter subsystem in the Linux kernel
did not properly handle DCCP conntrack buffers in certain situations,
leading to an out-of-bounds read vulnerability. An attacker could possibly
use this to expose sensitive information (kernel memory). (CVE-2023-39197)

It was discovered that the Siano USB MDTV receiver device driver in the
Linux kernel did not properly handle device initialization failures in
certain situations, leading to a use-after-free vulnerability. A physically
proximate attacker could use this cause a denial of service (system crash).
(CVE-2023-4132)

Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)

It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)

Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel
did not properly handle connect command payloads in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2023-6121)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle the remount operation in certain cases,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2024-0775)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)

It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)
CVEs:
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2023-3006
- https://ubuntu.com/security/CVE-2023-34256
- https://ubuntu.com/security/CVE-2023-39197
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2024-0775
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2024-0775
- https://ubuntu.com/security/CVE-2023-6121
- https://ubuntu.com/security/CVE-2023-46838
- https://ubuntu.com/security/CVE-2024-1086
- https://ubuntu.com/security/CVE-2023-51781
- https://ubuntu.com/security/CVE-2023-2002
- https://ubuntu.com/security/CVE-2023-4132
- https://ubuntu.com/security/CVE-2024-24855
- https://ubuntu.com/security/CVE-2023-34256
- https://ubuntu.com/security/CVE-2023-39197
- https://ubuntu.com/security/CVE-2023-23000
- https://ubuntu.com/security/CVE-2023-3006

Title: USN-6673-2: python-cryptography vulnerability
URL: https://ubuntu.com/security/notices/USN-6673-2
Priorities: medium
Description:
USN-6673-1 provided a security update for python-cryptography.
This update provides the corresponding update for Ubuntu 16.04 LTS.

Original advisory details:

Hubert Kario discovered that python-cryptography incorrectly handled
errors returned by the OpenSSL API when processing incorrect padding in
RSA PKCS#1 v1.5. A remote attacker could possibly use this issue to expose
confidential or sensitive information. (CVE-2023-50782)
CVEs:
- https://ubuntu.com/security/CVE-2023-50782
- https://ubuntu.com/security/CVE-2023-50782

Title: USN-6715-1: unixODBC vulnerability
URL: https://ubuntu.com/security/notices/USN-6715-1
Priorities: medium
Description:
It was discovered that unixODBC incorrectly handled certain bytes.
An attacker could use this issue to execute arbitrary code or cause
a crash.
CVEs:
- https://ubuntu.com/security/CVE-2024-1013

Title: USN-6588-2: PAM vulnerability
URL: https://ubuntu.com/security/notices/USN-6588-2
Priorities: medium
Description:
USN-6588-1 fixed a vulnerability in PAM. This update
provides the corresponding updates for Ubuntu 14.04 LTS,
Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.

Original advisory details:

Matthias Gerstner discovered that the PAM pam_namespace module incorrectly
handled special files when performing directory checks. A local attacker
could possibly use this issue to cause PAM to stop responding, resulting in
a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2024-22365

Title: USN-6698-1: Vim vulnerability
URL: https://ubuntu.com/security/notices/USN-6698-1
Priorities: low
Description:
Zhen Zhou discovered that Vim did not properly manage memory. An
attacker could possibly use this issue to cause a denial of service
CVEs:
- https://ubuntu.com/security/CVE-2024-22667

Title: USN-6718-2: curl vulnerability
URL: https://ubuntu.com/security/notices/USN-6718-2
Priorities: medium
Description:
USN-6718-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that curl incorrectly handled memory when limiting the
amount of headers when HTTP/2 server push is allowed. A remote attacker
could possibly use this issue to cause curl to consume resources, leading
to a denial of service. (CVE-2024-2398)
CVEs:
- https://ubuntu.com/security/CVE-2024-2398
- https://ubuntu.com/security/CVE-2024-2398

621.897

Available in the Broadcom Support portal

Release Date: March 14, 2024

Metadata:

BOSH Agent Version: 2.268.238
Kernel Version: 4.15.0.222.6

USNs:


Title: USN-6685-1: mqtt-client vulnerability
URL: https://ubuntu.com/security/notices/USN-6685-1
Priorities: medium
Description:
It was discovered that mqtt-client incorrectly handled memory while parsing
malformed MQTT frames. An attacker could possibly use this issue to cause a
crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2019-0222

Title: USN-6678-1: libgit2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6678-1
Priorities: medium
Description:
It was discovered that libgit2 mishandled equivalent filenames on NTFS
partitions. If a user or automated system were tricked into cloning a
specially crafted repository, an attacker could possibly use this issue to
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2020-12278, CVE-2020-12279)

It was discovered that libgit2 did not perform certificate checking by
default. An attacker could possibly use this issue to perform a
machine-in-the-middle attack. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2023-22742)

It was discovered that libgit2 could be made to run into an infinite loop.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 23.10. (CVE-2024-24575)

It was discovered that libgit2 did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2024-24577)
CVEs:
- https://ubuntu.com/security/CVE-2020-12278
- https://ubuntu.com/security/CVE-2020-12279
- https://ubuntu.com/security/CVE-2023-22742
- https://ubuntu.com/security/CVE-2024-24575
- https://ubuntu.com/security/CVE-2024-24577
- https://ubuntu.com/security/CVE-2024-24575
- https://ubuntu.com/security/CVE-2024-24577
- https://ubuntu.com/security/CVE-2020-12278
- https://ubuntu.com/security/CVE-2023-22742
- https://ubuntu.com/security/CVE-2020-12279

Title: USN-6584-2: Libspf2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6584-2
Priorities: medium
Description:
USN-6584-1 fixed several vulnerabilities in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. This update provides the corresponding updates for
CVE-2021-33912 and CVE-2021-33913 in Ubuntu 16.04 LTS.

We apologize for the inconvenience.

Original advisory details:

Philipp Jeitner and Haya Shulman discovered that Libspf2 incorrectly handled
certain inputs. If a user or an automated system were tricked into opening a
specially crafted input file, a remote attacker could possibly use this issue
to cause a denial of service or execute arbitrary code. (CVE-2021-20314)

It was discovered that Libspf2 incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file, a
remote attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2021-33912, CVE-2021-33913)
CVEs:
- https://ubuntu.com/security/CVE-2021-33912
- https://ubuntu.com/security/CVE-2021-33913
- https://ubuntu.com/security/CVE-2021-20314
- https://ubuntu.com/security/CVE-2021-33912
- https://ubuntu.com/security/CVE-2021-33913
- https://ubuntu.com/security/CVE-2021-33913
- https://ubuntu.com/security/CVE-2021-33912

Title: USN-6659-1: libde265 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6659-1
Priorities: medium
Description:
It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2022-43244, CVE-2022-43249,
CVE-2022-43250, CVE-2022-47665, CVE-2023-25221)

It was discovered that libde265 could be made to read out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service. (CVE-2022-43245)

It was discovered that libde265 could be made to dereference invalid
memory. If a user or automated system were tricked into opening a specially
crafted file, an attacker could possibly use this issue to cause a denial
of service. (CVE-2023-24751, CVE-2023-24752, CVE-2023-24754,
CVE-2023-24755, CVE-2023-24756, CVE-2023-24757, CVE-2023-24758)
CVEs:
- https://ubuntu.com/security/CVE-2022-43244
- https://ubuntu.com/security/CVE-2022-43249
- https://ubuntu.com/security/CVE-2022-43250
- https://ubuntu.com/security/CVE-2022-47665
- https://ubuntu.com/security/CVE-2023-25221
- https://ubuntu.com/security/CVE-2022-43245
- https://ubuntu.com/security/CVE-2023-24751
- https://ubuntu.com/security/CVE-2023-24752
- https://ubuntu.com/security/CVE-2023-24754
- https://ubuntu.com/security/CVE-2023-24755
- https://ubuntu.com/security/CVE-2023-24756
- https://ubuntu.com/security/CVE-2023-24757
- https://ubuntu.com/security/CVE-2023-24758
- https://ubuntu.com/security/CVE-2022-47665
- https://ubuntu.com/security/CVE-2023-24752
- https://ubuntu.com/security/CVE-2022-43244
- https://ubuntu.com/security/CVE-2023-24754
- https://ubuntu.com/security/CVE-2023-24756
- https://ubuntu.com/security/CVE-2022-43245
- https://ubuntu.com/security/CVE-2023-24758
- https://ubuntu.com/security/CVE-2023-24751
- https://ubuntu.com/security/CVE-2023-25221
- https://ubuntu.com/security/CVE-2022-43250
- https://ubuntu.com/security/CVE-2022-43249
- https://ubuntu.com/security/CVE-2023-24757
- https://ubuntu.com/security/CVE-2023-24755

Title: USN-6677-1: libde265 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6677-1
Priorities: medium
Description:
It was discovered that libde265 could be made to dereference invalid
memory. If a user or automated system were tricked into opening a specially
crafted file, an attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2023-27102)

It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2023-27103)

It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2023-43887, CVE-2023-47471,
CVE-2023-49465, CVE-2023-49467, CVE-2023-49468)
CVEs:
- https://ubuntu.com/security/CVE-2023-27102
- https://ubuntu.com/security/CVE-2023-27103
- https://ubuntu.com/security/CVE-2023-43887
- https://ubuntu.com/security/CVE-2023-47471
- https://ubuntu.com/security/CVE-2023-49465
- https://ubuntu.com/security/CVE-2023-49467
- https://ubuntu.com/security/CVE-2023-49468
- https://ubuntu.com/security/CVE-2023-49468
- https://ubuntu.com/security/CVE-2023-49465
- https://ubuntu.com/security/CVE-2023-27102
- https://ubuntu.com/security/CVE-2023-49467
- https://ubuntu.com/security/CVE-2023-27103
- https://ubuntu.com/security/CVE-2023-47471
- https://ubuntu.com/security/CVE-2023-43887

Title: USN-6305-2: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6305-2
Priorities: medium
Description:
USN-6305-1 fixed several vulnerabilities in PHP. This update provides
the corresponding update for Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS.

Original advisory details:

It was discovered that PHP incorrectly handled certain XML files.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2023-3823)

It was discovered that PHP incorrectly handled certain PHAR files.
An attacker could possibly use this issue to cause a crash,
expose sensitive information or execute arbitrary code.
(CVE-2023-3824)
CVEs:
- https://ubuntu.com/security/CVE-2023-3823
- https://ubuntu.com/security/CVE-2023-3824
- https://ubuntu.com/security/CVE-2023-3823
- https://ubuntu.com/security/CVE-2023-3824

Title: USN-6654-1: Roundcube Webmail vulnerability
URL: https://ubuntu.com/security/notices/USN-6654-1
Priorities: medium
Description:
It was discovered that Roundcube Webmail incorrectly sanitized characters
in the linkrefs text messages. An attacker could possibly use this issue to
execute a cross-site scripting (XSS) attack. (CVE-2023-43770)
CVEs:
- https://ubuntu.com/security/CVE-2023-43770
- https://ubuntu.com/security/CVE-2023-43770

Title: USN-6684-1: ncurses vulnerability
URL: https://ubuntu.com/security/notices/USN-6684-1
Priorities: low
Description:
It was discovered that ncurses incorrectly handled certain function return
values, possibly leading to segmentation fault. A local attacker could possibly
use this to cause a denial of service (system crash).
CVEs:
- https://ubuntu.com/security/CVE-2023-50495

Title: USN-6646-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6646-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the Rose X.25 protocol
implementation in the Linux kernel, leading to a use-after- free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51782)

It was discovered that the netfilter connection tracker for netlink in the
Linux kernel did not properly perform reference counting in some error
conditions. A local attacker could possibly use this to cause a denial of
service (memory exhaustion). (CVE-2023-7192)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-7192
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-7192

Title: USN-6647-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6647-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the Rose X.25 protocol
implementation in the Linux kernel, leading to a use-after- free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51782)

It was discovered that the netfilter connection tracker for netlink in the
Linux kernel did not properly perform reference counting in some error
conditions. A local attacker could possibly use this to cause a denial of
service (memory exhaustion). (CVE-2023-7192)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-7192
- https://ubuntu.com/security/CVE-2023-7192
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51782

Title: LSN-0101-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0101-1
Priorities: high
Description:
Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-6817)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-6932)

It was discovered that the netfilter connection tracker for netlink in the
Linux kernel did not properly perform reference counting in some error
conditions. A local attacker could possibly use this to cause a denial of
service (memory exhaustion).(CVE-2023-7192)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.(CVE-2024-0193)

Jann Horn discovered that the TLS subsystem in the Linux kernel did not
properly handle spliced messages, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2024-0646)
CVEs:
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-7192
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-0646
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-7192
- https://ubuntu.com/security/CVE-2024-0193
- https://ubuntu.com/security/CVE-2024-0646

Title: USN-6658-2: libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6658-2
Priorities: medium
Description:
USN-6658-1 fixed a vulnerability in libxml2. This update
provides the corresponding updates for Ubuntu 14.04 LTS,
Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that libxml2 incorrectly handled certain XML documents. A
remote attacker could possibly use this issue to cause libxml2 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2024-25062

Title: USN-6676-1: c-ares vulnerability
URL: https://ubuntu.com/security/notices/USN-6676-1
Priorities: unknown
Description:
Vojtěch Vobr discovered that c-ares incorrectly handled user input from
local configuration files. An attacker could possibly use this issue to
cause a denial of service via application crash.
CVEs:
- https://ubuntu.com/security/CVE-2024-25629

621.872

Available in the Broadcom Support portal

Release Date: February 21, 2024

Metadata:

BOSH Agent Version: 2.268.230

USNs:


Title: USN-6617-1: libde265 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6617-1
Priorities: medium
Description:
It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 16.04
LTS and Ubuntu 18.04 LTS. (CVE-2020-21594)

It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2020-21595, CVE-2020-21596,
CVE-2020-21599, CVE-2020-21600, CVE-2020-21601, CVE-2020-21602,
CVE-2020-21603, CVE-2020-21604, CVE-2020-21605)

It was discovered that libde265 did not properly manage memory. If a user
or automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 20.04 LTS.
(CVE-2020-21597, CVE-2020-21598, CVE-2020-21606, CVE-2021-36408)
CVEs:
- https://ubuntu.com/security/CVE-2020-21594
- https://ubuntu.com/security/CVE-2020-21595
- https://ubuntu.com/security/CVE-2020-21596
- https://ubuntu.com/security/CVE-2020-21599
- https://ubuntu.com/security/CVE-2020-21600
- https://ubuntu.com/security/CVE-2020-21601
- https://ubuntu.com/security/CVE-2020-21602
- https://ubuntu.com/security/CVE-2020-21603
- https://ubuntu.com/security/CVE-2020-21604
- https://ubuntu.com/security/CVE-2020-21605
- https://ubuntu.com/security/CVE-2020-21597
- https://ubuntu.com/security/CVE-2020-21598
- https://ubuntu.com/security/CVE-2020-21606
- https://ubuntu.com/security/CVE-2021-36408
- https://ubuntu.com/security/CVE-2020-21606
- https://ubuntu.com/security/CVE-2021-36408
- https://ubuntu.com/security/CVE-2020-21595
- https://ubuntu.com/security/CVE-2020-21601
- https://ubuntu.com/security/CVE-2020-21598
- https://ubuntu.com/security/CVE-2020-21602
- https://ubuntu.com/security/CVE-2020-21605
- https://ubuntu.com/security/CVE-2020-21600
- https://ubuntu.com/security/CVE-2020-21597
- https://ubuntu.com/security/CVE-2020-21599
- https://ubuntu.com/security/CVE-2020-21603
- https://ubuntu.com/security/CVE-2020-21594
- https://ubuntu.com/security/CVE-2020-21596
- https://ubuntu.com/security/CVE-2020-21604

Title: USN-6627-1: libde265 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6627-1
Priorities: medium,low
Description:
It was discovered that libde265 could be made to read out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service. (CVE-2021-35452, CVE-2021-36411, CVE-2022-43238, CVE-2022-43241,
CVE-2022-43242)

It was discovered that libde265 did not properly manage memory. If a user
or automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 22.04 LTS.
(CVE-2021-36408)

It was discovered that libde265 contained a logical error. If a user
or automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service.
(CVE-2021-36409)

It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2021-36410, CVE-2022-43235,
CVE-2022-43236, CVE-2022-43237, CVE-2022-43239, CVE-2022-43240,
CVE-2022-43243, CVE-2022-43248, CVE-2022-43252, CVE-2022-43253)

It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 22.04
LTS. (CVE-2022-1253)
CVEs:
- https://ubuntu.com/security/CVE-2021-35452
- https://ubuntu.com/security/CVE-2021-36411
- https://ubuntu.com/security/CVE-2022-43238
- https://ubuntu.com/security/CVE-2022-43241
- https://ubuntu.com/security/CVE-2022-43242
- https://ubuntu.com/security/CVE-2021-36408
- https://ubuntu.com/security/CVE-2021-36409
- https://ubuntu.com/security/CVE-2021-36410
- https://ubuntu.com/security/CVE-2022-43235
- https://ubuntu.com/security/CVE-2022-43236
- https://ubuntu.com/security/CVE-2022-43237
- https://ubuntu.com/security/CVE-2022-43239
- https://ubuntu.com/security/CVE-2022-43240
- https://ubuntu.com/security/CVE-2022-43243
- https://ubuntu.com/security/CVE-2022-43248
- https://ubuntu.com/security/CVE-2022-43252
- https://ubuntu.com/security/CVE-2022-43253
- https://ubuntu.com/security/CVE-2022-1253
- https://ubuntu.com/security/CVE-2022-43242
- https://ubuntu.com/security/CVE-2022-43243
- https://ubuntu.com/security/CVE-2021-36409
- https://ubuntu.com/security/CVE-2021-36410
- https://ubuntu.com/security/CVE-2022-43240
- https://ubuntu.com/security/CVE-2022-43239
- https://ubuntu.com/security/CVE-2022-43237
- https://ubuntu.com/security/CVE-2021-36411
- https://ubuntu.com/security/CVE-2022-1253
- https://ubuntu.com/security/CVE-2022-43236
- https://ubuntu.com/security/CVE-2022-43253
- https://ubuntu.com/security/CVE-2022-43241
- https://ubuntu.com/security/CVE-2022-43235
- https://ubuntu.com/security/CVE-2021-35452
- https://ubuntu.com/security/CVE-2021-36408
- https://ubuntu.com/security/CVE-2022-43252
- https://ubuntu.com/security/CVE-2022-43238
- https://ubuntu.com/security/CVE-2022-43248

Title: USN-6604-2: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6604-2
Priorities: low,high,medium
Description:
It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)

Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

It was discovered that a race condition existed in the Linux kernel when
performing operations with kernel objects, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-45863)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)
CVEs:
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-45863
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-45863
- https://ubuntu.com/security/CVE-2023-6606

Title: USN-6613-1: Ceph vulnerability
URL: https://ubuntu.com/security/notices/USN-6613-1
Priorities: medium
Description:
Lucas Henry discovered that Ceph incorrectly handled specially
crafted POST requests. An uprivileged user could use this to
bypass Ceph’s authorization checks and upload a file to any bucket.
CVEs:
- https://ubuntu.com/security/CVE-2023-43040

Title: USN-6641-1: curl vulnerability
URL: https://ubuntu.com/security/notices/USN-6641-1
Priorities: medium
Description:
Harry Sintonen discovered that curl incorrectly handled mixed case cookie
domains. A remote attacker could possibly use this issue to set cookies
that get sent to different and unrelated sites and domains.
CVEs:
- https://ubuntu.com/security/CVE-2023-46218

Title: USN-6640-1: shadow vulnerability
URL: https://ubuntu.com/security/notices/USN-6640-1
Priorities: low
Description:
It was discovered that shadow was not properly sanitizing memory when
running the password utility. An attacker could possibly use this issue
to retrieve a password from memory, exposing sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-4641

Title: USN-6591-2: Postfix update
URL: https://ubuntu.com/security/notices/USN-6591-2
Priorities: medium
Description:
USN-6591-1 fixed vulnerabilities in Postfix. A fix with less risk of
regression has been made available since the last update. This update
updates the fix and aligns with the latest configuration guidelines
regarding this vulnerability.

We apologize for the inconvenience.

Original advisory details:

Timo Longin discovered that Postfix incorrectly handled certain email line
endings. A remote attacker could possibly use this issue to bypass an email
authentication mechanism, allowing domain spoofing and potential spamming.

Please note that certain configuration changes are required to address
this issue. They are not enabled by default for backward compatibility.
Information can be found at https://www.postfix.org/smtp-smuggling.html.
CVEs:
- https://ubuntu.com/security/CVE-2023-51764

Title: USN-6646-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6646-1
Priorities: medium,high
Description:
It was discovered that a race condition existed in the ATM (Asynchronous
Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51780)

It was discovered that a race condition existed in the Rose X.25 protocol
implementation in the Linux kernel, leading to a use-after- free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-51782)

It was discovered that the netfilter connection tracker for netlink in the
Linux kernel did not properly perform reference counting in some error
conditions. A local attacker could possibly use this to cause a denial of
service (memory exhaustion). (CVE-2023-7192)
CVEs:
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-7192
- https://ubuntu.com/security/CVE-2023-51782
- https://ubuntu.com/security/CVE-2023-51780
- https://ubuntu.com/security/CVE-2023-7192

Title: USN-6644-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6644-1
Priorities: medium,low
Description:
It was discovered that LibTIFF incorrectly handled certain files. If
a user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the application to crash, resulting
in a denial of service. (CVE-2023-52356)

It was discovered that LibTIFF incorrectly handled certain image files
with the tiffcp utility. If a user were tricked into opening a specially
crafted image file, an attacker could possibly use this issue to cause
tiffcp to crash, resulting in a denial of service. (CVE-2023-6228)

It was discovered that LibTIFF incorrectly handled certain files. If
a user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the application to consume
resources, resulting in a denial of service. (CVE-2023-6277)
CVEs:
- https://ubuntu.com/security/CVE-2023-52356
- https://ubuntu.com/security/CVE-2023-6228
- https://ubuntu.com/security/CVE-2023-6277
- https://ubuntu.com/security/CVE-2023-6228
- https://ubuntu.com/security/CVE-2023-52356
- https://ubuntu.com/security/CVE-2023-6277

Title: USN-6621-1: ImageMagick vulnerability
URL: https://ubuntu.com/security/notices/USN-6621-1
Priorities: medium
Description:
It was discovered that ImageMagick incorrectly handled certain values when
processing BMP files. An attacker could exploit this to cause a denial of
service.
CVEs:
- https://ubuntu.com/security/CVE-2023-5341

Title: LSN-0100-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0100-1
Priorities: high,medium
Description:
It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code.(CVE-2023-5345)

Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code.(CVE-2023-6040)

It was discovered that the TLS subsystem in the Linux kernel did not
properly perform cryptographic operations in some situations, leading to a
null pointer dereference vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code.(CVE-2023-6176)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-6817)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-6932)
CVEs:
- https://ubuntu.com/security/CVE-2023-5345
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6817
- https://ubuntu.com/security/CVE-2023-6040
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6176
- https://ubuntu.com/security/CVE-2023-5345

Title: USN-6632-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6632-1
Priorities: low
Description:
David Benjamin discovered that OpenSSL incorrectly handled excessively long
X9.42 DH keys. A remote attacker could possibly use this issue to cause
OpenSSL to consume resources, leading to a denial of service.
(CVE-2023-5678)

Bahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed
PKCS12 files. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. (CVE-2024-0727)
CVEs:
- https://ubuntu.com/security/CVE-2023-5678
- https://ubuntu.com/security/CVE-2024-0727
- https://ubuntu.com/security/CVE-2023-5678
- https://ubuntu.com/security/CVE-2024-0727

Title: USN-6592-2: libssh vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6592-2
Priorities: medium
Description:
USN-6592-1 fixed vulnerabilities in libssh. This update provides the
corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that libssh incorrectly handled the ProxyCommand and the
ProxyJump features. A remote attacker could possibly use this issue to
inject malicious code into the command of the features mentioned through
the hostname parameter. (CVE-2023-6004)

It was discovered that libssh incorrectly handled return codes when
performing message digest operations. A remote attacker could possibly use
this issue to cause libssh to crash, obtain sensitive information, or
execute arbitrary code. (CVE-2023-6918)
CVEs:
- https://ubuntu.com/security/CVE-2023-6004
- https://ubuntu.com/security/CVE-2023-6918
- https://ubuntu.com/security/CVE-2023-6918
- https://ubuntu.com/security/CVE-2023-6004

Title: USN-6587-4: X.Org X Server regression
URL: https://ubuntu.com/security/notices/USN-6587-4
Priorities: medium
Description:
USN-6587-1 fixed vulnerabilities in X.Org X Server. The fix was incomplete
resulting in a possible regression. This update fixes the problem.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the DeviceFocusEvent and ProcXIQueryPointer APIs. An
attacker could possibly use this issue to cause the X Server to crash,
obtain sensitive information, or execute arbitrary code. (CVE-2023-6816)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
reattaching to a different master device. An attacker could use this issue
to cause the X Server to crash, leading to a denial of service, or possibly
execute arbitrary code. (CVE-2024-0229)

Olivier Fourdan and Donn Seeley discovered that the X.Org X Server
incorrectly labeled GLX PBuffers when used with SELinux. An attacker could
use this issue to cause the X Server to crash, leading to a denial of
service. (CVE-2024-0408)

Olivier Fourdan discovered that the X.Org X Server incorrectly handled
the curser code when used with SELinux. An attacker could use this issue to
cause the X Server to crash, leading to a denial of service.
(CVE-2024-0409)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the XISendDeviceHierarchyEvent API. An attacker
could possibly use this issue to cause the X Server to crash, or execute
arbitrary code. (CVE-2024-21885)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
devices being disabled. An attacker could possibly use this issue to cause
the X Server to crash, or execute arbitrary code. (CVE-2024-21886)
CVEs:
- https://ubuntu.com/security/CVE-2023-6816
- https://ubuntu.com/security/CVE-2024-0229
- https://ubuntu.com/security/CVE-2024-0408
- https://ubuntu.com/security/CVE-2024-0409
- https://ubuntu.com/security/CVE-2024-21885
- https://ubuntu.com/security/CVE-2024-21886

Full Changelog: https://github.com/pivotal-cf/bosh-linux-stemcell-builder-lts/compare/ubuntu-trusty/v3586.153…ubuntu-xenial/v621.872

621.813

Available in the Broadcom Support portal

Release Date: January 30, 2024

Fixes

  • The bosh-agent no longer blocks when running an asynchronous action and receiving a second asynchronous action. It will not run multiple actions in parallel, but it will not block so get_task actions are able to be processed.

Metadata:

BOSH Agent Version: 2.268.214

USNs:


Title: USN-6604-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6604-1
Priorities: low,high,medium
Description:
It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)

Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

It was discovered that a race condition existed in the Linux kernel when
performing operations with kernel objects, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-45863)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)
CVEs:
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-45863
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-45863
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6931

Title: USN-6604-2: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6604-2
Priorities: low,high,medium
Description:
It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)

Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

It was discovered that a race condition existed in the Linux kernel when
performing operations with kernel objects, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-45863)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)
CVEs:
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-45863
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-1079
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-45863
- https://ubuntu.com/security/CVE-2023-6606

Title: USN-6611-1: Exim vulnerability
URL: https://ubuntu.com/security/notices/USN-6611-1
Priorities: medium
Description:
It was discovered that Exim incorrectly handled certain requests.
A remote attacker could possibly use a published exploitation technique
to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass
of an SPF protection mechanism.
CVEs:
- https://ubuntu.com/security/CVE-2023-51766

621.809

Available in the Broadcom Support portal

Release Date: January 29, 2024

Metadata:

BOSH Agent Version: 2.268.213

USNs:


Title: USN-6579-1: Xerces-C++ vulnerability
URL: https://ubuntu.com/security/notices/USN-6579-1
Priorities: medium
Description:
It was discovered that Xerces-C++ was not properly handling memory
management operations when parsing XML data containing external DTDs,
which could trigger a use-after-free error. If a user or automated system
were tricked into processing a specially crafted XML document, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2018-1311

Title: USN-6590-1: Xerces-C++ vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6590-1
Priorities: medium
Description:
It was discovered that Xerces-C++ was not properly handling memory
management operations when parsing XML data containing external DTDs,
which could trigger a use-after-free error. If a user or automated system
were tricked into processing a specially crafted XML document, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2018-1311)

It was discovered that Xerces-C++ was not properly performing bounds
checks when processing XML Schema Definition files, which could lead to an
out-of-bounds access via an HTTP request. If a user or automated system
were tricked into processing a specially crafted XSD file, a remote
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-37536)
CVEs:
- https://ubuntu.com/security/CVE-2018-1311
- https://ubuntu.com/security/CVE-2023-37536
- https://ubuntu.com/security/CVE-2018-1311
- https://ubuntu.com/security/CVE-2023-37536

Title: USN-6559-1: ZooKeeper vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6559-1
Priorities: low,medium
Description:
It was discovered that ZooKeeper incorrectly handled authorization for
the getACL() command. A remote attacker could possibly use this issue to
obtain sensitive information. This issue only affected Ubuntu 14.04
LTS and Ubuntu 16.04 LTS. (CVE-2019-0201)

Damien Diederen discovered that ZooKeeper incorrectly handled
authorization if SASL Quorum Peer authentication is enabled. An
attacker could possibly use this issue to bypass ZooKeeper’s
authorization system. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04
and Ubuntu 23.10. (CVE-2023-44981)
CVEs:
- https://ubuntu.com/security/CVE-2019-0201
- https://ubuntu.com/security/CVE-2023-44981
- https://ubuntu.com/security/CVE-2023-44981
- https://ubuntu.com/security/CVE-2019-0201

Title: USN-6586-1: FreeImage vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6586-1
Priorities: medium
Description:
It was discovered that FreeImage incorrectly handled certain memory
operations. If a user were tricked into opening a crafted TIFF file, a
remote attacker could use this issue to cause a heap buffer overflow,
resulting in a denial of service attack. This issue only affected Ubuntu
16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12211)

It was discovered that FreeImage incorrectly processed images under
certain circumstances. If a user were tricked into opening a crafted TIFF
file, a remote attacker could possibly use this issue to cause a stack
exhaustion condition, resulting in a denial of service attack. This issue
only affected Ubuntu 16.04 LTS and Ubuntu 20.04 LTS. (CVE-2019-12213)

It was discovered that FreeImage incorrectly processed certain images.
If a user or automated system were tricked into opening a specially
crafted image file, a remote attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2020-21427,
CVE-2020-21428)

It was discovered that FreeImage incorrectly processed certain images.
If a user or automated system were tricked into opening a specially
crafted PFM file, an attacker could possibly use this issue to cause a
denial of service. (CVE-2020-22524)
CVEs:
- https://ubuntu.com/security/CVE-2019-12211
- https://ubuntu.com/security/CVE-2019-12213
- https://ubuntu.com/security/CVE-2020-21427
- https://ubuntu.com/security/CVE-2020-21428
- https://ubuntu.com/security/CVE-2020-22524
- https://ubuntu.com/security/CVE-2020-21427
- https://ubuntu.com/security/CVE-2020-21428
- https://ubuntu.com/security/CVE-2019-12213
- https://ubuntu.com/security/CVE-2020-22524
- https://ubuntu.com/security/CVE-2019-12211

Title: USN-6599-1: Jinja2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6599-1
Priorities: low,medium
Description:
Yeting Li discovered that Jinja incorrectly handled certain regex.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, and
Ubuntu 20.04 LTS. (CVE-2020-28493)

It was discovered that Jinja incorrectly handled certain HTML passed with
xmlatter filter. An attacker could inject arbitrary HTML attributes
keys and values potentially leading to XSS. (CVE-2024-22195)
CVEs:
- https://ubuntu.com/security/CVE-2020-28493
- https://ubuntu.com/security/CVE-2024-22195
- https://ubuntu.com/security/CVE-2020-28493
- https://ubuntu.com/security/CVE-2024-22195

Title: USN-6584-1: Libspf2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6584-1
Priorities: medium
Description:
Philipp Jeitner and Haya Shulman discovered that Libspf2 incorrectly handled
certain inputs. If a user or an automated system were tricked into opening a
specially crafted input file, a remote attacker could possibly use this issue
to cause a denial of service or execute arbitrary code. (CVE-2021-20314)

It was discovered that Libspf2 incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file, a
remote attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2021-33912, CVE-2021-33913)
CVEs:
- https://ubuntu.com/security/CVE-2021-20314
- https://ubuntu.com/security/CVE-2021-33912
- https://ubuntu.com/security/CVE-2021-33913
- https://ubuntu.com/security/CVE-2021-33912
- https://ubuntu.com/security/CVE-2021-33913
- https://ubuntu.com/security/CVE-2021-20314

Title: USN-6571-1: Monit vulnerability
URL: https://ubuntu.com/security/notices/USN-6571-1
Priorities: medium
Description:
Youssef Rebahi-Gilbert discovered that Monit did not properly process
credentials for disabled accounts. An attacker could possibly use this
issue to login to the platform with an expired account and a valid
password.
CVEs:
- https://ubuntu.com/security/CVE-2022-26563

Title: USN-6038-2: Go vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6038-2
Priorities: medium
Description:
USN-6038-1 fixed several vulnerabilities in Go 1.18. This update provides
the corresponding updates for Go 1.13 and Go 1.16.

CVE-2022-29526 and CVE-2022-30630 only affected Go 1.16.

Original advisory details:

It was discovered that the Go net/http module incorrectly handled
Transfer-Encoding headers in the HTTP/1 client. A remote attacker could
possibly use this issue to perform an HTTP Request Smuggling attack.
(CVE-2022-1705)

It was discovered that Go did not properly manage memory under certain
circumstances. An attacker could possibly use this issue to cause a panic
resulting into a denial of service. (CVE-2022-1962, CVE-2022-27664,
CVE-2022-28131, CVE-2022-30630, CVE-2022-30631, CVE-2022-30632,
CVE-2022-30633, CVE-2022-30635, CVE-2022-32189, CVE-2022-41715,
CVE-2022-41717, CVE-2023-24534, CVE-2023-24537)

It was discovered that Go did not properly implemented the maximum size of
file headers in Reader.Read. An attacker could possibly use this issue to
cause a panic resulting into a denial of service. (CVE-2022-2879)

It was discovered that the Go net/http module incorrectly handled query
parameters in requests forwarded by ReverseProxy. A remote attacker could
possibly use this issue to perform an HTTP Query Parameter Smuggling attack.
(CVE-2022-2880)

It was discovered that Go did not properly manage the permissions for
Faccessat function. A attacker could possibly use this issue to expose
sensitive information. (CVE-2022-29526)

It was discovered that Go did not properly generate the values for
ticket_age_add in session tickets. An attacker could possibly use this
issue to observe TLS handshakes to correlate successive connections by
comparing ticket ages during session resumption. (CVE-2022-30629)

It was discovered that Go did not properly manage client IP addresses in
net/http. An attacker could possibly use this issue to cause ReverseProxy
to set the client IP as the value of the X-Forwarded-For header.
(CVE-2022-32148)

It was discovered that Go did not properly validate backticks (`) as
Javascript string delimiters, and do not escape them as expected. An
attacker could possibly use this issue to inject arbitrary Javascript code
into the Go template. (CVE-2023-24538)
CVEs:
- https://ubuntu.com/security/CVE-2022-29526
- https://ubuntu.com/security/CVE-2022-30630
- https://ubuntu.com/security/CVE-2022-1705
- https://ubuntu.com/security/CVE-2022-1962
- https://ubuntu.com/security/CVE-2022-27664
- https://ubuntu.com/security/CVE-2022-28131
- https://ubuntu.com/security/CVE-2022-30630
- https://ubuntu.com/security/CVE-2022-30631
- https://ubuntu.com/security/CVE-2022-30632
- https://ubuntu.com/security/CVE-2022-30633
- https://ubuntu.com/security/CVE-2022-30635
- https://ubuntu.com/security/CVE-2022-32189
- https://ubuntu.com/security/CVE-2022-41715
- https://ubuntu.com/security/CVE-2022-41717
- https://ubuntu.com/security/CVE-2023-24534
- https://ubuntu.com/security/CVE-2023-24537
- https://ubuntu.com/security/CVE-2022-2879
- https://ubuntu.com/security/CVE-2022-2880
- https://ubuntu.com/security/CVE-2022-29526
- https://ubuntu.com/security/CVE-2022-30629
- https://ubuntu.com/security/CVE-2022-32148
- https://ubuntu.com/security/CVE-2023-24538
- https://ubuntu.com/security/CVE-2022-2879
- https://ubuntu.com/security/CVE-2022-1705
- https://ubuntu.com/security/CVE-2022-30630
- https://ubuntu.com/security/CVE-2022-30633
- https://ubuntu.com/security/CVE-2022-28131
- https://ubuntu.com/security/CVE-2022-30635
- https://ubuntu.com/security/CVE-2022-32148
- https://ubuntu.com/security/CVE-2023-24534
- https://ubuntu.com/security/CVE-2023-24538
- https://ubuntu.com/security/CVE-2022-32189
- https://ubuntu.com/security/CVE-2022-41717
- https://ubuntu.com/security/CVE-2023-24537
- https://ubuntu.com/security/CVE-2022-27664
- https://ubuntu.com/security/CVE-2022-2880
- https://ubuntu.com/security/CVE-2022-29526
- https://ubuntu.com/security/CVE-2022-30631
- https://ubuntu.com/security/CVE-2022-30632
- https://ubuntu.com/security/CVE-2022-30629

Title: USN-6577-1: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6577-1
Priorities: high,medium
Description:
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

It was discovered that a race condition existed in the Linux kernel when
performing operations with kernel objects, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-45863)
CVEs:
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-45863
- https://ubuntu.com/security/CVE-2023-45863
- https://ubuntu.com/security/CVE-2023-20588

Title: USN-6602-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6602-1
Priorities: high,medium
Description:
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

It was discovered that a race condition existed in the Linux kernel when
performing operations with kernel objects, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-45863)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)
CVEs:
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-45863
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6931
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-20588
- https://ubuntu.com/security/CVE-2023-45863
- https://ubuntu.com/security/CVE-2023-6606
- https://ubuntu.com/security/CVE-2023-6932
- https://ubuntu.com/security/CVE-2023-6931

Title: USN-6583-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6583-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.7.44 in Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-44.html
https://www.oracle.com/security-alerts/cpuoct2023.html
CVEs:
- https://ubuntu.com/security/CVE-2023-22084
- https://ubuntu.com/security/CVE-2023-22028

Title: USN-6560-2: OpenSSH vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6560-2
Priorities: medium
Description:
USN-6560-1 fixed several vulnerabilities in OpenSSH. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk discovered that the SSH
protocol was vulnerable to a prefix truncation attack. If a remote attacker
was able to intercept SSH communications, extension negotiation messages
could be truncated, possibly leading to certain algorithms and features
being downgraded. This issue is known as the Terrapin attack. This update
adds protocol extensions to mitigate this issue. (CVE-2023-48795)

It was discovered that OpenSSH incorrectly handled user names or host names
with shell metacharacters. An attacker could possibly use this issue to
perform OS command injection. This only affected Ubuntu 18.04 LTS. (CVE-2023-51385)
CVEs:
- https://ubuntu.com/security/CVE-2023-48795
- https://ubuntu.com/security/CVE-2023-51385
- https://ubuntu.com/security/CVE-2023-48795
- https://ubuntu.com/security/CVE-2023-51385

Title: USN-6591-1: Postfix vulnerability
URL: https://ubuntu.com/security/notices/USN-6591-1
Priorities: medium
Description:
Timo Longin discovered that Postfix incorrectly handled certain email line
endings. A remote attacker could possibly use this issue to bypass an email
authentication mechanism, allowing domain spoofing and potential spamming.

Please note that certain configuration changes are required to address
this issue. They are not enabled by default for backward compatibility.
Information can be found at https://www.postfix.org/smtp-smuggling.html.
CVEs:
- https://ubuntu.com/security/CVE-2023-51764

Title: USN-6570-1: PostgreSQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6570-1
Priorities: medium
Description:
Pedro Gallegos discovered that PostgreSQL incorrectly handled modifying
certain SQL array values. A remote attacker could use this issue to obtain
sensitive information, or possibly execute arbitrary code. (CVE-2023-5869)

Hemanth Sandrana and Mahendrakar Srinivasarao discovered that PostgreSQL
allowed the pg_signal_backend role to signal certain superuser processes,
contrary to expectations. (CVE-2023-5870)
CVEs:
- https://ubuntu.com/security/CVE-2023-5869
- https://ubuntu.com/security/CVE-2023-5870
- https://ubuntu.com/security/CVE-2023-5869
- https://ubuntu.com/security/CVE-2023-5870

Full Changelog: https://github.com/pivotal-cf/bosh-linux-stemcell-builder-lts/compare/ubuntu-trusty/v3586.153…ubuntu-xenial/v621.809

621.793

Available in the Broadcom Support portal

Release Date: January 03, 2024

Metadata:

BOSH Agent Version: 2.268.208

USNs:


Title: USN-6558-1: audiofile vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6558-1
Priorities: low,medium
Description:
It was discovered that audiofile could be made to dereference invalid
memory. If a user or an automated system were tricked into opening a
specially crafted file, an attacker could possibly use this issue to cause
a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu
18.04 LTS. (CVE-2018-13440)

It was discovered that audiofile could be made to write out of bounds. If a
user or an automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 16.04
LTS and Ubuntu 18.04 LTS. (CVE-2018-17095)

It was discovered that audiofile could be made to dereference invalid
memory. If a user or an automated system were tricked into opening a
specially crafted file, an attacker could possibly use this issue to cause
a denial of service. (CVE-2019-13147)

It was discovered that audiofile could be made to leak memory. If a user or
an automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to obtain sensitive information.
(CVE-2022-24599)
CVEs:
- https://ubuntu.com/security/CVE-2018-13440
- https://ubuntu.com/security/CVE-2018-17095
- https://ubuntu.com/security/CVE-2019-13147
- https://ubuntu.com/security/CVE-2022-24599
- https://ubuntu.com/security/CVE-2018-17095
- https://ubuntu.com/security/CVE-2019-13147
- https://ubuntu.com/security/CVE-2018-13440
- https://ubuntu.com/security/CVE-2022-24599

Title: USN-6557-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6557-1
Priorities: low,medium
Description:
It was discovered that Vim could be made to dereference invalid memory. An
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-1725)

It was discovered that Vim could be made to recurse infinitely. An
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1771)

It was discovered that Vim could be made to write out of bounds with a put
command. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 22.04
LTS. (CVE-2022-1886)

It was discovered that Vim could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-1897,
CVE-2022-2000)

It was discovered that Vim did not properly manage memory in the spell
command. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 22.04
LTS. (CVE-2022-2042)

It was discovered that Vim did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2023-46246, CVE-2023-48231)

It was discovered that Vim could be made to divide by zero. An attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 23.04 and Ubuntu 23.10. (CVE-2023-48232)

It was discovered that Vim contained multiple arithmetic overflows. An
attacker could possibly use these issues to cause a denial of service.
(CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236,
CVE-2023-48237)

It was discovered that Vim did not properly manage memory in the
substitute command. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. This issue only affected
Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-48706)
CVEs:
- https://ubuntu.com/security/CVE-2022-1725
- https://ubuntu.com/security/CVE-2022-1771
- https://ubuntu.com/security/CVE-2022-1886
- https://ubuntu.com/security/CVE-2022-1897
- https://ubuntu.com/security/CVE-2022-2000
- https://ubuntu.com/security/CVE-2022-2042
- https://ubuntu.com/security/CVE-2023-46246
- https://ubuntu.com/security/CVE-2023-48231
- https://ubuntu.com/security/CVE-2023-48232
- https://ubuntu.com/security/CVE-2023-48233
- https://ubuntu.com/security/CVE-2023-48234
- https://ubuntu.com/security/CVE-2023-48235
- https://ubuntu.com/security/CVE-2023-48236
- https://ubuntu.com/security/CVE-2023-48237
- https://ubuntu.com/security/CVE-2023-48706
- https://ubuntu.com/security/CVE-2023-48706
- https://ubuntu.com/security/CVE-2023-48234
- https://ubuntu.com/security/CVE-2023-48231
- https://ubuntu.com/security/CVE-2023-46246
- https://ubuntu.com/security/CVE-2023-48235
- https://ubuntu.com/security/CVE-2022-1725
- https://ubuntu.com/security/CVE-2023-48232
- https://ubuntu.com/security/CVE-2022-2042
- https://ubuntu.com/security/CVE-2022-2000
- https://ubuntu.com/security/CVE-2022-1886
- https://ubuntu.com/security/CVE-2023-48233
- https://ubuntu.com/security/CVE-2023-48236
- https://ubuntu.com/security/CVE-2022-1771
- https://ubuntu.com/security/CVE-2022-1897
- https://ubuntu.com/security/CVE-2023-48237

Title: USN-6555-2: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6555-2
Priorities: medium
Description:
USN-6555-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled XKB
button actions. An attacker could possibly use this issue to cause the X
Server to crash, execute arbitrary code, or escalate privileges.
(CVE-2023-6377)

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the RRChangeOutputProperty and
RRChangeProviderProperty APIs. An attacker could possibly use this issue to
cause the X Server to crash, or obtain sensitive information.
(CVE-2023-6478)
CVEs:
- https://ubuntu.com/security/CVE-2023-6377
- https://ubuntu.com/security/CVE-2023-6478
- https://ubuntu.com/security/CVE-2023-6478
- https://ubuntu.com/security/CVE-2023-6377

Full Changelog: https://github.com/pivotal-cf/bosh-linux-stemcell-builder-lts/compare/ubuntu-trusty/v3586.153…ubuntu-xenial/v621.793

621.782

Available in the Broadcom Support portal

Release Date: December 12, 2023

Metadata:

BOSH Agent Version: 2.268.203

USNs:


Title: USN-6473-2: pip vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6473-2
Priorities: medium
Description:
USN-6473-1 fixed vulnerabilities in urllib3. This update provides the
corresponding updates for the urllib3 module bundled into pip.

Original advisory details:

It was discovered that urllib3 didn’t strip HTTP Authorization header
on cross-origin redirects. A remote attacker could possibly use this
issue to obtain sensitive information. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-25091)

It was discovered that urllib3 didn’t strip HTTP Cookie header on
cross-origin redirects. A remote attacker could possibly use this
issue to obtain sensitive information. (CVE-2023-43804)

It was discovered that urllib3 didn’t strip HTTP body on status code
303 redirects under certain circumstances. A remote attacker could
possibly use this issue to obtain sensitive information. (CVE-2023-45803)
CVEs:
- https://ubuntu.com/security/CVE-2018-25091
- https://ubuntu.com/security/CVE-2023-43804
- https://ubuntu.com/security/CVE-2023-45803
- https://ubuntu.com/security/CVE-2023-45803
- https://ubuntu.com/security/CVE-2018-25091
- https://ubuntu.com/security/CVE-2023-43804

Title: USN-6508-1: poppler vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6508-1
Priorities: medium
Description:
It was discovered that poppler incorrectly handled certain malformed PDF
files. If a user or an automated system were tricked into opening a
specially crafted PDF file, a remote attacker could possibly use this
issue to cause a denial of service. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-23804)

It was discovered that poppler incorrectly handled certain malformed PDF
files. If a user or an automated system were tricked into opening a
specially crafted PDF file, a remote attacker could possibly use this
issue to cause a denial of service. (CVE-2022-37050, CVE-2022-37051,
CVE-2022-37052, CVE-2022-38349)
CVEs:
- https://ubuntu.com/security/CVE-2020-23804
- https://ubuntu.com/security/CVE-2022-37050
- https://ubuntu.com/security/CVE-2022-37051
- https://ubuntu.com/security/CVE-2022-37052
- https://ubuntu.com/security/CVE-2022-38349
- https://ubuntu.com/security/CVE-2022-37051
- https://ubuntu.com/security/CVE-2020-23804
- https://ubuntu.com/security/CVE-2022-38349
- https://ubuntu.com/security/CVE-2022-37050
- https://ubuntu.com/security/CVE-2022-37052

Title: USN-6542-1: TinyXML vulnerability
URL: https://ubuntu.com/security/notices/USN-6542-1
Priorities: medium
Description:
Wang Zhong discovered that TinyXML incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2021-42260

Title: USN-6531-1: Redis vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6531-1
Priorities: medium
Description:
Seiya Nakata and Yudai Fujiwara discovered that Redis incorrectly handled
certain specially crafted Lua scripts. An attacker could possibly use this
issue to cause heap corruption and execute arbitrary code.
(CVE-2022-24834)

SeungHyun Lee discovered that Redis incorrectly handled specially crafted
commands. An attacker could possibly use this issue to trigger an integer
overflow, which might cause Redis to allocate impossible amounts of memory,
resulting in a denial of service via an application crash. (CVE-2022-35977)

Tom Levy discovered that Redis incorrectly handled crafted string matching
patterns. An attacker could possibly use this issue to cause Redis to hang,
resulting in a denial of service. (CVE-2022-36021)

Yupeng Yang discovered that Redis incorrectly handled specially crafted
commands. An attacker could possibly use this issue to trigger an integer
overflow, resulting in a denial of service via an application crash.
(CVE-2023-25155)

It was discovered that Redis incorrectly handled a specially crafted
command. An attacker could possibly use this issue to create an invalid
hash field, which could potentially cause Redis to crash on future access.
(CVE-2023-28856)

Alexander Aleksandrovič Klimov discovered that Redis incorrectly listened
to a Unix socket before setting proper permissions. A local attacker could
possibly use this issue to connect, bypassing intended permissions.
(CVE-2023-45145)
CVEs:
- https://ubuntu.com/security/CVE-2022-24834
- https://ubuntu.com/security/CVE-2022-35977
- https://ubuntu.com/security/CVE-2022-36021
- https://ubuntu.com/security/CVE-2023-25155
- https://ubuntu.com/security/CVE-2023-28856
- https://ubuntu.com/security/CVE-2023-45145
- https://ubuntu.com/security/CVE-2023-25155
- https://ubuntu.com/security/CVE-2022-36021
- https://ubuntu.com/security/CVE-2022-24834
- https://ubuntu.com/security/CVE-2023-45145
- https://ubuntu.com/security/CVE-2023-28856
- https://ubuntu.com/security/CVE-2022-35977

Title: LSN-0099-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0099-1
Priorities: medium,high
Description:
It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability).(CVE-2022-3643)

It was discovered that the virtual terminal driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information (kernel memory).(CVE-2023-3567)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-3609)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code.(CVE-2023-3777)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code.(CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code.(CVE-2023-4004)

Bing-Jhong Billy Jheng discovered that the Unix domain socket
implementation in the Linux kernel contained a race condition in certain
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2023-4622)

Budimir Markovic discovered that the qdisc implementation in the Linux
kernel did not properly validate inner classes, leading to a use-after-free
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-4623)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash).(CVE-2023-4881)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle removal of rules from chain bindings in certain
circumstances, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code.(CVE-2023-5197)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-31436)

Ross Lagerwall discovered that the Xen netback backend driver in the Linux
kernel did not properly handle certain unusual packets from a
paravirtualized network frontend, leading to a buffer overflow. An attacker
in a guest VM could use this to cause a denial of service (host system
crash) or possibly execute arbitrary code.(CVE-2023-34319)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-40283)

Kyle Zeng discovered that the networking stack implementation in the Linux
kernel did not properly validate skb object size in certain conditions. An
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-42752)

Kyle Zeng discovered that the netfiler subsystem in the Linux kernel did
not properly calculate array offsets, leading to a out-of-bounds write
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-42753)
CVEs:
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-5197
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2023-31436

Title: USN-6512-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6512-1
Priorities: medium,negligible
Description:
It was discovered that LibTIFF could be made to run into an infinite loop.
If a user or an automated system were tricked into opening a specially
crafted image file, an attacker could possibly use this issue to cause a
denial of service. (CVE-2022-40090)

It was discovered that LibTIFF could be made leak memory. If a user or an
automated system were tricked into opening a specially crafted image file,
an attacker could possibly use this issue to cause a denial of service.
(CVE-2023-3576)
CVEs:
- https://ubuntu.com/security/CVE-2022-40090
- https://ubuntu.com/security/CVE-2023-3576
- https://ubuntu.com/security/CVE-2023-3576
- https://ubuntu.com/security/CVE-2022-40090

Title: USN-6528-1: OpenJDK 8 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6528-1
Priorities: medium
Description:
It was discovered that the HotSpot VM implementation in OpenJDK did not
properly validate bytecode blocks in certain situations. An attacker could
possibly use this to cause a denial of service. (CVE-2022-40433)

Carter Kozak discovered that OpenJDK, when compiling with AVX-512
instruction support enabled, could produce code that resulted in memory
corruption in certain situations. An attacker targeting applications built
in this way could possibly use this to cause a denial of service or execute
arbitrary code. In Ubuntu, OpenJDK defaults to not using AVX-512
instructions. (CVE-2023-22025)

It was discovered that the CORBA implementation in OpenJDK did not properly
perform deserialization of IOR string objects. An attacker could possibly
use this to bypass Java sandbox restrictions. (CVE-2023-22067)

It was discovered that OpenJDK did not properly perform PKIX certification
path validation in certain situations. An attacker could use this to cause
a denial of service. (CVE-2023-22081)
CVEs:
- https://ubuntu.com/security/CVE-2022-40433
- https://ubuntu.com/security/CVE-2023-22025
- https://ubuntu.com/security/CVE-2023-22067
- https://ubuntu.com/security/CVE-2023-22081
- https://ubuntu.com/security/CVE-2023-22067
- https://ubuntu.com/security/CVE-2022-40433
- https://ubuntu.com/security/CVE-2023-22081
- https://ubuntu.com/security/CVE-2023-22025

Title: USN-6513-1: Python vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6513-1
Priorities: medium
Description:
It was discovered that Python incorrectly handled certain plist files.
If a user or an automated system were tricked into processing a specially
crafted plist file, an attacker could possibly use this issue to consume
resources, resulting in a denial of service. (CVE-2022-48564)

It was discovered that Python instances of ssl.SSLSocket were vulnerable
to a bypass of the TLS handshake. An attacker could possibly use this
issue to cause applications to treat unauthenticated received data before
TLS handshake as authenticated data after TLS handshake. (CVE-2023-40217)
CVEs:
- https://ubuntu.com/security/CVE-2022-48564
- https://ubuntu.com/security/CVE-2023-40217
- https://ubuntu.com/security/CVE-2023-40217
- https://ubuntu.com/security/CVE-2022-48564

Title: USN-6532-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6532-1
Priorities: high,low,medium
Description:
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)

Lucas Leong discovered that the Netlink Transformation (XFRM) subsystem in
the Linux kernel did not properly handle state filters, leading to an out-
of-bounds read vulnerability. A privileged local attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-39194)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)

It was discovered that the USB ENE card reader driver in the Linux kernel
did not properly allocate enough memory when processing the storage device
boot blocks. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-45862)

Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)
CVEs:
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-45862
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-45862
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-5717

Title: USN-6494-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6494-2
Priorities: low,medium
Description:
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check for MTD with zero erasesize during device attachment. A local
privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-31085)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate some attributes passed from userspace. A local
attacker could use this to cause a denial of service (system crash) or
possibly expose sensitive information (kernel memory). (CVE-2023-39189)

Sunjoo Park discovered that the netfilter subsystem in the Linux kernel did
not properly validate u32 packets content, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39192)

Lucas Leong discovered that the netfilter subsystem in the Linux kernel did
not properly validate SCTP data, leading to an out-of-bounds read
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-39193)

Lucas Leong discovered that the Netlink Transformation (XFRM) subsystem in
the Linux kernel did not properly handle state filters, leading to an out-
of-bounds read vulnerability. A privileged local attacker could use this to
cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-39194)

Kyle Zeng discovered that the IPv4 implementation in the Linux kernel did
not properly handle socket buffers (skb) when performing IP routing in
certain circumstances, leading to a null pointer dereference vulnerability.
A privileged attacker could use this to cause a denial of service (system
crash). (CVE-2023-42754)

It was discovered that the USB ENE card reader driver in the Linux kernel
did not properly allocate enough memory when processing the storage device
boot blocks. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-45862)

Manfred Rudigier discovered that the Intel(R) PCI-Express Gigabit (igb)
Ethernet driver in the Linux kernel did not properly validate received
frames that are larger than the set MTU size, leading to a buffer overflow
vulnerability. An attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-45871)

Budimir Markovic discovered that the perf subsystem in the Linux kernel did
not properly handle event groups, leading to an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-5717)
CVEs:
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-45862
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-5717
- https://ubuntu.com/security/CVE-2023-45871
- https://ubuntu.com/security/CVE-2023-39194
- https://ubuntu.com/security/CVE-2023-39193
- https://ubuntu.com/security/CVE-2023-42754
- https://ubuntu.com/security/CVE-2023-39192
- https://ubuntu.com/security/CVE-2023-45862
- https://ubuntu.com/security/CVE-2023-39189
- https://ubuntu.com/security/CVE-2023-31085
- https://ubuntu.com/security/CVE-2023-5717

Title: USN-6510-1: Apache HTTP Server vulnerability
URL: https://ubuntu.com/security/notices/USN-6510-1
Priorities: low
Description:
David Shoon discovered that the Apache HTTP Server mod_macro module
incorrectly handled certain memory operations. A remote attacker could
possibly use this issue to cause the server to crash, resulting in a denial
of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-31122

Title: USN-6463-2: Open VM Tools vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6463-2
Priorities: medium
Description:
USN-6463-1 fixed vulnerabilities in Open VM Tools. This update provides
the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that Open VM Tools incorrectly handled SAML tokens. A
remote attacker with Guest Operations privileges could possibly use this
issue to elevate their privileges. (CVE-2023-34058)

Matthias Gerstner discovered that Open VM Tools incorrectly handled file
descriptors when dropping privileges. A local attacker could possibly use
this issue to hijack /dev/uinput and simulate user inputs. (CVE-2023-34059)
CVEs:
- https://ubuntu.com/security/CVE-2023-34058
- https://ubuntu.com/security/CVE-2023-34059
- https://ubuntu.com/security/CVE-2023-34058
- https://ubuntu.com/security/CVE-2023-34059

Title: USN-6487-1: Avahi vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6487-1
Priorities: medium
Description:
Evgeny Vereshchagin discovered that Avahi contained several reachable
assertions, which could lead to intentional assertion failures when
specially crafted user input was given. An attacker could possibly use
this issue to cause a denial of service. (CVE-2023-38469, CVE-2023-38470,
CVE-2023-38471, CVE-2023-38472, CVE-2023-38473)
CVEs:
- https://ubuntu.com/security/CVE-2023-38469
- https://ubuntu.com/security/CVE-2023-38470
- https://ubuntu.com/security/CVE-2023-38471
- https://ubuntu.com/security/CVE-2023-38472
- https://ubuntu.com/security/CVE-2023-38473
- https://ubuntu.com/security/CVE-2023-38469
- https://ubuntu.com/security/CVE-2023-38471
- https://ubuntu.com/security/CVE-2023-38472
- https://ubuntu.com/security/CVE-2023-38470
- https://ubuntu.com/security/CVE-2023-38473

Title: USN-6540-1: BlueZ vulnerability
URL: https://ubuntu.com/security/notices/USN-6540-1
Priorities: medium
Description:
It was discovered that BlueZ did not properly restrict non-bonded devices
from injecting HID events into the input subsystem. This could allow a
physically proximate attacker to inject keystrokes and execute arbitrary
commands whilst the device is discoverable.
CVEs:
- https://ubuntu.com/security/CVE-2023-45866

Title: USN-6541-1: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6541-1
Priorities: low,medium
Description:
It was discovered that the GNU C Library was not properly handling certain
memory operations. An attacker could possibly use this issue to cause a
denial of service (application crash). (CVE-2023-4806, CVE-2023-4813)

It was discovered that the GNU C library was not properly implementing a
fix for CVE-2023-4806 in certain cases, which could lead to a memory leak.
An attacker could possibly use this issue to cause a denial of service
(application crash). This issue only affected Ubuntu 22.04 LTS and Ubuntu
23.04. (CVE-2023-5156)
CVEs:
- https://ubuntu.com/security/CVE-2023-4806
- https://ubuntu.com/security/CVE-2023-4813
- https://ubuntu.com/security/CVE-2023-4806
- https://ubuntu.com/security/CVE-2023-5156
- https://ubuntu.com/security/CVE-2023-4806
- https://ubuntu.com/security/CVE-2023-4813
- https://ubuntu.com/security/CVE-2023-5156

621.759

Available in the Broadcom Support portal

Release Date: November 19, 2023

Metadata:

BOSH Agent Version: 2.268.196

USNs:


Title: USN-6475-1: Cobbler vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6475-1
Priorities: medium,low,high
Description:
It was discovered that Cobbler did not properly handle user input, which
could result in an absolute path traversal. An attacker could possibly
use this issue to read arbitrary files. (CVE-2014-3225)

It was discovered that Cobbler did not properly handle user input, which
could result in command injection. An attacker could possibly use this
issue to execute arbitrary code with high privileges.
(CVE-2017-1000469, CVE-2021-45082)

It was discovered that Cobbler did not properly hide private functions in
a class. A remote attacker could possibly use this issue to gain high
privileges and upload files to an arbitrary location.
(CVE-2018-10931, CVE-2018-1000225, CVE-2018-1000226)

Nicolas Chatelain discovered that Cobbler did not properly handle user
input, which could result in log poisoning. A remote attacker could
possibly use this issue to bypass authorization, write in an arbitrary
file, or execute arbitrary code.
(CVE-2021-40323, CVE-2021-40324, CVE-2021-40325)

It was discovered that Cobbler did not properly handle file permissions
during package install or update operations. An attacker could possibly
use this issue to perform a privilege escalation attack. (CVE-2021-45083)

It was discovered that Cobbler did not properly process credentials for
expired accounts. An attacker could possibly use this issue to login to
the platform with an expired account or password. (CVE-2022-0860)
CVEs:
- https://ubuntu.com/security/CVE-2014-3225
- https://ubuntu.com/security/CVE-2017-1000469
- https://ubuntu.com/security/CVE-2021-45082
- https://ubuntu.com/security/CVE-2018-10931
- https://ubuntu.com/security/CVE-2018-1000225
- https://ubuntu.com/security/CVE-2018-1000226
- https://ubuntu.com/security/CVE-2021-40323
- https://ubuntu.com/security/CVE-2021-40324
- https://ubuntu.com/security/CVE-2021-40325
- https://ubuntu.com/security/CVE-2021-45083
- https://ubuntu.com/security/CVE-2022-0860
- https://ubuntu.com/security/CVE-2021-40323
- https://ubuntu.com/security/CVE-2018-1000225
- https://ubuntu.com/security/CVE-2021-45082
- https://ubuntu.com/security/CVE-2021-40324
- https://ubuntu.com/security/CVE-2021-45083
- https://ubuntu.com/security/CVE-2017-1000469
- https://ubuntu.com/security/CVE-2021-40325
- https://ubuntu.com/security/CVE-2022-0860
- https://ubuntu.com/security/CVE-2018-10931
- https://ubuntu.com/security/CVE-2018-1000226
- https://ubuntu.com/security/CVE-2014-3225

Title: USN-6474-1: xrdp vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6474-1
Priorities: medium
Description:
It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds reads. An attacker
could possibly use this issue to crash the program or extract sensitive
information. (CVE-2022-23479, CVE-2022-23481, CVE-2022-23483,
CVE-2023-42822)

It was discovered that xrdp improperly handled session establishment
errors. An attacker could potentially use this issue to bypass the
OS-level session restrictions by PAM. (CVE-2023-40184)

It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds writes. An attacker
could possibly use this issue to cause memory corruption or execute
arbitrary code. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-23468)

It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds reads. An attacker
could possibly use this issue to crash the program or extract sensitive
information. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS
and Ubuntu 22.04 LTS. (CVE-2022-23480, CVE-2022-23482, CVE-2022-23484)

It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds reads. An attacker
could possibly use this issue to crash the program or extract sensitive
information. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-23477, CVE-2022-23493)

It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds writes. An attacker
could possibly use this issue to cause memory corruption or execute
arbitrary code. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-23478)

It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds reads. An attacker
could possibly use this issue to crash the program or extract sensitive
information. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-23613)
CVEs:
- https://ubuntu.com/security/CVE-2022-23479
- https://ubuntu.com/security/CVE-2022-23481
- https://ubuntu.com/security/CVE-2022-23483
- https://ubuntu.com/security/CVE-2023-42822
- https://ubuntu.com/security/CVE-2023-40184
- https://ubuntu.com/security/CVE-2022-23468
- https://ubuntu.com/security/CVE-2022-23480
- https://ubuntu.com/security/CVE-2022-23482
- https://ubuntu.com/security/CVE-2022-23484
- https://ubuntu.com/security/CVE-2022-23477
- https://ubuntu.com/security/CVE-2022-23493
- https://ubuntu.com/security/CVE-2022-23478
- https://ubuntu.com/security/CVE-2022-23613
- https://ubuntu.com/security/CVE-2022-23468
- https://ubuntu.com/security/CVE-2022-23477
- https://ubuntu.com/security/CVE-2022-23479
- https://ubuntu.com/security/CVE-2022-23484
- https://ubuntu.com/security/CVE-2022-23481
- https://ubuntu.com/security/CVE-2022-23613
- https://ubuntu.com/security/CVE-2022-23493
- https://ubuntu.com/security/CVE-2022-23480
- https://ubuntu.com/security/CVE-2022-23483
- https://ubuntu.com/security/CVE-2022-23478
- https://ubuntu.com/security/CVE-2023-42822
- https://ubuntu.com/security/CVE-2022-23482
- https://ubuntu.com/security/CVE-2023-40184

Title: USN-6485-1: Intel Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-6485-1
Priorities: high
Description:
Benoit Morgan, Paul Grosen, Thais Moreira Hamasaki, Ke Sun, Alyssa Milburn,
Hisham Shafi, Nir Shlomovich, Tavis Ormandy, Daniel Moghimi, Josh Eads, Salman
Qazi, Alexandra Sandulescu, Andy Nguyen, Eduardo Vela, Doug Kwan, and Kostik
Shtoyk discovered that some Intel(R) Processors did not properly handle certain
sequences of processor instructions. A local attacker could possibly use this to
cause a core hang (resulting in a denial of service), gain access to sensitive
information or possibly escalate their privileges.
CVEs:
- https://ubuntu.com/security/CVE-2023-23583

Title: USN-6477-1: procps-ng vulnerability
URL: https://ubuntu.com/security/notices/USN-6477-1
Priorities: low
Description:
It was discovered that the procps-ng ps tool incorrectly handled memory.
An attacker could possibly use this issue to cause procps-ng to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-4016

621.753

Available in the Broadcom Support portal

Release Date: November 14, 2023

Metadata:

BOSH Agent Version: 2.268.193

USNs:


Title: USN-6473-1: urllib3 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6473-1
Priorities: medium
Description:
It was discovered that urllib3 didn’t strip HTTP Authorization header
on cross-origin redirects. A remote attacker could possibly use this
issue to obtain sensitive information. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-25091)

It was discovered that urllib3 didn’t strip HTTP Cookie header on
cross-origin redirects. A remote attacker could possibly use this
issue to obtain sensitive information. (CVE-2023-43804)

It was discovered that urllib3 didn’t strip HTTP body on status code
303 redirects under certain circumstances. A remote attacker could
possibly use this issue to obtain sensitive information. (CVE-2023-45803)
CVEs:
- https://ubuntu.com/security/CVE-2018-25091
- https://ubuntu.com/security/CVE-2023-43804
- https://ubuntu.com/security/CVE-2023-45803
- https://ubuntu.com/security/CVE-2023-45803
- https://ubuntu.com/security/CVE-2023-43804
- https://ubuntu.com/security/CVE-2018-25091

Title: USN-6451-1: ncurses vulnerability
URL: https://ubuntu.com/security/notices/USN-6451-1
Priorities: medium
Description:
It was discovered that ncurses could be made to read out of bounds.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-19189

Title: USN-6472-1: GNU Scientific Library vulnerability
URL: https://ubuntu.com/security/notices/USN-6472-1
Priorities: medium
Description:
It was discovered that GNU Scientific Library incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to cause a
denial of service or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-35357

Title: USN-6469-1: xrdp vulnerability
URL: https://ubuntu.com/security/notices/USN-6469-1
Priorities: medium
Description:
Ashley Newson discovered that xrdp incorrectly handled memory when
processing certain incoming connections. An attacker could possibly use
this issue to cause a denial of service or arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2020-4044

Title: USN-6471-1: libsndfile vulnerability
URL: https://ubuntu.com/security/notices/USN-6471-1
Priorities: medium
Description:
It was discovered that libsndfile contained multiple arithmetic overflows.
If a user or automated system were tricked into processing a specially
crafted audio file, an attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-33065

Title: USN-6440-3: Linux kernel (HWE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6440-3
Priorities: medium,low,high
Description:
Seth Jenkins discovered that the Linux kernel did not properly perform
address randomization for a per-cpu memory management structure. A local
attacker could use this to expose sensitive information (kernel memory) or
in conjunction with another kernel vulnerability. (CVE-2023-0597)

It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)

Ross Lagerwall discovered that the Xen netback backend driver in the Linux
kernel did not properly handle certain unusual packets from a
paravirtualized network frontend, leading to a buffer overflow. An attacker
in a guest VM could use this to cause a denial of service (host system
crash) or possibly execute arbitrary code. (CVE-2023-34319)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)

Kyle Zeng discovered that the networking stack implementation in the Linux
kernel did not properly validate skb object size in certain conditions. An
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-42752)

Kyle Zeng discovered that the netfiler subsystem in the Linux kernel did
not properly calculate array offsets, leading to a out-of-bounds write
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-42753)

Kyle Zeng discovered that the IPv4 Resource Reservation Protocol (RSVP)
classifier implementation in the Linux kernel contained an out-of-bounds
read vulnerability. A local attacker could use this to cause a denial of
service (system crash). Please note that kernel packet classifier support
for RSVP has been removed to resolve this vulnerability. (CVE-2023-42755)

Bing-Jhong Billy Jheng discovered that the Unix domain socket
implementation in the Linux kernel contained a race condition in certain
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4622)

Budimir Markovic discovered that the qdisc implementation in the Linux
kernel did not properly validate inner classes, leading to a use-after-free
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-4623)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)
CVEs:
- https://ubuntu.com/security/CVE-2023-0597
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-0597

Title: USN-6288-2: MySQL vulnerability
URL: https://ubuntu.com/security/notices/USN-6288-2
Priorities: medium
Description:
USN-6288-1 fixed a vulnerability in MySQL. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.7.43 in Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-43.html
https://www.oracle.com/security-alerts/cpujul2023.html
CVEs:
- https://ubuntu.com/security/CVE-2023-22053

Title: USN-6448-1: Sofia-SIP vulnerability
URL: https://ubuntu.com/security/notices/USN-6448-1
Priorities: medium
Description:
Xu Biang discovered that Sofia-SIP did not properly manage memory when
handling STUN packets. An attacker could use this issue to cause
Sofia-SIP to crash, resulting in a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-32307

Title: USN-6199-2: PHP vulnerability
URL: https://ubuntu.com/security/notices/USN-6199-2
Priorities: medium
Description:
USN-6199-1 fixed a vulnerability in PHP. This update provides the
corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that PHP incorrectly handled certain Digest
authentication for SOAP. An attacker could possibly use this issue
to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-3247

Title: USN-6467-1: Kerberos vulnerability
URL: https://ubuntu.com/security/notices/USN-6467-1
Priorities: medium
Description:
Robert Morris discovered that Kerberos did not properly handle memory
access when processing RPC data through kadmind, which could lead to the
freeing of uninitialized memory. An authenticated remote attacker could
possibly use this issue to cause kadmind to crash, resulting in a denial
of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-36054

Title: USN-6452-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6452-1
Priorities: medium
Description:
It was discovered that Vim could be made to divide by zero. An attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 23.04. (CVE-2023-3896)

It was discovered that Vim did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2023-4733, CVE-2023-4750)

It was discovered that Vim contained an arithmetic overflow. An attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10.
(CVE-2023-4734)

It was discovered that Vim could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2023-4735, CVE-2023-5344)

It was discovered that Vim could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 23.04 and Ubuntu
23.10. (CVE-2023-4738)

It was discovered that Vim could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu
16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04. (CVE-2023-4751)

It was discovered that Vim did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04
LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-4752, CVE-2023-5535)

It was discovered that Vim could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu
22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2023-4781)

It was discovered that Vim could be made to dereference invalid memory. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-5441)
CVEs:
- https://ubuntu.com/security/CVE-2023-3896
- https://ubuntu.com/security/CVE-2023-4733
- https://ubuntu.com/security/CVE-2023-4750
- https://ubuntu.com/security/CVE-2023-4734
- https://ubuntu.com/security/CVE-2023-4735
- https://ubuntu.com/security/CVE-2023-5344
- https://ubuntu.com/security/CVE-2023-4738
- https://ubuntu.com/security/CVE-2023-4751
- https://ubuntu.com/security/CVE-2023-4752
- https://ubuntu.com/security/CVE-2023-5535
- https://ubuntu.com/security/CVE-2023-4781
- https://ubuntu.com/security/CVE-2023-5441
- https://ubuntu.com/security/CVE-2023-4752
- https://ubuntu.com/security/CVE-2023-5535
- https://ubuntu.com/security/CVE-2023-4733
- https://ubuntu.com/security/CVE-2023-4750
- https://ubuntu.com/security/CVE-2023-3896
- https://ubuntu.com/security/CVE-2023-4781
- https://ubuntu.com/security/CVE-2023-5344
- https://ubuntu.com/security/CVE-2023-4751
- https://ubuntu.com/security/CVE-2023-5441
- https://ubuntu.com/security/CVE-2023-4735
- https://ubuntu.com/security/CVE-2023-4738
- https://ubuntu.com/security/CVE-2023-4734

Title: USN-6470-1: Axis vulnerability
URL: https://ubuntu.com/security/notices/USN-6470-1
Priorities: medium
Description:
It was discovered that Axis incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service
or execute arbitrary code. (CVE-2023-40743)
CVEs:
- https://ubuntu.com/security/CVE-2023-40743
- https://ubuntu.com/security/CVE-2023-40743

Title: USN-6455-1: Exim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6455-1
Priorities: medium
Description:
It was discovered that Exim incorrectly handled validation of user-supplied
data, which could lead to memory corruption. A remote attacker could
possibly use this issue to execute arbitrary code. (CVE-2023-42117)

It was discovered that Exim incorrectly handled validation of user-supplied
data, which could lead to an out-of-bounds read. An attacker could possibly
use this issue to expose sensitive information. (CVE-2023-42119)
CVEs:
- https://ubuntu.com/security/CVE-2023-42117
- https://ubuntu.com/security/CVE-2023-42119
- https://ubuntu.com/security/CVE-2023-42117
- https://ubuntu.com/security/CVE-2023-42119

Title: USN-6408-2: libXpm vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6408-2
Priorities: medium
Description:
USN-6408-1 fixed several vulnerabilities in libXpm. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Yair Mizrahi discovered that libXpm incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could possibly use this issue to consume
memory, leading to a denial of service. (CVE-2023-43786)

Yair Mizrahi discovered that libXpm incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could use this issue to cause libXpm to
crash, leading to a denial of service, or possibly execute arbitrary code.
(CVE-2023-43787)

Alan Coopersmith discovered that libXpm incorrectly handled certain
malformed XPM image files. If a user were tricked into opening a specially
crafted XPM image file, a remote attacker could possibly use this issue to
cause libXpm to crash, leading to a denial of service. (CVE-2023-43788,
CVE-2023-43789)
CVEs:
- https://ubuntu.com/security/CVE-2023-43786
- https://ubuntu.com/security/CVE-2023-43787
- https://ubuntu.com/security/CVE-2023-43788
- https://ubuntu.com/security/CVE-2023-43789
- https://ubuntu.com/security/CVE-2023-43789
- https://ubuntu.com/security/CVE-2023-43787
- https://ubuntu.com/security/CVE-2023-43786
- https://ubuntu.com/security/CVE-2023-43788

Title: USN-6453-2: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6453-2
Priorities: medium
Description:
USN-6453-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
prepending values to certain properties. An attacker could possibly use
this issue to cause the X Server to crash, execute arbitrary code, or
escalate privileges. (CVE-2023-5367)

Sri discovered that the X.Org X Server incorrectly handled detroying
windows in certain legacy multi-screen setups. An attacker could possibly
use this issue to cause the X Server to crash, execute arbitrary code, or
escalate privileges. (CVE-2023-5380)
CVEs:
- https://ubuntu.com/security/CVE-2023-5367
- https://ubuntu.com/security/CVE-2023-5380
- https://ubuntu.com/security/CVE-2023-5380
- https://ubuntu.com/security/CVE-2023-5367

621.730

Available in the Broadcom Support portal

Release Date: October 23, 2023

Metadata:

BOSH Agent Version: 2.268.187

USNs:


Title: USN-6419-1: jQuery UI vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6419-1
Priorities: medium
Description:
Hong Phat Ly discovered that jQuery UI did not properly manage parameters
from untrusted sources, which could lead to arbitrary web script or HTML
code injection. A remote attacker could possibly use this issue to perform
a cross-site scripting (XSS) attack. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-7103)

Esben Sparre Andreasen discovered that jQuery UI did not properly handle
values from untrusted sources in the Datepicker widget. A remote attacker
could possibly use this issue to perform a cross-site scripting (XSS)
attack and execute arbitrary code. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS.
(CVE-2021-41182, CVE-2021-41183)

It was discovered that jQuery UI did not properly validate values from
untrusted sources. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. This issue only affected
Ubuntu 20.04 LTS. (CVE-2021-41184)

It was discovered that the jQuery UI checkboxradio widget did not properly
decode certain values from HTML entities. An attacker could possibly use
this issue to perform a cross-site scripting (XSS) attack and cause a
denial of service or execute arbitrary code. This issue only affected
Ubuntu 20.04 LTS. (CVE-2022-31160)
CVEs:
- https://ubuntu.com/security/CVE-2016-7103
- https://ubuntu.com/security/CVE-2021-41182
- https://ubuntu.com/security/CVE-2021-41183
- https://ubuntu.com/security/CVE-2021-41184
- https://ubuntu.com/security/CVE-2022-31160
- https://ubuntu.com/security/CVE-2021-41183
- https://ubuntu.com/security/CVE-2022-31160
- https://ubuntu.com/security/CVE-2021-41184
- https://ubuntu.com/security/CVE-2021-41182
- https://ubuntu.com/security/CVE-2016-7103

Title: USN-6413-1: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6413-1
Priorities: low,medium
Description:
It was discovered that GNU binutils was not properly performing checks
when dealing with memory allocation operations, which could lead to
excessive memory consumption. An attacker could possibly use this issue
to cause a denial of service. This issue only affected Ubuntu 14.04 LTS.
(CVE-2017-17122, CVE-2017-8421)

It was discovered that GNU binutils was not properly performing bounds
checks when processing debug sections with objdump, which could lead to
an overflow. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu
14.04 LTS. (CVE-2018-20671, CVE-2018-6543)

It was discovered that GNU binutils contained a reachable assertion, which
could lead to an intentional assertion failure when processing certain
crafted DWARF files. An attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 18.04 LTS.
(CVE-2022-35205)

It was discovered that GNU binutils incorrectly handled memory management
operations in several of its functions, which could lead to excessive
memory consumption due to memory leaks. An attacker could possibly use
these issues to cause a denial of service.
(CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011)

It was discovered that GNU binutils was not properly performing bounds
checks when dealing with memory allocation operations, which could lead
to excessive memory consumption. An attacker could possibly use this issue
to cause a denial of service. (CVE-2022-48063)
CVEs:
- https://ubuntu.com/security/CVE-2017-17122
- https://ubuntu.com/security/CVE-2017-8421
- https://ubuntu.com/security/CVE-2018-20671
- https://ubuntu.com/security/CVE-2018-6543
- https://ubuntu.com/security/CVE-2022-35205
- https://ubuntu.com/security/CVE-2022-47007
- https://ubuntu.com/security/CVE-2022-47008
- https://ubuntu.com/security/CVE-2022-47010
- https://ubuntu.com/security/CVE-2022-47011
- https://ubuntu.com/security/CVE-2022-48063
- https://ubuntu.com/security/CVE-2022-35205
- https://ubuntu.com/security/CVE-2022-47007
- https://ubuntu.com/security/CVE-2018-20671
- https://ubuntu.com/security/CVE-2017-8421
- https://ubuntu.com/security/CVE-2022-47011
- https://ubuntu.com/security/CVE-2017-17122
- https://ubuntu.com/security/CVE-2022-48063
- https://ubuntu.com/security/CVE-2022-47010
- https://ubuntu.com/security/CVE-2022-47008
- https://ubuntu.com/security/CVE-2018-6543

Title: USN-6437-1: VIPS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6437-1
Priorities: medium,low
Description:
Ziqiang Gu discovered that VIPS could be made to dereference a NULL
pointer. If a user or automated system were tricked into processing
a specially crafted input image file, an attacker could possibly use
this issue to cause a denial of service. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-7998)

It was discovered that VIPS did not properly handle uninitialized memory
locations when processing corrupted input image data. An attacker could
possibly use this issue to generate output images that expose sensitive
information. This issue only affected Ubuntu 16.04 LTS
and Ubuntu 18.04 LTS. (CVE-2019-6976)

It was discovered that VIPS did not properly manage memory due to an
uninitialized variable. If a user or automated system were tricked into
processing a specially crafted output file, an attacker could possibly
use this issue to expose sensitive information.
This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
(CVE-2020-20739)

It was discovered that VIPS could be made to divide by zero in multiple
funcions. If a user or automated system were tricked into processing a
specially crafted image file, an attacker could possibly use this issue
to cause a denial of service. This issue only affected Ubuntu 16.04 LTS
and Ubuntu 18.04 LTS. (CVE-2021-27847)

It was discovered that VIPS did not properly handle certain input files
that contained malformed UTF-8 characters. If a user or automated system
were tricked into processing a specially crafted SVG image file, an
attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 22.04 LTS. (CVE-2023-40032)
CVEs:
- https://ubuntu.com/security/CVE-2018-7998
- https://ubuntu.com/security/CVE-2019-6976
- https://ubuntu.com/security/CVE-2020-20739
- https://ubuntu.com/security/CVE-2021-27847
- https://ubuntu.com/security/CVE-2023-40032
- https://ubuntu.com/security/CVE-2020-20739
- https://ubuntu.com/security/CVE-2018-7998
- https://ubuntu.com/security/CVE-2019-6976
- https://ubuntu.com/security/CVE-2023-40032
- https://ubuntu.com/security/CVE-2021-27847

Title: USN-6430-1: FFmpeg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6430-1
Priorities: medium
Description:
It was discovered that FFmpeg did not properly handle certain inputs in
vf_lagfun.c, resulting in a buffer overflow vulnerability. An attacker
could possibly use this issue to cause a denial of service via application
crash. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-22024)

It was discovered that FFmpeg incorrectly managed memory in avienc.c,
resulting in a memory leak. An attacker could possibly use this issue
to cause a denial of service via application crash. (CVE-2020-22039)

It was discovered that FFmpeg incorrectly handled certain files due to a
memory leak in frame.c. An attacker could possibly use this issue to cause
a denial of service via application crash. This issue affected
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-22040)

It was discovered that FFmpeg incorrectly handled certain files due to a
memory leak in fifo.c. An attacker could possibly use this issue to cause
a denial of service via application crash. (CVE-2020-22043)

It was discovered that FFmpeg incorrectly handled certain files due to a
memory leak in vf_tile.c. If a user or automated system were tricked into
processing a specially crafted MOV file, an attacker could possibly use
this issue to cause a denial of service. (CVE-2020-22051)

It was discovered that FFmpeg incorrectly handled certain MOV files in
timecode.c, leading to an integer overflow. An attacker could possibly
use this issue to cause a denial of service using a crafted MOV file.
This issue only affected Ubuntu 16.04 LTS. (CVE-2021-28429)
CVEs:
- https://ubuntu.com/security/CVE-2020-22024
- https://ubuntu.com/security/CVE-2020-22039
- https://ubuntu.com/security/CVE-2020-22040
- https://ubuntu.com/security/CVE-2020-22043
- https://ubuntu.com/security/CVE-2020-22051
- https://ubuntu.com/security/CVE-2021-28429
- https://ubuntu.com/security/CVE-2020-22040
- https://ubuntu.com/security/CVE-2020-22051
- https://ubuntu.com/security/CVE-2021-28429
- https://ubuntu.com/security/CVE-2020-22043
- https://ubuntu.com/security/CVE-2020-22039
- https://ubuntu.com/security/CVE-2020-22024

Title: USN-6398-1: ReadyMedia vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6398-1
Priorities: medium
Description:
It was discovered that ReadyMedia was vulnerable to DNS rebinding attacks.
A remote attacker could possibly use this issue to trick the local DLNA
server to leak information. This issue only affected Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-26505)

It was discovered that ReadyMedia incorrectly handled certain HTTP requests
using chunked transport encoding. A remote attacker could possibly use this
issue to cause buffer overflows, resulting in out-of-bounds reads and writes.
(CVE-2023-33476)
CVEs:
- https://ubuntu.com/security/CVE-2022-26505
- https://ubuntu.com/security/CVE-2023-33476
- https://ubuntu.com/security/CVE-2022-26505
- https://ubuntu.com/security/CVE-2023-33476

Title: USN-6394-2: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-6394-2
Priorities: medium
Description:
USN-6394-1 fixed a vulnerability in Python. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that Python incorrectly handled certain scripts.
An attacker could possibly use this issue to execute arbitrary code
or cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2022-48560

Title: USN-6439-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6439-1
Priorities: medium,low,high
Description:
It was discovered that the IPv6 implementation in the Linux kernel
contained a high rate of hash collisions in connection lookup table. A
remote attacker could use this to cause a denial of service (excessive CPU
consumption). (CVE-2023-1206)

Yu Hao and Weiteng Chen discovered that the Bluetooth HCI UART driver in
the Linux kernel contained a race condition, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2023-31083)

Ross Lagerwall discovered that the Xen netback backend driver in the Linux
kernel did not properly handle certain unusual packets from a
paravirtualized network frontend, leading to a buffer overflow. An attacker
in a guest VM could use this to cause a denial of service (host system
crash) or possibly execute arbitrary code. (CVE-2023-34319)

Lin Ma discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a null pointer dereference vulnerability in some
situations. A local privileged attacker could use this to cause a denial of
service (system crash). (CVE-2023-3772)

Kyle Zeng discovered that the networking stack implementation in the Linux
kernel did not properly validate skb object size in certain conditions. An
attacker could use this cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-42752)

Kyle Zeng discovered that the netfiler subsystem in the Linux kernel did
not properly calculate array offsets, leading to a out-of-bounds write
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-42753)

Kyle Zeng discovered that the IPv4 Resource Reservation Protocol (RSVP)
classifier implementation in the Linux kernel contained an out-of-bounds
read vulnerability. A local attacker could use this to cause a denial of
service (system crash). Please note that kernel packet classifier support
for RSVP has been removed to resolve this vulnerability. (CVE-2023-42755)

Bing-Jhong Billy Jheng discovered that the Unix domain socket
implementation in the Linux kernel contained a race condition in certain
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4622)

Budimir Markovic discovered that the qdisc implementation in the Linux
kernel did not properly validate inner classes, leading to a use-after-free
vulnerability. A local user could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-4623)

Alex Birnberg discovered that the netfilter subsystem in the Linux kernel
did not properly validate register length, leading to an out-of- bounds
write vulnerability. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2023-4881)

It was discovered that the Quick Fair Queueing scheduler implementation in
the Linux kernel did not properly handle network packets in certain
conditions, leading to a use after free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-4921)
CVEs:
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-3772
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-31083
- https://ubuntu.com/security/CVE-2023-42753
- https://ubuntu.com/security/CVE-2023-4921
- https://ubuntu.com/security/CVE-2023-4881
- https://ubuntu.com/security/CVE-2023-42752
- https://ubuntu.com/security/CVE-2023-42755
- https://ubuntu.com/security/CVE-2023-4622
- https://ubuntu.com/security/CVE-2023-34319
- https://ubuntu.com/security/CVE-2023-4623
- https://ubuntu.com/security/CVE-2023-1206
- https://ubuntu.com/security/CVE-2023-3772

Title: USN-6428-1: LibTIFF vulnerability
URL: https://ubuntu.com/security/notices/USN-6428-1
Priorities: low
Description:
It was discovered that LibTIFF could be made to read out of bounds when
processing certain malformed image files with the tiffcrop utility. If a
user were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-1916

Title: LSN-0098-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0098-1
Priorities: high
Description:
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.(CVE-2023-3090)

It was discovered that the virtual terminal driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information (kernel memory).(CVE-2023-3567)

It was discovered that the universal 32bit network packet classifier
implementation in the Linux kernel did not properly perform reference
counting in some situations, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-3609)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-3776)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle table rules flush in certain circumstances. A local
attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code.(CVE-2023-3777)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly handle rule additions to bound chains in certain
circumstances. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code.(CVE-2023-3995)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle PIPAPO element removal, leading to a use-after-free
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code.(CVE-2023-4004)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code.(CVE-2023-4128)

Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-21400)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-40283)
CVEs:
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3609
- https://ubuntu.com/security/CVE-2023-21400
- https://ubuntu.com/security/CVE-2023-4004
- https://ubuntu.com/security/CVE-2023-3777
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3995
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-4128

Title: USN-6421-1: Bind vulnerability
URL: https://ubuntu.com/security/notices/USN-6421-1
Priorities: medium
Description:
It was discovered that Bind incorrectly handled certain control channel
messages. A remote attacker with access to the control channel could
possibly use this issue to cause Bind to crash, resulting in a denial of
service.
CVEs:
- https://ubuntu.com/security/CVE-2023-3341

Title: USN-6429-2: curl vulnerability
URL: https://ubuntu.com/security/notices/USN-6429-2
Priorities: low
Description:
USN-6429-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS
and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that curl incorrectly handled cookies when an application
duplicated certain handles. A local attacker could possibly create a cookie
file and inject arbitrary cookies into subsequent connections.
(CVE-2023-38546)
CVEs:
- https://ubuntu.com/security/CVE-2023-38546
- https://ubuntu.com/security/CVE-2023-38546

Title: USN-6432-1: Quagga vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6432-1
Priorities: medium,low
Description:
It was discovered that the Quagga BGP daemon did not properly check the
attribute length in NRLI. A remote attacker could possibly use this issue
to cause a denial of service. (CVE-2023-41358)

It was discovered that the Quagga BGP daemon did not properly manage memory
when reading initial bytes of ORF header. A remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-41360)
CVEs:
- https://ubuntu.com/security/CVE-2023-41358
- https://ubuntu.com/security/CVE-2023-41360
- https://ubuntu.com/security/CVE-2023-41360
- https://ubuntu.com/security/CVE-2023-41358

Title: USN-6411-1: Exim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6411-1
Priorities: medium
Description:
It was discovered that Exim incorrectly handled certain challenge requests.
A remote attacker could possibly use this issue to perform out-of-bounds
reads, resulting in information leakage. (CVE-2023-42114)

It was discovered that Exim incorrectly handled validation of user-supplied
data. A remote attacker could possibly use this issue to perform
out-of-bounds writes, resulting in arbitrary code execution. This issue
only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.04.
(CVE-2023-42115)

It was discovered that Exim incorrectly handled certain challenge requests.
A remote attacker could possibly use this issue to perform out-of-bounds
writes, resulting in arbitrary code execution. (CVE-2023-42116)
CVEs:
- https://ubuntu.com/security/CVE-2023-42114
- https://ubuntu.com/security/CVE-2023-42115
- https://ubuntu.com/security/CVE-2023-42116
- https://ubuntu.com/security/CVE-2023-42115
- https://ubuntu.com/security/CVE-2023-42114
- https://ubuntu.com/security/CVE-2023-42116

Title: USN-6407-2: libx11 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6407-2
Priorities: medium
Description:
USN-6407-1 fixed several vulnerabilities in libx11. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Gregory James Duck discovered that libx11 incorrectly handled certain
keyboard symbols. If a user were tricked into connecting to a malicious X
server, a remote attacker could use this issue to cause libx11 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-43785)

Yair Mizrahi discovered that libx11 incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could possibly use this issue to consume
memory, leading to a denial of service. (CVE-2023-43786)

Yair Mizrahi discovered that libx11 incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could use this issue to cause libx11 to
crash, leading to a denial of service, or possibly execute arbitrary code.
(CVE-2023-43787)
CVEs:
- https://ubuntu.com/security/CVE-2023-43785
- https://ubuntu.com/security/CVE-2023-43786
- https://ubuntu.com/security/CVE-2023-43787
- https://ubuntu.com/security/CVE-2023-43786
- https://ubuntu.com/security/CVE-2023-43785
- https://ubuntu.com/security/CVE-2023-43787

621.699

Available in the Broadcom Support portal

Release Date: September 28, 2023

Metadata:

BOSH Agent Version: 2.268.177

USNs:


Title: USN-6360-2: FLAC vulnerability
URL: https://ubuntu.com/security/notices/USN-6360-2
Priorities: medium
Description:
USN-6360-1 fixed a vulnerability in FLAC. This update provides the
corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and
Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that FLAC incorrectly handled encoding certain files. A
remote attacker could use this issue to cause FLAC to crash, resulting in a
denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-22219

Title: USN-6396-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6396-1
Priorities: medium,low,high
Description:
It was discovered that some AMD x86-64 processors with SMT enabled could
speculatively execute instructions using a return address from a sibling
thread. A local attacker could possibly use this to expose sensitive
information. (CVE-2022-27672)

Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)
CVEs:
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2022-27672
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128

Title: USN-6388-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6388-1
Priorities: medium,low,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)

It was discovered that the JFS file system implementation in the Linux
kernel did not properly validate memory allocations in certain situations,
leading to a null pointer dereference vulnerability. An attacker could use
this to construct a malicious JFS image that, when mounted, could cause a
denial of service (system crash). (CVE-2023-4385)

It was discovered that the VMware VMXNET3 ethernet driver in the Linux
kernel contained a use-after-free vulnerability in certain situations. A
local attacker in a guest VM could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-4387)

It was discovered that the VMware VMXNET3 ethernet driver in the Linux
kernel did not properly handle errors in certain situations, leading to a
null pointer dereference vulnerability. A local attacker in a guest VM
could use this to cause a denial of service (system crash). (CVE-2023-4459)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4385
- https://ubuntu.com/security/CVE-2023-4387
- https://ubuntu.com/security/CVE-2023-4459
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-4385
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-4387
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-4459
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-40283

Title: USN-6393-1: ImageMagick vulnerability
URL: https://ubuntu.com/security/notices/USN-6393-1
Priorities: low
Description:
It was discovered that ImageMagick did not properly handle memory when
processing the -help option. An attacker could potentially use this
issue to cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2022-48541

Title: USN-6394-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-6394-1
Priorities: medium
Description:
It was discovered that Python incorrectly handled certain scripts.
An attacker could possibly use this issue to execute arbitrary code
or cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2022-48560

Title: USN-6365-2: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-6365-2
Priorities: medium
Description:
USN-6365-1 fixed a vulnerability in Open VM Tools. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that Open VM Tools incorrectly handled SAML tokens. A
remote attacker could possibly use this issue to bypass SAML token
signature verification and perform VMware Tools Guest Operations.
CVEs:
- https://ubuntu.com/security/CVE-2023-20900

Title: USN-6190-2: AccountsService vulnerability
URL: https://ubuntu.com/security/notices/USN-6190-2
Priorities: medium
Description:
USN-6190-1 fixed a vulnerability in AccountsService. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS.

Original advisory details:

Kevin Backhouse discovered that AccountsService incorrectly handled certain
D-Bus messages. A local attacker could use this issue to cause
AccountsService to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-3297

Title: USN-6391-2: CUPS vulnerability
URL: https://ubuntu.com/security/notices/USN-6391-2
Priorities: medium
Description:
USN-6391-1 fixed a vulnerability in CUPS. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that CUPS incorrectly parsed certain Postscript objects.
If a user or automated system were tricked into printing a specially
crafted document, a remote attacker could use this issue to cause CUPS to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2023-4504

621.687

Available in the Broadcom Support portal

Release Date: September 20, 2023

Metadata:

BOSH Agent Version: 2.268.173

USNs:


Title: USN-6380-1: Node.js vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6380-1
Priorities: medium
Description:
Rogier Schouten discovered that Node.js incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
(CVE-2019-15604)

Ethan Rubinson discovered that Node.js incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2019-15605)

Alyssa Wilk discovered that Node.js incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to execute
arbitrary code. This issue only affected Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2019-15606)

Tobias Niessen discovered that Node.js incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-8174)

It was discovered that Node.js incorrectly handled certain inputs. If a user
or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2020-8265, CVE-2020-8287)
CVEs:
- https://ubuntu.com/security/CVE-2019-15604
- https://ubuntu.com/security/CVE-2019-15605
- https://ubuntu.com/security/CVE-2019-15606
- https://ubuntu.com/security/CVE-2020-8174
- https://ubuntu.com/security/CVE-2020-8265
- https://ubuntu.com/security/CVE-2020-8287
- https://ubuntu.com/security/CVE-2019-15604
- https://ubuntu.com/security/CVE-2019-15606
- https://ubuntu.com/security/CVE-2020-8265
- https://ubuntu.com/security/CVE-2019-15605
- https://ubuntu.com/security/CVE-2020-8287
- https://ubuntu.com/security/CVE-2020-8174

Title: USN-6356-1: OpenDMARC vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6356-1
Priorities: low,medium
Description:
Jianjun Chen, Vern Paxson and Jian Jiang discovered that OpenDMARC
incorrectly handled certain inputs. If a user or an automated system were
tricked into receiving crafted inputs, an attacker could possibly use this
to falsify the domain of an e-mails origin. (CVE-2020-12272)

Patrik Lantz discovered that OpenDMARC incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to
cause a denial of service. (CVE-2020-12460)
CVEs:
- https://ubuntu.com/security/CVE-2020-12272
- https://ubuntu.com/security/CVE-2020-12460
- https://ubuntu.com/security/CVE-2020-12460
- https://ubuntu.com/security/CVE-2020-12272

Title: USN-6381-1: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6381-1
Priorities: medium
Description:
It was discovered that a memory leak existed in certain GNU binutils
modules. An attacker could possibly use this issue to cause a denial of
service (memory exhaustion). (CVE-2020-19724, CVE-2020-21490)

It was discovered that GNU binutils was not properly performing bounds
checks in several functions, which could lead to a buffer overflow. An
attacker could possibly use this issue to cause a denial of service,
expose sensitive information or execute arbitrary code.
(CVE-2020-19726, CVE-2021-46174, CVE-2022-45703)

It was discovered that GNU binutils was not properly initializing heap
memory when processing certain print instructions. An attacker could
possibly use this issue to expose sensitive information. (CVE-2020-35342)

It was discovered that GNU binutils was not properly handling the logic
behind certain memory management related operations, which could lead to a
buffer overflow. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. (CVE-2022-44840)

It was discovered that GNU binutils was not properly handling the logic
behind certain memory management related operations, which could lead to
an invalid memory access. An attacker could possibly use this issue to
cause a denial of service. (CVE-2022-47695)
CVEs:
- https://ubuntu.com/security/CVE-2020-19724
- https://ubuntu.com/security/CVE-2020-21490
- https://ubuntu.com/security/CVE-2020-19726
- https://ubuntu.com/security/CVE-2021-46174
- https://ubuntu.com/security/CVE-2022-45703
- https://ubuntu.com/security/CVE-2020-35342
- https://ubuntu.com/security/CVE-2022-44840
- https://ubuntu.com/security/CVE-2022-47695
- https://ubuntu.com/security/CVE-2020-19726
- https://ubuntu.com/security/CVE-2020-35342
- https://ubuntu.com/security/CVE-2022-44840
- https://ubuntu.com/security/CVE-2020-21490
- https://ubuntu.com/security/CVE-2022-45703
- https://ubuntu.com/security/CVE-2021-46174
- https://ubuntu.com/security/CVE-2020-19724
- https://ubuntu.com/security/CVE-2022-47695

Title: USN-6364-1: Ghostscript vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6364-1
Priorities: medium
Description:
It was discovered that Ghostscript incorrectly handled certain PDF files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2020-21710)

It was discovered that Ghostscript incorrectly handled certain PDF files.
An attacker could possibly use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2020-21890)
CVEs:
- https://ubuntu.com/security/CVE-2020-21710
- https://ubuntu.com/security/CVE-2020-21890
- https://ubuntu.com/security/CVE-2020-21890
- https://ubuntu.com/security/CVE-2020-21710

Title: USN-6371-1: libssh2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6371-1
Priorities: medium
Description:
It was discovered that libssh2 incorrectly handled memory
access. An attacker could possibly use this issue to cause
a crash.
CVEs:
- https://ubuntu.com/security/CVE-2020-22218

Title: USN-6370-1: ModSecurity vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6370-1
Priorities: medium
Description:
It was discovered that ModSecurity incorrectly handled certain nested JSON
objects. An attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
and Ubuntu 20.04 LTS. (CVE-2021-42717)

It was discovered that ModSecurity incorrectly handled certain HTTP
multipart requests. A remote attacker could possibly use this issue
to bypass ModSecurity restrictions. (CVE-2022-48279)

It was discovered that ModSecurity incorrectly handled certain file
uploads. A remote attacker could possibly use this issue to cause a
buffer overflow and a firewall failure. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2023-24021)
CVEs:
- https://ubuntu.com/security/CVE-2021-42717
- https://ubuntu.com/security/CVE-2022-48279
- https://ubuntu.com/security/CVE-2023-24021
- https://ubuntu.com/security/CVE-2021-42717
- https://ubuntu.com/security/CVE-2023-24021
- https://ubuntu.com/security/CVE-2022-48279

Title: USN-6388-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6388-1
Priorities: medium,low,high
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly
clear microarchitectural state after speculative execution of various
instructions. A local unprivileged user could use this to obtain to
sensitive information. (CVE-2022-40982)

Yang Lan discovered that the GFS2 file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious GFS2 image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2023-3212)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

It was discovered that the NFC implementation in the Linux kernel contained
a use-after-free vulnerability when performing peer-to-peer communication
in certain conditions. A privileged attacker could use this to cause a
denial of service (system crash) or possibly expose sensitive information
(kernel memory). (CVE-2023-3863)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle L2CAP socket release, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-40283)

It was discovered that some network classifier implementations in the Linux
kernel contained use-after-free vulnerabilities. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2023-4128)

It was discovered that the JFS file system implementation in the Linux
kernel did not properly validate memory allocations in certain situations,
leading to a null pointer dereference vulnerability. An attacker could use
this to construct a malicious JFS image that, when mounted, could cause a
denial of service (system crash). (CVE-2023-4385)

It was discovered that the VMware VMXNET3 ethernet driver in the Linux
kernel contained a use-after-free vulnerability in certain situations. A
local attacker in a guest VM could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-4387)

It was discovered that the VMware VMXNET3 ethernet driver in the Linux
kernel did not properly handle errors in certain situations, leading to a
null pointer dereference vulnerability. A local attacker in a guest VM
could use this to cause a denial of service (system crash). (CVE-2023-4459)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-40283
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2023-4385
- https://ubuntu.com/security/CVE-2023-4387
- https://ubuntu.com/security/CVE-2023-4459
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-4385
- https://ubuntu.com/security/CVE-2023-3212
- https://ubuntu.com/security/CVE-2023-4387
- https://ubuntu.com/security/CVE-2023-3863
- https://ubuntu.com/security/CVE-2023-4459
- https://ubuntu.com/security/CVE-2023-4128
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-40283

Title: USN-6342-2: Linux kernel (Azure)
URL: https://ubuntu.com/security/notices/USN-6342-2
Priorities: high,medium,low
Description:
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
CVEs:
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-20593

Title: USN-6237-3: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6237-3
Priorities: low,medium
Description:
USN-6237-1 fixed several vulnerabilities in curl. This update provides the
corresponding updates for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and
Ubuntu 18.04 LTS.

Original advisory details:

Hiroki Kurosawa discovered that curl incorrectly handled validating certain
certificate wildcards. A remote attacker could possibly use this issue to
spoof certain website certificates using IDN hosts. (CVE-2023-28321)

Hiroki Kurosawa discovered that curl incorrectly handled callbacks when
certain options are set by applications. This could cause applications
using curl to misbehave, resulting in information disclosure, or a denial
of service. (CVE-2023-28322)

It was discovered that curl incorrectly handled saving cookies to files. A
local attacker could possibly use this issue to create or overwrite files.
This issue only affected Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-32001)
CVEs:
- https://ubuntu.com/security/CVE-2023-28321
- https://ubuntu.com/security/CVE-2023-28322
- https://ubuntu.com/security/CVE-2023-32001
- https://ubuntu.com/security/CVE-2023-28322
- https://ubuntu.com/security/CVE-2023-28321

Title: USN-6164-2: c-ares vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6164-2
Priorities: medium
Description:
USN-6164-1 fixed several vulnerabilities in c-ares. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

Hannes Moesl discovered that c-ares incorrectly handled certain ipv6
addresses. An attacker could use this issue to cause c-ares to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-31130)

Xiang Li discovered that c-ares incorrectly handled certain UDP packets. A
remote attacker could possibly use this issue to cause c-res to crash,
resulting in a denial of service. (CVE-2023-32067)
CVEs:
- https://ubuntu.com/security/CVE-2023-31130
- https://ubuntu.com/security/CVE-2023-32067
- https://ubuntu.com/security/CVE-2023-32067
- https://ubuntu.com/security/CVE-2023-31130

Title: USN-6358-1: RedCloth vulnerability
URL: https://ubuntu.com/security/notices/USN-6358-1
Priorities: medium
Description:
It was discovered that RedCloth incorrectly handled certain inputs during
html sanitisation. An attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-31606

Title: USN-6372-1: DBus vulnerability
URL: https://ubuntu.com/security/notices/USN-6372-1
Priorities: low
Description:
It was discovered that DBus incorrectly handled certain
invalid messages. A local attacker could possibly use
this issue to cause DBus to crash, resulting in a denial
of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-34969

Title: USN-6366-1: PostgreSQL vulnerability
URL: https://ubuntu.com/security/notices/USN-6366-1
Priorities: medium
Description:
It was discovered that PostgreSQL incorrectly handled certain extension
script substitutions. An attacker having database-level CREATE privileges
can use this issue to execute arbitrary code as the bootstrap superuser.
CVEs:
- https://ubuntu.com/security/CVE-2023-39417

Title: USN-6373-1: gawk vulnerability
URL: https://ubuntu.com/security/notices/USN-6373-1
Priorities: medium
Description:
It was discovered that gawk could be made to read out of bounds when
processing certain inputs. If a user or an automated system were tricked
into opening a specially crafted input, an attacker could possibly use
this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-4156

Title: USN-6374-1: Mutt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6374-1
Priorities: medium
Description:
It was discovered that Mutt incorrectly handled certain email header
contents. If a user were tricked into opening a specially crafted message,
a remote attacker could possibly use this issue to cause a denial of
service. (CVE-2023-4874, CVE-2023-4875)
CVEs:
- https://ubuntu.com/security/CVE-2023-4874
- https://ubuntu.com/security/CVE-2023-4875
- https://ubuntu.com/security/CVE-2023-4874
- https://ubuntu.com/security/CVE-2023-4875

Full Changelog: https://github.com/pivotal-cf/bosh-linux-stemcell-builder-lts/compare/ubuntu-trusty/v3586.153…ubuntu-xenial/v621.687

621.676

Available in the Broadcom Support portal

Release Date: September 07, 2023

Metadata:

BOSH Agent Version: 2.268.170

USNs:


Title: USN-6336-1: Docker Registry vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6336-1
Priorities: low,medium
Description:
It was discovered that Docker Registry incorrectly handled certain crafted
input, which allowed remote attackers to cause a denial of service. This
issue only affected Ubuntu 16.04 LTS. (CVE-2017-11468)

It was discovered that Docker Registry incorrectly handled certain crafted
input. An attacker could possibly use this issue to cause a denial of
service. (CVE-2017-11468)
CVEs:
- https://ubuntu.com/security/CVE-2017-11468
- https://ubuntu.com/security/CVE-2017-11468
- https://ubuntu.com/security/CVE-2023-2253
- https://ubuntu.com/security/CVE-2017-11468

Title: USN-6322-1: elfutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6322-1
Priorities: low,medium
Description:
It was discovered that elfutils incorrectly handled certain malformed
files. If a user or automated system were tricked into processing a
specially crafted file, elfutils could be made to crash or consume
resources, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS. (CVE-2018-16062, CVE-2018-16403, CVE-2018-18310,
CVE-2018-18520, CVE-2018-18521, CVE-2019-7149, CVE-2019-7150,
CVE-2019-7665)

It was discovered that elfutils incorrectly handled bounds checks in
certain functions when processing malformed files. If a user or automated
system were tricked into processing a specially crafted file, elfutils
could be made to crash or consume resources, resulting in a denial of
service. (CVE-2020-21047, CVE-2021-33294)
CVEs:
- https://ubuntu.com/security/CVE-2018-16062
- https://ubuntu.com/security/CVE-2018-16403
- https://ubuntu.com/security/CVE-2018-18310
- https://ubuntu.com/security/CVE-2018-18520
- https://ubuntu.com/security/CVE-2018-18521
- https://ubuntu.com/security/CVE-2019-7149
- https://ubuntu.com/security/CVE-2019-7150
- https://ubuntu.com/security/CVE-2019-7665
- https://ubuntu.com/security/CVE-2020-21047
- https://ubuntu.com/security/CVE-2021-33294
- https://ubuntu.com/security/CVE-2021-33294
- https://ubuntu.com/security/CVE-2020-21047
- https://ubuntu.com/security/CVE-2018-18521
- https://ubuntu.com/security/CVE-2018-18520
- https://ubuntu.com/security/CVE-2019-7665
- https://ubuntu.com/security/CVE-2018-16062
- https://ubuntu.com/security/CVE-2019-7150
- https://ubuntu.com/security/CVE-2018-16403
- https://ubuntu.com/security/CVE-2019-7149
- https://ubuntu.com/security/CVE-2018-18310

Title: USN-6334-1: atftp vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6334-1
Priorities: medium
Description:
Peter Wang discovered that atftp did not properly manage certain inputs. A
remote attacker could send a specially crafted tftp request to the server
to cause a crash. (CVE-2020-6097)

Andreas B. Mundt discovered that atftp did not properly manage certain
inputs. A remote attacker could send a specially crafted tftp request to
the server to cause a crash. (CVE-2021-41054)

Johannes Krupp discovered that atftp did not properly manage certain
inputs. A remote attacker could send a specially crafted tftp request to
the server and make the server to disclose /etc/group data.
(CVE-2021-46671)
CVEs:
- https://ubuntu.com/security/CVE-2020-6097
- https://ubuntu.com/security/CVE-2021-41054
- https://ubuntu.com/security/CVE-2021-46671
- https://ubuntu.com/security/CVE-2020-6097
- https://ubuntu.com/security/CVE-2021-46671
- https://ubuntu.com/security/CVE-2021-41054

Title: USN-6335-1: BusyBox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6335-1
Priorities: low,medium
Description:
It was discovered that BusyBox incorrectly handled certain malformed gzip
archives. If a user or automated system were tricked into processing a
specially crafted gzip archive, a remote attacker could use this issue to
cause BusyBox to crash, resulting in a denial of service, or execute
arbitrary code. This issue only affected Ubuntu 14.04 LTS.
(CVE-2021-28831)

It was discovered that BusyBox did not properly validate user input when
performing certain arithmetic operations. If a user or automated system
were tricked into processing a specially crafted file, an attacker could
possibly use this issue to cause BusyBox to crash, resulting in a denial
of service, or execute arbitrary code. (CVE-2022-48174)
CVEs:
- https://ubuntu.com/security/CVE-2021-28831
- https://ubuntu.com/security/CVE-2022-48174
- https://ubuntu.com/security/CVE-2022-48174
- https://ubuntu.com/security/CVE-2021-28831

Title: USN-6313-1: FAAD2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6313-1
Priorities: medium
Description:
It was discovered that FAAD2 incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-32272, CVE-2021-32273, CVE-2021-32274, CVE-2021-32277,
CVE-2021-32278, CVE-2023-38857, CVE-2023-38858)

It was discovered that FAAD2 incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service.
(CVE-2021-32276)
CVEs:
- https://ubuntu.com/security/CVE-2021-32272
- https://ubuntu.com/security/CVE-2021-32273
- https://ubuntu.com/security/CVE-2021-32274
- https://ubuntu.com/security/CVE-2021-32277
- https://ubuntu.com/security/CVE-2021-32278
- https://ubuntu.com/security/CVE-2023-38857
- https://ubuntu.com/security/CVE-2023-38858
- https://ubuntu.com/security/CVE-2021-32276
- https://ubuntu.com/security/CVE-2021-32276
- https://ubuntu.com/security/CVE-2021-32278
- https://ubuntu.com/security/CVE-2023-38857
- https://ubuntu.com/security/CVE-2021-32273
- https://ubuntu.com/security/CVE-2021-32274
- https://ubuntu.com/security/CVE-2021-32277
- https://ubuntu.com/security/CVE-2023-38858
- https://ubuntu.com/security/CVE-2021-32272

Title: USN-6353-1: PLIB vulnerability
URL: https://ubuntu.com/security/notices/USN-6353-1
Priorities: medium
Description:
Wooseok Kang discovered that PLIB did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted TGA file, an attacker could possibly use this issue to cause
applications using PLIB to crash, resulting in a denial of service, or
possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-38714

Title: USN-6354-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-6354-1
Priorities: medium
Description:
It was discovered that Python did not properly handle XML entity
declarations in plist files. An attacker could possibly use this
vulnerability to perform an XML External Entity (XXE) injection,
resulting in a denial of service or information disclosure.
CVEs:
- https://ubuntu.com/security/CVE-2022-48565

Title: USN-6319-1: AMD Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-6319-1
Priorities: medium
Description:
Daniël Trujillo, Johannes Wikner, and Kaveh Razavi discovered that some AMD
processors utilising speculative execution and branch prediction may allow
unauthorised memory reads via a speculative side-channel attack. A local
attacker could use this to expose sensitive information, including kernel
memory.
CVEs:
- https://ubuntu.com/security/CVE-2023-20569

Title: USN-6342-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6342-1
Priorities: high,medium,low
Description:
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local
attacker could use this to expose sensitive information. (CVE-2023-20593)

Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
CVEs:
- https://ubuntu.com/security/CVE-2023-20593
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-20593

Title: USN-6327-1: Linux kernel (KVM) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6327-1
Priorities: medium,low,high
Description:
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

It was discovered that the virtual terminal driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information (kernel memory). (CVE-2023-3567)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
CVEs:
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084

Title: LSN-0097-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0097-1
Priorities: high
Description:
It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.(CVE-2023-3090)

Querijn Voet discovered that a race condition existed in the io_uring
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2023-3389)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2023-3390)

Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly validate the status of a nft chain while performing a lookup
by id, leading to a use-after-free vulnerability. An attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code.(CVE-2023-31248)

Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in
the Ubuntu Linux kernel did not properly perform permission checks in
certain situations. A local attacker could possibly use this to gain
elevated privileges.(CVE-2023-32629)

Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.(CVE-2023-35001)

Hangyu Hua discovered that the Flower classifier implementation in the
Linux kernel contained an out-of-bounds write vulnerability. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2023-35788)
CVEs:
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3389
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-31248
- https://ubuntu.com/security/CVE-2023-32629
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35788
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3389

Title: USN-6345-1: SoX vulnerability
URL: https://ubuntu.com/security/notices/USN-6345-1
Priorities: medium
Description:
It was discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, an attacker could possibly use this issue to cause a denial
of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-32627

Title: USN-6326-1: GitPython vulnerability
URL: https://ubuntu.com/security/notices/USN-6326-1
Priorities: medium
Description:
It was discovered that GitPython did not block insecure options from user
inputs in the clone command. An attacker could possibly use this issue to
execute arbitrary commands on the host.
CVEs:
- https://ubuntu.com/security/CVE-2023-40267

621.655

Available in the Broadcom Support portal

Release Date: August 29, 2023

Metadata:

BOSH Agent Version: 2.268.165

USNs:


Title: USN-6291-1: GStreamer vulnerability
URL: https://ubuntu.com/security/notices/USN-6291-1
Priorities: low
Description:
Hanno Bock discovered that GStreamer incorrecly handled certain datetime
strings. An attacker could possibly use this issue to cause a denial
of service or expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2017-5838

Title: USN-6298-1: ZZIPlib vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6298-1
Priorities: low
Description:
Liu Zhu discovered that ZZIPlib incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2018-7727)

YiMing Liu discovered that ZZIPlib incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2020-18442)
CVEs:
- https://ubuntu.com/security/CVE-2018-7727
- https://ubuntu.com/security/CVE-2020-18442
- https://ubuntu.com/security/CVE-2020-18442
- https://ubuntu.com/security/CVE-2018-7727

Title: USN-6303-2: ClamAV vulnerability
URL: https://ubuntu.com/security/notices/USN-6303-2
Priorities: medium
Description:
USN-6303-1 fixed a vulnerability in ClamAV. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that ClamAV incorrectly handled parsing HFS+ files. A
remote attacker could possibly use this issue to cause ClamAV to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-20197

Title: USN-6309-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6309-1
Priorities: medium,low,high
Description:
Zheng Zhang discovered that the device-mapper implementation in the Linux
kernel did not properly handle locking during table_clear() operations. A
local attacker could use this to cause a denial of service (kernel
deadlock). (CVE-2023-2269)

It was discovered that a use-after-free vulnerability existed in the HFS+
file system implementation in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2023-2985)

It was discovered that the DVB Core driver in the Linux kernel did not
properly handle locking events in certain situations. A local attacker
could use this to cause a denial of service (kernel deadlock).
(CVE-2023-31084)

It was discovered that the virtual terminal driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information (kernel memory). (CVE-2023-3567)

It was discovered that the Quick Fair Queueing network scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3611)

It was discovered that the network packet classifier with
netfilter/firewall marks implementation in the Linux kernel did not
properly handle reference counting, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3776)
CVEs:
- https://ubuntu.com/security/CVE-2023-2269
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-3776
- https://ubuntu.com/security/CVE-2023-31084
- https://ubuntu.com/security/CVE-2023-3611
- https://ubuntu.com/security/CVE-2023-2985
- https://ubuntu.com/security/CVE-2023-3567
- https://ubuntu.com/security/CVE-2023-2269

Title: USN-6297-1: Ghostscript vulnerability
URL: https://ubuntu.com/security/notices/USN-6297-1
Priorities: medium
Description:
It was discovered that Ghostscript incorrectly handled outputting certain
PDF files. A local attacker could potentially use this issue to cause
a crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-38559

621.644

Available in the Broadcom Support portal

Release Date: August 17, 2023

Metadata:

BOSH Agent Version: 2.268.161

USNs:


Title: USN-6265-1: RabbitMQ vulnerability
URL: https://ubuntu.com/security/notices/USN-6265-1
Priorities: low
Description:
It was discovered that RabbitMQ incorrectly handled certain signed-in user
credentials. An attacker could possibly use this issue to expose
sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2017-4966

Title: USN-6276-1: unixODBC vulnerability
URL: https://ubuntu.com/security/notices/USN-6276-1
Priorities: low
Description:
It was discovered that unixODBC incorrectly handled certain unicode
to ansi copies. An attacker could possibly use this issue to cause
a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2018-7409

Title: USN-6262-1: Wireshark vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6262-1
Priorities: low,medium
Description:
It was discovered that Wireshark did not properly handle certain
NFS packages when certain configuration options were enabled.
An attacker could possibly use this issue to cause
Wireshark to crash, resulting in a denial of service. (CVE-2020-13164)

It was discovered that Wireshark did not properly handle certain GVCP
packages. An attacker could possibly use this issue to cause
Wireshark to crash, resulting in a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-15466)

It was discovered that Wireshark did not properly handle certain
Kafka packages. An attacker could possibly use this issue to cause
Wireshark to crash, resulting in a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-17498)

It was discovered that Wireshark did not properly handle certain TCP
packages containing an invalid 0xFFFF checksum. An attacker could
possibly use this issue to cause Wireshark to crash, resulting in
a denial of service. (CVE-2020-25862)

It was discovered that Wireshark did not properly handle certain
MIME packages containing invalid parts. An attacker could
possibly use this issue to cause Wireshark to crash, resulting in
a denial of service. (CVE-2020-25863)
CVEs:
- https://ubuntu.com/security/CVE-2020-13164
- https://ubuntu.com/security/CVE-2020-15466
- https://ubuntu.com/security/CVE-2020-17498
- https://ubuntu.com/security/CVE-2020-25862
- https://ubuntu.com/security/CVE-2020-25863
- https://ubuntu.com/security/CVE-2020-13164
- https://ubuntu.com/security/CVE-2020-17498
- https://ubuntu.com/security/CVE-2020-15466
- https://ubuntu.com/security/CVE-2020-25863
- https://ubuntu.com/security/CVE-2020-25862

Title: USN-6281-1: Velocity Engine vulnerability
URL: https://ubuntu.com/security/notices/USN-6281-1
Priorities: medium
Description:
Alvaro Munoz discovered that Velocity Engine incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-13936

Title: USN-6282-1: Velocity Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-6282-1
Priorities: medium
Description:
Jackson Henry discovered that Velocity Tools incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-13959

Title: USN-6259-1: Open-iSCSI vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6259-1
Priorities: low
Description:
Jos Wetzels, Stanislav Dashevskyi, and Amine Amri discovered that
Open-iSCSI incorrectly handled certain checksums for IP packets.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2020-13987)

Jos Wetzels, Stanislav Dashevskyi, Amine Amri discovered that
Open-iSCSI incorrectly handled certain parsing TCP MSS options.
An attacker could possibly use this issue to cause a crash or cause
unexpected behavior. (CVE-2020-13988)

Amine Amri and Stanislav Dashevskyi discovered that Open-iSCSI
incorrectly handled certain TCP data. An attacker could possibly
use this issue to expose sensitive information. (CVE-2020-17437)
CVEs:
- https://ubuntu.com/security/CVE-2020-13987
- https://ubuntu.com/security/CVE-2020-13988
- https://ubuntu.com/security/CVE-2020-17437
- https://ubuntu.com/security/CVE-2020-13988
- https://ubuntu.com/security/CVE-2020-13987
- https://ubuntu.com/security/CVE-2020-17437

Title: USN-5193-3: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5193-3
Priorities: medium
Description:
USN-5193-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain inputs. An attacker could use this issue to cause the server to
crash, resulting in a denial of service, or possibly execute arbitrary
code and escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2021-4011
- https://ubuntu.com/security/CVE-2021-4008
- https://ubuntu.com/security/CVE-2021-4009

Title: USN-6287-1: Go yaml vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6287-1
Priorities: medium
Description:
Simon Ferquel discovered that the Go yaml package incorrectly handled
certain YAML documents. If a user or an automated system were tricked
into opening a specially crafted input file, a remote attacker could
possibly use this issue to cause the system to crash, resulting in
a denial of service. (CVE-2021-4235)

It was discovered that the Go yaml package incorrectly handled
certain large YAML documents. If a user or an automated system were tricked
into opening a specially crafted input file, a remote attacker could
possibly use this issue to cause the system to crash, resulting in
a denial of service. (CVE-2022-3064)
CVEs:
- https://ubuntu.com/security/CVE-2021-4235
- https://ubuntu.com/security/CVE-2022-3064
- https://ubuntu.com/security/CVE-2022-3064
- https://ubuntu.com/security/CVE-2021-4235

Title: USN-6252-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6252-1
Priorities: medium,low,high
Description:
It was discovered that the ext4 file system implementation in the Linux
kernel contained a use-after-free vulnerability. An attacker could use this
to construct a malicious ext4 file system image that, when mounted, could
cause a denial of service (system crash). (CVE-2022-1184)

It was discovered that the sound subsystem in the Linux kernel contained a
race condition in some situations. A local attacker could use this to cause
a denial of service (system crash). (CVE-2022-3303)

It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)

It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)

It was discovered that a race condition existed in the Xen transport layer
implementation for the 9P file system protocol in the Linux kernel, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (guest crash) or expose sensitive information (guest
kernel memory). (CVE-2023-1859)

It was discovered that the ST NCI NFC driver did not properly handle device
removal events. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2023-1990)

It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)

It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)

It was discovered that the btrfs file system implementation in the Linux
kernel did not properly handle error conditions in some situations, leading
to a use-after-free vulnerability. A local attacker could possibly use this
to cause a denial of service (system crash). (CVE-2023-3111)

It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)

It was discovered that the kernel->user space relay implementation in the
Linux kernel did not properly perform certain buffer calculations, leading
to an out-of-bounds read vulnerability. A local attacker could use this to
cause a denial of service (system crash) or expose sensitive information
(kernel memory). (CVE-2023-3268)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)

Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)
CVEs:
- https://ubuntu.com/security/CVE-2022-1184
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1859
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3111
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2022-1184
- https://ubuntu.com/security/CVE-2023-1859
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-3111
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2023-1611

Title: USN-6270-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6270-1
Priorities: medium,low
Description:
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possibly execute arbitrary code. This
issue only affected Ubuntu 22.04 LTS. (CVE-2022-2182)

It was discovered that Vim incorrectly handled memory when deleting buffers
in diff mode. An attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-2208)

It was discovered that Vim incorrectly handled memory access. An attacker
could possibly use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-2210)

It was discovered that Vim incorrectly handled memory when using nested
:source. An attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-2231)

It was discovered that Vim did not properly perform bounds checks when
processing a menu item with the only modifier. An attacker could possibly
use this issue to cause a denial of service. (CVE-2022-2257)

It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possibly execute arbitrary code.
(CVE-2022-2264, CVE-2022-2284, CVE-2022-2289)

It was discovered that Vim did not properly perform bounds checks when
going over the end of the typahead. An attacker could possibly use this
issue to cause a denial of service. (CVE-2022-2285)

It was discovered that Vim did not properly perform bounds checks when
reading the provided string. An attacker could possibly use this issue to
cause a denial of service. (CVE-2022-2286)

It was discovered that Vim incorrectly handled memory when adding words
with a control character to the internal spell word list. An attacker could
possibly use this issue to cause a denial of service. (CVE-2022-2287)
CVEs:
- https://ubuntu.com/security/CVE-2022-2182
- https://ubuntu.com/security/CVE-2022-2208
- https://ubuntu.com/security/CVE-2022-2210
- https://ubuntu.com/security/CVE-2022-2231
- https://ubuntu.com/security/CVE-2022-2257
- https://ubuntu.com/security/CVE-2022-2264
- https://ubuntu.com/security/CVE-2022-2284
- https://ubuntu.com/security/CVE-2022-2289
- https://ubuntu.com/security/CVE-2022-2285
- https://ubuntu.com/security/CVE-2022-2286
- https://ubuntu.com/security/CVE-2022-2287
- https://ubuntu.com/security/CVE-2022-2208
- https://ubuntu.com/security/CVE-2022-2182
- https://ubuntu.com/security/CVE-2022-2264
- https://ubuntu.com/security/CVE-2022-2286
- https://ubuntu.com/security/CVE-2022-2287
- https://ubuntu.com/security/CVE-2022-2231
- https://ubuntu.com/security/CVE-2022-2210
- https://ubuntu.com/security/CVE-2022-2285
- https://ubuntu.com/security/CVE-2022-2289
- https://ubuntu.com/security/CVE-2022-2284
- https://ubuntu.com/security/CVE-2022-2257

Title: USN-6271-1: MaraDNS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6271-1
Priorities: medium
Description:
Xiang Li discovered that MaraDNS incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information. (CVE-2022-30256)

Huascar Tejeda discovered that MaraDNS incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a denial
of service. (CVE-2023-31137)
CVEs:
- https://ubuntu.com/security/CVE-2022-30256
- https://ubuntu.com/security/CVE-2023-31137
- https://ubuntu.com/security/CVE-2023-31137
- https://ubuntu.com/security/CVE-2022-30256

Title: USN-6286-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6286-1
Priorities: medium
Description:
Daniel Moghimi discovered that some Intel(R) Processors did not properly clear
microarchitectural state after speculative execution of various instructions. A
local unprivileged user could use this to obtain to sensitive
information. (CVE-2022-40982)

It was discovered that some Intel(R) Xeon(R) Processors did not properly
restrict error injection for Intel(R) SGX or Intel(R) TDX. A local privileged
user could use this to further escalate their privileges. (CVE-2022-41804)

It was discovered that some 3rd Generation Intel(R) Xeon(R) Scalable processors
did not properly restrict access in some situations. A local privileged attacker
could use this to obtain sensitive information. (CVE-2023-23908)
CVEs:
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2022-41804
- https://ubuntu.com/security/CVE-2023-23908
- https://ubuntu.com/security/CVE-2022-40982
- https://ubuntu.com/security/CVE-2023-23908
- https://ubuntu.com/security/CVE-2022-41804

Title: USN-6290-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6290-1
Priorities: medium,low
Description:
It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files with the tiffcrop utility. If a
user were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-48281)

It was discovered that LibTIFF incorrectly handled certain image files. If
a user were tricked into opening a specially crafted image file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 23.04. (CVE-2023-2731)

It was discovered that LibTIFF incorrectly handled certain image files
with the tiffcp utility. If a user were tricked into opening a specially
crafted image file, an attacker could possibly use this issue to cause
tiffcp to crash, resulting in a denial of service. (CVE-2023-2908)

It was discovered that LibTIFF incorrectly handled certain file paths. If
a user were tricked into specifying certain output paths, an attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-3316)

It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files. If a user were tricked into
opening a specially crafted image file, an attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code. (CVE-2023-3618)

It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files. If a user were tricked into
opening a specially crafted image file, an attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and
Ubuntu 23.04. (CVE-2023-25433, CVE-2023-26966)

It was discovered that LibTIFF did not properly managed memory when
processing certain malformed image files with the tiffcrop utility. If a
user were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04.
(CVE-2023-26965)

It was discovered that LibTIFF contained an arithmetic overflow. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause a denial of service.
(CVE-2023-38288, CVE-2023-38289)
CVEs:
- https://ubuntu.com/security/CVE-2022-48281
- https://ubuntu.com/security/CVE-2023-2731
- https://ubuntu.com/security/CVE-2023-2908
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-3618
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-26966
- https://ubuntu.com/security/CVE-2023-26965
- https://ubuntu.com/security/CVE-2023-38288
- https://ubuntu.com/security/CVE-2023-38289
- https://ubuntu.com/security/CVE-2022-48281
- https://ubuntu.com/security/CVE-2023-2908
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-3618
- https://ubuntu.com/security/CVE-2023-38288
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-38289
- https://ubuntu.com/security/CVE-2023-2731
- https://ubuntu.com/security/CVE-2023-26966
- https://ubuntu.com/security/CVE-2023-26965

Title: USN-6254-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6254-1
Priorities: medium,low,high
Description:
Jordy Zomer and Alexandra Sandulescu discovered that syscalls invoking the
do_prlimit() function in the Linux kernel did not properly handle
speculative execution barriers. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2023-0458)

It was discovered that a race condition existed in the btrfs file system
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1611)

It was discovered that the XFS file system implementation in the Linux
kernel did not properly perform metadata validation when mounting certain
images. An attacker could use this to specially craft a file system image
that, when mounted, could cause a denial of service (system crash).
(CVE-2023-2124)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle extra inode size for extended attributes,
leading to a use-after-free vulnerability. A privileged attacker could
possibly use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-2513)

It was discovered that the IP-VLAN network driver for the Linux kernel did
not properly initialize memory in some situations, leading to an out-of-
bounds write vulnerability. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2023-3090)

It was discovered that the Ricoh R5C592 MemoryStick card reader driver in
the Linux kernel contained a race condition during module unload, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-3141)

It was discovered that a use-after-free vulnerability existed in the IEEE
1394 (Firewire) implementation in the Linux kernel. A privileged attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2023-3159)

Sanan Hasanov discovered that the framebuffer console driver in the Linux
kernel did not properly perform checks for font dimension limits. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2023-3161)

It was discovered that the kernel->user space relay implementation in the
Linux kernel did not properly perform certain buffer calculations, leading
to an out-of-bounds read vulnerability. A local attacker could use this to
cause a denial of service (system crash) or expose sensitive information
(kernel memory). (CVE-2023-3268)

It was discovered that the netfilter subsystem in the Linux kernel did not
properly handle some error conditions, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-3390)

Tanguy Dubroca discovered that the netfilter subsystem in the Linux kernel
did not properly handle certain pointer data type, leading to an out-of-
bounds write vulnerability. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-35001)
CVEs:
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-1611
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-2513
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-3159
- https://ubuntu.com/security/CVE-2023-3161
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-2513
- https://ubuntu.com/security/CVE-2023-3268
- https://ubuntu.com/security/CVE-2023-3390
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-3141
- https://ubuntu.com/security/CVE-2023-0458
- https://ubuntu.com/security/CVE-2023-3159
- https://ubuntu.com/security/CVE-2023-3161
- https://ubuntu.com/security/CVE-2023-35001
- https://ubuntu.com/security/CVE-2023-2124
- https://ubuntu.com/security/CVE-2023-3090
- https://ubuntu.com/security/CVE-2023-1611

Title: USN-6257-1: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-6257-1
Priorities: low
Description:
It was discovered that Open VM Tools incorrectly handled certain
authentication requests. A fully compromised ESXi host can force Open VM
Tools to fail to authenticate host-to-guest operations, impacting the
confidentiality and integrity of the guest virtual machine. (CVE-2023-20867)
CVEs:
- https://ubuntu.com/security/CVE-2023-20867
- https://ubuntu.com/security/CVE-2023-20867

Title: USN-6263-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6263-1
Priorities: medium,low
Description:
Motoyasu Saburi discovered that OpenJDK incorrectly handled special
characters in file name parameters. An attacker could possibly use
this issue to insert, edit or obtain sensitive information. This issue
only affected OpenJDK 11 and OpenJDK 17. (CVE-2023-22006)

Eirik Bjørsnøs discovered that OpenJDK incorrectly handled certain ZIP
archives. An attacker could possibly use this issue to cause a denial
of service. This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-22036)

David Stancu discovered that OpenJDK had a flaw in the AES cipher
implementation. An attacker could possibly use this issue to obtain
sensitive information. This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-22041)

Zhiqiang Zang discovered that OpenJDK incorrectly handled array accesses
when using the binary ‘%’ operator. An attacker could possibly use this
issue to obtain sensitive information. This issue only affected OpenJDK 17.
(CVE-2023-22044)

Zhiqiang Zang discovered that OpenJDK incorrectly handled array accesses.
An attacker could possibly use this issue to obtain sensitive information.
(CVE-2023-22045)

It was discovered that OpenJDK incorrectly sanitized URIs strings. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2023-22049)

It was discovered that OpenJDK incorrectly handled certain glyphs. An
attacker could possibly use this issue to cause a denial of service.
This issue only affected OpenJDK 11 and OpenJDK 17.
(CVE-2023-25193)
CVEs:
- https://ubuntu.com/security/CVE-2023-22006
- https://ubuntu.com/security/CVE-2023-22036
- https://ubuntu.com/security/CVE-2023-22041
- https://ubuntu.com/security/CVE-2023-22044
- https://ubuntu.com/security/CVE-2023-22045
- https://ubuntu.com/security/CVE-2023-22049
- https://ubuntu.com/security/CVE-2023-25193
- https://ubuntu.com/security/CVE-2023-22045
- https://ubuntu.com/security/CVE-2023-22036
- https://ubuntu.com/security/CVE-2023-22044
- https://ubuntu.com/security/CVE-2023-25193
- https://ubuntu.com/security/CVE-2023-22049
- https://ubuntu.com/security/CVE-2023-22006
- https://ubuntu.com/security/CVE-2023-22041

Title: USN-6274-1: XMLTooling vulnerability
URL: https://ubuntu.com/security/notices/USN-6274-1
Priorities: medium
Description:
Jurien de Jong discovered that XMLTooling did not properly handle certain
KeyInfo element content within an XML signature. An attacker could possibly
use this issue to achieve server-side request forgery.
CVEs:
- https://ubuntu.com/security/CVE-2023-36661

Title: USN-6242-2: OpenSSH vulnerability
URL: https://ubuntu.com/security/notices/USN-6242-2
Priorities: medium
Description:
USN-6242-1 fixed a vulnerability in OpenSSH. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that OpenSSH incorrectly handled loading certain PKCS#11
providers. If a user forwarded their ssh-agent to an untrusted system, a
remote attacker could possibly use this issue to load arbitrary libraries
from the user’s system and execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-38408

Title: USN-6275-1: Cargo vulnerability
URL: https://ubuntu.com/security/notices/USN-6275-1
Priorities: medium
Description:
Addison Crump discovered that Cargo incorrectly set file permissions
on UNIX-like systems when extracting crate archives. If the crate would
contain files writable by any user, a local attacker could possibly use
this issue to execute code as another user.
CVEs:
- https://ubuntu.com/security/CVE-2023-38497

621.615

Available in the Broadcom Support portal

Release Date: July 26, 2023

Metadata:

BOSH Agent Version: 2.268.150

USNs:


Title: USN-6233-1: YAJL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6233-1
Priorities: low,medium
Description:
It was discovered that YAJL was not properly performing bounds checks when
decoding a string with escape sequences. If a user or automated system
using YAJL were tricked into processing specially crafted input, an
attacker could possibly use this issue to cause a denial of service
(application abort). (CVE-2017-16516)

It was discovered that YAJL was not properly handling memory allocation
when dealing with large inputs, which could lead to heap memory
corruption. If a user or automated system using YAJL were tricked into
running a specially crafted large input, an attacker could possibly use
this issue to cause a denial of service. (CVE-2022-24795)

It was discovered that memory leaks existed in one of the YAJL parsing
functions. An attacker could possibly use this issue to cause a denial of
service (memory exhaustion). (CVE-2023-33460)
CVEs:
- https://ubuntu.com/security/CVE-2017-16516
- https://ubuntu.com/security/CVE-2022-24795
- https://ubuntu.com/security/CVE-2023-33460
- https://ubuntu.com/security/CVE-2023-33460
- https://ubuntu.com/security/CVE-2022-24795
- https://ubuntu.com/security/CVE-2017-16516

Title: USN-6232-1: wkhtmltopdf vulnerability
URL: https://ubuntu.com/security/notices/USN-6232-1
Priorities: medium
Description:
It was discovered that wkhtmltopdf was not properly enforcing the
same-origin policy when processing certain HTML files. If a user or
automated system using wkhtmltopdf were tricked into processing a
specially crafted HTML file, an attacker could possibly use this issue to
expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2020-21365

Title: USN-6236-1: ConnMan vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6236-1
Priorities: medium
Description:
It was discovered that ConnMan could be made to write out of bounds. A
remote attacker could possibly use this issue to cause ConnMan to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-26675, CVE-2021-33833)

It was discovered that ConnMan could be made to leak sensitive information
via the gdhcp component. A remote attacker could possibly use this issue
to obtain information for further exploitation. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676)

It was discovered that ConnMan could be made to read out of bounds. A
remote attacker could possibly use this issue to case ConnMan to crash,
resulting in a denial of service. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-23096, CVE-2022-23097)

It was discovered that ConnMan could be made to run into an infinite loop.
A remote attacker could possibly use this issue to cause ConnMan to
consume resources and to stop operating, resulting in a denial of service.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098)

It was discovered that ConnMan could be made to write out of bounds via
the gweb component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292)

It was discovered that ConnMan did not properly manage memory under
certain circumstances. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293)

It was discovered that ConnMan could be made to write out of bounds via
the gdhcp component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-28488)
CVEs:
- https://ubuntu.com/security/CVE-2021-26675
- https://ubuntu.com/security/CVE-2021-33833
- https://ubuntu.com/security/CVE-2021-26676
- https://ubuntu.com/security/CVE-2022-23096
- https://ubuntu.com/security/CVE-2022-23097
- https://ubuntu.com/security/CVE-2022-23098
- https://ubuntu.com/security/CVE-2022-32292
- https://ubuntu.com/security/CVE-2022-32293
- https://ubuntu.com/security/CVE-2023-28488
- https://ubuntu.com/security/CVE-2021-26676
- https://ubuntu.com/security/CVE-2022-32293
- https://ubuntu.com/security/CVE-2023-28488
- https://ubuntu.com/security/CVE-2022-23098
- https://ubuntu.com/security/CVE-2021-26675
- https://ubuntu.com/security/CVE-2021-33833
- https://ubuntu.com/security/CVE-2022-23097
- https://ubuntu.com/security/CVE-2022-23096
- https://ubuntu.com/security/CVE-2022-32292

Title: USN-6239-1: ECDSA Util vulnerability
URL: https://ubuntu.com/security/notices/USN-6239-1
Priorities: medium
Description:
It was discovered that ECDSA Util did not properly verify certain
signature values.
An attacker could possibly use this issue to bypass signature
verification.
CVEs:
- https://ubuntu.com/security/CVE-2022-24884

Title: USN-6244-1: AMD Microcode vulnerability
URL: https://ubuntu.com/security/notices/USN-6244-1
Priorities: high
Description:
Tavis Ormandy discovered that some AMD processors did not properly handle
speculative execution of certain vector register instructions. A local attacker
could use this to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-20593

Title: USN-6183-2: Bind vulnerability
URL: https://ubuntu.com/security/notices/USN-6183-2
Priorities: medium
Description:
USN-6183-1 fixed vulnerabilities in Bind. This update provides the
corresponding updates for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04
LTS.

Original advisory details:

Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered
that Bind incorrectly handled the cache size limit. A remote attacker could
possibly use this issue to consume memory, leading to a denial of service.
(CVE-2023-2828)

It was discovered that Bind incorrectly handled the recursive-clients
quota. A remote attacker could possibly use this issue to cause Bind to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-2911)
CVEs:
- https://ubuntu.com/security/CVE-2023-2828
- https://ubuntu.com/security/CVE-2023-2911
- https://ubuntu.com/security/CVE-2023-2828

621.609

Available in the Broadcom Support portal

Release Date: July 19, 2023

Metadata:

BOSH Agent Version: 2.268.149

USNs:


Title: USN-6200-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6200-1
Priorities: negligible,medium,low
Description:
It was discovered that ImageMagick incorrectly handled the “-authenticate”
option for password-protected PDF files. An attacker could possibly use
this issue to inject additional shell commands and perform arbitrary code
execution. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-29599)

It was discovered that ImageMagick incorrectly handled certain values
when processing PDF files. If a user or automated system using ImageMagick
were tricked into opening a specially crafted PDF file, an attacker could
exploit this to cause a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20224)

Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20241, CVE-2021-20243)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-20244, CVE-2021-20309)

It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20246)

It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 20.04 LTS.
(CVE-2021-20312)

It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. This issue only
affected Ubuntu 20.04 LTS. (CVE-2021-20313)

It was discovered that ImageMagick did not use the correct rights when
specifically excluded by a module policy. An attacker could use this issue
to read and write certain restricted files. This issue only affected Ubuntu
20.04 LTS. (CVE-2021-39212)

It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
20.04 LTS. (CVE-2022-28463, CVE-2022-32545, CVE-2022-32546, CVE-2022-32547)

It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2021-3610, CVE-2023-1906,
CVE-2023-3428)

It was discovered that ImageMagick incorrectly handled certain values
when processing specially crafted SVG files. By tricking a user into
opening a specially crafted SVG file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-1289)

It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
tiff file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-3195)

It was discovered that ImageMagick incorrectly handled memory under certain
circumstances. If a user were tricked into opening a specially crafted
image file, an attacker could possibly exploit this issue to cause a denial
of service or other unspecified impact. (CVE-2023-34151)
CVEs:
- https://ubuntu.com/security/CVE-2020-29599
- https://ubuntu.com/security/CVE-2021-20224
- https://ubuntu.com/security/CVE-2021-20241
- https://ubuntu.com/security/CVE-2021-20243
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-39212
- https://ubuntu.com/security/CVE-2022-28463
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-32546
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2021-3610
- https://ubuntu.com/security/CVE-2023-1906
- https://ubuntu.com/security/CVE-2023-3428
- https://ubuntu.com/security/CVE-2023-1289
- https://ubuntu.com/security/CVE-2023-3195
- https://ubuntu.com/security/CVE-2023-34151
- https://ubuntu.com/security/CVE-2023-1289
- https://ubuntu.com/security/CVE-2021-20243
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-3610
- https://ubuntu.com/security/CVE-2021-20224
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2023-3428
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-39212
- https://ubuntu.com/security/CVE-2021-20241
- https://ubuntu.com/security/CVE-2023-3195
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-28463
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2023-1906
- https://ubuntu.com/security/CVE-2023-34151
- https://ubuntu.com/security/CVE-2020-29599
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2022-32546

Title: USN-6221-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6221-1
Priorities: medium,low
Description:
It was discovered that a race condition existed in the overlay file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2021-20321)

It was discovered that the virtual terminal (vt) device implementation in
the Linux kernel contained a race condition in its ioctl handling that led
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information. (CVE-2021-3753)

It was discovered that the ext4 file system implementation in the Linux
kernel contained a use-after-free vulnerability. An attacker could use this
to construct a malicious ext4 file system image that, when mounted, could
cause a denial of service (system crash). (CVE-2022-1184)

Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)

Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)

It was discovered that the ST NCI NFC driver did not properly handle device
removal events. A physically proximate attacker could use this to cause a
denial of service (system crash). (CVE-2023-1990)

It was discovered that the btrfs file system implementation in the Linux
kernel did not properly handle error conditions in some situations, leading
to a use-after-free vulnerability. A local attacker could possibly use this
to cause a denial of service (system crash). (CVE-2023-3111)
CVEs:
- https://ubuntu.com/security/CVE-2021-20321
- https://ubuntu.com/security/CVE-2021-3753
- https://ubuntu.com/security/CVE-2022-1184
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2023-3111
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2023-3111
- https://ubuntu.com/security/CVE-2021-20321
- https://ubuntu.com/security/CVE-2023-1990
- https://ubuntu.com/security/CVE-2021-3753
- https://ubuntu.com/security/CVE-2022-1184

Title: USN-6225-1: Knot Resolver vulnerability
URL: https://ubuntu.com/security/notices/USN-6225-1
Priorities: medium
Description:
It was discovered that Knot Resolver did not correctly handle certain
client options. A remote attacker could send requests to malicous domains
and cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40188

Title: USN-6230-1: PostgreSQL vulnerability
URL: https://ubuntu.com/security/notices/USN-6230-1
Priorities: medium
Description:
Alexander Lakhin discovered that PostgreSQL incorrectly handled certain
CREATE privileges. An authenticated user could possibly use this issue to
execute arbitrary code as the bootstrap supervisor.
CVEs:
- https://ubuntu.com/security/CVE-2023-2454

Title: USN-6198-1: GNU Screen vulnerability
URL: https://ubuntu.com/security/notices/USN-6198-1
Priorities: low
Description:
It was discovered that GNU Screen was not properly checking user
identifiers before sending certain signals to target processes. If GNU
Screen was installed as setuid or setgid, a local attacker could possibly
use this issue to cause a denial of service on a target application.
CVEs:
- https://ubuntu.com/security/CVE-2023-24626

Title: USN-6202-1: containerd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6202-1
Priorities: medium
Description:
David Korczynski and Adam Korczynski discovered that containerd
incorrectly processed certain images with large files. An attacker
could possibly use this issue to cause containerd to crash,
resulting in a denial of service. (CVE-2023-25153)

It was discovered that containerd incorrectly set up supplementary
groups inside a container. An attacker with direct access to the
container could possibly use this issue to obtain sensitive information
or execute code with higher privileges. (CVE-2023-25173)
CVEs:
- https://ubuntu.com/security/CVE-2023-25153
- https://ubuntu.com/security/CVE-2023-25173
- https://ubuntu.com/security/CVE-2023-25153
- https://ubuntu.com/security/CVE-2023-25173

Title: USN-6229-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6229-1
Priorities: medium,low
Description:
It was discovered that LibTIFF was not properly handling variables used to
perform memory management operations when processing an image through
tiffcrop, which could lead to a heap buffer overflow. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. (CVE-2023-25433, CVE-2023-26965)

It was discovered that LibTIFF was not properly processing numerical
values when dealing with little-endian input data, which could lead to the
execution of an invalid operation. An attacker could possibly use this
issue to cause a denial of service (CVE-2023-26966)

It was discovered that LibTIFF was not properly performing bounds checks
when closing a previously opened TIFF file, which could lead to a NULL
pointer dereference. An attacker could possibly use this issue to cause a
denial of service. (CVE-2023-3316)
CVEs:
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-26965
- https://ubuntu.com/security/CVE-2023-26966
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-25433
- https://ubuntu.com/security/CVE-2023-26965
- https://ubuntu.com/security/CVE-2023-3316
- https://ubuntu.com/security/CVE-2023-26966

Title: USN-6219-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6219-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 20.10 and Ubuntu 20.04 LTS.
(CVE-2023-28755)

It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue exists because of an incomplete fix for CVE-2023-28755.
(CVE-2023-36617)
CVEs:
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-36617
- https://ubuntu.com/security/CVE-2023-36617
- https://ubuntu.com/security/CVE-2023-28755

Title: USN-6197-1: OpenLDAP vulnerability
URL: https://ubuntu.com/security/notices/USN-6197-1
Priorities: low
Description:
It was discovered that OpenLDAP was not properly performing bounds checks
when executing functions related to LDAP URLs. An attacker could possibly
use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-2953

Title: USN-6210-1: Doorkeeper vulnerability
URL: https://ubuntu.com/security/notices/USN-6210-1
Priorities: high
Description:
It was discovered that Doorkeeper incorrectly performed authorization checks
for public clients that have been previous approved. An attacker could
potentially exploit these in order to impersonate another user and obtain
sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-34246

621.584

Available in the Broadcom Support portal

Release Date: June 26, 2023

Metadata:

BOSH Agent Version: 2.268.145

USNs:


Title: USN-6180-1: VLC media player vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6180-1
Priorities: low,medium
Description:
It was discovered that VLC could be made to read out of bounds when
decoding image files. If a user were tricked into opening a crafted image
file, a remote attacker could possibly use this issue to cause VLC to
crash, leading to a denial of service. This issue only affected Ubuntu
16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-19721)

It was discovered that VLC could be made to write out of bounds when
processing H.264 video files. If a user were tricked into opening a
crafted H.264 video file, a remote attacker could possibly use this issue
to cause VLC to crash, leading to a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-13428)

It was discovered that VLC could be made to read out of bounds when
processing AVI video files. If a user were tricked into opening a crafted
AVI video file, a remote attacker could possibly use this issue to cause
VLC to crash, leading to a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-25801,
CVE-2021-25802, CVE-2021-25803, CVE-2021-25804)

It was discovered that the VNC module of VLC contained an arithmetic
overflow. If a user were tricked into opening a crafted playlist or
connecting to a rouge VNC server, a remote attacker could possibly use
this issue to cause VLC to crash, leading to a denial of service, or
possibly execute arbitrary code. (CVE-2022-41325)
CVEs:
- https://ubuntu.com/security/CVE-2019-19721
- https://ubuntu.com/security/CVE-2020-13428
- https://ubuntu.com/security/CVE-2021-25801
- https://ubuntu.com/security/CVE-2021-25802
- https://ubuntu.com/security/CVE-2021-25803
- https://ubuntu.com/security/CVE-2021-25804
- https://ubuntu.com/security/CVE-2022-41325
- https://ubuntu.com/security/CVE-2021-25801
- https://ubuntu.com/security/CVE-2021-25802
- https://ubuntu.com/security/CVE-2022-41325
- https://ubuntu.com/security/CVE-2019-19721
- https://ubuntu.com/security/CVE-2021-25804
- https://ubuntu.com/security/CVE-2021-25803
- https://ubuntu.com/security/CVE-2020-13428

Title: USN-6182-1: pngcheck vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6182-1
Priorities: medium
Description:
It was discovered that pngcheck incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-27818
- https://ubuntu.com/security/CVE-2020-35511

Title: USN-6163-1: pano13 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6163-1
Priorities: medium
Description:
It was discovered that pano13 did not properly validate the prefix provided
for PTcrop’s output. An attacker could use this issue to cause pano13 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-20307)

It was discovered that pano13 did not properly handle certain crafted TIFF
images. An attacker could use this issue to cause pano13 to crash,
resulting in a denial of service. (CVE-2021-33293)
CVEs:
- https://ubuntu.com/security/CVE-2021-20307
- https://ubuntu.com/security/CVE-2021-33293
- https://ubuntu.com/security/CVE-2021-20307
- https://ubuntu.com/security/CVE-2021-33293

Title: USN-6167-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6167-1
Priorities: low,medium
Description:
It was discovered that QEMU did not properly manage the guest drivers when
shared buffers are not allocated. A malicious guest driver could use this
issue to cause QEMU to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-1050)

It was discovered that QEMU did not properly check the size of the
structure pointed to by the guest physical address pqxl. A malicious guest
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.
(CVE-2022-4144)

It was discovered that QEMU did not properly manage memory in the ACPI
Error Record Serialization Table (ERST) device. A malicious guest attacker
could use this issue to cause QEMU to crash, resulting in a denial of
service. This issue only affected Ubuntu 22.10. (CVE-2022-4172)

It was discovered that QEMU did not properly manage memory when DMA memory
writes happen repeatedly in the lsi53c895a device. A malicious guest
attacker could use this issue to cause QEMU to crash, resulting in a denial
of service. (CVE-2023-0330)
CVEs:
- https://ubuntu.com/security/CVE-2022-1050
- https://ubuntu.com/security/CVE-2022-4144
- https://ubuntu.com/security/CVE-2022-4172
- https://ubuntu.com/security/CVE-2023-0330
- https://ubuntu.com/security/CVE-2022-4172
- https://ubuntu.com/security/CVE-2022-4144
- https://ubuntu.com/security/CVE-2022-1050
- https://ubuntu.com/security/CVE-2023-0330

Title: USN-6169-1: GNU SASL vulnerability
URL: https://ubuntu.com/security/notices/USN-6169-1
Priorities: low
Description:
It was discovered that GNU SASL’s GSSAPI server could make an
out-of-bounds reads if given specially crafted GSS-API authentication
data. A remote attacker could possibly use this issue to cause a
denial of service or to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-2469

Title: USN-6176-1: PyPDF2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6176-1
Priorities: medium
Description:
It was discovered that PyPDF2 incorrectly handled certain PDF files. If a
user or automated system were tricked into processing a specially crafted
file, an attacker could possibly use this issue to consume system
resources, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-24859

Title: USN-6179-1: Jettison vulnerability
URL: https://ubuntu.com/security/notices/USN-6179-1
Priorities: medium
Description:
It was discovered that Jettison incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-1436

Title: USN-6154-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6154-1
Priorities: medium
Description:
It was discovered that Vim was using uninitialized memory when fuzzy
matching, which could lead to invalid memory access. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu
23.04. (CVE-2023-2426)

It was discovered that Vim was not properly performing bounds checks when
processing register contents, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2023-2609)

It was discovered that Vim was not properly limiting the length of
substitution expression strings, which could lead to excessive memory
consumption. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-2610)
CVEs:
- https://ubuntu.com/security/CVE-2023-2426
- https://ubuntu.com/security/CVE-2023-2609
- https://ubuntu.com/security/CVE-2023-2610
- https://ubuntu.com/security/CVE-2023-2609
- https://ubuntu.com/security/CVE-2023-2610
- https://ubuntu.com/security/CVE-2023-2426

Title: USN-6083-2: cups-filters vulnerability
URL: https://ubuntu.com/security/notices/USN-6083-2
Priorities: medium
Description:
USN-6083-1 fixed a vulnerability in cups-filters. This update provides
the corresponding update for Ubuntu 16.04 LTS.

Original advisory details:

It was discovered that cups-filters incorrectly handled the beh CUPS
backend. A remote attacker could possibly use this issue to cause the
backend to stop responding or to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-24805

Title: USN-6166-2: libcap2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6166-2
Priorities: medium
Description:
USN-6166-1 fixed a vulnerability in libcap2. This update provides
the corresponding update for Ubuntu 14.04 ESM, Ubuntu 16.04 ESM
and Ubuntu 18.04 ESM.

Original advisory details:

Richard Weinberger discovered that libcap2 incorrectly handled certain long
input strings. An attacker could use this issue to cause libcap2 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-2603)
CVEs:
- https://ubuntu.com/security/CVE-2023-2603
- https://ubuntu.com/security/CVE-2023-2603

Title: USN-6188-1: OpenSSL vulnerability
URL: https://ubuntu.com/security/notices/USN-6188-1
Priorities: medium
Description:
Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1
object identifiers. A remote attacker could possibly use this issue to
cause OpenSSL to consume resources, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-2650

Title: USN-6159-1: Tornado vulnerability
URL: https://ubuntu.com/security/notices/USN-6159-1
Priorities: medium
Description:
It was discovered that Tornado incorrectly handled certain redirect.
An remote attacker could possibly use this issue to redirect a user to an
arbitrary web site and conduct a phishing attack by having user access a
specially crafted URL.
CVEs:
- https://ubuntu.com/security/CVE-2023-28370

Title: USN-6168-2: libx11 vulnerability
URL: https://ubuntu.com/security/notices/USN-6168-2
Priorities: medium
Description:
USN-6168-1 fixed a vulnerability in libx11. This update provides
the corresponding update for Ubuntu 14.04 ESM, Ubuntu 16.04 ESM,
and Ubuntu 18.04 ESM.

Original advisory details:

Gregory James Duck discovered that libx11 incorrectly handled certain
Request, Event, or Error IDs. If a user were tricked into connecting to a
malicious X Server, a remote attacker could possibly use this issue to
cause libx11 to crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-3138

Title: USN-6155-2: Requests vulnerability
URL: https://ubuntu.com/security/notices/USN-6155-2
Priorities: medium
Description:
USN-6155-1 fixed a vulnerability in Requests. This update provides
the corresponding update for Ubuntu 16.04 ESM and 18.04 ESM.

Original advisory details:

Dennis Brinkrolf and Tobias Funke discovered that Requests incorrectly
leaked Proxy-Authorization headers. A remote attacker could possibly use
this issue to obtain sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2023-32681

621.561

Available in the Broadcom Support portal

Release Date: June 09, 2023

Metadata:

BOSH Agent Version: 2.268.141

USNs:


Title: USN-6146-1: Netatalk vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6146-1
Priorities: medium,high
Description:
It was discovered that Netatalk did not properly validate the length of
user-supplied data in the DSI structures. A remote attacker could possibly
use this issue to execute arbitrary code with the privileges of the user
invoking the programs. This issue only affected Ubuntu 20.04 LTS and Ubuntu
22.04 LTS. (CVE-2021-31439)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the ad_addcomment function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-0194)

It was discovered that Netatalk did not properly handle errors when parsing
AppleDouble entries. A remote attacker could possibly use this issue to
execute arbitrary code with root privileges. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-23121)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the setfilparams function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-23122)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the getdirparams function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04
LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-23123)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the get_finderinfo function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-23124)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the copyapplfile function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04
LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-23125)

It was discovered that Netatalk did not properly validate the length of
user-supplied data in the dsi_writeinit function. A remote attacker could
possibly use this issue to execute arbitrary code with root privileges.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu
22.10. (CVE-2022-43634)

It was discovered that Netatalk did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted .appl file, a remote attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-45188)
CVEs:
- https://ubuntu.com/security/CVE-2021-31439
- https://ubuntu.com/security/CVE-2022-0194
- https://ubuntu.com/security/CVE-2022-23121
- https://ubuntu.com/security/CVE-2022-23122
- https://ubuntu.com/security/CVE-2022-23123
- https://ubuntu.com/security/CVE-2022-23124
- https://ubuntu.com/security/CVE-2022-23125
- https://ubuntu.com/security/CVE-2022-43634
- https://ubuntu.com/security/CVE-2022-45188
- https://ubuntu.com/security/CVE-2022-23123
- https://ubuntu.com/security/CVE-2022-43634
- https://ubuntu.com/security/CVE-2022-23122
- https://ubuntu.com/security/CVE-2021-31439
- https://ubuntu.com/security/CVE-2022-23121
- https://ubuntu.com/security/CVE-2022-23124
- https://ubuntu.com/security/CVE-2022-23125
- https://ubuntu.com/security/CVE-2022-0194
- https://ubuntu.com/security/CVE-2022-45188

Title: USN-6145-1: Sysstat vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6145-1
Priorities: medium
Description:
It was discovered that Sysstat incorrectly handled certain arithmetic
multiplications. An attacker could use this issue to cause Sysstat to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue was only fixed for Ubuntu 16.04 LTS. (CVE-2022-39377)

It was discovered that Sysstat incorrectly handled certain arithmetic
multiplications in 64-bit systems, as a result of an incomplete fix for
CVE-2022-39377. An attacker could use this issue to cause Sysstat to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2023-33204)
CVEs:
- https://ubuntu.com/security/CVE-2022-39377
- https://ubuntu.com/security/CVE-2022-39377
- https://ubuntu.com/security/CVE-2023-33204
- https://ubuntu.com/security/CVE-2023-33204
- https://ubuntu.com/security/CVE-2022-39377

Title: USN-6149-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6149-1
Priorities: high,medium
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)

It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)

Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-31436

621.553

Available in the Broadcom Support portal

Release Date: June 06, 2023

Metadata:

BOSH Agent Version: 2.268.141

USNs:


Title: USN-6117-1: Apache Batik vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6117-1
Priorities: medium
Description:
It was discovered that Apache Batik incorrectly handled certain inputs. An
attacker could possibly use this to perform a cross site request forgery
attack. (CVE-2019-17566, CVE-2020-11987, CVE-2022-38398, CVE-2022-38648)

It was discovered that Apache Batik incorrectly handled Jar URLs in some
situations. A remote attacker could use this issue to access files on the
server. (CVE-2022-40146)

It was discovered that Apache Batik allowed running untrusted Java code from
an SVG. An attacker could use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2022-41704, CVE-2022-42890)
CVEs:
- https://ubuntu.com/security/CVE-2019-17566
- https://ubuntu.com/security/CVE-2020-11987
- https://ubuntu.com/security/CVE-2022-38398
- https://ubuntu.com/security/CVE-2022-38648
- https://ubuntu.com/security/CVE-2022-40146
- https://ubuntu.com/security/CVE-2022-41704
- https://ubuntu.com/security/CVE-2022-42890
- https://ubuntu.com/security/CVE-2022-40146
- https://ubuntu.com/security/CVE-2020-11987
- https://ubuntu.com/security/CVE-2022-41704
- https://ubuntu.com/security/CVE-2022-38648
- https://ubuntu.com/security/CVE-2022-38398
- https://ubuntu.com/security/CVE-2019-17566
- https://ubuntu.com/security/CVE-2022-42890

Title: USN-6099-1: ncurses vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6099-1
Priorities: negligible,medium
Description:
It was discovered that ncurses was incorrectly performing bounds
checks when processing invalid hashcodes. An attacker could possibly
use this issue to cause a denial of service or to expose sensitive
information. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-17594)

It was discovered that ncurses was incorrectly handling
end-of-string characters when processing terminfo and termcap files.
An attacker could possibly use this issue to cause a denial of
service or to expose sensitive information. This issue only affected
Ubuntu 18.04 LTS. (CVE-2019-17595)

It was discovered that ncurses was incorrectly handling
end-of-string characters when converting between termcap and
terminfo formats. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-39537)

It was discovered that ncurses was incorrectly performing bounds
checks when dealing with corrupt terminfo data while reading a
terminfo file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-29458)

It was discovered that ncurses was parsing environment variables when
running with setuid applications and not properly handling the
processing of malformed data when doing so. A local attacker could
possibly use this issue to cause a denial of service (application
crash) or execute arbitrary code. (CVE-2023-29491)
CVEs:
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2019-17595
- https://ubuntu.com/security/CVE-2021-39537
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2023-29491
- https://ubuntu.com/security/CVE-2021-39537
- https://ubuntu.com/security/CVE-2023-29491
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2019-17595

Title: USN-6098-1: Jhead vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6098-1
Priorities: medium,low
Description:
It was discovered that Jhead did not properly handle certain crafted images
while processing the JFIF markers. An attacker could cause Jhead to crash. This
issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.
(CVE-2019-19035)

It was discovered that Jhead did not properly handle certain crafted images
while processing longitude tags. An attacker could cause Jhead to crash. This
issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-1010301)

It was discovered that Jhead did not properly handle certain crafted images
while processing IPTC data. An attacker could cause Jhead to crash. This
issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-1010302)

Binbin Li discovered that Jhead did not properly handle certain crafted images
while processing the DQT data. An attacker could cause Jhead to crash.
(CVE-2020-6624)

Binbin Li discovered that Jhead did not properly handle certain crafted images
while processing longitude data. An attacker could cause Jhead to crash.
(CVE-2020-6625)

Feng Zhao Yang discovered that Jhead did not properly handle certain crafted
images while reading JPEG sections. An attacker could cause Jhead to crash.
(CVE-2020-26208)

It was discovered that Jhead did not properly handle certain crafted images
while processing Canon images. An attacker could cause Jhead to crash.
(CVE-2021-28276)

It was discovered that Jhead did not properly handle certain crafted images
when removing a certain type of sections. An attacker could cause Jhead to
crash. (CVE-2021-28278)
CVEs:
- https://ubuntu.com/security/CVE-2019-19035
- https://ubuntu.com/security/CVE-2019-1010301
- https://ubuntu.com/security/CVE-2019-1010302
- https://ubuntu.com/security/CVE-2020-6624
- https://ubuntu.com/security/CVE-2020-6625
- https://ubuntu.com/security/CVE-2020-26208
- https://ubuntu.com/security/CVE-2021-28276
- https://ubuntu.com/security/CVE-2021-28278
- https://ubuntu.com/security/CVE-2019-1010302
- https://ubuntu.com/security/CVE-2021-28278
- https://ubuntu.com/security/CVE-2019-1010301
- https://ubuntu.com/security/CVE-2020-6624
- https://ubuntu.com/security/CVE-2020-26208
- https://ubuntu.com/security/CVE-2019-19035
- https://ubuntu.com/security/CVE-2020-6625
- https://ubuntu.com/security/CVE-2021-28276

Title: USN-6088-2: runC vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6088-2
Priorities: medium,low
Description:
USN-6088-1 fixed vulnerabilities in runC. This update provides
the corresponding updates for Ubuntu 16.04 LTS.

It was discovered that runC incorrectly performed access control when
mounting /proc to non-directories. An attacker could possibly use
this issue to escalate privileges.
(CVE-2019-19921)

Felix Wilhelm discovered that runC incorrecly handled netlink
messages. An attacker could possibly use
this issue to escalate privileges. (CVE-2021-43784)

Andrew G. Morgan discovered that runC incorrectly set
inherited process capabilities inside the container.
An attacker could possibly use this issue to
escalate privileges. (CVE-2022-29162)

Original advisory details:

It was discovered that runC incorrectly made /sys/fs/cgroup
writable when in rootless mode. An attacker could possibly
use this issue to escalate privileges. (CVE-2023-25809)

It was discovered that runC incorrectly performed access control when
mounting /proc to non-directories. An attacker could possibly use
this issue to escalate privileges. (CVE-2023-27561)

It was discovered that runC incorrectly handled /proc and
/sys mounts inside a container. An attacker could possibly
use this issue to bypass AppArmor, and potentially SELinux.
(CVE-2023-28642)
CVEs:
- https://ubuntu.com/security/CVE-2019-19921
- https://ubuntu.com/security/CVE-2021-43784
- https://ubuntu.com/security/CVE-2022-29162
- https://ubuntu.com/security/CVE-2023-25809
- https://ubuntu.com/security/CVE-2023-27561
- https://ubuntu.com/security/CVE-2023-28642
- https://ubuntu.com/security/CVE-2022-29162
- https://ubuntu.com/security/CVE-2023-25809
- https://ubuntu.com/security/CVE-2023-28642
- https://ubuntu.com/security/CVE-2021-43784
- https://ubuntu.com/security/CVE-2023-27561
- https://ubuntu.com/security/CVE-2019-19921

Title: USN-6142-1: nghttp2 vulnerability
URL: https://ubuntu.com/security/notices/USN-6142-1
Priorities: medium
Description:
Gal Goldshtein discovered that nghttp2 incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-11080

Title: USN-5725-2: Go vulnerability
URL: https://ubuntu.com/security/notices/USN-5725-2
Priorities: low
Description:
USN-5725-1 fixed a vulnerability in Go. This update provides
the corresponding update for Ubuntu 16.04 LTS.

Original advisory details:

Diederik Loerakker, Jonny Rhea, Raúl Kripalani, and Preston
Van Loon discovered that Go incorrectly handled certain inputs.
An attacker could possibly use this issue to cause Go applications
to hang or crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-16845

Title: USN-6108-1: Jhead vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6108-1
Priorities: medium
Description:
It was discovered that Jhead did not properly handle certain crafted images
while rotating them. An attacker could possibly use this issue to crash Jhead,
resulting in a denial of service. (CVE-2021-34055)

Kyle Brown discovered that Jhead did not properly handle certain crafted
images while regenerating the Exif thumbnail. An attacker could possibly use
this issue to execute arbitrary commands. (CVE-2022-41751)
CVEs:
- https://ubuntu.com/security/CVE-2021-34055
- https://ubuntu.com/security/CVE-2022-41751
- https://ubuntu.com/security/CVE-2022-41751
- https://ubuntu.com/security/CVE-2021-34055

Title: USN-6110-1: Jhead vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6110-1
Priorities: medium
Description:
It was discovered that Jhead did not properly handle certain crafted Canon
images when processing them. An attacker could possibly use this issue to
crash Jhead, resulting in a denial of service. (CVE-2021-3496)

It was discovered that Jhead did not properly handle certain crafted images
when printing Canon-specific information. An attacker could possibly use this
issue to crash Jhead, resulting in a denial of service. (CVE-2021-28275)

It was discovered that Jhead did not properly handle certain crafted images
when removing unknown sections. An attacker could possibly use this issue to
crash Jhead, resulting in a denial of service. (CVE-2021-28275)

Kyle Brown discovered that Jhead did not properly handle certain crafted
images when editing their comments. An attacker could possibly use this to
crash Jhead, resulting in a denial of service. (LP: #2020068)
CVEs:
- https://ubuntu.com/security/CVE-2021-3496
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-28277
- https://ubuntu.com/security/CVE-2021-28275
- https://ubuntu.com/security/CVE-2021-3496

Title: USN-6097-1: Linux PTP vulnerability
URL: https://ubuntu.com/security/notices/USN-6097-1
Priorities: medium
Description:
It was discovered that Linux PTP did not properly perform a length check
when forwarding a PTP message between ports. A remote attacker could
possibly use this issue to access sensitive information, execute
arbitrary code, or cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2021-3570

Title: USN-6125-1: snapd vulnerability
URL: https://ubuntu.com/security/notices/USN-6125-1
Priorities: medium
Description:
It was discovered that the snap sandbox did not restrict the use of the
ioctl system call with a TIOCLINUX request. This could be exploited by a
malicious snap to inject commands into the controlling terminal which would
then be executed outside of the snap sandbox once the snap had exited. This
could allow an attacker to execute arbitrary commands outside of the
confined snap sandbox. Note: graphical terminal emulators like xterm,
gnome-terminal and others are not affected - this can only be exploited
when snaps are run on a virtual console.
CVEs:
- https://ubuntu.com/security/CVE-2023-1523

Title: USN-6101-1: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6101-1
Priorities: medium,low
Description:
It was discovered that GNU binutils incorrectly handled certain DWARF
files. An attacker could possibly use this issue to cause a crash or
execute arbitrary code. This issue only affected Ubuntu 22.10.
(CVE-2023-1579)

It was discovered that GNU binutils did not properly verify the version
definitions in zer0-lengthverdef table. An attacker could possibly use this
issue to cause a crash or execute arbitrary code. This issue only affected
Ubuntu 22.04 LTS, Ubuntu 22.10 and Ubuntu 23.04. (CVE-2023-1972)

It was discovered that GNU binutils did not properly validate the size of
length parameter in vms-alpha. An attacker could possibly use this issue to
cause a crash or access sensitive information. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10.
(CVE-2023-25584)

It was discovered that GNU binutils did not properly initialized the
file_table field of struct module and the_bfd field of asymbol. An attacker
could possibly use this issue to cause a crash. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-25585, CVE-2023-25588)
CVEs:
- https://ubuntu.com/security/CVE-2023-1579
- https://ubuntu.com/security/CVE-2023-1972
- https://ubuntu.com/security/CVE-2023-25584
- https://ubuntu.com/security/CVE-2023-25585
- https://ubuntu.com/security/CVE-2023-25588
- https://ubuntu.com/security/CVE-2023-1972
- https://ubuntu.com/security/CVE-2023-25588
- https://ubuntu.com/security/CVE-2023-25585
- https://ubuntu.com/security/CVE-2023-25584
- https://ubuntu.com/security/CVE-2023-1579

Title: USN-6100-1: HTML::StripScripts vulnerability
URL: https://ubuntu.com/security/notices/USN-6100-1
Priorities: medium
Description:
It was discovered that HTML::StripScripts does not properly parse HTML
content with certain style attributes. A remote attacker could use this issue
to cause a regular expression denial of service (ReDoS).
CVEs:
- https://ubuntu.com/security/CVE-2023-24038

Title: USN-6139-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-6139-1
Priorities: medium
Description:
Yebo Cao discovered that Python incorrectly handled certain URLs.
An attacker could use this issue to bypass blockinglisting methods.
This issue was first addressed in USN-5960-1, but was incomplete.
Here we address an additional fix to that issue. (CVE-2023-24329)
CVEs:
- https://ubuntu.com/security/CVE-2023-24329
- https://ubuntu.com/security/CVE-2023-24329

Title: USN-6005-2: Sudo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6005-2
Priorities: medium
Description:
USN-6005-1 fixed vulnerabilities in Sudo. This update
provides the corresponding updates for Ubuntu 16.04 LTS.

Original advisory details:

Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
escaped control characters in log messages and sudoreplay output. An
attacker could possibly use these issues to inject terminal control
characters that alter output when being viewed.
CVEs:
- https://ubuntu.com/security/CVE-2023-28486
- https://ubuntu.com/security/CVE-2023-28487

Title: USN-6054-2: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-6054-2
Priorities: low
Description:
USN-6054-1 fixed a vulnerability in Django. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Moataz Al-Sharida and nawaik discovered that Django incorrectly handled
uploading multiple files using one form field. A remote attacker could
possibly use this issue to bypass certain validations.
CVEs:
- https://ubuntu.com/security/CVE-2023-31047

Title: USN-6112-1: Perl vulnerability
URL: https://ubuntu.com/security/notices/USN-6112-1
Priorities: medium
Description:
It was discovered that Perl was not properly verifying TLS certificates
when using CPAN together with HTTP::Tiny to download modules over HTTPS.
If a remote attacker were able to intercept communications, this flaw
could potentially be used to install altered modules.
CVEs:
- https://ubuntu.com/security/CVE-2023-31484

Title: USN-6130-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6130-1
Priorities: high
Description:
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-32233)

Gwangun Jung discovered that the Quick Fair Queueing scheduler
implementation in the Linux kernel contained an out-of-bounds write
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2023-31436)

Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). (CVE-2023-30456)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform data buffer size validation in some
situations. A physically proximate attacker could use this to craft a
malicious USB device that when inserted, could cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-1380)
CVEs:
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-30456
- https://ubuntu.com/security/CVE-2023-1380
- https://ubuntu.com/security/CVE-2023-32233
- https://ubuntu.com/security/CVE-2023-31436

Title: USN-6128-2: CUPS vulnerability
URL: https://ubuntu.com/security/notices/USN-6128-2
Priorities: medium
Description:
USN-6128-1 fixed a vulnerability in CUPS. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that CUPS incorrectly handled logging. A remote attacker
could use this issue to cause CUPS to crash, resulting in a denial of
service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-32324

621.543

Available in the Broadcom Support portal

Release Date: May 22, 2023

Metadata:

BOSH Agent Version: 2.268.139

USNs:


Title: USN-6065-1: css-what vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6065-1
Priorities: medium
Description:
It was discovered that css-what incorrectly handled certain inputs. If a user
or an automated system were tricked into opening a specially crafted input
file, a remote attacker could possibly use this issue to cause a denial of
service. (CVE-2021-33587, CVE-2022-21222)
CVEs:
- https://ubuntu.com/security/CVE-2021-33587
- https://ubuntu.com/security/CVE-2022-21222
- https://ubuntu.com/security/CVE-2022-21222
- https://ubuntu.com/security/CVE-2021-33587

Title: USN-6082-1: EventSource vulnerability
URL: https://ubuntu.com/security/notices/USN-6082-1
Priorities: medium
Description:
It was discovered that EventSource incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to obtain
sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-1650

Title: USN-6081-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6081-1
Priorities: medium,low,negligible
Description:
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)

Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-2162

Title: USN-6084-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6084-1
Priorities: medium,low,negligible
Description:
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)

Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-2162

Title: USN-6092-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6092-1
Priorities: medium,low,negligible
Description:
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2023-0459)

Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2023-1513)

It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2023-2162)

It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-32269)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2023-0459
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-32269
- https://ubuntu.com/security/CVE-2023-2162
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1513
- https://ubuntu.com/security/CVE-2023-0459

Title: USN-6053-1: PHP vulnerability
URL: https://ubuntu.com/security/notices/USN-6053-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain invalid Blowfish
password hashes. An invalid password hash could possibly allow applications to
accept any password as valid, contrary to expectations.
CVEs:
- https://ubuntu.com/security/CVE-2023-0567

Title: USN-6058-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-6058-1
Priorities: high
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed.
CVEs:
- https://ubuntu.com/security/CVE-2023-1829

Title: USN-6060-2: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6060-2
Priorities: medium
Description:
USN-6060-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.7.42 in Ubuntu 16.04 ESM.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-42.html
https://www.oracle.com/security-alerts/cpuapr2023.html
CVEs:
- https://ubuntu.com/security/CVE-2023-21912
- https://ubuntu.com/security/CVE-2023-21980

Title: USN-6050-2: Git vulnerability
URL: https://ubuntu.com/security/notices/USN-6050-2
Priorities: medium
Description:
USN-6050-1 fixed several vulnerabilities in Git. This update provides
the corresponding updates for CVE-2023-25652 and CVE-2023-29007 on
Ubuntu 16.04 LTS.

Original advisory details:

It was discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to overwrite paths.
(CVE-2023-25652)

André Baptista and Vítor Pinho discovered that Git incorrectly handled
certain configurations. An attacker could possibly use this issue
to achieve arbitrary configuration injection. (CVE-2023-29007)
CVEs:
- https://ubuntu.com/security/CVE-2023-25652
- https://ubuntu.com/security/CVE-2023-29007
- https://ubuntu.com/security/CVE-2023-25652
- https://ubuntu.com/security/CVE-2023-29007
- https://ubuntu.com/security/CVE-2023-25652
- https://ubuntu.com/security/CVE-2023-29007

Title: USN-6055-2: Ruby regression
URL: https://ubuntu.com/security/notices/USN-6055-2
Priorities: medium
Description:
USN-6055-1 fixed a vulnerability in Ruby. Unfortunately it introduced a regression.
This update reverts the patches applied to CVE-2023-28755 in order to fix the regression
pending further investigation.

We apologize for the inconvenience.

Original advisory details:

It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-28755)
CVEs:
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28755

Title: USN-6055-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6055-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-28755)

It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
This issue is being addressed only for Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2023-28756)
CVEs:
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28756
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28756

Title: USN-6087-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6087-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-28755)

It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possily use this issue to cause a denial of service.
This issue only affected Ubuntu 16.04 ESM. (CVE-2023-28756)
CVEs:
- https://ubuntu.com/security/CVE-2023-28755
- https://ubuntu.com/security/CVE-2023-28756
- https://ubuntu.com/security/CVE-2023-28756
- https://ubuntu.com/security/CVE-2023-28755

621.508

Available in the Broadcom Support portal

Release Date: April 28, 2023

Metadata:

BOSH Agent Version: 2.268.135

USNs:


Title: USN-6035-1: KAuth vulnerability
URL: https://ubuntu.com/security/notices/USN-6035-1
Priorities: medium
Description:
It was discovered that KAuth incorrectly handled some configuration parameters
with specially crafted arbitrary types. An attacker could possibly use this
issue to cause a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2019-7443

Title: USN-6039-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6039-1
Priorities: low,negligible
Description:
It was discovered that OpenSSL was not properly managing file locks when
processing policy constraints. If a user or automated system were tricked
into processing a certificate chain with specially crafted policy
constraints, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu
22.10. (CVE-2022-3996)

David Benjamin discovered that OpenSSL was not properly performing the
verification of X.509 certificate chains that include policy constraints,
which could lead to excessive resource consumption. If a user or automated
system were tricked into processing a specially crafted X.509 certificate
chain that includes policy constraints, a remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-0464)

David Benjamin discovered that OpenSSL was not properly handling invalid
certificate policies in leaf certificates, which would result in certain
policy checks being skipped for the certificate. If a user or automated
system were tricked into processing a specially crafted certificate, a
remote attacker could possibly use this issue to assert invalid
certificate policies and circumvent policy checking. (CVE-2023-0465)

David Benjamin discovered that OpenSSL incorrectly documented the
functionalities of function X509_VERIFY_PARAM_add0_policy, stating that
it would implicitly enable certificate policy checks when doing
certificate verifications, contrary to its implementation. This could
cause users and applications to not perform certificate policy checks
even when expected to do so. (CVE-2023-0466)
CVEs:
- https://ubuntu.com/security/CVE-2022-3996
- https://ubuntu.com/security/CVE-2023-0464
- https://ubuntu.com/security/CVE-2023-0465
- https://ubuntu.com/security/CVE-2023-0466
- https://ubuntu.com/security/CVE-2022-3996
- https://ubuntu.com/security/CVE-2023-0464
- https://ubuntu.com/security/CVE-2023-0466

Title: USN-6042-1: Cloud-init vulnerability
URL: https://ubuntu.com/security/notices/USN-6042-1
Priorities: medium
Description:
James Glovich discovered that sensitive data could be exposed in logs. An
attacker could use this information to find hashed passwords and possibly
escalate their privilege.
CVEs:
- https://ubuntu.com/security/CVE-2023-1786

Title: USN-6047-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-6047-1
Priorities: high
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed.
CVEs:
- https://ubuntu.com/security/CVE-2023-1829

Title: USN-6045-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6045-1
Priorities: high,medium,low
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel did not properly perform filter deactivation in some
situations. A local attacker could possibly use this to gain elevated
privileges. Please note that with the fix for this CVE, kernel support for
the TCINDEX classifier has been removed. (CVE-2023-1829)

Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)

Zheng Wang and Zhuorao Yang discovered that the RealTek RTL8712U wireless
driver in the Linux kernel contained a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-4095)

It was discovered that the TIPC protocol implementation in the Linux kernel
did not properly validate the queue of socket buffers (skb) when handling
certain UDP packets. A remote attacker could use this to cause a denial of
service. (CVE-2023-1390)

It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2023-1670)
CVEs:
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-4095
- https://ubuntu.com/security/CVE-2023-1390
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2023-1829
- https://ubuntu.com/security/CVE-2023-1670
- https://ubuntu.com/security/CVE-2023-1390
- https://ubuntu.com/security/CVE-2022-4095

Title: USN-6034-1: Dnsmasq vulnerability
URL: https://ubuntu.com/security/notices/USN-6034-1
Priorities: low
Description:
It was discovered that Dnsmasq was sending large DNS messages
over UDP, possibly causing transmission failures due to IP
fragmentation. This update lowers the default maximum size of
DNS messages to improve transmission reliability over UDP.
CVEs:
- https://ubuntu.com/security/CVE-2023-28450

621.499

Available in the Broadcom Support portal

Release Date: April 19, 2023

Metadata:

BOSH Agent Version: 2.268.134

USNs:


Title: USN-6022-1: Kamailio vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6022-1
Priorities: medium
Description:
It was discovered that Kamailio did not properly sanitize SIP messages under
certain circumstances. An attacker could use this vulnerability to cause a
denial of service or possibly execute arbitrary code. This issue only affected
Ubuntu 16.04 ESM and 18.04 ESM. (CVE-2018-16657)

It was discovered that Kamailio did not properly validate INVITE requests
under certain circumstances. An attacker could use this vulnerability to
cause a denial of service or possibly execute arbitrary code. (CVE-2020-27507)
CVEs:
- https://ubuntu.com/security/CVE-2018-16657
- https://ubuntu.com/security/CVE-2020-27507
- https://ubuntu.com/security/CVE-2020-27507
- https://ubuntu.com/security/CVE-2018-16657

Title: USN-6014-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6014-1
Priorities: medium,low,negligible
Description:
Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP
implementation in the Linux kernel did not properly handle IPID assignment.
A remote attacker could use this to cause a denial of service (connection
termination) or inject forged data. (CVE-2020-36516)

Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk,
Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre
Variant 2 mitigations for AMD processors on Linux were insufficient in some
situations. A local attacker could possibly use this to expose sensitive
information. (CVE-2021-26401)

Jürgen Groß discovered that the Xen subsystem within the Linux kernel did
not adequately limit the number of events driver domains (unprivileged PV
backends) could send to other guest VMs. An attacker in a driver domain
could use this to cause a denial of service in other guest VMs.
(CVE-2021-28711, CVE-2021-28712, CVE-2021-28713)

Wolfgang Frisch discovered that the ext4 file system implementation in the
Linux kernel contained an integer overflow when handling metadata inode
extents. An attacker could use this to construct a malicious ext4 file
system image that, when mounted, could cause a denial of service (system
crash). (CVE-2021-3428)

It was discovered that the IEEE 802.15.4 wireless network subsystem in the
Linux kernel did not properly handle certain error conditions, leading to a
null pointer dereference vulnerability. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2021-3659)

It was discovered that the System V IPC implementation in the Linux kernel
did not properly handle large shared memory counts. A local attacker could
use this to cause a denial of service (memory exhaustion). (CVE-2021-3669)

Alois Wohlschlager discovered that the overlay file system in the Linux
kernel did not restrict private clones in some situations. An attacker
could use this to expose sensitive information. (CVE-2021-3732)

It was discovered that the SCTP protocol implementation in the Linux kernel
did not properly verify VTAGs in some situations. A remote attacker could
possibly use this to cause a denial of service (connection disassociation).
(CVE-2021-3772)

It was discovered that the btrfs file system implementation in the Linux
kernel did not properly handle locking in certain error conditions. A local
attacker could use this to cause a denial of service (kernel deadlock).
(CVE-2021-4149)

Jann Horn discovered that the socket subsystem in the Linux kernel
contained a race condition when handling listen() and connect() operations,
leading to a read-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2021-4203)

It was discovered that the file system quotas implementation in the Linux
kernel did not properly validate the quota block number. An attacker could
use this to construct a malicious file system image that, when mounted and
operated on, could cause a denial of service (system crash).
(CVE-2021-45868)

Zhihua Yao discovered that the MOXART SD/MMC driver in the Linux kernel did
not properly handle device removal, leading to a use-after-free
vulnerability. A physically proximate attacker could possibly use this to
cause a denial of service (system crash). (CVE-2022-0487)

It was discovered that the block layer subsystem in the Linux kernel did
not properly initialize memory in some situations. A privileged local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-0494)

It was discovered that the UDF file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious UDF image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-0617)

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)

It was discovered that the implementation of the 6pack and mkiss protocols
in the Linux kernel did not handle detach events properly in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2022-1195)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel, leading to use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-1205)

It was discovered that the tty subsystem in the Linux kernel contained a
race condition in certain situations, leading to an out-of-bounds read
vulnerability. A local attacker could possibly use this to cause a denial
of service (system crash) or expose sensitive information. (CVE-2022-1462)

It was discovered that the implementation of X.25 network protocols in the
Linux kernel did not terminate link layer sessions properly. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1516)

Duoming Zhou discovered a race condition in the NFC subsystem in the Linux
kernel, leading to a use-after-free vulnerability. A privileged local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-1974)

Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not
properly prevent context switches from occurring during certain atomic
context operations. A privileged local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1975)

It was discovered that the HID subsystem in the Linux kernel did not
properly validate inputs in certain conditions. A local attacker with
physical access could plug in a specially crafted USB device to expose
sensitive information. (CVE-2022-20132)

It was discovered that the device-mapper verity (dm-verity) driver in the
Linux kernel did not properly verify targets being loaded into the device-
mapper table. A privileged attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-20572,
CVE-2022-2503)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Zheyu Ma discovered that the Silicon Motion SM712 framebuffer driver in the
Linux kernel did not properly handle very small reads. A local attacker
could use this to cause a denial of service (system crash). (CVE-2022-2380)

David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)

Lucas Leong discovered that the LightNVM subsystem in the Linux kernel did
not properly handle data lengths in certain situations. A privileged
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-2991)

It was discovered that the Intel 740 frame buffer driver in the Linux
kernel contained a divide by zero vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3061)

Jiasheng Jiang discovered that the wm8350 charger driver in the Linux
kernel did not properly deallocate memory, leading to a null pointer
dereference vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3111)

It was discovered that the sound subsystem in the Linux kernel contained a
race condition in some situations. A local attacker could use this to cause
a denial of service (system crash). (CVE-2022-3303)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)

It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)

It was discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36879)

It was discovered that the infrared transceiver USB driver did not properly
handle USB control messages. A local attacker with physical access could
plug in a specially crafted USB device to cause a denial of service (memory
exhaustion). (CVE-2022-3903)

Jann Horn discovered a race condition existed in the Linux kernel when
unmapping VMAs in certain situations, resulting in possible use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-39188)

Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)

It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)

It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)

It was discovered that the USB core subsystem in the Linux kernel did not
properly handle nested reset events. A local attacker with physical access
could plug in a specially crafted USB device to cause a denial of service
(kernel deadlock). (CVE-2022-4662)

It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)

It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)

Mingi Cho discovered that the netfilter subsystem in the Linux kernel did
not properly initialize a data structure, leading to a null pointer
dereference vulnerability. An attacker could use this to cause a denial of
service (system crash). (CVE-2023-1095)

Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)

Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2023-26607)

Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2023-1118)
CVEs:
- https://ubuntu.com/security/CVE-2020-36516
- https://ubuntu.com/security/CVE-2021-26401
- https://ubuntu.com/security/CVE-2021-28711
- https://ubuntu.com/security/CVE-2021-28712
- https://ubuntu.com/security/CVE-2021-28713
- https://ubuntu.com/security/CVE-2021-3428
- https://ubuntu.com/security/CVE-2021-3659
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2021-3732
- https://ubuntu.com/security/CVE-2021-3772
- https://ubuntu.com/security/CVE-2021-4149
- https://ubuntu.com/security/CVE-2021-4203
- https://ubuntu.com/security/CVE-2021-45868
- https://ubuntu.com/security/CVE-2022-0487
- https://ubuntu.com/security/CVE-2022-0494
- https://ubuntu.com/security/CVE-2022-0617
- https://ubuntu.com/security/CVE-2022-1016
- https://ubuntu.com/security/CVE-2022-1195
- https://ubuntu.com/security/CVE-2022-1205
- https://ubuntu.com/security/CVE-2022-1462
- https://ubuntu.com/security/CVE-2022-1516
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-20132
- https://ubuntu.com/security/CVE-2022-20572
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-2380
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-2991
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-3111
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-3903
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-4662
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-1095
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-1095
- https://ubuntu.com/security/CVE-2021-3772
- https://ubuntu.com/security/CVE-2021-45868
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2021-4149
- https://ubuntu.com/security/CVE-2022-1462
- https://ubuntu.com/security/CVE-2021-28711
- https://ubuntu.com/security/CVE-2022-4662
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-1516
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2021-26401
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-3111
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2022-0617
- https://ubuntu.com/security/CVE-2020-36516
- https://ubuntu.com/security/CVE-2023-1118
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2021-4203
- https://ubuntu.com/security/CVE-2022-2380
- https://ubuntu.com/security/CVE-2022-0487
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2022-1195
- https://ubuntu.com/security/CVE-2022-20572
- https://ubuntu.com/security/CVE-2022-1205
- https://ubuntu.com/security/CVE-2021-3732
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-0494
- https://ubuntu.com/security/CVE-2021-3428
- https://ubuntu.com/security/CVE-2021-28712
- https://ubuntu.com/security/CVE-2022-3303
- https://ubuntu.com/security/CVE-2021-28713
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2022-2503
- https://ubuntu.com/security/CVE-2022-2991
- https://ubuntu.com/security/CVE-2022-3903
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-1016
- https://ubuntu.com/security/CVE-2021-3659
- https://ubuntu.com/security/CVE-2022-20132

Title: USN-6009-1: Linux kernel (GCP) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6009-1
Priorities: low,medium
Description:
It was discovered that the System V IPC implementation in the Linux kernel
did not properly handle large shared memory counts. A local attacker could
use this to cause a denial of service (memory exhaustion). (CVE-2021-3669)

It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)

Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)

Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)

It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)

José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)

It was discovered that a use-after-free vulnerability existed in the
Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-0266)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)

Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)

It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)

Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2022-41218

Title: USN-5855-4: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5855-4
Priorities: medium
Description:
USN-5855-1 fixed vulnerabilities in ImageMagick. This update provides the
corresponding updates for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that ImageMagick incorrectly handled certain PNG images.
If a user or automated system were tricked into opening a specially crafted
PNG file, an attacker could use this issue to cause ImageMagick to stop
responding, resulting in a denial of service, or possibly obtain the
contents of arbitrary files by including them into images.
CVEs:
- https://ubuntu.com/security/CVE-2022-44267
- https://ubuntu.com/security/CVE-2022-44268

Title: USN-6007-1: Linux kernel (GCP) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6007-1
Priorities: high,medium,low
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)

It was discovered that an out-of-bounds write vulnerability existed in the
Video for Linux 2 (V4L2) implementation in the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-20369)

Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)

David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)

Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)

Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)

It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)

It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)

Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)

Hyunwoo Kim discovered that an integer overflow vulnerability existed in
the PXA3xx graphics driver in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2022-39842)

It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)

It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)

It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2023-26607)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-20369
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-20369
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-2663

Title: LSN-0094-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0094-1
Priorities: high
Description:
Lin Ma discovered a race condition in the io_uring subsystem in the Linux
kernel, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).(CVE-2023-0468)

It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-1281)
CVEs:
- https://ubuntu.com/security/CVE-2023-0468
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2023-0468

Title: USN-6029-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6029-1
Priorities: high,low,medium
Description:
It was discovered that the Traffic-Control Index (TCINDEX) implementation
in the Linux kernel contained a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-1281)

It was discovered that the infrared transceiver USB driver did not properly
handle USB control messages. A local attacker with physical access could
plug in a specially crafted USB device to cause a denial of service (memory
exhaustion). (CVE-2022-3903)

It was discovered that the Human Interface Device (HID) support driver in
the Linux kernel contained a type confusion vulnerability in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-1073)

It was discovered that a memory leak existed in the SCTP protocol
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2023-1074)

Lianhui Tang discovered that the MPLS implementation in the Linux kernel
did not properly handle certain sysctl allocation failure conditions,
leading to a double-free vulnerability. An attacker could use this to cause
a denial of service or possibly execute arbitrary code. (CVE-2023-26545)
CVEs:
- https://ubuntu.com/security/CVE-2023-1281
- https://ubuntu.com/security/CVE-2022-3903
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1074
- https://ubuntu.com/security/CVE-2022-3903
- https://ubuntu.com/security/CVE-2023-26545
- https://ubuntu.com/security/CVE-2023-1073
- https://ubuntu.com/security/CVE-2023-1281

Title: USN-6017-1: Ghostscript vulnerability
URL: https://ubuntu.com/security/notices/USN-6017-1
Priorities: medium
Description:
Hadrien Perrineau discovered that Ghostscript incorrectly handled certain
inputs. An attacker could possibly use this issue to cause a denial of
service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-28879

621.488

Available in the Broadcom Support portal

Release Date: April 07, 2023

Metadata:

BOSH Agent Version: 2.268.132

USNs:


Title: USN-5961-1: abcm2ps vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5961-1
Priorities: medium,low
Description:
It was discovered that abcm2ps incorrectly
handled memory when parsing specially crafted ABC files.
An attacker could use this issue to cause abcm2ps to crash,
leading to a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 16.04 ESM
and Ubuntu 18.04 LTS.
(CVE-2018-10753, CVE-2018-10771, CVE-2019-1010069)

Chiba of Topsec Alpha Lab discovered that abcm2ps incorrectly
handled memory when parsing specially crafted ABC files.
An attacker could use this issue to cause abcm2ps to crash,
leading to a denial of service.
(CVE-2021-32434, CVE-2021-32435, CVE-2021-32436)
CVEs:
- https://ubuntu.com/security/CVE-2018-10753
- https://ubuntu.com/security/CVE-2018-10771
- https://ubuntu.com/security/CVE-2019-1010069
- https://ubuntu.com/security/CVE-2021-32434
- https://ubuntu.com/security/CVE-2021-32435
- https://ubuntu.com/security/CVE-2021-32436
- https://ubuntu.com/security/CVE-2021-32435
- https://ubuntu.com/security/CVE-2018-10771
- https://ubuntu.com/security/CVE-2019-1010069
- https://ubuntu.com/security/CVE-2021-32434
- https://ubuntu.com/security/CVE-2021-32436
- https://ubuntu.com/security/CVE-2018-10753

Title: USN-5974-1: GraphicsMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5974-1
Priorities: medium
Description:
It was discovered that GraphicsMagick was not properly performing bounds
checks when processing TGA image files, which could lead to a heap buffer
overflow. If a user or automated system were tricked into processing a
specially crafted TGA image file, an attacker could possibly use this
issue to cause a denial of service or execute arbitrary code. This issue
only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-20184)

It was discovered that GraphicsMagick was not properly validating bits per
pixel data when processing DIB image files. If a user or automated system
were tricked into processing a specially crafted DIB image file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
(CVE-2018-20189)

It was discovered that GraphicsMagick was not properly processing
bit-field mask values in BMP image files, which could result in the
execution of an infinite loop. If a user or automated system were tricked
into processing a specially crafted BMP image file, an attacker could
possibly use this issue to cause a denial of service. This issue only
affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-5685)

It was discovered that GraphicsMagick was not properly validating data
used in arithmetic operations when processing MNG image files, which
could result in a divide-by-zero error. If a user or automated system were
tricked into processing a specially crafted MNG image file, an attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2018-9018)

It was discovered that GraphicsMagick was not properly performing bounds
checks when processing MIFF image files, which could lead to a heap buffer
overflow. If a user or automated system were tricked into processing a
specially crafted MIFF image file, an attacker could possibly use this
issue to cause a denial of service or expose sensitive information. This
issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
(CVE-2019-11006)

It was discovered that GraphicsMagick did not properly magnify certain
MNG image files, which could lead to a heap buffer overflow. If a user or
automated system were tricked into processing a specially crafted MNG
image file, an attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu
20.04 LTS. (CVE-2020-12672)

It was discovered that GraphicsMagick was not properly performing bounds
checks when parsing certain MIFF image files, which could lead to a heap
buffer overflow. If a user or automated system were tricked into
processing a specially crafted MIFF image file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
(CVE-2022-1270)
CVEs:
- https://ubuntu.com/security/CVE-2018-20184
- https://ubuntu.com/security/CVE-2018-20189
- https://ubuntu.com/security/CVE-2018-5685
- https://ubuntu.com/security/CVE-2018-9018
- https://ubuntu.com/security/CVE-2019-11006
- https://ubuntu.com/security/CVE-2020-12672
- https://ubuntu.com/security/CVE-2022-1270
- https://ubuntu.com/security/CVE-2019-11006
- https://ubuntu.com/security/CVE-2018-9018
- https://ubuntu.com/security/CVE-2022-1270
- https://ubuntu.com/security/CVE-2018-20189
- https://ubuntu.com/security/CVE-2020-12672
- https://ubuntu.com/security/CVE-2018-20184
- https://ubuntu.com/security/CVE-2018-5685

Title: USN-5973-1: url-parse vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5973-1
Priorities: medium,low
Description:
It was discovered that url-parse incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service, or to perform a server-side request forgery attack or open
redirect attack. (CVE-2018-3774)

It was discovered that url-parse incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to bypass input
validation. This issue was only fixed in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-8124)

Yaniv Nizry discovered that url-parse incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service, or to perform a server-side request forgery attack or open
redirect attack. This issue was only fixed in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2021-27515)

It was discovered that url-parse incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service, or to perform a server-side request forgery attack or open
redirect attack. This issue was only fixed in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2021-3664)

It was discovered that url-parse incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to bypass
authorization. This issue was only fixed in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2022-0512, CVE-2022-0639, CVE-2022-0691)

Rohan Sharma discovered that url-parse incorrectly handled certain inputs.
If a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to bypass
authorization. This issue was only fixed in Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2022-0686)
CVEs:
- https://ubuntu.com/security/CVE-2018-3774
- https://ubuntu.com/security/CVE-2020-8124
- https://ubuntu.com/security/CVE-2021-27515
- https://ubuntu.com/security/CVE-2021-3664
- https://ubuntu.com/security/CVE-2022-0512
- https://ubuntu.com/security/CVE-2022-0639
- https://ubuntu.com/security/CVE-2022-0691
- https://ubuntu.com/security/CVE-2022-0686
- https://ubuntu.com/security/CVE-2021-3664
- https://ubuntu.com/security/CVE-2022-0639
- https://ubuntu.com/security/CVE-2021-27515
- https://ubuntu.com/security/CVE-2022-0686
- https://ubuntu.com/security/CVE-2020-8124
- https://ubuntu.com/security/CVE-2022-0512
- https://ubuntu.com/security/CVE-2022-0691
- https://ubuntu.com/security/CVE-2018-3774

Title: USN-5990-1: musl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5990-1
Priorities: medium
Description:
It was discovered that musl did not handle certain i386 math functions
properly. An attacker could use this vulnerability to cause a denial of
service (crash) or possibly execute arbitrary code. This issue only
affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM, and Ubuntu 18.04 LTS.
(CVE-2019-14697)

It was discovered that musl did not handle wide-character conversion
properly. A remote attacker could use this vulnerability to cause resource
consumption (infinite loop), denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04
ESM, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2020-28928)
CVEs:
- https://ubuntu.com/security/CVE-2019-14697
- https://ubuntu.com/security/CVE-2020-28928
- https://ubuntu.com/security/CVE-2020-28928
- https://ubuntu.com/security/CVE-2019-14697

Title: USN-5988-1: Xcftools vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5988-1
Priorities: medium
Description:
It was discovered that integer overflows vulnerabilities existed in Xcftools.
An attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2019-5086, CVE-2019-5087)
CVEs:
- https://ubuntu.com/security/CVE-2019-5086
- https://ubuntu.com/security/CVE-2019-5087
- https://ubuntu.com/security/CVE-2019-5086
- https://ubuntu.com/security/CVE-2019-5087

Title: USN-5983-1: Nette vulnerability
URL: https://ubuntu.com/security/notices/USN-5983-1
Priorities: medium
Description:
Cyku Hong discovered that Nette was not properly handling and validating
data used for code generation. A remote attacker could possibly use this
issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-15227

Title: USN-5997-1: IPMItool vulnerability
URL: https://ubuntu.com/security/notices/USN-5997-1
Priorities: medium
Description:
It was discovered that IPMItool was not properly checking the data received
from a remote LAN party. A remote attacker could possibly use this issue to
to cause a crash or arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2020-5208

Title: USN-5904-2: SoX regression
URL: https://ubuntu.com/security/notices/USN-5904-2
Priorities: medium,low
Description:
USN-5904-1 fixed vulnerabilities in SoX. It was discovered that the fix for
CVE-2021-33844 was incomplete. This update fixes the problem.

Original advisory details:

Helmut Grohne discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM,
and Ubuntu 18.04 LTS. (CVE-2019-13590)

Helmut Grohne discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2021-23159, CVE-2021-23172, CVE-2021-23210,
CVE-2021-33844, CVE-2021-3643, CVE-2021-40426, CVE-2022-31650, and
CVE-2022-31651)
CVEs:
- https://ubuntu.com/security/CVE-2021-33844
- https://ubuntu.com/security/CVE-2019-13590
- https://ubuntu.com/security/CVE-2021-23159
- https://ubuntu.com/security/CVE-2021-23172
- https://ubuntu.com/security/CVE-2021-23210
- https://ubuntu.com/security/CVE-2021-33844
- https://ubuntu.com/security/CVE-2021-3643
- https://ubuntu.com/security/CVE-2021-40426
- https://ubuntu.com/security/CVE-2022-31650
- https://ubuntu.com/security/CVE-2022-31651
- https://ubuntu.com/security/CVE-2021-33844

Title: USN-5981-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5981-1
Priorities: low,medium
Description:
It was discovered that the System V IPC implementation in the Linux kernel
did not properly handle large shared memory counts. A local attacker could
use this to cause a denial of service (memory exhaustion). (CVE-2021-3669)

It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)

Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)

Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)

It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)

José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)

It was discovered that a use-after-free vulnerability existed in the
Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-0266)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)

Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)

It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)

Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-28328

Title: USN-5969-1: gif2apng vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5969-1
Priorities: medium
Description:
It was discovered that gif2apng contained multiple heap-base overflows. An
attacker could potentially exploit this to cause a denial of service (system
crash). (CVE-2021-45909, CVE-2021-45910, CVE-2021-45911)
CVEs:
- https://ubuntu.com/security/CVE-2021-45909
- https://ubuntu.com/security/CVE-2021-45910
- https://ubuntu.com/security/CVE-2021-45911
- https://ubuntu.com/security/CVE-2021-45911
- https://ubuntu.com/security/CVE-2021-45909
- https://ubuntu.com/security/CVE-2021-45910

Title: USN-5968-1: GitPython vulnerability
URL: https://ubuntu.com/security/notices/USN-5968-1
Priorities: medium
Description:
It was discovered that GitPython did not properly sanitize user inputs for
remote URLs in the clone command. By injecting a maliciously crafted
remote URL, an attacker could possibly use this issue to execute arbitrary
commands on the host.
CVEs:
- https://ubuntu.com/security/CVE-2022-24439

Title: USN-5958-1: FFmpeg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5958-1
Priorities: medium
Description:
It was discovered that FFmpeg could be made to dereference a null
pointer. An attacker could possibly use this to cause a denial of
service via application crash. These issues only affected Ubuntu
16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04
LTS. (CVE-2022-3109, CVE-2022-3341)

It was discovered that FFmpeg could be made to access an out-of-bounds
frame by the Apple RPZA encoder. An attacker could possibly use this
to cause a denial of service via application crash or access sensitive
information. This issue only affected Ubuntu 20.04 LTS and Ubuntu
22.10. (CVE-2022-3964)

It was discovered that FFmpeg could be made to access an out-of-bounds
frame by the QuickTime encoder. An attacker could possibly use this to
cause a denial of service via application crash or access sensitive
information. This issue only affected Ubuntu 22.10. (CVE-2022-3965)
CVEs:
- https://ubuntu.com/security/CVE-2022-3109
- https://ubuntu.com/security/CVE-2022-3341
- https://ubuntu.com/security/CVE-2022-3964
- https://ubuntu.com/security/CVE-2022-3965
- https://ubuntu.com/security/CVE-2022-3341
- https://ubuntu.com/security/CVE-2022-3109
- https://ubuntu.com/security/CVE-2022-3965
- https://ubuntu.com/security/CVE-2022-3964

Title: USN-5966-2: amanda regression
URL: https://ubuntu.com/security/notices/USN-5966-2
Priorities: low,medium,high
Description:
USN-5966-1 fixed vulnerabilities in amanda. Unfortunately it introduced
a regression in GNUTAR-based backups. This update reverts all of the
changes in amanda until a better fix is provided.

We apologize for the inconvenience.

Original advisory details:

Maher Azzouzi discovered an information disclosure vulnerability in the
calcsize binary within amanda. calcsize is a suid binary owned by root that
could possibly be used by a malicious local attacker to expose sensitive
file system information. (CVE-2022-37703)

Maher Azzouzi discovered a privilege escalation vulnerability in the
rundump binary within amanda. rundump is a suid binary owned by root that
did not perform adequate sanitization of environment variables or
commandline options and could possibly be used by a malicious local
attacker to escalate privileges. (CVE-2022-37704)

Maher Azzouzi discovered a privilege escalation vulnerability in the runtar
binary within amanda. runtar is a suid binary owned by root that did not
perform adequate sanitization of commandline options and could possibly be
used by a malicious local attacker to escalate privileges. (CVE-2022-37705)
CVEs:
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705

Title: USN-5966-1: amanda vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5966-1
Priorities: low,medium,high
Description:
Maher Azzouzi discovered an information disclosure vulnerability in the
calcsize binary within amanda. calcsize is a suid binary owned by root that
could possibly be used by a malicious local attacker to expose sensitive
file system information. (CVE-2022-37703)

Maher Azzouzi discovered a privilege escalation vulnerability in the
rundump binary within amanda. rundump is a suid binary owned by root that
did not perform adequate sanitization of environment variables or
commandline options and could possibly be used by a malicious local
attacker to escalate privileges. (CVE-2022-37704)

Maher Azzouzi discovered a privilege escalation vulnerability in the runtar
binary within amanda. runtar is a suid binary owned by root that did not
perform adequate sanitization of commandline options and could possibly be
used by a malicious local attacker to escalate privileges. (CVE-2022-37705)
CVEs:
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705
- https://ubuntu.com/security/CVE-2022-37703
- https://ubuntu.com/security/CVE-2022-37704
- https://ubuntu.com/security/CVE-2022-37705

Title: USN-5686-4: Git vulnerability
URL: https://ubuntu.com/security/notices/USN-5686-4
Priorities: medium
Description:
USN-5686-1 fixed several vulnerabilities in Git. This update
provides the corresponding fix for CVE-2022-39253 on Ubuntu 16.04 ESM.

Original advisory details:

Cory Snider discovered that Git incorrectly handled certain symbolic links.
An attacker could possibly use this issue to cause an unexpected behaviour.
CVEs:
- https://ubuntu.com/security/CVE-2022-39253
- https://ubuntu.com/security/CVE-2022-39253

Title: USN-5963-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5963-1
Priorities: medium
Description:
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 18.04
LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-47024,
CVE-2023-0049, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433)

It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 22.04
LTS, and Ubuntu 22.10. (CVE-2023-0051)

It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2023-1170, CVE-2023-1175)

It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue only affected Ubuntu 20.04
LTS, Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2023-1264)
CVEs:
- https://ubuntu.com/security/CVE-2022-47024
- https://ubuntu.com/security/CVE-2023-0049
- https://ubuntu.com/security/CVE-2023-0054
- https://ubuntu.com/security/CVE-2023-0288
- https://ubuntu.com/security/CVE-2023-0433
- https://ubuntu.com/security/CVE-2023-0051
- https://ubuntu.com/security/CVE-2023-1170
- https://ubuntu.com/security/CVE-2023-1175
- https://ubuntu.com/security/CVE-2023-1264
- https://ubuntu.com/security/CVE-2023-0054
- https://ubuntu.com/security/CVE-2023-1175
- https://ubuntu.com/security/CVE-2023-0049
- https://ubuntu.com/security/CVE-2023-1264
- https://ubuntu.com/security/CVE-2023-0433
- https://ubuntu.com/security/CVE-2022-47024
- https://ubuntu.com/security/CVE-2023-0051
- https://ubuntu.com/security/CVE-2023-0288
- https://ubuntu.com/security/CVE-2023-1170

Title: LSN-0093-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0093-1
Priorities: high
Description:
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel
did not properly handle VLAN headers in some situations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2023-0179)

It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2023-0461)
CVEs:
- https://ubuntu.com/security/CVE-2023-0179
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2023-0179

Title: USN-5975-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5975-1
Priorities: high,low,medium
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)

It was discovered that the System V IPC implementation in the Linux kernel
did not properly handle large shared memory counts. A local attacker could
use this to cause a denial of service (memory exhaustion). (CVE-2021-3669)

It was discovered that an out-of-bounds write vulnerability existed in the
Video for Linux 2 (V4L2) implementation in the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-20369)

Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)

David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)

Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)

Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)

It was discovered that a use-after-free vulnerability existed in the SGI
GRU driver in the Linux kernel. A local attacker could possibly use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3424)

It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux
kernel contained an out-of-bounds write vulnerability. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2022-36280)

It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)

It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)

Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)

Hyunwoo Kim discovered that an integer overflow vulnerability existed in
the PXA3xx graphics driver in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2022-39842)

Hyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not
properly perform reference counting in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41218)

It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)

It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)

It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)

It was discovered that the network queuing discipline implementation in the
Linux kernel contained a null pointer dereference in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2022-47929)

José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)

It was discovered that a use-after-free vulnerability existed in the
Advanced Linux Sound Architecture (ALSA) subsystem. A local attacker could
use this to cause a denial of service (system crash). (CVE-2023-0266)

Kyle Zeng discovered that the IPv6 implementation in the Linux kernel
contained a NULL pointer dereference vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2023-0394)

Kyle Zeng discovered that the ATM VC queuing discipline implementation in
the Linux kernel contained a type confusion vulnerability in some
situations. An attacker could use this to cause a denial of service (system
crash). (CVE-2023-23455)

It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)

It was discovered that the NTFS file system implementation in the Linux
kernel did not properly validate attributes in certain situations, leading
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information (kernel memory). (CVE-2023-26607)

Wei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel
contained a null pointer dereference when handling certain messages from
user space. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-28328)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2022-20369
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3424
- https://ubuntu.com/security/CVE-2022-41218
- https://ubuntu.com/security/CVE-2022-47929
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2023-23455
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2023-26607
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2021-3669
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2023-0266
- https://ubuntu.com/security/CVE-2023-0394
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-20369
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-36280
- https://ubuntu.com/security/CVE-2023-28328
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-41849

Title: USN-5960-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-5960-1
Priorities: medium
Description:
Yebo Cao discovered that Python incorrectly handled certain URLs.
An attacker could possibly use this issue to bypass blocklisting
methods by supplying a URL that starts with blank characters.
CVEs:
- https://ubuntu.com/security/CVE-2023-24329

Title: USN-5942-2: Apache HTTP Server vulnerability
URL: https://ubuntu.com/security/notices/USN-5942-2
Priorities: medium
Description:
USN-5942-1 fixed vulnerabilities in Apache HTTP Server. This update
provides the corresponding update for CVE-2023-25690 for Ubuntu 16.04 ESM.

Original advisory details:

Lars Krapf discovered that the Apache HTTP Server mod_proxy module
incorrectly handled certain configurations. A remote attacker could
possibly use this issue to perform an HTTP Request Smuggling attack.
(CVE-2023-25690)
CVEs:
- https://ubuntu.com/security/CVE-2023-25690
- https://ubuntu.com/security/CVE-2023-25690
- https://ubuntu.com/security/CVE-2023-25690

Title: USN-5989-1: GlusterFS vulnerability
URL: https://ubuntu.com/security/notices/USN-5989-1
Priorities: medium
Description:
Tao Lyu discovered that GlusterFS did not properly handle certain
event notifications. An attacker could possibly use this issue to
cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-26253

Title: USN-5996-1: Liblouis vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5996-1
Priorities: medium
Description:
It was discovered that Liblouis incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2023-26767, CVE-2023-26768, CVE-2023-26769)
CVEs:
- https://ubuntu.com/security/CVE-2023-26767
- https://ubuntu.com/security/CVE-2023-26768
- https://ubuntu.com/security/CVE-2023-26769
- https://ubuntu.com/security/CVE-2023-26769
- https://ubuntu.com/security/CVE-2023-26768
- https://ubuntu.com/security/CVE-2023-26767

Title: USN-5964-2: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5964-2
Priorities: low,medium
Description:
USN-5964-1 fixed several vulnerabilities in curl. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Harry Sintonen discovered that curl incorrectly handled certain TELNET
connection options. Due to lack of proper input scrubbing, curl could pass
on user name and telnet options to the server as provided, contrary to
expectations. (CVE-2023-27533)

Harry Sintonen discovered that curl incorrectly reused certain FTP
connections. This could lead to the wrong credentials being reused,
contrary to expectations. (CVE-2023-27535)

Harry Sintonen discovered that curl incorrectly reused connections when the
GSS delegation option had been changed. This could lead to the option being
reused, contrary to expectations. (CVE-2023-27536)
CVEs:
- https://ubuntu.com/security/CVE-2023-27533
- https://ubuntu.com/security/CVE-2023-27535
- https://ubuntu.com/security/CVE-2023-27536
- https://ubuntu.com/security/CVE-2023-27535
- https://ubuntu.com/security/CVE-2023-27536
- https://ubuntu.com/security/CVE-2023-27533

621.463

Available in the Broadcom Support portal

Release Date: March 16, 2023

Metadata:

BOSH Agent Version: 2.268.127

Changes:


* AWS light stemcells are now compatible with the eu-central-2 region.

USNs:


Title: USN-5904-1: SoX vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5904-1
Priorities: medium,low
Description:
Helmut Grohne discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
and Ubuntu 18.04 LTS. (CVE-2019-13590)

Helmut Grohne discovered that SoX incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2021-23159, CVE-2021-23172, CVE-2021-23210,
CVE-2021-33844, CVE-2021-3643, CVE-2021-40426, CVE-2022-31650, and
CVE-2022-31651)
CVEs:
- https://ubuntu.com/security/CVE-2019-13590
- https://ubuntu.com/security/CVE-2021-23159
- https://ubuntu.com/security/CVE-2021-23172
- https://ubuntu.com/security/CVE-2021-23210
- https://ubuntu.com/security/CVE-2021-33844
- https://ubuntu.com/security/CVE-2021-3643
- https://ubuntu.com/security/CVE-2021-40426
- https://ubuntu.com/security/CVE-2022-31650
- https://ubuntu.com/security/CVE-2022-31651
- https://ubuntu.com/security/CVE-2021-3643
- https://ubuntu.com/security/CVE-2021-23172
- https://ubuntu.com/security/CVE-2021-23159
- https://ubuntu.com/security/CVE-2022-31650
- https://ubuntu.com/security/CVE-2019-13590
- https://ubuntu.com/security/CVE-2021-40426
- https://ubuntu.com/security/CVE-2021-33844
- https://ubuntu.com/security/CVE-2021-23210
- https://ubuntu.com/security/CVE-2022-31651

Title: USN-5926-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5926-1
Priorities: medium,low
Description:
Kirill Tkhai discovered that the XFS file system implementation in the
Linux kernel did not calculate size correctly when pre-allocating space in
some situations. A local attacker could use this to expose sensitive
information. (CVE-2021-4155)

Lee Jones discovered that a use-after-free vulnerability existed in the
Bluetooth implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-20566)

Duoming Zhou discovered that a race condition existed in the SLIP driver in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to cause a denial of service (system crash).
(CVE-2022-41858)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)

It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)
CVEs:
- https://ubuntu.com/security/CVE-2021-4155
- https://ubuntu.com/security/CVE-2022-20566
- https://ubuntu.com/security/CVE-2022-41858
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2021-4155
- https://ubuntu.com/security/CVE-2022-41858
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2022-20566

Title: USN-5922-1: FriBidi vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5922-1
Priorities: medium
Description:
It was discovered that FriBidi incorrectly handled the processing of input
strings, resulting in memory corruption. An attacker could possibly use this
issue to cause FriBidi to crash, resulting in a denial of service, or
potentially execute arbitrary code. (CVE-2022-25308)

It was discovered that FriBidi incorrectly validated input data to its CapRTL
unicode encoder, resulting in memory corruption. An attacker could possibly use
this issue to cause FriBidi to crash, resulting in a denial of service, or
potentially execute arbitrary code. (CVE-2022-25309)

It was discovered that FriBidi incorrectly handled empty input when removing
marks from unicode strings, resulting in a crash. An attacker could possibly use
this to cause FriBidi to crash, resulting in a denial of service, or potentially
execute arbitrary code. (CVE-2022-25310)
CVEs:
- https://ubuntu.com/security/CVE-2022-25308
- https://ubuntu.com/security/CVE-2022-25309
- https://ubuntu.com/security/CVE-2022-25310
- https://ubuntu.com/security/CVE-2022-25308
- https://ubuntu.com/security/CVE-2022-25309
- https://ubuntu.com/security/CVE-2022-25310

Title: USN-5944-1: SnakeYAML vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5944-1
Priorities: low,medium
Description:
It was discovered that SnakeYAML did not limit the maximal nested depth
for collections when parsing YAML data. If a user or automated system were
tricked into opening a specially crafted YAML file, an attacker could
possibly use this issue to cause applications using SnakeYAML to crash,
resulting in a denial of service. (CVE-2022-25857, CVE-2022-38749,
CVE-2022-38750)

It was discovered that SnakeYAML did not limit the maximal data matched
with regular expressions when parsing YAML data. If a user or automated
system were tricked into opening a specially crafted YAML file, an
attacker could possibly use this issue to cause applications using
SnakeYAML to crash, resulting in a denial of service. (CVE-2022-38751)
CVEs:
- https://ubuntu.com/security/CVE-2022-25857
- https://ubuntu.com/security/CVE-2022-38749
- https://ubuntu.com/security/CVE-2022-38750
- https://ubuntu.com/security/CVE-2022-38751
- https://ubuntu.com/security/CVE-2022-38750
- https://ubuntu.com/security/CVE-2022-25857
- https://ubuntu.com/security/CVE-2022-38749
- https://ubuntu.com/security/CVE-2022-38751

Title: USN-5932-1: Sofia-SIP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5932-1
Priorities: medium
Description:
It was discovered that Sofia-SIP incorrectly handled specially
crafted SDP packets. A remote attacker could use this issue
to cause applications using Sofia-SIP to crash, leading to
a denial of service, or possibly execute arbitrary code.
This issue only affected Ubuntu 16.04 ESM, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-31001, CVE-2022-31002, CVE-2022-31003)

It was discovered that Sofia-SIP incorrectly handled specially
crafted UDP packets. A remote attacker could use this issue
to cause applications using Sofia-SIP to crash, leading to
a denial of service. (CVE-2022-47516)

Qiuhao Li discovered that Sofia-SIP incorrectly handled specially
crafted STUN packets. A remote attacker could use this issue
to cause applications using Sofia-SIP to crash, leading to
a denial of service, or possibly execute arbitrary code.
(CVE-2023-22741)
CVEs:
- https://ubuntu.com/security/CVE-2022-31001
- https://ubuntu.com/security/CVE-2022-31002
- https://ubuntu.com/security/CVE-2022-31003
- https://ubuntu.com/security/CVE-2022-47516
- https://ubuntu.com/security/CVE-2023-22741
- https://ubuntu.com/security/CVE-2022-47516
- https://ubuntu.com/security/CVE-2022-31001
- https://ubuntu.com/security/CVE-2023-22741
- https://ubuntu.com/security/CVE-2022-31003
- https://ubuntu.com/security/CVE-2022-31002

Title: USN-5905-1: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5905-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain gzip files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-31628)

It was discovered that PHP incorrectly handled certain cookies.
An attacker could possibly use this issue to compromise data integrity.
(CVE-2022-31629)

It was discovered that PHP incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code. (CVE-2022-31631)

It was discovered that PHP incorrectly handled resolving long paths. A
remote attacker could possibly use this issue to obtain or modify sensitive
information. (CVE-2023-0568)

It was discovered that PHP incorrectly handled a large number of field and file
parts in HTTP form uploads. A remote attacker could possibly use this issue to
cause PHP to consume resources, leading to a denial of service. (CVE-2023-0662)
CVEs:
- https://ubuntu.com/security/CVE-2022-31628
- https://ubuntu.com/security/CVE-2022-31629
- https://ubuntu.com/security/CVE-2022-31631
- https://ubuntu.com/security/CVE-2023-0568
- https://ubuntu.com/security/CVE-2023-0662
- https://ubuntu.com/security/CVE-2023-0568
- https://ubuntu.com/security/CVE-2023-0662
- https://ubuntu.com/security/CVE-2022-31629
- https://ubuntu.com/security/CVE-2022-31628
- https://ubuntu.com/security/CVE-2022-31631

Title: USN-5928-1: systemd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5928-1
Priorities: medium
Description:
It was discovered that systemd did not properly validate the time and
accuracy values provided to the format_timespan() function. An attacker
could possibly use this issue to cause a buffer overrun, leading to a
denial of service attack. This issue only affected Ubuntu 14.04 ESM, Ubuntu
16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-3821)

It was discovered that systemd did not properly manage the fs.suid_dumpable
kernel configurations. A local attacker could possibly use this issue to
expose sensitive information. This issue only affected Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS, and Ubuntu 22.10. (CVE-2022-4415)

It was discovered that systemd did not properly manage a crash with long
backtrace data. A local attacker could possibly use this issue to cause a
deadlock, leading to a denial of service attack. This issue only affected
Ubuntu 22.10. (CVE-2022-45873)
CVEs:
- https://ubuntu.com/security/CVE-2022-3821
- https://ubuntu.com/security/CVE-2022-4415
- https://ubuntu.com/security/CVE-2022-45873
- https://ubuntu.com/security/CVE-2022-3821
- https://ubuntu.com/security/CVE-2022-45873
- https://ubuntu.com/security/CVE-2022-4415

Title: USN-5821-3: pip regression
URL: https://ubuntu.com/security/notices/USN-5821-3
Priorities: medium
Description:
USN-5821-1 fixed a vulnerability in wheel and pip. Unfortunately,
it was missing a commit to fix it properly in pip.

We apologize for the inconvenience.

Original advisory details:

Sebastian Chnelik discovered that wheel incorrectly handled
certain file names when validated against a regex expression.
An attacker could possibly use this issue to cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40898

Title: LSN-0092-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0092-1
Priorities: high
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-4378)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code.(CVE-2022-42896)

It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code.(CVE-2022-43945)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-43945

Title: USN-5910-1: Rack vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5910-1
Priorities: medium
Description:
It was discovered that Rack did not properly structure regular expressions
in some of its parsing components, which could result in uncontrolled
resource consumption if an application using Rack received specially
crafted input. A remote attacker could possibly use this issue to cause a
denial of service. (CVE-2022-44570, CVE-2022-44571)

It was discovered that Rack did not properly structure regular expressions
in its multipart parsing component, which could result in uncontrolled
resource consumption if an application using Rack to parse multipart posts
received specially crafted input. A remote attacker could possibly use
this issue to cause a denial of service. This issue was only fixed in
Ubuntu 20.04 ESM and Ubuntu 22.04 ESM. (CVE-2022-44572)
CVEs:
- https://ubuntu.com/security/CVE-2022-44570
- https://ubuntu.com/security/CVE-2022-44571
- https://ubuntu.com/security/CVE-2022-44572
- https://ubuntu.com/security/CVE-2022-44571
- https://ubuntu.com/security/CVE-2022-44572
- https://ubuntu.com/security/CVE-2022-44570

Title: USN-5899-1: AWStats vulnerability
URL: https://ubuntu.com/security/notices/USN-5899-1
Priorities: low
Description:
It was discovered that AWStats did not properly sanitize the content of
whois responses in the hostinfo plugin. An attacker could possibly use
this issue to conduct cross-site scripting (XSS) attacks.
CVEs:
- https://ubuntu.com/security/CVE-2022-46391

Title: USN-5937-1: Opusfile vulnerability
URL: https://ubuntu.com/security/notices/USN-5937-1
Priorities: medium
Description:
It was discovered that Opusfile was not properly validating pointer
arguments in some of its functions, which could lead to a NULL pointer
dereference. An attacker could possibly use this issue to cause a denial
of service or have other unspecified impacts.
CVEs:
- https://ubuntu.com/security/CVE-2022-47021

Title: USN-5900-1: tar vulnerability
URL: https://ubuntu.com/security/notices/USN-5900-1
Priorities: medium
Description:
It was discovered that tar incorrectly handled certain files.
An attacker could possibly use this issue to expose sensitive information
or cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2022-48303

Title: USN-5919-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5919-1
Priorities: high,medium
Description:
It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)

Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)

It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)

It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)

Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)

It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328, CVE-2022-42329)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)
CVEs:
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-42329
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-3640

Title: USN-5892-2: NSS vulnerability
URL: https://ubuntu.com/security/notices/USN-5892-2
Priorities: medium
Description:
USN-5892-1 fixed a vulnerability in NSS. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Christian Holler discovered that NSS incorrectly handled certain PKCS 12
certificated bundles. A remote attacker could use this issue to cause NSS
to crash, leading to a denial of service, or possibly execute arbitrary
code. (CVE-2023-0767)
CVEs:
- https://ubuntu.com/security/CVE-2023-0767
- https://ubuntu.com/security/CVE-2023-0767

Title: USN-5923-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5923-1
Priorities: medium
Description:
It was discovered that LibTIFF could be made to read out of bounds when
processing certain malformed image files with the tiffcrop tool. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service. (CVE-2023-0795, CVE-2023-0796, CVE-2023-0797,
CVE-2023-0798, CVE-2023-0799)

It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files with the tiffcrop tool. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2023-0800,
CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804)
CVEs:
- https://ubuntu.com/security/CVE-2023-0795
- https://ubuntu.com/security/CVE-2023-0796
- https://ubuntu.com/security/CVE-2023-0797
- https://ubuntu.com/security/CVE-2023-0798
- https://ubuntu.com/security/CVE-2023-0799
- https://ubuntu.com/security/CVE-2023-0800
- https://ubuntu.com/security/CVE-2023-0801
- https://ubuntu.com/security/CVE-2023-0802
- https://ubuntu.com/security/CVE-2023-0803
- https://ubuntu.com/security/CVE-2023-0804
- https://ubuntu.com/security/CVE-2023-0802
- https://ubuntu.com/security/CVE-2023-0796
- https://ubuntu.com/security/CVE-2023-0803
- https://ubuntu.com/security/CVE-2023-0799
- https://ubuntu.com/security/CVE-2023-0800
- https://ubuntu.com/security/CVE-2023-0801
- https://ubuntu.com/security/CVE-2023-0798
- https://ubuntu.com/security/CVE-2023-0795
- https://ubuntu.com/security/CVE-2023-0797
- https://ubuntu.com/security/CVE-2023-0804

Title: USN-5898-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5898-1
Priorities: medium,low
Description:
It was discovered that the Serialization component of OpenJDK did not
properly handle the deserialization of some CORBA objects. An attacker
could possibly use this to bypass Java sandbox restrictions.
(CVE-2023-21830)

Markus Loewe discovered that the Java Sound subsystem in OpenJDK did not
properly validate the origin of a Soundbank. An attacker could use this to
specially craft an untrusted Java application or applet that could load a
Soundbank from an attacker controlled remote URL. (CVE-2023-21843)
CVEs:
- https://ubuntu.com/security/CVE-2023-21830
- https://ubuntu.com/security/CVE-2023-21843
- https://ubuntu.com/security/CVE-2023-21830
- https://ubuntu.com/security/CVE-2023-21843

621.448

Available in the Broadcom Support portal

Release Date: February 28, 2023

Metadata:

BOSH Agent Version: 2.268.123

USNs:


Title: USN-5866-1: Nova vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5866-1
Priorities: low,medium
Description:
It was discovered that Nova did not properly manage data logged into the
log file. An attacker with read access to the service’s logs could exploit
this issue and may obtain sensitive information. This issue only affected
Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2015-9543)

It was discovered that Nova did not properly handle attaching and
reattaching the encrypted volume. An attacker could possibly use this issue
to perform a denial of service attack. This issue only affected Ubuntu
16.04 ESM. (CVE-2017-18191)

It was discovered that Nova did not properly handle the updation of domain
XML after live migration. An attacker could possibly use this issue to
corrupt the volume or perform a denial of service attack. This issue only
affected Ubuntu 18.04 LTS. (CVE-2020-17376)

It was discovered that Nova was not properly validating the URL passed to
noVNC. An attacker could possibly use this issue by providing malicious URL
to the noVNC proxy to redirect to any desired URL. This issue only affected
Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2021-3654)

It was discovered that Nova did not properly handle changes in the neutron
port of vnic_type type. An authenticated user could possibly use this issue
to perform a denial of service attack. This issue only affected Ubuntu
20.04 LTS. (CVE-2022-37394)
CVEs:
- https://ubuntu.com/security/CVE-2015-9543
- https://ubuntu.com/security/CVE-2017-18191
- https://ubuntu.com/security/CVE-2020-17376
- https://ubuntu.com/security/CVE-2021-3654
- https://ubuntu.com/security/CVE-2022-37394
- https://ubuntu.com/security/CVE-2021-3654
- https://ubuntu.com/security/CVE-2017-18191
- https://ubuntu.com/security/CVE-2020-17376
- https://ubuntu.com/security/CVE-2022-37394
- https://ubuntu.com/security/CVE-2015-9543

Title: USN-5889-1: ZoneMinder vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5889-1
Priorities: medium,high
Description:
It was discovered that ZoneMinder was not properly sanitizing URL
parameters for certain views. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 16.04 ESM. (CVE-2019-6777)

It was discovered that ZoneMinder was not properly sanitizing stored user
input later printed to the user in certain views. An attacker could
possibly use this issue to perform a cross-site scripting (XSS) attack.
This issue was only fixed in Ubuntu 16.04 ESM. (CVE-2019-6990,
CVE-2019-6992)

It was discovered that ZoneMinder was not properly limiting data size and
not properly performing bound checks when processing username and password
data, which could lead to a stack buffer overflow. An attacker could
possibly use this issue to bypass authentication, cause a denial of
service or execute arbitrary code. This issue was only fixed in Ubuntu
16.04 ESM. (CVE-2019-6991)

It was discovered that ZoneMinder was not properly defining and filtering
data that was appended to the webroot URL of a view. An attacker could
possibly use this issue to perform cross-site scripting (XSS) attacks.
This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 20.04 LTS.
(CVE-2019-7325, CVE-2019-7329)

It was discovered that ZoneMinder was not properly sanitizing stored user
input later printed to the user in certain views. An attacker could
possibly use this issue to perform a cross-site scripting (XSS) attack.
This issue was only fixed in Ubuntu 20.04 LTS. (CVE-2019-7326)

It was discovered that ZoneMinder was not properly sanitizing URL
parameters for certain views. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 20.04 LTS. (CVE-2019-7327, CVE-2019-7328, CVE-2019-7330,
CVE-2019-7332)

It was discovered that ZoneMinder was not properly sanitizing user input
in the monitor editing view. An attacker could possibly use this issue to
perform a cross-site scripting (XSS) attack. This issue was only fixed in
Ubuntu 16.04 ESM and Ubuntu 20.04 LTS. (CVE-2019-7331)

It was discovered that ZoneMinder was not properly sanitizing data related
to file paths in a system. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-29806)
CVEs:
- https://ubuntu.com/security/CVE-2019-6777
- https://ubuntu.com/security/CVE-2019-6990
- https://ubuntu.com/security/CVE-2019-6992
- https://ubuntu.com/security/CVE-2019-6991
- https://ubuntu.com/security/CVE-2019-7325
- https://ubuntu.com/security/CVE-2019-7329
- https://ubuntu.com/security/CVE-2019-7326
- https://ubuntu.com/security/CVE-2019-7327
- https://ubuntu.com/security/CVE-2019-7328
- https://ubuntu.com/security/CVE-2019-7330
- https://ubuntu.com/security/CVE-2019-7332
- https://ubuntu.com/security/CVE-2019-7331
- https://ubuntu.com/security/CVE-2022-29806
- https://ubuntu.com/security/CVE-2019-7332
- https://ubuntu.com/security/CVE-2019-7326
- https://ubuntu.com/security/CVE-2019-7328
- https://ubuntu.com/security/CVE-2019-7330
- https://ubuntu.com/security/CVE-2019-7329
- https://ubuntu.com/security/CVE-2019-6777
- https://ubuntu.com/security/CVE-2019-7325
- https://ubuntu.com/security/CVE-2019-6991
- https://ubuntu.com/security/CVE-2019-6992
- https://ubuntu.com/security/CVE-2019-7327
- https://ubuntu.com/security/CVE-2019-6990
- https://ubuntu.com/security/CVE-2019-7331
- https://ubuntu.com/security/CVE-2022-29806

Title: USN-5884-1: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5884-1
Priorities: medium,low
Description:
Kirill Tkhai discovered that the XFS file system implementation in the
Linux kernel did not calculate size correctly when pre-allocating space in
some situations. A local attacker could use this to expose sensitive
information. (CVE-2021-4155)

Lee Jones discovered that a use-after-free vulnerability existed in the
Bluetooth implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-20566)

Duoming Zhou discovered that a race condition existed in the SLIP driver in
the Linux kernel, leading to a null pointer dereference vulnerability. An
attacker could use this to cause a denial of service (system crash).
(CVE-2022-41858)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

José Oliveira and Rodrigo Branco discovered that the prctl syscall
implementation in the Linux kernel did not properly protect against
indirect branch prediction attacks in some situations. A local attacker
could possibly use this to expose sensitive information. (CVE-2023-0045)

It was discovered that the RNDIS USB driver in the Linux kernel contained
an integer overflow vulnerability. A local attacker with physical access
could plug in a malicious USB device to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2023-23559)
CVEs:
- https://ubuntu.com/security/CVE-2021-4155
- https://ubuntu.com/security/CVE-2022-20566
- https://ubuntu.com/security/CVE-2022-41858
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2023-0045
- https://ubuntu.com/security/CVE-2023-23559
- https://ubuntu.com/security/CVE-2022-41858
- https://ubuntu.com/security/CVE-2021-4155
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-20566

Title: USN-5886-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5886-1
Priorities: medium
Description:
Erik C. Bjorge discovered that some Intel(R) Atom and Intel Xeon Scalable
Processors did not properly implement access controls for out-of-band
management. This may allow a privileged network-adjacent user to potentially
escalate privileges. (CVE-2022-21216)

Cfir Cohen, Erdem Aktas, Felix Wilhelm, James Forshaw, Josh Eads, Nagaraju
Kodalapura Nagabhushana Rao, Przemyslaw Duda, Liron Shacham and Ron Anderson
discovered that some Intel(R) Xeon(R) Processors used incorrect default
permissions in some memory controller configurations when using Intel(R)
Software Guard Extensions. This may allow a privileged local user to potentially
escalate privileges. (CVE-2022-33196)

It was discovered that some 3rd Generation Intel(R) Xeon(R) Scalable Processors
did not properly calculate microkey keying. This may allow a privileged local
user to potentially disclose information. (CVE-2022-33972)

Joseph Nuzman discovered that some Intel(R) Processors when using Intel(R)
Software Guard Extensions did not properly isolate shared resources. This may
allow a privileged local user to potentially disclose
information. (CVE-2022-38090)
CVEs:
- https://ubuntu.com/security/CVE-2022-21216
- https://ubuntu.com/security/CVE-2022-33196
- https://ubuntu.com/security/CVE-2022-33972
- https://ubuntu.com/security/CVE-2022-38090
- https://ubuntu.com/security/CVE-2022-33972
- https://ubuntu.com/security/CVE-2022-38090
- https://ubuntu.com/security/CVE-2022-21216
- https://ubuntu.com/security/CVE-2022-33196

Title: USN-5872-1: NSS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5872-1
Priorities: low,medium
Description:
Tavis Ormandy discovered that NSS incorrectly handled an empty pkcs7
sequence. A remote attacker could possibly use this issue to cause NSS to
crash, resulting in a denial of service. (CVE-2022-22747)

Ronald Crane discovered that NSS incorrectly handled certain memory
operations. A remote attacker could use this issue to cause NSS to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2022-34480)
CVEs:
- https://ubuntu.com/security/CVE-2022-22747
- https://ubuntu.com/security/CVE-2022-34480
- https://ubuntu.com/security/CVE-2022-22747
- https://ubuntu.com/security/CVE-2022-34480

Title: USN-5870-1: apr-util vulnerability
URL: https://ubuntu.com/security/notices/USN-5870-1
Priorities: medium
Description:
Ronald Crane discovered that APR-util did not properly handled memory when
encoding or decoding certain input data. An attacker could possibly use
this issue to cause a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2022-25147

Title: USN-5883-1: Linux kernel (HWE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5883-1
Priorities: high,medium,low
Description:
Kyle Zeng discovered that the sysctl implementation in the Linux kernel
contained a stack-based buffer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-4378)

It was discovered that an out-of-bounds write vulnerability existed in the
Video for Linux 2 (V4L2) implementation in the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-20369)

Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan
and Ariel Sabba discovered that some Intel processors with Enhanced
Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET
instructions after a VM exits. A local attacker could potentially use this
to expose sensitive information. (CVE-2022-26373)

David Leadbeater discovered that the netfilter IRC protocol tracking
implementation in the Linux Kernel incorrectly handled certain message
payloads in some situations. A remote attacker could possibly use this to
cause a denial of service or bypass firewall filtering. (CVE-2022-2663)

Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64
processors, the branch predictor could by mis-trained for return
instructions in certain circumstances. A local attacker could possibly use
this to expose sensitive information. (CVE-2022-29900)

Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64
processors, the Linux kernel’s protections against speculative branch
target injection attacks were insufficient in some circumstances. A local
attacker could possibly use this to expose sensitive information.
(CVE-2022-29901)

It was discovered that a race condition existed in the Kernel Connection
Multiplexor (KCM) socket implementation in the Linux kernel when releasing
sockets in certain situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-3521)

It was discovered that the Netronome Ethernet driver in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3545)

It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux
kernel did not properly perform bounds checking in some situations. A
physically proximate attacker could use this to craft a malicious USB
device that when inserted, could cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-3628)

It was discovered that a use-after-free vulnerability existed in the
Bluetooth stack in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3640)

It was discovered that the NILFS2 file system implementation in the Linux
kernel did not properly deallocate memory in certain error conditions. An
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2022-3646)

Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)

Hyunwoo Kim discovered that an integer overflow vulnerability existed in
the PXA3xx graphics driver in the Linux kernel. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2022-39842)

It was discovered that a race condition existed in the SMSC UFX USB driver
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-41849)

It was discovered that a race condition existed in the Roccat HID driver in
the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-41850)

It was discovered that a race condition existed in the Xen network backend
driver in the Linux kernel when handling dropped packets in certain
circumstances. An attacker could use this to cause a denial of service
(kernel deadlock). (CVE-2022-42328)

Tamás Koczka discovered that the Bluetooth L2CAP implementation in the
Linux kernel did not properly initialize memory in some situations. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-42895)

It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)

It was discovered that the Upper Level Protocol (ULP) subsystem in the
Linux kernel did not properly handle sockets entering the LISTEN state in
certain protocols, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2023-0461)
CVEs:
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-20369
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3646
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-26373
- https://ubuntu.com/security/CVE-2022-41849
- https://ubuntu.com/security/CVE-2022-3521
- https://ubuntu.com/security/CVE-2023-0461
- https://ubuntu.com/security/CVE-2022-20369
- https://ubuntu.com/security/CVE-2022-42328
- https://ubuntu.com/security/CVE-2022-29901
- https://ubuntu.com/security/CVE-2022-3545
- https://ubuntu.com/security/CVE-2022-42895
- https://ubuntu.com/security/CVE-2022-41850
- https://ubuntu.com/security/CVE-2022-29900
- https://ubuntu.com/security/CVE-2022-39842
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-2663
- https://ubuntu.com/security/CVE-2022-3640
- https://ubuntu.com/security/CVE-2022-3628
- https://ubuntu.com/security/CVE-2022-4378
- https://ubuntu.com/security/CVE-2022-3646

Title: USN-5863-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5863-1
Priorities: high,medium
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-42896

Title: USN-5807-2: libXpm vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5807-2
Priorities: medium
Description:
USN-5807-1 fixed vulnerabilities in libXpm. This update provides the
corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

Martin Ettl discovered that libXpm incorrectly handled certain XPM files.
If a user or automated system were tricked into opening a specially crafted
XPM file, a remote attacker could possibly use this issue to cause libXpm
to stop responding, resulting in a denial of service. (CVE-2022-44617)

Marco Ivaldi discovered that libXpm incorrectly handled certain XPM files.
If a user or automated system were tricked into opening a specially crafted
XPM file, a remote attacker could possibly use this issue to cause libXpm
to stop responding, resulting in a denial of service. (CVE-2022-46285)

Alan Coopersmith discovered that libXpm incorrectly handled calling
external helper binaries. If libXpm was being used by a setuid binary, a
local attacker could possibly use this issue to escalate privileges.
(CVE-2022-4883)
CVEs:
- https://ubuntu.com/security/CVE-2022-44617
- https://ubuntu.com/security/CVE-2022-46285
- https://ubuntu.com/security/CVE-2022-4883
- https://ubuntu.com/security/CVE-2022-44617
- https://ubuntu.com/security/CVE-2022-4883
- https://ubuntu.com/security/CVE-2022-46285

Title: USN-5778-2: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5778-2
Priorities: medium
Description:
USN-5778-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Jan-Niklas Sohn discovered that X.Org X Server extensions contained
multiple security issues. An attacker could possibly use these issues to
cause the X Server to crash, execute arbitrary code, or escalate
privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-46344
- https://ubuntu.com/security/CVE-2023-0494
- https://ubuntu.com/security/CVE-2022-46341
- https://ubuntu.com/security/CVE-2022-46340
- https://ubuntu.com/security/CVE-2022-46343
- https://ubuntu.com/security/CVE-2022-46342
- https://ubuntu.com/security/CVE-2022-4283

Title: USN-5887-1: ClamAV vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5887-1
Priorities: medium
Description:
Simon Scannell discovered that ClamAV incorrectly handled parsing
HFS+ files. A remote attacker could possibly use this issue
to cause ClamAV to crash, resulting in a denial of service,
or possibly execute arbitrary code. (CVE-2023-20032)

Simon Scannell discovered that ClamAV incorrectly handled parsing
DMG files. A remote attacker could possibly use this issue
to expose sensitive information. (CVE-2023-20052)
CVEs:
- https://ubuntu.com/security/CVE-2023-20032
- https://ubuntu.com/security/CVE-2023-20052
- https://ubuntu.com/security/CVE-2023-20032
- https://ubuntu.com/security/CVE-2023-20052

Title: USN-5871-1: Git vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5871-1
Priorities: medium
Description:
It was discovered that Git incorrectly handled certain repositories.
An attacker could use this issue to make Git uses its local
clone optimization even when using a non-local transport.
(CVE-2023-22490)

Joern Schneeweisz discovered that Git incorrectly handled certain commands.
An attacker could possibly use this issue to overwrite a patch outside
the working tree. (CVE-2023-23946)
CVEs:
- https://ubuntu.com/security/CVE-2023-22490
- https://ubuntu.com/security/CVE-2023-23946
- https://ubuntu.com/security/CVE-2023-23946
- https://ubuntu.com/security/CVE-2023-22490

621.418

Available in the Broadcom Support portal

Release Date: February 09, 2023

Metadata:

BOSH Agent Version: 2.268.118

USNs:


Title: USN-5834-1: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5834-1
Priorities: medium
Description:
It was discovered that the Apache HTTP Server mod_dav module did not
properly handle specially crafted request headers. A remote attacker
could possibly use this issue to cause the process to crash, leading
to a denial of service. (CVE-2006-20001)

It was discovered that the Apache HTTP Server mod_proxy_ajp module did not
properly handle certain invalid Transfer-Encoding headers. A remote attacker
could possibly use this issue to perform an HTTP Request Smuggling attack.
(CVE-2022-36760)
CVEs:
- https://ubuntu.com/security/CVE-2006-20001
- https://ubuntu.com/security/CVE-2022-36760
- https://ubuntu.com/security/CVE-2022-36760
- https://ubuntu.com/security/CVE-2006-20001

Title: USN-4781-2: Slurm vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4781-2
Priorities: medium,high
Description:
USN-4781-1 fixed several vulnerabilities in Slurm. This update provides
the corresponding updates for Ubuntu 14.04 ESM (CVE-2016-10030) and
Ubuntu 16.04 ESM (CVE-2018-10995).

Original advisory details:

It was discovered that Slurm incorrectly handled certain messages
between the daemon and the user. An attacker could possibly use this
issue to assume control of an arbitrary file on the system. This
issue only affected Ubuntu 16.04 ESM.
(CVE-2016-10030)

It was discovered that Slurm mishandled SPANK environment variables.
An attacker could possibly use this issue to gain elevated privileges.
This issue only affected Ubuntu 16.04 ESM. (CVE-2017-15566)

It was discovered that Slurm mishandled certain SQL queries. A local
attacker could use this issue to gain elevated privileges. This
issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and
Ubuntu 18.04 ESM. (CVE-2018-7033)

It was discovered that Slurm mishandled user names and group ids. A local
attacker could use this issue to gain administrative privileges.
This issue only affected Ubuntu 14.04 ESM and Ubuntu 18.04 ESM.
(CVE-2018-10995)

It was discovered that Slurm mishandled 23-bit systems. A local attacker
could use this to gain administrative privileges. This issue only affected
Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 ESM. (CVE-2019-6438)

It was discovered that Slurm incorrectly handled certain inputs
when Message Aggregation is enabled. An attacker could possibly
use this issue to launch a process as an arbitrary user.
This issue only affected Ubuntu 16.04 ESM, Ubuntu 18.04 ESM
and Ubuntu 20.04 ESM. (CVE-2020-12693)

It was discovered that Slurm incorrectly handled certain RPC inputs.
An attacker could possibly use this issue to execute arbitrary code.
This issue only affected Ubuntu 18.04 ESM and Ubuntu 20.04 ESM.
(CVE-2020-27745)

Jonas Stare discovered that Slurm exposes sensitive information related
to the X protocol. An attacker could possibly use this issue to obtain
a graphical session from an arbitrary user. This issue only affected
Ubuntu 18.04 ESM and Ubuntu 20.04 ESM. (CVE-2020-27746)

It was discovered that Slurm incorrectly handled environment parameters.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-31215)
CVEs:
- https://ubuntu.com/security/CVE-2016-10030
- https://ubuntu.com/security/CVE-2018-10995
- https://ubuntu.com/security/CVE-2016-10030
- https://ubuntu.com/security/CVE-2017-15566
- https://ubuntu.com/security/CVE-2018-7033
- https://ubuntu.com/security/CVE-2018-10995
- https://ubuntu.com/security/CVE-2019-6438
- https://ubuntu.com/security/CVE-2020-12693
- https://ubuntu.com/security/CVE-2020-27745
- https://ubuntu.com/security/CVE-2020-27746
- https://ubuntu.com/security/CVE-2021-31215
- https://ubuntu.com/security/CVE-2016-10030
- https://ubuntu.com/security/CVE-2018-10995

Title: USN-5828-1: Kerberos vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5828-1
Priorities: medium
Description:
It was discovered that Kerberos incorrectly handled certain S4U2Self
requests. An attacker could possibly use this issue to cause a denial of
service. This issue was only addressed in Ubuntu 16.04 ESM and Ubuntu
18.04 LTS. (CVE-2018-20217)

Greg Hudson discovered that Kerberos PAC implementation incorrectly
handled certain parsing operations. A remote attacker could use this
issue to cause a denial of service, or possibly execute arbitrary code.
(CVE-2022-42898)
CVEs:
- https://ubuntu.com/security/CVE-2018-20217
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2018-20217

Title: USN-5838-1: AdvanceCOMP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5838-1
Priorities: low,medium
Description:
It was discovered that AdvanceCOMP did not properly manage memory while
performing read operations on MNG file. If a user were tricked into opening
a specially crafted MNG file, a remote attacker could possibly use this
issue to cause AdvanceCOMP to crash, resulting in a denial of service.
(CVE-2022-35014, CVE-2022-35017, CVE-2022-35018, CVE-2022-35019,
CVE-2022-35020)

It was discovered that AdvanceCOMP did not properly manage memory while
performing read operations on ZIP file. If a user were tricked into opening
a specially crafted ZIP file, a remote attacker could possibly use this
issue to cause AdvanceCOMP to crash, resulting in a denial of service.
(CVE-2022-35015, CVE-2022-35016)
CVEs:
- https://ubuntu.com/security/CVE-2022-35014
- https://ubuntu.com/security/CVE-2022-35017
- https://ubuntu.com/security/CVE-2022-35018
- https://ubuntu.com/security/CVE-2022-35019
- https://ubuntu.com/security/CVE-2022-35020
- https://ubuntu.com/security/CVE-2022-35015
- https://ubuntu.com/security/CVE-2022-35016
- https://ubuntu.com/security/CVE-2022-35016
- https://ubuntu.com/security/CVE-2022-35018
- https://ubuntu.com/security/CVE-2022-35015
- https://ubuntu.com/security/CVE-2022-35014
- https://ubuntu.com/security/CVE-2022-35019
- https://ubuntu.com/security/CVE-2022-35020
- https://ubuntu.com/security/CVE-2022-35017

Title: USN-5833-1: python-future vulnerability
URL: https://ubuntu.com/security/notices/USN-5833-1
Priorities: medium
Description:
Sebastian Chnelik discovered that python-future incorrectly handled
certain HTTP header field. An attacker could possibly use this issue
to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40899

Title: USN-5836-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5836-1
Priorities: medium
Description:
It was discovered that Vim was not properly performing memory management
operations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2022-47024, CVE-2023-0049,
CVE-2023-0054, CVE-2023-0288, CVE-2023-0433)
CVEs:
- https://ubuntu.com/security/CVE-2022-47024
- https://ubuntu.com/security/CVE-2023-0049
- https://ubuntu.com/security/CVE-2023-0054
- https://ubuntu.com/security/CVE-2023-0288
- https://ubuntu.com/security/CVE-2023-0433
- https://ubuntu.com/security/CVE-2022-47024
- https://ubuntu.com/security/CVE-2023-0049
- https://ubuntu.com/security/CVE-2023-0054
- https://ubuntu.com/security/CVE-2023-0288
- https://ubuntu.com/security/CVE-2023-0433

Title: USN-5845-2: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5845-2
Priorities: high,medium
Description:
USN-5845-1 fixed several vulnerabilities in OpenSSL. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

David Benjamin discovered that OpenSSL incorrectly handled X.400 address
processing. A remote attacker could possibly use this issue to read
arbitrary memory contents or cause OpenSSL to crash, resulting in a denial
of service. (CVE-2023-0286)

Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly
handled streaming ASN.1 data. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-0215)
CVEs:
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2023-0215
- https://ubuntu.com/security/CVE-2023-0286
- https://ubuntu.com/security/CVE-2023-0215

Title: USN-5842-1: EditorConfig Core C vulnerability
URL: https://ubuntu.com/security/notices/USN-5842-1
Priorities: medium
Description:
Mark Esler and David Fernandez Gonzalez discovered that
EditorConfig Core C incorrectly handled memory when handling
certain inputs. An attacker could possibly use this issue to cause
applications using EditorConfig Core C to crash, resulting in a
denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2023-0341

Title: USN-5837-2: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-5837-2
Priorities: medium
Description:
USN-5837-1 fixed a vulnerability in Django. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Nick Pope discovered that Django incorrectly handled certain
Accept-Language headers. A remote attacker could possibly use this issue to
cause Django to consume memory, leading to a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2023-23969

621.401

Available in the Broadcom Support portal

Release Date: January 26, 2023

Metadata:

BOSH Agent Version: 2.268.116

USNs:


Title: USN-5806-1: Ruby vulnerability
URL: https://ubuntu.com/security/notices/USN-5806-1
Priorities: medium
Description:
Hiroshi Tokumaru discovered that Ruby did not properly handle certain
user input for applications the generate HTTP responses using cgi gem.
An attacker could possibly use this issue to maliciously modify the
response a user would receive from a vulnerable application.
CVEs:
- https://ubuntu.com/security/CVE-2021-33621

Title: USN-5790-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5790-1
Priorities: medium
Description:
It was discovered that the BPF verifier in the Linux kernel did not
properly handle internal data structures. A local attacker could use this
to expose sensitive information (kernel memory). (CVE-2021-4159)

It was discovered that a race condition existed in the Android Binder IPC
subsystem in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-20421)

It was discovered that the Intel 740 frame buffer driver in the Linux
kernel contained a divide by zero vulnerability. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3061)

Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3586)

Jann Horn discovered a race condition existed in the Linux kernel when
unmapping VMAs in certain situations, resulting in possible use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-39188)

It was discovered that a race condition existed in the EFI capsule loader
driver in the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-40307)

Zheng Wang and Zhuorao Yang discovered that the RealTek RTL8712U wireless
driver in the Linux kernel contained a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-4095)
CVEs:
- https://ubuntu.com/security/CVE-2021-4159
- https://ubuntu.com/security/CVE-2022-20421
- https://ubuntu.com/security/CVE-2022-3061
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-40307
- https://ubuntu.com/security/CVE-2022-4095
- https://ubuntu.com/security/CVE-2022-39188
- https://ubuntu.com/security/CVE-2022-20421
- https://ubuntu.com/security/CVE-2022-3586
- https://ubuntu.com/security/CVE-2022-4095
- https://ubuntu.com/security/CVE-2021-4159
- https://ubuntu.com/security/CVE-2022-40307
- https://ubuntu.com/security/CVE-2022-3061

Title: USN-5800-1: Heimdal vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5800-1
Priorities: medium
Description:
It was discovered that Heimdal incorrectly handled certain SPNEGO tokens. A
remote attacker could possibly use this issue to cause a denial of service.
(CVE-2021-44758)

Evgeny Legerov discovered that Heimdal incorrectly handled memory when
performing certain DES decryption operations. A remote attacker could use
this issue to cause a denial of service, or possibly execute arbitrary
code. (CVE-2022-3437)

Greg Hudson discovered that Kerberos PAC implementation used in Heimdal
incorrectly handled certain parsing operations. A remote attacker could use
this issue to cause a denial of service, or possibly execute arbitrary
code. (CVE-2022-42898)

It was discovered that Heimdal’s KDC did not properly handle certain error
conditions. A remote attacker could use this issue to cause a denial of
service, or possibly execute arbitrary code. (CVE-2022-44640)
CVEs:
- https://ubuntu.com/security/CVE-2021-44758
- https://ubuntu.com/security/CVE-2022-3437
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2022-44640
- https://ubuntu.com/security/CVE-2022-42898
- https://ubuntu.com/security/CVE-2022-44640
- https://ubuntu.com/security/CVE-2021-44758
- https://ubuntu.com/security/CVE-2022-3437

Title: USN-5795-2: Net-SNMP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5795-2
Priorities: medium
Description:
USN-5795-1 and 5543-1 fixed several vulnerabilities in Net-SNMP. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Net-SNMP incorrectly handled certain requests. A
remote attacker could possibly use these issues to cause Net-SNMP to crash,
resulting in a denial of service.

Yu Zhang and Nanyu Zhong discovered that Net-SNMP incorrectly handled
memory operations when processing certain requests. A remote attacker could
use this issue to cause Net-SNMP to crash, resulting in a denial of
service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-24805
- https://ubuntu.com/security/CVE-2022-24810
- https://ubuntu.com/security/CVE-2022-44793
- https://ubuntu.com/security/CVE-2022-24807
- https://ubuntu.com/security/CVE-2022-24808
- https://ubuntu.com/security/CVE-2022-44792
- https://ubuntu.com/security/CVE-2022-24809
- https://ubuntu.com/security/CVE-2022-24806

Title: USN-5817-1: Setuptools vulnerability
URL: https://ubuntu.com/security/notices/USN-5817-1
Priorities: medium
Description:
Sebastian Chnelik discovered that setuptools incorrectly handled
certain regex inputs. An attacker could possibly use this issue
to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-40897

Title: USN-5804-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5804-1
Priorities: high,medium
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-3643

Title: USN-5794-1: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5794-1
Priorities: high,medium
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-43945

Title: USN-5802-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5802-1
Priorities: high,medium
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-43945

Title: USN-5813-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5813-1
Priorities: high,medium
Description:
It was discovered that the NFSD implementation in the Linux kernel did not
properly handle some RPC messages, leading to a buffer overflow. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-43945)

Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation
in the Linux kernel contained multiple use-after-free vulnerabilities. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-42896)

It was discovered that the Xen netback driver in the Linux kernel did not
properly handle packets structured in certain ways. An attacker in a guest
VM could possibly use this to cause a denial of service (host NIC
availability). (CVE-2022-3643)

It was discovered that an integer overflow vulnerability existed in the
Bluetooth subsystem in the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2022-45934)
CVEs:
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-42896
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-45934
- https://ubuntu.com/security/CVE-2022-43945
- https://ubuntu.com/security/CVE-2022-3643
- https://ubuntu.com/security/CVE-2022-42896

Title: USN-5811-2: Sudo vulnerability
URL: https://ubuntu.com/security/notices/USN-5811-2
Priorities: medium
Description:
USN-5811-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
handled user-specified editors when using the sudoedit command. A local
attacker that has permission to use the sudoedit command could possibly use
this issue to edit arbitrary files. (CVE-2023-22809)
CVEs:
- https://ubuntu.com/security/CVE-2023-22809
- https://ubuntu.com/security/CVE-2023-22809

621.376

Available in the Broadcom Support portal

Release Date: January 05, 2023

Metadata:

BOSH Agent Version: 2.268.112

USNs:


Title: USN-5769-1: protobuf vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5769-1
Priorities: low
Description:
It was discovered that protobuf did not properly manage memory when serializing
large messages. An attacker could possibly use this issue to cause applications
using protobuf to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2015-5237)

It was discovered that protobuf did not properly manage memory when parsing
specifically crafted messages. An attacker could possibly use this issue to
cause applications using protobuf to crash, resulting in a denial of service.
(CVE-2022-1941)
CVEs:
- https://ubuntu.com/security/CVE-2015-5237
- https://ubuntu.com/security/CVE-2022-1941
- https://ubuntu.com/security/CVE-2022-1941
- https://ubuntu.com/security/CVE-2015-5237

Title: USN-5768-1: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5768-1
Priorities: negligible,low
Description:
Jan Engelhardt, Tavis Ormandy, and others discovered that the GNU C Library
iconv feature incorrectly handled certain input sequences. An attacker
could possibly use this issue to cause the GNU C Library to hang or crash,
resulting in a denial of service. (CVE-2016-10228, CVE-2019-25013,
CVE-2020-27618)

It was discovered that the GNU C Library did not properly handled DNS
responses when ENDS0 is enabled. An attacker could possibly use this issue
to cause fragmentation-based attacks. (CVE-2017-12132)
CVEs:
- https://ubuntu.com/security/CVE-2016-10228
- https://ubuntu.com/security/CVE-2019-25013
- https://ubuntu.com/security/CVE-2020-27618
- https://ubuntu.com/security/CVE-2017-12132
- https://ubuntu.com/security/CVE-2019-25013
- https://ubuntu.com/security/CVE-2016-10228
- https://ubuntu.com/security/CVE-2020-27618
- https://ubuntu.com/security/CVE-2017-12132

Title: USN-5771-1: Squid regression
URL: https://ubuntu.com/security/notices/USN-5771-1
Priorities: low
Description:
USN-3557-1 fixed vulnerabilities in Squid. This update introduced a regression
which could cause the cache log to be filled with many Vary loop messages. This
update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Mathias Fischer discovered that Squid incorrectly handled certain long
strings in headers. A malicious remote server could possibly cause Squid to
crash, resulting in a denial of service. This issue was only addressed in
Ubuntu 16.04 LTS. (CVE-2016-2569)

William Lima discovered that Squid incorrectly handled XML parsing when
processing Edge Side Includes (ESI). A malicious remote server could
possibly cause Squid to crash, resulting in a denial of service. This issue
was only addressed in Ubuntu 16.04 LTS. (CVE-2016-2570)

Alex Rousskov discovered that Squid incorrectly handled response-parsing
failures. A malicious remote server could possibly cause Squid to crash,
resulting in a denial of service. This issue only applied to Ubuntu 16.04
LTS. (CVE-2016-2571)

Santiago Ruano Rincón discovered that Squid incorrectly handled certain
Vary headers. A remote attacker could possibly use this issue to cause
Squid to crash, resulting in a denial of service. This issue was only
addressed in Ubuntu 16.04 LTS. (CVE-2016-3948)

Louis Dion-Marcil discovered that Squid incorrectly handled certain Edge
Side Includes (ESI) responses. A malicious remote server could possibly
cause Squid to crash, resulting in a denial of service. (CVE-2018-1000024)

Louis Dion-Marcil discovered that Squid incorrectly handled certain Edge
Side Includes (ESI) responses. A malicious remote server could possibly
cause Squid to crash, resulting in a denial of service. (CVE-2018-1000027)
CVEs:
- https://ubuntu.com/security/CVE-2016-2569
- https://ubuntu.com/security/CVE-2016-2570
- https://ubuntu.com/security/CVE-2016-2571
- https://ubuntu.com/security/CVE-2016-3948
- https://ubuntu.com/security/CVE-2018-1000024
- https://ubuntu.com/security/CVE-2018-1000027

Title: USN-5770-1: GCC vulnerability
URL: https://ubuntu.com/security/notices/USN-5770-1
Priorities: low
Description:
Todd Eisenberger discovered that certain versions of GNU Compiler
Collection (GCC) could be made to clobber the status flag of RDRAND
and RDSEED with specially crafted input. This could potentially lead
to less randomness in random number generation.
CVEs:
- https://ubuntu.com/security/CVE-2017-11671

Title: USN-5772-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5772-1
Priorities: medium,low
Description:
It was discovered that QEMU incorrectly handled bulk transfers from SPICE
clients. A remote attacker could use this issue to cause QEMU to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2021-3682)

It was discovered that QEMU did not properly manage memory when it
transfers the USB packets. A malicious guest attacker could use this issue
to cause QEMU to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS and Ubuntu 22.04 LTS. (CVE-2021-3750)

It was discovered that the QEMU SCSI device emulation incorrectly handled
certain MODE SELECT commands. An attacker inside the guest could possibly
use this issue to cause QEMU to crash, resulting in a denial of service.
This issue only affected Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
(CVE-2021-3930)

It was discovered that QEMU did not properly manage memory when it
processing repeated messages to cancel the current SCSI request. A
malicious privileged guest attacker could use this issue to cause QEMU to
crash, resulting in a denial of service. (CVE-2022-0216)

It was discovered that QEMU did not properly manage memory when it
using Tulip device emulation. A malicious guest attacker could use this
issue to cause QEMU to crash, resulting in a denial of service. This issue
only affected Ubuntu 22.10. (CVE-2022-2962)

It was discovered that QEMU did not properly manage memory when processing
ClientCutText messages. A attacker could use this issue to cause QEMU to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 22.10. (CVE-2022-3165)
CVEs:
- https://ubuntu.com/security/CVE-2021-3682
- https://ubuntu.com/security/CVE-2021-3750
- https://ubuntu.com/security/CVE-2021-3930
- https://ubuntu.com/security/CVE-2022-0216
- https://ubuntu.com/security/CVE-2022-2962
- https://ubuntu.com/security/CVE-2022-3165
- https://ubuntu.com/security/CVE-2021-3682
- https://ubuntu.com/security/CVE-2022-3165
- https://ubuntu.com/security/CVE-2022-0216
- https://ubuntu.com/security/CVE-2021-3750
- https://ubuntu.com/security/CVE-2021-3930
- https://ubuntu.com/security/CVE-2022-2962

Title: USN-5775-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5775-1
Priorities: medium,low
Description:
It was discovered that Vim uses freed memory in recurisve substitution of
specially crafted patterns. An attacker could possbly use this to crash Vim
and cause denial of service. (CVE-2022-2345)

It was discovered that Vim makes illegal memory calls when patterns start
with an illegal byte. An attacker could possibly use this to crash Vim,
access or modify memory, or execute arbitrary commands. (CVE-2022-2581)

It was discovered that Vim could be made to crash when parsing invalid line
numbers. An attacker could possbly use this to crash Vim and cause denial
of service. (CVE-2022-3099)

It was discovered that Vim uses freed memory when autocmd changes a mark.
An attacker could possbly use this to crash Vim and cause denial of
service. (CVE-2022-3256)

It was discovered the Vim uses an incorrect array index when window width
is negative. A local attacker could possbly use this to crash Vim and cause
denial of service. (CVE-2022-3324)

It was discoverd that certain buffers could be sent to the wrong window. An
attacker with local access could use this to send messages to the wrong
window. (CVE-2022-3591)
CVEs:
- https://ubuntu.com/security/CVE-2022-2345
- https://ubuntu.com/security/CVE-2022-2581
- https://ubuntu.com/security/CVE-2022-3099
- https://ubuntu.com/security/CVE-2022-3256
- https://ubuntu.com/security/CVE-2022-3324
- https://ubuntu.com/security/CVE-2022-3591
- https://ubuntu.com/security/CVE-2022-3591
- https://ubuntu.com/security/CVE-2022-2581
- https://ubuntu.com/security/CVE-2022-2345
- https://ubuntu.com/security/CVE-2022-3256
- https://ubuntu.com/security/CVE-2022-3324
- https://ubuntu.com/security/CVE-2022-3099

Title: USN-5766-1: Heimdal vulnerability
URL: https://ubuntu.com/security/notices/USN-5766-1
Priorities: medium
Description:
It was discovered that Heimdal did not properly manage memory when
normalizing Unicode. An attacker could possibly use this issue to
cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-41916

Title: USN-5767-2: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-5767-2
Priorities: medium
Description:
USN-5767-1 fixed a vulnerability in Python. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Python incorrectly handled certain IDNA inputs.
An attacker could possibly use this issue to expose sensitive information
denial of service, or cause a crash.
(CVE-2022-45061)
CVEs:
- https://ubuntu.com/security/CVE-2022-45061
- https://ubuntu.com/security/CVE-2022-45061

Title: USN-5781-1: Emacs vulnerability
URL: https://ubuntu.com/security/notices/USN-5781-1
Priorities: medium
Description:
It was discovered that Emacs did not properly manage certain inputs.
An attacker could possibly use this issue to execute arbitrary commands.
CVEs:
- https://ubuntu.com/security/CVE-2022-45939

621.364

Available in the Broadcom Support portal

Release Date: December 08, 2022

Fixes:

  • Preserve extended attributes when migrating disk data

Metadata:

BOSH Agent Version: 2.268.109

USNs:


Title: USN-5762-1: GNU binutils vulnerability
URL: https://ubuntu.com/security/notices/USN-5762-1
Priorities: medium
Description:
It was discovered that GNU binutils incorrectly handled certain COFF files.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-38533

Title: USN-5760-2: libxml2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5760-2
Priorities: medium
Description:
USN-5760-1 fixed vulnerabilities in libxml2. This update provides the
corresponding updates for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to expose sensitive information
or cause a crash. (CVE-2022-40303)

It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2022-40304)
CVEs:
- https://ubuntu.com/security/CVE-2022-40303
- https://ubuntu.com/security/CVE-2022-40304
- https://ubuntu.com/security/CVE-2022-40304
- https://ubuntu.com/security/CVE-2022-40303

621.359

Available in the Broadcom Support portal

Release Date: December 05, 2022

Metadata:

BOSH Agent Version: 2.268.108

USNs:


Title: USN-5745-1: shadow vulnerability
URL: https://ubuntu.com/security/notices/USN-5745-1
Priorities: low
Description:
Florian Weimer discovered that shadow was not properly copying and removing
user directory trees, which could lead to a race condition. A local attacker
could possibly use this issue to setup a symlink attack and alter or remove
directories without authorization.
CVEs:
- https://ubuntu.com/security/CVE-2013-4235

Title: USN-5746-1: HarfBuzz vulnerability
URL: https://ubuntu.com/security/notices/USN-5746-1
Priorities: low
Description:
Behzad Najjarpour Jabbari discovered that HarfBuzz incorrectly handled
certain inputs. A remote attacker could possibly use this issue to cause
a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2015-9274

Title: USN-5747-1: Bind vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5747-1
Priorities: medium,low
Description:
It was discovered that Bind incorrectly handled large query name when using
lightweight resolver protocol. A remote attacker could use this issue to
consume resources, leading to a denial of service. (CVE-2016-2775)

It was discovered that Bind incorrectly handled large zone data size
received via AXFR response. A remote authenticated attacker could use this
issue to consume resources, leading to a denial of service. This issue only
affected Ubuntu 16.04 LTS. (CVE-2016-6170)
CVEs:
- https://ubuntu.com/security/CVE-2016-2775
- https://ubuntu.com/security/CVE-2016-6170
- https://ubuntu.com/security/CVE-2016-2775
- https://ubuntu.com/security/CVE-2016-6170

Title: USN-5737-1: APR-util vulnerability
URL: https://ubuntu.com/security/notices/USN-5737-1
Priorities: low
Description:
It was discovered that APR-util did not properly handle memory when using
SDBM database files. A local attacker with write access to the database
can make a program or process using these functions crash, and cause a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2017-12618

Title: USN-5744-1: libICE vulnerability
URL: https://ubuntu.com/security/notices/USN-5744-1
Priorities: low
Description:
It was discovered that libICE was using a weak mechanism to generate the
session cookies. A local attacker could possibly use this issue to perform
a privilege escalation attack.
CVEs:
- https://ubuntu.com/security/CVE-2017-2626

Title: USN-5733-1: FLAC vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5733-1
Priorities: low
Description:
It was discovered that FLAC was not properly performing memory management
operations, which could result in a memory leak. An attacker could possibly
use this issue to cause FLAC to consume resources, leading to a denial of
service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and
Ubuntu 18.04 LTS. (CVE-2017-6888)

It was discovered that FLAC was not properly performing bounds checking
operations when decoding data. If a user or automated system were tricked
into processing a specially crafted file, an attacker could possibly use
this issue to expose sensitive information or to cause FLAC to crash,
leading to a denial of service. This issue only affected Ubuntu 14.04 ESM,
Ubuntu 16.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-0499)

It was discovered that FLAC was not properly performing bounds checking
operations when encoding data. If a user or automated system were tricked
into processing a specially crafted file, an attacker could possibly use
this issue to expose sensitive information or to cause FLAC to crash,
leading to a denial of service. (CVE-2021-0561)
CVEs:
- https://ubuntu.com/security/CVE-2017-6888
- https://ubuntu.com/security/CVE-2020-0499
- https://ubuntu.com/security/CVE-2021-0561
- https://ubuntu.com/security/CVE-2017-6888
- https://ubuntu.com/security/CVE-2020-0499
- https://ubuntu.com/security/CVE-2021-0561

Title: USN-5749-1: libsamplerate vulnerability
URL: https://ubuntu.com/security/notices/USN-5749-1
Priorities: low
Description:
Erik de Castro Lopo and Agostino Sarubbo discovered that libsamplerate
did not properly perform bounds checking. If a user were tricked into
processing a specially crafted audio file, an attacker could possibly
use this issue to cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2017-7697

Title: USN-5736-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5736-1
Priorities: medium,low
Description:
It was discovered that ImageMagick incorrectly handled certain values
when processing PDF files. If a user or automated system using ImageMagick
were tricked into opening a specially crafted PDF file, an attacker could
exploit this to cause a denial of service. This issue only affected Ubuntu
14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2021-20224)

Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2021-20241)

Zhang Xiaohui discovered that ImageMagick incorrectly handled certain
values when processing image data. If a user or automated system using
ImageMagick were tricked into opening a specially crafted image, an
attacker could exploit this to cause a denial of service. This issue only
affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10.
(CVE-2021-20243)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
22.10. (CVE-2021-20244)

It was discovered that ImageMagick could be made to divide by zero when
processing crafted files. By tricking a user into opening a specially
crafted image file, an attacker could crash the application causing a
denial of service. This issue only affected Ubuntu 22.10. (CVE-2021-20245)

It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 22.10.
(CVE-2021-20246)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
22.10. (CVE-2021-20309)

It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. This issue only affected Ubuntu 22.10.
(CVE-2021-20312)

It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. This issue only
affected Ubuntu 22.10. (CVE-2021-20313)

It was discovered that ImageMagick did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted file using the convert command, an attacker could possibly use
this issue to cause ImageMagick to crash, resulting in a denial of
service. This issue only affected Ubuntu 22.10. (CVE-2021-3574)

It was discovered that ImageMagick did not use the correct rights when
specifically excluded by a module policy. An attacker could use this issue
to read and write certain restricted files. This issue only affected
Ubuntu 22.10. (CVE-2021-39212)

It was discovered that ImageMagick incorrectly handled certain values
when processing specially crafted SVG files. By tricking a user into
opening a specially crafted SVG file, an attacker could crash the
application causing a denial of service. This issue only affected Ubuntu
22.10. (CVE-2021-4219)

It was discovered that ImageMagick did not properly manage memory under
certain circumstances. If a user were tricked into opening a specially
crafted DICOM file, an attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of servicei, or expose sensitive
information. This issue only affected Ubuntu 22.10. (CVE-2022-1114)

It was discovered that ImageMagick incorrectly handled memory under
certain circumstances. If a user were tricked into opening a specially
crafted image file, an attacker could possibly exploit this issue to cause
a denial of service or other unspecified impact. This issue only affected
Ubuntu 22.10. (CVE-2022-28463)

It was discovered that ImageMagick incorrectly handled certain values.
If a user were tricked into processing a specially crafted image file,
an attacker could possibly exploit this issue to cause a denial of service
or other unspecified impact. This issue only affected Ubuntu 14.04 ESM,
Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32545, CVE-2022-32546)

It was discovered that ImageMagick incorrectly handled memory under
certain circumstances. If a user were tricked into processing a specially
crafted image file, an attacker could possibly exploit this issue to cause
a denial of service or other unspecified impact. This issue only affected
Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 22.10. (CVE-2022-32547)
CVEs:
- https://ubuntu.com/security/CVE-2021-20224
- https://ubuntu.com/security/CVE-2021-20241
- https://ubuntu.com/security/CVE-2021-20243
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2021-20245
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-3574
- https://ubuntu.com/security/CVE-2021-39212
- https://ubuntu.com/security/CVE-2021-4219
- https://ubuntu.com/security/CVE-2022-1114
- https://ubuntu.com/security/CVE-2022-28463
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-32546
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-20224
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-4219
- https://ubuntu.com/security/CVE-2022-28463
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2021-20243
- https://ubuntu.com/security/CVE-2021-3574
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-32546
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2021-20245
- https://ubuntu.com/security/CVE-2021-20241
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2022-1114
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2021-39212

Title: USN-5750-1: GnuTLS vulnerability
URL: https://ubuntu.com/security/notices/USN-5750-1
Priorities: low
Description:
It was discovered that GnuTLS incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to cause GnuTLS
to crash, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2021-4209

Title: USN-5723-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5723-1
Priorities: medium,low
Description:
It was discovered that Vim could be made to crash when searching specially
crafted patterns. An attacker could possibly use this to crash Vim and
cause denial of service. (CVE-2022-1674)

It was discovered that there existed a NULL pointer dereference in Vim. An
attacker could possibly use this to crash Vim and cause denial of service.
(CVE-2022-1725)

It was discovered that there existed a buffer over-read in Vim when
searching specially crafted patterns. An attacker could possibly use this
to crash Vim and cause denial of service. (CVE-2022-2124)

It was discovered that there existed a heap buffer overflow in Vim when
auto-indenting lisp. An attacker could possibly use this to crash Vim and
cause denial of service. (CVE-2022-2125)

It was discovered that there existed an out of bounds read in Vim when
performing spelling suggestions. An attacker could possibly use this to
crash Vim and cause denial of service. (CVE-2022-2126)

It was discovered that Vim accessed invalid memory when executing specially
crafted command line expressions. An attacker could possibly use this to
crash Vim, access or modify memory, or execute arbitrary commands.
(CVE-2022-2175)

It was discovered that there existed an out-of-bounds read in Vim when
auto-indenting lisp. An attacker could possibly use this to crash Vim,
access or modify memory, or execute arbitrary commands. (CVE-2022-2183)


It was discovered that Vim accessed invalid memory when terminal size
changed. An attacker could possibly use this to crash Vim, access or modify
memory, or execute arbitrary commands. (CVE-2022-2206)

It was discovered that there existed a stack buffer overflow in Vim’s
spelldump. An attacker could possibly use this to crash Vim and cause
denial of service. (CVE-2022-2304)
CVEs:
- https://ubuntu.com/security/CVE-2022-1674
- https://ubuntu.com/security/CVE-2022-1725
- https://ubuntu.com/security/CVE-2022-2124
- https://ubuntu.com/security/CVE-2022-2125
- https://ubuntu.com/security/CVE-2022-2126
- https://ubuntu.com/security/CVE-2022-2175
- https://ubuntu.com/security/CVE-2022-2183
- https://ubuntu.com/security/CVE-2022-2206
- https://ubuntu.com/security/CVE-2022-2304
- https://ubuntu.com/security/CVE-2022-1674
- https://ubuntu.com/security/CVE-2022-2125
- https://ubuntu.com/security/CVE-2022-2304
- https://ubuntu.com/security/CVE-2022-1725
- https://ubuntu.com/security/CVE-2022-2124
- https://ubuntu.com/security/CVE-2022-2126
- https://ubuntu.com/security/CVE-2022-2183
- https://ubuntu.com/security/CVE-2022-2175
- https://ubuntu.com/security/CVE-2022-2206

Title: USN-5727-2: Linux kernel (GCP) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5727-2
Priorities: medium
Description:
It was discovered that a race condition existed in the instruction emulator
of the Linux kernel on Arm 64-bit systems. A local attacker could use this
to cause a denial of service (system crash). (CVE-2022-20422)

It was discovered that the KVM implementation in the Linux kernel did not
properly handle virtual CPUs without APICs in certain situations. A local
attacker could possibly use this to cause a denial of service (host system
crash). (CVE-2022-2153)

Hao Sun and Jiacheng Xu discovered that the NILFS file system
implementation in the Linux kernel contained a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-2978)

Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2022-3028)

It was discovered that the IDT 77252 ATM PCI device driver in the Linux
kernel did not properly remove any pending timers during device exit,
resulting in a use-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-3635)

It was discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36879)

Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX
storage controller driver in the Linux kernel did not properly handle
certain structures. A local attacker could potentially use this to expose
sensitive information (kernel memory). (CVE-2022-40768)
CVEs:
- https://ubuntu.com/security/CVE-2022-20422
- https://ubuntu.com/security/CVE-2022-2153
- https://ubuntu.com/security/CVE-2022-2978
- https://ubuntu.com/security/CVE-2022-3028
- https://ubuntu.com/security/CVE-2022-3635
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-40768
- https://ubuntu.com/security/CVE-2022-3028
- https://ubuntu.com/security/CVE-2022-20422
- https://ubuntu.com/security/CVE-2022-2978
- https://ubuntu.com/security/CVE-2022-2153
- https://ubuntu.com/security/CVE-2022-40768
- https://ubuntu.com/security/CVE-2022-3635
- https://ubuntu.com/security/CVE-2022-36879

Title: USN-5727-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5727-1
Priorities: medium
Description:
It was discovered that a race condition existed in the instruction emulator
of the Linux kernel on Arm 64-bit systems. A local attacker could use this
to cause a denial of service (system crash). (CVE-2022-20422)

It was discovered that the KVM implementation in the Linux kernel did not
properly handle virtual CPUs without APICs in certain situations. A local
attacker could possibly use this to cause a denial of service (host system
crash). (CVE-2022-2153)

Hao Sun and Jiacheng Xu discovered that the NILFS file system
implementation in the Linux kernel contained a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-2978)

Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2022-3028)

It was discovered that the IDT 77252 ATM PCI device driver in the Linux
kernel did not properly remove any pending timers during device exit,
resulting in a use-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-3635)

It was discovered that the Netlink Transformation (XFRM) subsystem in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2022-36879)

Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX
storage controller driver in the Linux kernel did not properly handle
certain structures. A local attacker could potentially use this to expose
sensitive information (kernel memory). (CVE-2022-40768)
CVEs:
- https://ubuntu.com/security/CVE-2022-20422
- https://ubuntu.com/security/CVE-2022-2153
- https://ubuntu.com/security/CVE-2022-2978
- https://ubuntu.com/security/CVE-2022-3028
- https://ubuntu.com/security/CVE-2022-3635
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-40768
- https://ubuntu.com/security/CVE-2022-3028
- https://ubuntu.com/security/CVE-2022-2153
- https://ubuntu.com/security/CVE-2022-36879
- https://ubuntu.com/security/CVE-2022-3635
- https://ubuntu.com/security/CVE-2022-20422
- https://ubuntu.com/security/CVE-2022-40768
- https://ubuntu.com/security/CVE-2022-2978

Title: USN-5753-1: snapd vulnerability
URL: https://ubuntu.com/security/notices/USN-5753-1
Priorities: high
Description:
The Qualys Research Team discovered that a race condition existed in the
snapd snap-confine binary when preparing the private /tmp mount for a
snap. A local attacker could possibly use this issue to escalate privileges
and execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-3328

Title: USN-5740-1: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5740-1
Priorities: medium
Description:
It was discovered that X.Org X Server incorrectly handled certain inputs.
An attacker could use these issues to cause the server to crash, resulting
in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-3550
- https://ubuntu.com/security/CVE-2022-3551

Title: USN-5686-2: Git vulnerability
URL: https://ubuntu.com/security/notices/USN-5686-2
Priorities: medium
Description:
USN-5686-1 fixed several vulnerabilities in Git. This update
provides the corresponding fix for CVE-2022-39260 on Ubuntu 16.04 ESM.

Original advisory details:

Kevin Backhouse discovered that Git incorrectly handled certain command
strings. An attacker could possibly use this issue to cause a crash or
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-39260
- https://ubuntu.com/security/CVE-2022-39260

Title: USN-5735-1: Sysstat vulnerability
URL: https://ubuntu.com/security/notices/USN-5735-1
Priorities: medium
Description:
It was discovered that Sysstat did not properly check bounds
when perfoming certain arithmetic operations on 32 bit systems.
An attacker could possibly use this issue to cause a crash or
arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-39377

Title: USN-5722-1: nginx vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5722-1
Priorities: medium
Description:
It was discovered that nginx incorrectly handled certain memory operations in
the ngx_http_mp4_module module. A local attacker could possibly use this issue
with a specially crafted mp4 file to cause nginx to crash, stop responding, or
access arbitrary memory. (CVE-2022-41741, CVE-2022-41742)
CVEs:
- https://ubuntu.com/security/CVE-2022-41741
- https://ubuntu.com/security/CVE-2022-41742
- https://ubuntu.com/security/CVE-2022-41741
- https://ubuntu.com/security/CVE-2022-41742

Title: USN-5757-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5757-2
Priorities: high,medium,low
Description:
Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)

It was discovered that the video4linux driver for Empia based TV cards in
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3239)

It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)

It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)

It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)

It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)

It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)

It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)
CVEs:
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3239
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3239
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3567

Title: USN-5758-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5758-1
Priorities: high,medium,low
Description:
Jann Horn discovered that the Linux kernel did not properly track memory
allocations for anonymous VMA mappings in some situations, leading to
potential data structure reuse. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-42703)

It was discovered that the video4linux driver for Empia based TV cards in
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2022-3239)

It was discovered that a memory leak existed in the IPv6 implementation of
the Linux kernel. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-3524)

It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a use-after-free vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-3564)

It was discovered that the ISDN implementation of the Linux kernel
contained a use-after-free vulnerability. A privileged user could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-3565)

It was discovered that the TCP implementation in the Linux kernel contained
a data race condition. An attacker could possibly use this to cause
undesired behaviors. (CVE-2022-3566)

It was discovered that the IPv6 implementation in the Linux kernel
contained a data race condition. An attacker could possibly use this to
cause undesired behaviors. (CVE-2022-3567)

It was discovered that the Realtek RTL8152 USB Ethernet adapter driver in
the Linux kernel did not properly handle certain error conditions. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (memory exhaustion). (CVE-2022-3594)

It was discovered that a null pointer dereference existed in the NILFS2
file system implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2022-3621)

It was discovered that the IDT 77252 ATM PCI device driver in the Linux
kernel did not properly remove any pending timers during device exit,
resulting in a use-after-free vulnerability. A local attacker could
possibly use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-3635)

Khalid Masum discovered that the NILFS2 file system implementation in the
Linux kernel did not properly handle certain error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2022-3649)

Xingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX
storage controller driver in the Linux kernel did not properly handle
certain structures. A local attacker could potentially use this to expose
sensitive information (kernel memory). (CVE-2022-40768)

It was discovered that the USB monitoring (usbmon) component in the Linux
kernel did not properly set permissions on memory mapped in to user space
processes. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-43750)
CVEs:
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3239
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3635
- https://ubuntu.com/security/CVE-2022-3649
- https://ubuntu.com/security/CVE-2022-40768
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-3621
- https://ubuntu.com/security/CVE-2022-3239
- https://ubuntu.com/security/CVE-2022-3566
- https://ubuntu.com/security/CVE-2022-40768
- https://ubuntu.com/security/CVE-2022-3594
- https://ubuntu.com/security/CVE-2022-3635
- https://ubuntu.com/security/CVE-2022-43750
- https://ubuntu.com/security/CVE-2022-3564
- https://ubuntu.com/security/CVE-2022-3567
- https://ubuntu.com/security/CVE-2022-42703
- https://ubuntu.com/security/CVE-2022-3524
- https://ubuntu.com/security/CVE-2022-3565
- https://ubuntu.com/security/CVE-2022-3649

Title: USN-5638-3: Expat vulnerability
URL: https://ubuntu.com/security/notices/USN-5638-3
Priorities: medium
Description:
USN-5638-1 fixed a vulnerability in Expat. This update provides
the corresponding updates for Ubuntu 16.04 ESM, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-43680)
This update also fixes a minor regression introduced in
Ubuntu 18.04 LTS.

We apologize for the inconvenience.

Original advisory details:

Rhodri James discovered that Expat incorrectly handled memory when
processing certain malformed XML files. An attacker could possibly
use this issue to cause a crash or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-43680
- https://ubuntu.com/security/CVE-2022-43680

Title: USN-5718-2: pixman vulnerability
URL: https://ubuntu.com/security/notices/USN-5718-2
Priorities: medium
Description:
USN-5718-1 fixed a vulnerability in pixman. This update provides the
corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Maddie Stone discovered that pixman incorrectly handled certain memory
operations. A remote attacker could use this issue to cause pixman to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2022-44638

621.330

Available in the Broadcom Support portal

Release Date: November 16, 2022

Fixes:

The Linux kernel slab memory leak present in versions 621.241 through 621.305 is fixed in this version.

Not all workloads or configurations were affected by this issue. If you are using one of the affected versions and would like information about how to determine if you are affected by this issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

Metadata:

BOSH Agent Version: 2.268.102

USNs:


Title: USN-5701-1: Jinja2 vulnerability
URL: https://ubuntu.com/security/notices/USN-5701-1
Priorities: low
Description:
Yeting Li discovered that Jinja2 incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-28493

Title: USN-5699-1: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5699-1
Priorities: low
Description:
Jan Engelhardt, Tavis Ormandy, and others discovered that the GNU C Library
iconv feature incorrectly handled certain input sequences. An attacker
could possibly use this issue to cause the GNU C Library to hang or crash,
resulting in a denial of service. (CVE-2021-3326)

It was discovered that the GNU C Library nscd daemon incorrectly handled
certain netgroup lookups. An attacker could possibly use this issue to
cause the GNU C Library to crash, resulting in a denial of service.
(CVE-2021-35942)
CVEs:
- https://ubuntu.com/security/CVE-2021-3326
- https://ubuntu.com/security/CVE-2021-35942
- https://ubuntu.com/security/CVE-2021-3326
- https://ubuntu.com/security/CVE-2021-35942

Title: USN-5707-1: Libtasn1 vulnerability
URL: https://ubuntu.com/security/notices/USN-5707-1
Priorities: low
Description:
It was discovered that Libtasn1 did not properly perform bounds
checking. An attacker could possibly use this issue to cause a
crash.
CVEs:
- https://ubuntu.com/security/CVE-2021-46848

Title: USN-5696-2: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5696-2
Priorities: medium
Description:
USN-5696-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.7.40 in Ubuntu 16.04 ESM.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-40.html
https://www.oracle.com/security-alerts/cpuoct2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21617
- https://ubuntu.com/security/CVE-2022-21589
- https://ubuntu.com/security/CVE-2022-21592
- https://ubuntu.com/security/CVE-2022-21608

Title: USN-5719-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5719-1
Priorities: medium
Description:
It was discovered that OpenJDK incorrectly handled long client hostnames.
An attacker could possibly use this issue to cause the corruption of
sensitive information. (CVE-2022-21619)

It was discovered that OpenJDK incorrectly randomized DNS port numbers. A
remote attacker could possibly use this issue to perform spoofing attacks.
(CVE-2022-21624)

It was discovered that OpenJDK did not limit the number of connections
accepted from HTTP clients. An attacker could possibly use this issue to
cause a denial of service. (CVE-2022-21628)

It was discovered that OpenJDK incorrectly handled X.509 certificates. An
attacker could possibly use this issue to cause a denial of service. This
issue only affected OpenJDK 8 and OpenJDK 11. (CVE-2022-21626)

It was discovered that OpenJDK incorrectly handled cached server
connections. An attacker could possibly use this issue to perform spoofing
attacks. This issue only affected OpenJDK 11, OpenJDK 17 and OpenJDK 19.
(CVE-2022-39399)

It was discovered that OpenJDK incorrectly handled byte conversions. An
attacker could possibly use this issue to obtain sensitive information.
This issue only affected OpenJDK 11, OpenJDK 17 and OpenJDK 19.
(CVE-2022-21618)
CVEs:
- https://ubuntu.com/security/CVE-2022-21619
- https://ubuntu.com/security/CVE-2022-21624
- https://ubuntu.com/security/CVE-2022-21628
- https://ubuntu.com/security/CVE-2022-21626
- https://ubuntu.com/security/CVE-2022-39399
- https://ubuntu.com/security/CVE-2022-21618
- https://ubuntu.com/security/CVE-2022-21618
- https://ubuntu.com/security/CVE-2022-21626
- https://ubuntu.com/security/CVE-2022-39399
- https://ubuntu.com/security/CVE-2022-21628
- https://ubuntu.com/security/CVE-2022-21619
- https://ubuntu.com/security/CVE-2022-21624

Title: USN-5714-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5714-1
Priorities: medium,low
Description:
It was discovered that LibTIFF incorrectly handled certain memory operations
when using tiffcrop. An attacker could trick a user into processing a specially
crafted tiff image file and potentially use this issue to cause a denial of
service. This issue only affected Ubuntu 22.10. (CVE-2022-2519, CVE-2022-2520,
CVE-2022-2521, CVE-2022-2953)

It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffcrop. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash. This
issue only affected to Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-2867, CVE-2022-2868, CVE-2022-2869)

It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffsplit. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash. This
issue only affected to Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-34526)

Chintan Shah discovered that LibTIFF incorrectly handled memory in certain
conditions when using tiffcrop. An attacker could trick a user into processing
a specially crafted image file and potentially use this issue to allow for
information disclosure or to cause the application to crash. This issue only
affected to Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04
LTS and Ubuntu 22.10. (CVE-2022-3570)

It was discovered that LibTIFF incorrectly handled memory in certain conditions
when using tiffcrop. An attacker could trick a user into processing a specially
crafted tiff file and potentially use this issue to cause a denial of service.
This issue only affected to Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-3598)

It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffcrop. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash.
(CVE-2022-3599)

It was discovered that LibTIFF did not properly perform bounds checking in
certain operations when using tiffcrop. An attacker could trick a user into
processing a specially crafted tiff image file and potentially use this issue
to allow for information disclosure or to cause the application to crash. This
issue only affected to Ubuntu 22.10. (CVE-2022-3626, CVE-2022-3627)
CVEs:
- https://ubuntu.com/security/CVE-2022-2519
- https://ubuntu.com/security/CVE-2022-2520
- https://ubuntu.com/security/CVE-2022-2521
- https://ubuntu.com/security/CVE-2022-2953
- https://ubuntu.com/security/CVE-2022-2867
- https://ubuntu.com/security/CVE-2022-2868
- https://ubuntu.com/security/CVE-2022-2869
- https://ubuntu.com/security/CVE-2022-34526
- https://ubuntu.com/security/CVE-2022-3570
- https://ubuntu.com/security/CVE-2022-3598
- https://ubuntu.com/security/CVE-2022-3599
- https://ubuntu.com/security/CVE-2022-3626
- https://ubuntu.com/security/CVE-2022-3627
- https://ubuntu.com/security/CVE-2022-2869
- https://ubuntu.com/security/CVE-2022-3627
- https://ubuntu.com/security/CVE-2022-3599
- https://ubuntu.com/security/CVE-2022-2519
- https://ubuntu.com/security/CVE-2022-3598
- https://ubuntu.com/security/CVE-2022-34526
- https://ubuntu.com/security/CVE-2022-2867
- https://ubuntu.com/security/CVE-2022-2868
- https://ubuntu.com/security/CVE-2022-2520
- https://ubuntu.com/security/CVE-2022-2521
- https://ubuntu.com/security/CVE-2022-3570
- https://ubuntu.com/security/CVE-2022-2953
- https://ubuntu.com/security/CVE-2022-3626

Title: USN-5658-2: DHCP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5658-2
Priorities: medium
Description:
USN-5658-1 fixed vulnerabilities in DHCP. This update provides
the corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that DHCP incorrectly handled option reference counting.
A remote attacker could possibly use this issue to cause DHCP servers to
crash, resulting in a denial of service. (CVE-2022-2928)

It was discovered that DHCP incorrectly handled certain memory operations.
A remote attacker could possibly use this issue to cause DHCP clients and
servers to consume resources, leading to a denial of service.
(CVE-2022-2929)
CVEs:
- https://ubuntu.com/security/CVE-2022-2928
- https://ubuntu.com/security/CVE-2022-2929
- https://ubuntu.com/security/CVE-2022-2928
- https://ubuntu.com/security/CVE-2022-2929

Title: USN-5698-2: Open vSwitch vulnerability
URL: https://ubuntu.com/security/notices/USN-5698-2
Priorities: medium
Description:
USN-5698-1 fixed a vulnerability in Open. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Open vSwitch incorrectly handled comparison of
certain minimasks. A remote attacker could use this issue to cause Open
vSwitch to crash, resulting in a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-32166

Title: USN-5702-2: curl vulnerability
URL: https://ubuntu.com/security/notices/USN-5702-2
Priorities: medium
Description:
USN-5702-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Robby Simpson discovered that curl incorrectly handled certain POST
operations after PUT operations. This issue could cause applications using
curl to send the wrong data, perform incorrect memory operations, or crash.
(CVE-2022-32221)
CVEs:
- https://ubuntu.com/security/CVE-2022-32221
- https://ubuntu.com/security/CVE-2022-32221

Title: USN-5705-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5705-1
Priorities: medium
Description:
Chintan Shah discovered that LibTIFF incorrectly handled memory in
certain conditions. An attacker could trick a user into processing a specially
crafted image file and potentially use this issue to allow for information
disclosure or to cause the application to crash. (CVE-2022-3570)

It was discovered that LibTIFF incorrectly handled memory in certain
conditions. An attacker could trick a user into processing a specially
crafted tiff file and potentially use this issue to cause a denial of service.
(CVE-2022-3598)
CVEs:
- https://ubuntu.com/security/CVE-2022-3570
- https://ubuntu.com/security/CVE-2022-3598
- https://ubuntu.com/security/CVE-2022-3570
- https://ubuntu.com/security/CVE-2022-3598

Title: USN-5712-1: SQLite vulnerability
URL: https://ubuntu.com/security/notices/USN-5712-1
Priorities: medium
Description:
It was discovered that SQLite did not properly handle large string
inputs in certain circumstances. An attacker could possibly use this
issue to cause a denial of service or arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-35737

Title: USN-5711-2: NTFS-3G vulnerability
URL: https://ubuntu.com/security/notices/USN-5711-2
Priorities: medium
Description:
USN-5711-1 fixed a vulnerability in NTFS-3G. This update provides
the corresponding update for Ubuntu 14.04 ESM Ubuntu 16.04 ESM.

Original advisory details:

Yuchen Zeng and Eduardo Vela discovered that NTFS-3G incorrectly validated
certain NTFS metadata. A local attacker could possibly use this issue to
gain privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-40284

Title: USN-5704-1: DBus vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5704-1
Priorities: medium
Description:
It was discovered that DBus incorrectly handled messages with invalid type
signatures. A local attacker could possibly use this issue to cause DBus to
crash, resulting in a denial of service. (CVE-2022-42010)

It was discovered that DBus was incorrectly validating the length of arrays of
fixed-length items. A local attacker could possibly use this issue to cause
DBus to crash, resulting in a denial of service. (CVE-2022-42011)

It was discovered that DBus incorrectly handled the body DBus message with
attached file descriptors. A local attacker could possibly use this issue to
cause DBus to crash, resulting in a denial of service. (CVE-2022-42012)
CVEs:
- https://ubuntu.com/security/CVE-2022-42010
- https://ubuntu.com/security/CVE-2022-42011
- https://ubuntu.com/security/CVE-2022-42012
- https://ubuntu.com/security/CVE-2022-42010
- https://ubuntu.com/security/CVE-2022-42012
- https://ubuntu.com/security/CVE-2022-42011

621.305

Available in the Broadcom Support portal

Release Date: October 25, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.98

USNs:


Title: USN-5695-1: Linux kernel (GCP) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5695-1
Priorities: medium
Description:
It was discovered that the SUNRPC RDMA protocol implementation in the Linux
kernel did not properly calculate the header size of a RPC message payload.
A local attacker could use this to expose sensitive information (kernel
memory). (CVE-2022-0812)

Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation
in the Linux kernel did not provide sufficient randomization when
calculating port offsets. An attacker could possibly use this to expose
sensitive information. (CVE-2022-1012, CVE-2022-32296)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)

Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)
CVEs:
- https://ubuntu.com/security/CVE-2022-0812
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-0812
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365

621.304

Available in the Broadcom Support portal

Release Date: October 25, 2022

Known Issues:

  • This stemcell was removed from AWS regions and cannot be recovered making it unavailable to AWS light stemcell users. AWS light stemcell users should instead use the AWS heavy stemcell or v621.305.

  • Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

    Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

    For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

    NOTE: The kernel slab memory leak issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.98

USNs:


Title: USN-5690-1: libXdmcp vulnerability
URL: https://ubuntu.com/security/notices/USN-5690-1
Priorities: low
Description:
It was discovered that libXdmcp was generating weak session keys.
A local attacker could possibly use this issue to perform a brute
force attack and obtain another user’s key.
CVEs:
- https://ubuntu.com/security/CVE-2017-2625

Title: USN-5665-1: PCRE vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5665-1
Priorities: low
Description:
It was discovered that PCRE incorrectly handled certain regular expressions.
A remote attacker could use this issue to cause applications using PCRE to
crash, resulting in a denial of service. (CVE-2017-6004)

It was discovered that PCRE incorrectly handled certain Unicode encoding. A
remote attacker could use this issue to cause applications using PCRE to
crash, resulting in a denial of service. (CVE-2017-7186)
CVEs:
- https://ubuntu.com/security/CVE-2017-6004
- https://ubuntu.com/security/CVE-2017-7186
- https://ubuntu.com/security/CVE-2017-7186
- https://ubuntu.com/security/CVE-2017-6004

Title: USN-5675-1: Heimdal vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5675-1
Priorities: medium,low
Description:
Isaac Boukris and Andrew Bartlett discovered that Heimdal’s KDC was
not properly performing checksum algorithm verifications in the
S4U2Self extension module. An attacker could possibly use this issue
to perform a machine-in-the-middle attack and request S4U2Self
tickets for any user known by the application. This issue only
affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS.
(CVE-2018-16860)

It was discovered that Heimdal was not properly handling the
verification of key exchanges when an anonymous PKINIT was being
used. An attacker could possibly use this issue to perform a
machine-in-the-middle attack and expose sensitive information.
This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and
Ubuntu 18.04 LTS. (CVE-2019-12098)

Joseph Sutton discovered that Heimdal was not properly handling
memory management operations when dealing with TGS-REQ tickets that
were missing information. An attacker could possibly use this issue
to cause a denial of service. (CVE-2021-3671)

Michał Kępień discovered that Heimdal was not properly handling
logical conditions that related to memory management operations. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2022-3116)
CVEs:
- https://ubuntu.com/security/CVE-2018-16860
- https://ubuntu.com/security/CVE-2019-12098
- https://ubuntu.com/security/CVE-2021-3671
- https://ubuntu.com/security/CVE-2022-3116
- https://ubuntu.com/security/CVE-2018-16860
- https://ubuntu.com/security/CVE-2022-3116
- https://ubuntu.com/security/CVE-2019-12098
- https://ubuntu.com/security/CVE-2021-3671

Title: USN-5657-1: Graphite2 vulnerability
URL: https://ubuntu.com/security/notices/USN-5657-1
Priorities: low
Description:
It was discovered that Graphite2 mishandled specially crafted files. An
attacker could possibly use this issue to cause a denial of service or
other unspecified impact.
CVEs:
- https://ubuntu.com/security/CVE-2018-7999

Title: USN-5656-1: JACK vulnerability
URL: https://ubuntu.com/security/notices/USN-5656-1
Priorities: low
Description:
Joseph Yasi discovered that JACK incorrectly handled the closing of a socket
in certain conditions. An attacker could potentially use this issue to
cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2019-13351

Title: USN-5671-1: AdvanceCOMP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5671-1
Priorities: low
Description:
It was discovered that AdvanceCOMP did not properly manage memory of function
be_uint32_read() under certain circumstances. If a user were tricked into
opening a specially crafted binary file, a remote attacker could possibly use
this issue to cause AdvanceCOMP to crash, resulting in a denial of service.
(CVE-2019-8379)

It was discovered that AdvanceCOMP did not properly manage memory of function
adv_png_unfilter_8() under certain circumstances. If a user were tricked into
opening a specially crafted PNG file, a remote attacker could possibly use this
issue to cause AdvanceCOMP to crash, resulting in a denial of service.
(CVE-2019-8383)
CVEs:
- https://ubuntu.com/security/CVE-2019-8379
- https://ubuntu.com/security/CVE-2019-8383
- https://ubuntu.com/security/CVE-2019-8379
- https://ubuntu.com/security/CVE-2019-8383

Title: USN-5371-3: nginx vulnerability
URL: https://ubuntu.com/security/notices/USN-5371-3
Priorities: medium,low
Description:
USN-5371-1 and USN-5371-2 fixed several vulnerabilities in nginx.
This update provides the corresponding update for CVE-2020-11724
for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue was fixed for Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11724)

It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to disclose sensitive
information. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-36309)

It was discovered that nginx mishandled the use of
compatible certificates among multiple encryption protocols.
If a remote attacker were able to intercept the communication,
this issue could be used to redirect traffic between subdomains.
(CVE-2021-3618)
CVEs:
- https://ubuntu.com/security/CVE-2020-11724
- https://ubuntu.com/security/CVE-2020-11724
- https://ubuntu.com/security/CVE-2020-36309
- https://ubuntu.com/security/CVE-2021-3618
- https://ubuntu.com/security/CVE-2020-11724

Title: USN-5689-1: Perl vulnerability
URL: https://ubuntu.com/security/notices/USN-5689-1
Priorities: medium
Description:
It was discovered that Perl incorrectly handled certain signature verification.
An remote attacker could possibly use this issue to bypass signature verification.
CVEs:
- https://ubuntu.com/security/CVE-2020-16156

Title: USN-5650-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5650-1
Priorities: medium,low
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

It was discovered that the virtual terminal driver in the Linux kernel did
not properly handle VGA console font changes, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2021-33656)

Christian Brauner discovered that the XFS file system implementation in the
Linux kernel did not properly handle setgid file creation. A local attacker
could use this to gain elevated privileges. (CVE-2021-4037)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly initialize memory in some situations. A privileged
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2022-0850)

Duoming Zhou discovered that the AX.25 amateur radio protocol
implementation in the Linux kernel did not handle detach events properly in
some situations. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-1199)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel during device detach operations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1204)

Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)

It was discovered that the Packet network protocol implementation in the
Linux kernel contained an out-of-bounds access. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-20368)

It was discovered that the Open vSwitch implementation in the Linux kernel
contained an out of bounds write vulnerability in certain situations. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2022-2639)

Jann Horn discovered that the ASIX AX88179/178A USB Ethernet driver in the
Linux kernel contained multiple out-of-bounds vulnerabilities. A local
attacker with physical access could plug in a specially crafted USB device
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-2964)

Hao Sun and Jiacheng Xu discovered that the NILFS file system
implementation in the Linux kernel contained a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-2978)

Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly expose sensitive information (kernel
memory). (CVE-2022-3028)

It was discovered that the Journaled File System (JFS) in the Linux kernel
contained a null pointer dereference in some situations. A local attacker
could use this to cause a denial of service (system crash). (CVE-2022-3202)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2021-33656
- https://ubuntu.com/security/CVE-2021-4037
- https://ubuntu.com/security/CVE-2022-0850
- https://ubuntu.com/security/CVE-2022-1199
- https://ubuntu.com/security/CVE-2022-1204
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-20368
- https://ubuntu.com/security/CVE-2022-2639
- https://ubuntu.com/security/CVE-2022-2964
- https://ubuntu.com/security/CVE-2022-2978
- https://ubuntu.com/security/CVE-2022-3028
- https://ubuntu.com/security/CVE-2022-3202
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2021-4037
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-0850
- https://ubuntu.com/security/CVE-2022-1204
- https://ubuntu.com/security/CVE-2022-1199
- https://ubuntu.com/security/CVE-2021-33656
- https://ubuntu.com/security/CVE-2022-20368
- https://ubuntu.com/security/CVE-2022-2964
- https://ubuntu.com/security/CVE-2022-3202
- https://ubuntu.com/security/CVE-2022-2978
- https://ubuntu.com/security/CVE-2022-3028
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-2639

Title: USN-5652-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5652-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2021-33655

Title: USN-5614-2: Wayland vulnerability
URL: https://ubuntu.com/security/notices/USN-5614-2
Priorities: medium
Description:
USN-5614-1 fixed a vulnerability in Wayland. This update
provides the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Wayland incorrectly handled reference counting
certain objects. An attacker could use this issue to cause Wayland to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2021-3782

Title: USN-5666-1: OpenSSH vulnerability
URL: https://ubuntu.com/security/notices/USN-5666-1
Priorities: low
Description:
It was discovered that OpenSSH incorrectly handled certain helper programs.
An attacker could possibly use this issue to arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2021-41617

Title: USN-5673-1: unzip vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5673-1
Priorities: low,medium
Description:
It was discovered that unzip did not properly handle unicode strings under
certain circumstances. If a user were tricked into opening a specially crafted
zip file, an attacker could possibly use this issue to cause unzip to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2021-4217)

It was discovered that unzip did not properly perform bounds checking while
converting wide strings to local strings. If a user were tricked into opening a
specially crafted zip file, an attacker could possibly use this issue to cause
unzip to crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2022-0529, CVE-2022-0530)
CVEs:
- https://ubuntu.com/security/CVE-2021-4217
- https://ubuntu.com/security/CVE-2022-0529
- https://ubuntu.com/security/CVE-2022-0530
- https://ubuntu.com/security/CVE-2022-0529
- https://ubuntu.com/security/CVE-2021-4217
- https://ubuntu.com/security/CVE-2022-0530

Title: USN-5669-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5669-2
Priorities: medium
Description:
It was discovered that the SUNRPC RDMA protocol implementation in the Linux
kernel did not properly calculate the header size of a RPC message payload.
A local attacker could use this to expose sensitive information (kernel
memory). (CVE-2022-0812)

Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation
in the Linux kernel did not provide sufficient randomization when
calculating port offsets. An attacker could possibly use this to expose
sensitive information. (CVE-2022-1012, CVE-2022-32296)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)

Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)
CVEs:
- https://ubuntu.com/security/CVE-2022-0812
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-0812

Title: USN-5679-1: Linux kernel (HWE) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5679-1
Priorities: medium
Description:
It was discovered that the SUNRPC RDMA protocol implementation in the Linux
kernel did not properly calculate the header size of a RPC message payload.
A local attacker could use this to expose sensitive information (kernel
memory). (CVE-2022-0812)

Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation
in the Linux kernel did not provide sufficient randomization when
calculating port offsets. An attacker could possibly use this to expose
sensitive information. (CVE-2022-1012, CVE-2022-32296)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)

Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)
CVEs:
- https://ubuntu.com/security/CVE-2022-0812
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-0812
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-33742

Title: USN-5684-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5684-1
Priorities: medium
Description:
It was discovered that the SUNRPC RDMA protocol implementation in the Linux
kernel did not properly calculate the header size of a RPC message payload.
A local attacker could use this to expose sensitive information (kernel
memory). (CVE-2022-0812)

Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation
in the Linux kernel did not provide sufficient randomization when
calculating port offsets. An attacker could possibly use this to expose
sensitive information. (CVE-2022-1012, CVE-2022-32296)

Duoming Zhou discovered that race conditions existed in the timer handling
implementation of the Linux kernel’s Rose X.25 protocol layer, resulting in
use-after-free vulnerabilities. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-2318)

Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741, CVE-2022-33742)

Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in
the Linux kernel on ARM platforms contained a race condition in certain
situations. An attacker in a guest VM could use this to cause a denial of
service in the host OS. (CVE-2022-33744)
CVEs:
- https://ubuntu.com/security/CVE-2022-0812
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-32296
- https://ubuntu.com/security/CVE-2022-1012
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33744
- https://ubuntu.com/security/CVE-2022-33742
- https://ubuntu.com/security/CVE-2022-0812
- https://ubuntu.com/security/CVE-2022-2318
- https://ubuntu.com/security/CVE-2022-26365

Title: USN-5676-1: PostgreSQL vulnerability
URL: https://ubuntu.com/security/notices/USN-5676-1
Priorities: medium
Description:
Alexander Lakhin discovered that PostgreSQL incorrectly handled the
security restricted operation sandbox when a privileged user is maintaining
another user’s objects. An attacker having permission to create non-temp
objects can use this issue to execute arbitrary commands as the superuser.
CVEs:
- https://ubuntu.com/security/CVE-2022-1552

Title: USN-5688-1: Libksba vulnerability
URL: https://ubuntu.com/security/notices/USN-5688-1
Priorities: high
Description:
It was discovered that an integer overflow could be triggered in Libksba
when decoding certain data. An attacker could use this issue to cause a
denial of service (application crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-3515

Title: USN-5651-2: strongSwan vulnerability
URL: https://ubuntu.com/security/notices/USN-5651-2
Priorities: medium
Description:
USN-5651-1 fixed a vulnerability in strongSwan. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Lahav Schlesinger discovered that strongSwan incorrectly handled certain OCSP URIs and
and CRL distribution points (CDP) in certificates. A remote attacker could
possibly use this issue to initiate IKE_SAs and send crafted certificates
that contain URIs pointing to servers under their control, which can lead
to a denial-of-service attack.
CVEs:
- https://ubuntu.com/security/CVE-2022-40617

Full Changelog: https://github.com/pivotal-cf/bosh-linux-stemcell-builder-lts/compare/ubuntu-trusty/v3586.153…ubuntu-xenial/v621.304

621.296

Available in the Broadcom Support portal

Release Date: October 04, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.95

USNs:


Title: USN-5593-1: Zstandard vulnerability
URL: https://ubuntu.com/security/notices/USN-5593-1
Priorities: medium
Description:
It was discovered that Zstandard incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2019-11922

Title: USN-5637-1: libvpx vulnerability
URL: https://ubuntu.com/security/notices/USN-5637-1
Priorities: low
Description:
It was discovered that libvpx incorrectly handled certain WebM media
files. A remote attacker could use this issue to crash an application
using libvpx under certain conditions, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-0034

Title: USN-5619-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5619-1
Priorities: negligible,medium,low
Description:
It was discovered that LibTIFF was not properly performing the calculation
of data that would eventually be used as a reference for bound-checking
operations. An attacker could possibly use this issue to cause a denial of
service or to expose sensitive information. This issue only affected Ubuntu
18.04 LTS. (CVE-2020-19131)

It was discovered that LibTIFF was not properly terminating a function
execution when processing incorrect data. An attacker could possibly use
this issue to cause a denial of service or to expose sensitive information.
This issue only affected Ubuntu 18.04 LTS. (CVE-2020-19144)

It was discovered that LibTIFF did not properly manage memory under certain
circumstances. If a user were tricked into opening a specially crafted TIFF
file using tiffinfo tool, an attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-1354)

It was discovered that LibTIFF did not properly manage memory under certain
circumstances. If a user were tricked into opening a specially crafted TIFF
file using tiffcp tool, an attacker could possibly use this issue to
cause a denial of service. (CVE-2022-1355)

It was discovered that LibTIFF was not properly performing checks to avoid
division calculations where the denominator value was zero, which could
lead to an undefined behaviour situation via a specially crafted file. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
CVEs:
- https://ubuntu.com/security/CVE-2020-19131
- https://ubuntu.com/security/CVE-2020-19144
- https://ubuntu.com/security/CVE-2022-1354
- https://ubuntu.com/security/CVE-2022-1355
- https://ubuntu.com/security/CVE-2022-2056
- https://ubuntu.com/security/CVE-2022-2057
- https://ubuntu.com/security/CVE-2022-2058
- https://ubuntu.com/security/CVE-2020-19144
- https://ubuntu.com/security/CVE-2022-1354
- https://ubuntu.com/security/CVE-2022-2056
- https://ubuntu.com/security/CVE-2022-2058
- https://ubuntu.com/security/CVE-2022-2057
- https://ubuntu.com/security/CVE-2020-19131
- https://ubuntu.com/security/CVE-2022-1355

Title: USN-5618-1: Ghostscript vulnerability
URL: https://ubuntu.com/security/notices/USN-5618-1
Priorities: medium
Description:
It was discovered the Ghostscript incorrectly handled memory when
processing certain inputs. By tricking a user into opening a specially
crafted PDF file, an attacker could cause the program to crash.
CVEs:
- https://ubuntu.com/security/CVE-2020-27792

Title: USN-5615-2: SQLite vulnerability
URL: https://ubuntu.com/security/notices/USN-5615-2
Priorities: medium
Description:
USN-5615-1 fixed several vulnerabilities in SQLite. This update provides
the corresponding fix for CVE-2020-35525 for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that SQLite incorrectly handled INTERSEC query
processing. An attacker could use this issue to cause SQLite to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2020-35525
- https://ubuntu.com/security/CVE-2020-35525

Title: USN-5645-1: PostgreSQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5645-1
Priorities: medium
Description:
Jacob Champion discovered that PostgreSQL incorrectly handled SSL
certificate verification and encryption. A remote attacker could possibly
use this issue to inject arbitrary SQL queries when a connection is first
established. (CVE-2021-23214)

Tom Lane discovered that PostgreSQL incorrect handled certain array
subscripting calculations. An authenticated attacker could possibly use
this issue to overwrite server memory and escalate privileges.
(CVE-2021-32027)
CVEs:
- https://ubuntu.com/security/CVE-2021-23214
- https://ubuntu.com/security/CVE-2021-32027
- https://ubuntu.com/security/CVE-2021-23214
- https://ubuntu.com/security/CVE-2021-32027

Title: USN-5629-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-5629-1
Priorities: low
Description:
It was discovered that the Python http.server module incorrectly handled
certain URIs. An attacker could potentially use this to redirect web traffic.
CVEs:
- https://ubuntu.com/security/CVE-2021-28861

Title: USN-5621-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5621-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2021-33655

Title: USN-5597-1: Linux kernel (Oracle) vulnerability
URL: https://ubuntu.com/security/notices/USN-5597-1
Priorities: medium
Description:
It was discovered that the virtual terminal driver in the Linux kernel did
not properly handle VGA console font changes, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-33656

Title: USN-4976-2: Dnsmasq vulnerability
URL: https://ubuntu.com/security/notices/USN-4976-2
Priorities: low
Description:
USN-4976-1 fixed a vulnerability in Dnsmasq. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Dnsmasq has been updated to 2.79-1 for Ubuntu 16.04 ESM in order to fix
some security issues.

Original advisory details:

Petr Mensik discovered that Dnsmasq incorrectly randomized source ports in
certain configurations. A remote attacker could possibly use this issue to
facilitate DNS cache poisoning attacks.
CVEs:
- https://ubuntu.com/security/CVE-2021-3448

Title: USN-5626-2: Bind vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5626-2
Priorities: medium
Description:
USN-5626-1 fixed several vulnerabilities in Bind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Yehuda Afek, Anat Bremler-Barr, and Shani Stajnrod discovered that Bind
incorrectly handled large delegations. A remote attacker could possibly use
this issue to reduce performance, leading to a denial of service.
(CVE-2022-2795)

It was discovered that Bind incorrectly handled memory when processing
ECDSA DNSSEC verification. A remote attacker could use this issue to
consume resources, leading to a denial of service. (CVE-2022-38177)
CVEs:
- https://ubuntu.com/security/CVE-2022-2795
- https://ubuntu.com/security/CVE-2022-38177
- https://ubuntu.com/security/CVE-2022-38177
- https://ubuntu.com/security/CVE-2022-2795

Title: USN-5636-1: SoS vulnerability
URL: https://ubuntu.com/security/notices/USN-5636-1
Priorities: medium
Description:
It was discovered that SoS incorrectly handled certain data.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-2806

Title: USN-5604-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5604-1
Priorities: low
Description:
It was discovered that LibTIFF incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2022-2867, CVE-2022-2869)

It was discovered that LibTIFF incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-2868)
CVEs:
- https://ubuntu.com/security/CVE-2022-2867
- https://ubuntu.com/security/CVE-2022-2869
- https://ubuntu.com/security/CVE-2022-2868
- https://ubuntu.com/security/CVE-2022-2869
- https://ubuntu.com/security/CVE-2022-2868
- https://ubuntu.com/security/CVE-2022-2867

Title: USN-5606-1: poppler vulnerability
URL: https://ubuntu.com/security/notices/USN-5606-1
Priorities: medium
Description:
It was discovered that poppler incorrectly handled certain
PDF. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-38784

Title: USN-5638-1: Expat vulnerability
URL: https://ubuntu.com/security/notices/USN-5638-1
Priorities: medium
Description:
Rhodri James discovered that Expat incorrectly handled memory when
processing certain malformed XML files. An attacker could possibly
use this issue to cause a crash or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-40674

621.280

Available in the Broadcom Support portal

Release Date: September 06, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Fixes

  • There is an existing kernel bug in Xenial that can prevent the Precision Hardware Clock used in Azure stemcells from correctly tracking the time. To work around this problem we’ve changed the Azure stemcells to once again use the NTP servers in the config provided by BOSH. If your Azure network does not allow output NTP traffic to your configured NTP servers you may need to update your firewall rules to allow this traffic now.

Metadata:

BOSH Agent Version: 2.268.91

USNs:


Title: USN-5575-2: Libxslt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5575-2
Priorities: medium
Description:
USN-5575-1 fixed vulnerabilities in Libxslt. This update provides
the corresponding updates for Ubuntu 14.04 ESM and Ubuntu 16.04
ESM.

Original advisory details:

Nicolas Grégoire discovered that Libxslt incorrectly handled certain XML.
An attacker could possibly use this issue to expose sensitive information
or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-5815)

Alexey Neyman incorrectly handled certain HTML pages.
An attacker could possibly use this issue to expose sensitive information
or execute arbitrary code. (CVE-2021-30560)
CVEs:
- https://ubuntu.com/security/CVE-2019-5815
- https://ubuntu.com/security/CVE-2021-30560
- https://ubuntu.com/security/CVE-2019-5815
- https://ubuntu.com/security/CVE-2021-30560

Title: USN-5580-1: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5580-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

It was discovered that the virtual terminal driver in the Linux kernel did
not properly handle VGA console font changes, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2021-33656)

It was discovered that the Packet network protocol implementation in the
Linux kernel contained an out-of-bounds access. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-20368)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2021-33656
- https://ubuntu.com/security/CVE-2022-20368
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2021-33656
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-20368

Title: USN-5591-2: Linux kernel (HWE) vulnerability
URL: https://ubuntu.com/security/notices/USN-5591-2
Priorities: medium
Description:
It was discovered that the virtual terminal driver in the Linux kernel did
not properly handle VGA console font changes, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-33656

Title: USN-5591-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5591-1
Priorities: medium
Description:
It was discovered that the virtual terminal driver in the Linux kernel did
not properly handle VGA console font changes, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-33656

Title: USN-5572-1: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5572-1
Priorities: medium
Description:
Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741)
CVEs:
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740

Title: USN-5579-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5579-1
Priorities: medium
Description:
Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741)
CVEs:
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740

Title: USN-5584-1: Schroot vulnerability
URL: https://ubuntu.com/security/notices/USN-5584-1
Priorities: medium
Description:
It was discovered that Schroot incorrectly handled certain Schroot names.
An attacker could possibly use this issue to break schroot’s internal
state causing a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-2787

Title: USN-5578-2: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-5578-2
Priorities: medium
Description:
USN-5578-1 fixed a vulnerability in Open VM Tools. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Open VM Tools incorrectly handled certain requests.
An attacker inside the guest could possibly use this issue to gain root
privileges inside the virtual machine.
CVEs:
- https://ubuntu.com/security/CVE-2022-31676

Title: USN-5586-1: SDL vulnerability
URL: https://ubuntu.com/security/notices/USN-5586-1
Priorities: low
Description:
It was discovered that SDL (Simple DirectMedia Layer) incorrectly handled
memory. An attacker could potentially use this issue to cause a denial
of service or other unexpected behavior.
CVEs:
- https://ubuntu.com/security/CVE-2022-34568

Title: USN-5573-1: rsync vulnerability
URL: https://ubuntu.com/security/notices/USN-5573-1
Priorities: medium
Description:
Evgeny Legerov discovered that zlib incorrectly handled memory when
performing certain inflate operations. An attacker could use this issue
to cause rsync to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-37434

Title: USN-5570-1: zlib vulnerability
URL: https://ubuntu.com/security/notices/USN-5570-1
Priorities: medium
Description:
Evgeny Legerov discovered that zlib incorrectly handled memory when
performing certain inflate operations. An attacker could use this issue
to cause zlib to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-37434

Title: USN-5574-1: Exim vulnerability
URL: https://ubuntu.com/security/notices/USN-5574-1
Priorities: medium
Description:
It was discovered that Exim incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-37452

621.265

Available in the Broadcom Support portal

Release Date: August 11, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.88

USNs:


Title: USN-5548-1: libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-5548-1
Priorities: medium
Description:
It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2016-3709

Title: USN-5553-1: libjpeg-turbo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5553-1
Priorities: low
Description:
It was discovered that libjpeg-turbo was not properly handling EOF characters,
which could lead to excessive memory consumption through the execution of a
large loop. An attacker could possibly use this issue to cause a denial of
service. (CVE-2018-11813)

It was discovered that libjpeg-turbo was not properly performing bounds
check operations, which could lead to a heap-based buffer overread. If a user
or automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 14.04 ESM. (CVE-2018-14498)

It was discovered that libjpeg-turbo was not properly limiting the amount of
main memory being consumed by the system during decompression or multi-pass
compression operations, which could lead to excessive memory consumption. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2020-14152)

It was discovered that libjpeg-turbo was not properly setting variable sizes
when performing certain kinds of encoding operations, which could lead to a
stack-based buffer overflow. If a user or automated system were tricked into
opening a specially crafted file, an attacker could possibly use this issue to
cause a denial of service. (CVE-2020-17541)
CVEs:
- https://ubuntu.com/security/CVE-2018-11813
- https://ubuntu.com/security/CVE-2018-14498
- https://ubuntu.com/security/CVE-2020-14152
- https://ubuntu.com/security/CVE-2020-17541
- https://ubuntu.com/security/CVE-2020-17541
- https://ubuntu.com/security/CVE-2020-14152
- https://ubuntu.com/security/CVE-2018-14498
- https://ubuntu.com/security/CVE-2018-11813

Title: USN-5555-1: GStreamer Good Plugins vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5555-1
Priorities: medium
Description:
It was discovered that GStreamer Good Plugins incorrectly handled certain files.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2022-1920, CVE-2022-1921)

It was discovered that GStreamer Good Plugins incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2022-1922, CVE-2022-1923, CVE-2022-1924,
CVE-2022-1925, CVE-2022-2122)
CVEs:
- https://ubuntu.com/security/CVE-2022-1920
- https://ubuntu.com/security/CVE-2022-1921
- https://ubuntu.com/security/CVE-2022-1922
- https://ubuntu.com/security/CVE-2022-1923
- https://ubuntu.com/security/CVE-2022-1924
- https://ubuntu.com/security/CVE-2022-1925
- https://ubuntu.com/security/CVE-2022-2122
- https://ubuntu.com/security/CVE-2022-1921
- https://ubuntu.com/security/CVE-2022-1923
- https://ubuntu.com/security/CVE-2022-2122
- https://ubuntu.com/security/CVE-2022-1922
- https://ubuntu.com/security/CVE-2022-1924
- https://ubuntu.com/security/CVE-2022-1920
- https://ubuntu.com/security/CVE-2022-1925

Title: USN-5546-2: OpenJDK 8 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5546-2
Priorities: high,medium
Description:
USN-5546-1 fixed vulnerabilities in OpenJDK.
This update provides the corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

Neil Madden discovered that OpenJDK did not properly verify ECDSA
signatures. A remote attacker could possibly use this issue to insert,
edit or obtain sensitive information. This issue only affected OpenJDK
17 and OpenJDK 18. (CVE-2022-21449)

It was discovered that OpenJDK incorrectly limited memory when compiling a
specially crafted XPath expression. An attacker could possibly use this
issue to cause a denial of service. This issue was fixed in OpenJDK 8 and
OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11
and OpenJDK 17. (CVE-2022-21426)

It was discovered that OpenJDK incorrectly handled converting certain
object arguments into their textual representations. An attacker could
possibly use this issue to cause a denial of service. This issue was
fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed
this issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21434)

It was discovered that OpenJDK incorrectly validated the encoded length of
certain object identifiers. An attacker could possibly use this issue to
cause a denial of service. This issue was fixed in OpenJDK 8 and OpenJDK 18.
USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11 and OpenJDK 17.
(CVE-2022-21443)

It was discovered that OpenJDK incorrectly validated certain paths. An
attacker could possibly use this issue to bypass the secure validation
feature and expose sensitive information in XML files. This issue was
fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this
issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21476)

It was discovered that OpenJDK incorrectly parsed certain URI strings. An
attacker could possibly use this issue to make applications accept
invalid of malformed URI strings. This issue was fixed in OpenJDK 8 and
OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11
and OpenJDK 17. (CVE-2022-21496)

It was discovered that OpenJDK incorrectly generated class code in the
Hotspot component. An attacker could possibly use this issue to obtain
sensitive information. (CVE-2022-21540)

It was dicovered that OpenJDK incorrectly restricted access to the
invokeBasic() method in the Hotspot component. An attacker could possibly
use this issue to insert, edit or obtain sensitive information.
(CVE-2022-21541)

It was discovered that OpenJDK incorrectly computed exponentials. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. This issue only affected OpenJDK 17.
(CVE-2022-21549)

It was discovered that OpenJDK includes a copy of Xalan that incorrectly
handled integer truncation. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-34169)
CVEs:
- https://ubuntu.com/security/CVE-2022-21449
- https://ubuntu.com/security/CVE-2022-21426
- https://ubuntu.com/security/CVE-2022-21434
- https://ubuntu.com/security/CVE-2022-21443
- https://ubuntu.com/security/CVE-2022-21476
- https://ubuntu.com/security/CVE-2022-21496
- https://ubuntu.com/security/CVE-2022-21540
- https://ubuntu.com/security/CVE-2022-21541
- https://ubuntu.com/security/CVE-2022-21549
- https://ubuntu.com/security/CVE-2022-34169
- https://ubuntu.com/security/CVE-2022-21434
- https://ubuntu.com/security/CVE-2022-34169
- https://ubuntu.com/security/CVE-2022-21426
- https://ubuntu.com/security/CVE-2022-21541
- https://ubuntu.com/security/CVE-2022-21540
- https://ubuntu.com/security/CVE-2022-21443
- https://ubuntu.com/security/CVE-2022-21496
- https://ubuntu.com/security/CVE-2022-21476

Title: USN-5560-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5560-2
Priorities: high,medium,low
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)

It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)

It was discovered that the block layer subsystem in the Linux kernel did
not properly initialize memory in some situations. A privileged local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-0494)

Hu Jiahui discovered that multiple race conditions existed in the Advanced
Linux Sound Architecture (ALSA) framework, leading to use-after-free
vulnerabilities. A local attacker could use these to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-1048)

It was discovered that the implementation of the 6pack and mkiss protocols
in the Linux kernel did not handle detach events properly in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2022-1195)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-1734)

Duoming Zhou discovered a race condition in the NFC subsystem in the Linux
kernel, leading to a use-after-free vulnerability. A privileged local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-1974)

Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not
properly prevent context switches from occurring during certain atomic
context operations. A privileged local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1975)

Minh Yuan discovered that the floppy driver in the Linux kernel contained a
race condition in some situations, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-33981)

Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-0494
- https://ubuntu.com/security/CVE-2022-1048
- https://ubuntu.com/security/CVE-2022-1195
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-33981
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-0494
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-33981
- https://ubuntu.com/security/CVE-2022-1195
- https://ubuntu.com/security/CVE-2022-1048
- https://ubuntu.com/security/CVE-2022-1734

Title: USN-5557-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5557-1
Priorities: high
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)

It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586

Title: USN-5463-2: NTFS-3G vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5463-2
Priorities: medium
Description:
USN-5463-1 fixed vulnerabilities in NTFS-3G. This update provides the
corresponding updates for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Roman Fiedler discovered that NTFS-3G incorrectly handled certain return
codes. A local attacker could possibly use this issue to intercept
protocol traffic between FUSE and the kernel. (CVE-2022-30783)

It was discovered that NTFS-3G incorrectly handled certain NTFS disk
images. If a user or automated system were tricked into mounting a
specially crafted disk image, a remote attacker could use this issue to
cause a denial of service, or possibly execute arbitrary code.
(CVE-2022-30784, CVE-2022-30786, CVE-2022-30788, CVE-2022-30789)

Roman Fiedler discovered that NTFS-3G incorrectly handled certain file
handles. A local attacker could possibly use this issue to read and write
arbitrary memory. (CVE-2022-30785, CVE-2022-30787)
CVEs:
- https://ubuntu.com/security/CVE-2022-30783
- https://ubuntu.com/security/CVE-2022-30784
- https://ubuntu.com/security/CVE-2022-30786
- https://ubuntu.com/security/CVE-2022-30788
- https://ubuntu.com/security/CVE-2022-30789
- https://ubuntu.com/security/CVE-2022-30785
- https://ubuntu.com/security/CVE-2022-30787
- https://ubuntu.com/security/CVE-2022-30783
- https://ubuntu.com/security/CVE-2022-30785
- https://ubuntu.com/security/CVE-2022-30784
- https://ubuntu.com/security/CVE-2022-30787
- https://ubuntu.com/security/CVE-2022-30786
- https://ubuntu.com/security/CVE-2022-30788
- https://ubuntu.com/security/CVE-2022-30789

621.261

Available in the Broadcom Support portal

Release Date: August 03, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.87

USNs:


Title: USN-5519-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-5519-1
Priorities: low
Description:
It was discovered that Python incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2015-20107

Title: USN-5535-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5535-1
Priorities: medium
Description:
Joseph Nuzman discovered that some Intel processors did not properly
initialise shared resources. A local attacker could use this to obtain
sensitive information. (CVE-2021-0145)

Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel
processors did not prevent test and debug logic from being activated at
runtime. A local attacker could use this to escalate
privileges. (CVE-2021-0146)

It was discovered that some Intel processors did not implement sufficient
control flow management. A local attacker could use this to cause a denial
of service (system crash). (CVE-2021-0127)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123,
CVE-2022-21127)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that
some Intel processors improperly optimised security-critical code. A local
attacker could possibly use this to expose sensitive
information. (CVE-2022-21151)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

It was discovered that some Intel processors did not properly restrict
access in some situations. A local attacker could use this to obtain
sensitive information. (CVE-2021-33117)

Brandon Miller discovered that some Intel processors did not properly
restrict access in some situations. A local attacker could use this to
obtain sensitive information or a remote attacker could use this to
cause a denial of service (system crash). (CVE-2021-33120)
CVEs:
- https://ubuntu.com/security/CVE-2021-0145
- https://ubuntu.com/security/CVE-2021-0146
- https://ubuntu.com/security/CVE-2021-0127
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21127
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2022-21151
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2021-33117
- https://ubuntu.com/security/CVE-2021-33120
- https://ubuntu.com/security/CVE-2021-0145
- https://ubuntu.com/security/CVE-2022-21127
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2021-33117
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2021-33120
- https://ubuntu.com/security/CVE-2021-0146
- https://ubuntu.com/security/CVE-2022-21151
- https://ubuntu.com/security/CVE-2021-0127

Title: USN-5505-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5505-1
Priorities: high,medium,low
Description:
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)

Likang Luo discovered that a race condition existed in the Bluetooth
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-3752)

It was discovered that the NFC subsystem in the Linux kernel contained a
use-after-free vulnerability in its NFC Controller Interface (NCI)
implementation. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2021-3760)

Szymon Heidrich discovered that the USB Gadget subsystem in the Linux
kernel did not properly restrict the size of control requests for certain
gadget types, leading to possible out of bounds reads or writes. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-39685)

It was discovered that the Ion Memory Manager subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2021-39714)

Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in
the Linux kernel did not perform a GPU TLB flush in some situations. A
local attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2022-0330)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some error conditions. A local
attacker could use this to cause a denial of service. (CVE-2022-28356)

It was discovered that the 8 Devices USB2CAN interface implementation in
the Linux kernel did not properly handle certain error conditions, leading
to a double-free. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2022-28388)
CVEs:
- https://ubuntu.com/security/CVE-2021-3609
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2021-39714
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-0330
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2022-24958
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-28388
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2021-3609
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2022-24958
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2021-39714
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-28388
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-0330

Title: USN-5515-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5515-1
Priorities: medium,low
Description:
Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Jann Horn discovered that the FUSE file system in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-1011)

Duoming Zhou discovered that the 6pack protocol implementation in the Linux
kernel did not handle detach events properly in some situations, leading to
a use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1198)

Duoming Zhou discovered that the AX.25 amateur radio protocol
implementation in the Linux kernel did not handle detach events properly in
some situations. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-1199)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel during device detach operations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1204)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel, leading to use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-1205)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the implementation of X.25 network protocols in the
Linux kernel did not terminate link layer sessions properly. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1516)

Zheyu Ma discovered that the Silicon Motion SM712 framebuffer driver in the
Linux kernel did not properly handle very small reads. A local attacker
could use this to cause a denial of service (system crash). (CVE-2022-2380)

It was discovered that the Microchip CAN BUS Analyzer interface
implementation in the Linux kernel did not properly handle certain error
conditions, leading to a double-free. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2022-28389)
CVEs:
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2022-1011
- https://ubuntu.com/security/CVE-2022-1198
- https://ubuntu.com/security/CVE-2022-1199
- https://ubuntu.com/security/CVE-2022-1204
- https://ubuntu.com/security/CVE-2022-1205
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1516
- https://ubuntu.com/security/CVE-2022-2380
- https://ubuntu.com/security/CVE-2022-28389
- https://ubuntu.com/security/CVE-2022-1199
- https://ubuntu.com/security/CVE-2022-1205
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2022-28389
- https://ubuntu.com/security/CVE-2022-2380
- https://ubuntu.com/security/CVE-2022-1198
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1204
- https://ubuntu.com/security/CVE-2022-1011
- https://ubuntu.com/security/CVE-2022-1516

Title: USN-5523-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5523-1
Priorities: medium,negligible
Description:
It was discovered that LibTIFF was not properly performing checks to
guarantee that allocated memory space existed, which could lead to a
NULL pointer dereference via a specially crafted file. An attacker
could possibly use this issue to cause a denial of service.
(CVE-2022-0907, CVE-2022-0908)

It was discovered that LibTIFF was not properly performing checks to
avoid division calculations where the denominator value was zero,
which could lead to an undefined behavior situation via a specially
crafted file. An attacker could possibly use this issue to cause a
denial of service. (CVE-2022-0909)

It was discovered that LibTIFF was not properly performing bounds
checks, which could lead to an out-of-bounds read via a specially
crafted file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information. (CVE-2022-0924)

It was discovered that LibTIFF was not properly performing the
calculation of data that would eventually be used as a reference for
bounds checking operations, which could lead to an out-of-bounds
read via a specially crafted file. An attacker could possibly use
this issue to cause a denial of service or to expose sensitive
information. (CVE-2020-19131)

It was discovered that LibTIFF was not properly terminating a
function execution when processing incorrect data, which could lead
to an out-of-bounds read via a specially crafted file. An attacker
could possibly use this issue to cause a denial of service or to
expose sensitive information. (CVE-2020-19144)

It was discovered that LibTIFF was not properly performing checks
when setting the value for data later used as reference during memory
access, which could lead to an out-of-bounds read via a specially
crafted file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information.
(CVE-2022-22844)
CVEs:
- https://ubuntu.com/security/CVE-2022-0907
- https://ubuntu.com/security/CVE-2022-0908
- https://ubuntu.com/security/CVE-2022-0909
- https://ubuntu.com/security/CVE-2022-0924
- https://ubuntu.com/security/CVE-2020-19131
- https://ubuntu.com/security/CVE-2020-19144
- https://ubuntu.com/security/CVE-2022-22844
- https://ubuntu.com/security/CVE-2020-19144
- https://ubuntu.com/security/CVE-2020-19131
- https://ubuntu.com/security/CVE-2022-0909
- https://ubuntu.com/security/CVE-2022-0924
- https://ubuntu.com/security/CVE-2022-22844
- https://ubuntu.com/security/CVE-2022-0907
- https://ubuntu.com/security/CVE-2022-0908

Title: USN-5533-1: Vim vulnerability
URL: https://ubuntu.com/security/notices/USN-5533-1
Priorities: low
Description:
It was discovered that Vim incorrectly handled memory access. If a
user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-2129

Title: USN-5537-2: MySQL vulnerability
URL: https://ubuntu.com/security/notices/USN-5537-2
Priorities: low
Description:
USN-5537-1 fixed a vulnerability in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.7.39 in Ubuntu 16.04 ESM.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-39.html
https://www.oracle.com/security-alerts/cpujul2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21515

Title: USN-5516-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5516-1
Priorities: low,medium
Description:
It was discovered that Vim incorrectly handled memory access. An attacker
could potentially use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-2210
- https://ubuntu.com/security/CVE-2022-2000
- https://ubuntu.com/security/CVE-2022-2207

Title: USN-5510-2: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5510-2
Priorities: medium
Description:
USN-5510-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain inputs. An attacker could use this issue to cause the server to
crash, resulting in a denial of service, or possibly execute arbitrary
code and escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-2319
- https://ubuntu.com/security/CVE-2022-2320

Title: USN-5520-2: HTTP-Daemon vulnerability
URL: https://ubuntu.com/security/notices/USN-5520-2
Priorities: medium
Description:
USN-5520-1 fixed a vulnerability in HTTP-Daemon. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that HTTP-Daemon incorrectly handled certain crafted
requests. A remote attacker could possibly use this issue to perform an
HTTP Request Smuggling attack.
CVEs:
- https://ubuntu.com/security/CVE-2022-31081

Title: USN-5534-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5534-1
Priorities: medium
Description:
It was discovered that ImageMagick incorrectly handled certain values.
If a user were tricked into processing a specially crafted image file,
an attacker could possibly exploit this issue to cause a denial of service
or other unspecified impact. (CVE-2022-32545, CVE-2022-32546)

It was discovered that ImageMagick incorrectly handled memory under
certain circumstances. If a user were tricked into processing a specially
crafted image file, an attacker could possibly exploit this issue to cause
a denial of service or other unspecified impact. (CVE-2022-32547)
CVEs:
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-32546
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2022-32546
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2022-32545

Title: USN-5503-2: GnuPG vulnerability
URL: https://ubuntu.com/security/notices/USN-5503-2
Priorities: medium
Description:
USN-5503-1 fixed a vulnerability in GnuPG. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Demi Marie Obenour discovered that GnuPG incorrectly handled injection in
the status message. A remote attacker could possibly use this issue to
forge signatures.
CVEs:
- https://ubuntu.com/security/CVE-2022-34903

621.256

Available in the Broadcom Support portal

Release Date: July 11, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.83

USNs:


Title: USN-5478-1: util-linux vulnerability
URL: https://ubuntu.com/security/notices/USN-5478-1
Priorities: low
Description:
Christian Moch and Michael Gruhn discovered that the libblkid library
of util-linux did not properly manage memory under certain
circumstances. A local attacker could possibly use this issue
to cause denial of service by consuming all memory through
a specially crafted MSDOS partition table.
CVEs:
- https://ubuntu.com/security/CVE-2016-5011

Title: USN-5490-1: Protocol Buffers vulnerability
URL: https://ubuntu.com/security/notices/USN-5490-1
Priorities: low
Description:
It was discovered that Protocol Buffers did not properly parse certain symbols.
An attacker could possibly use this issue to cause a denial of service or other
unspecified impact.
CVEs:
- https://ubuntu.com/security/CVE-2021-22570

Title: USN-5505-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5505-1
Priorities: high,medium,low
Description:
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)

Likang Luo discovered that a race condition existed in the Bluetooth
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-3752)

It was discovered that the NFC subsystem in the Linux kernel contained a
use-after-free vulnerability in its NFC Controller Interface (NCI)
implementation. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2021-3760)

Szymon Heidrich discovered that the USB Gadget subsystem in the Linux
kernel did not properly restrict the size of control requests for certain
gadget types, leading to possible out of bounds reads or writes. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-39685)

It was discovered that the Ion Memory Manager subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2021-39714)

Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in
the Linux kernel did not perform a GPU TLB flush in some situations. A
local attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2022-0330)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some error conditions. A local
attacker could use this to cause a denial of service. (CVE-2022-28356)

It was discovered that the 8 Devices USB2CAN interface implementation in
the Linux kernel did not properly handle certain error conditions, leading
to a double-free. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2022-28388)
CVEs:
- https://ubuntu.com/security/CVE-2021-3609
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2021-39714
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-0330
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2022-24958
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-28388
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2021-3609
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2022-24958
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2021-39714
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-28388
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-0330

Title: USN-5500-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5500-1
Priorities: medium,low
Description:
Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some error conditions. A local
attacker could use this to cause a denial of service. (CVE-2022-28356)
CVEs:
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2022-1679

Title: USN-5498-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5498-1
Priorities: low,medium
Description:
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-1733
- https://ubuntu.com/security/CVE-2022-0413
- https://ubuntu.com/security/CVE-2022-1785
- https://ubuntu.com/security/CVE-2022-1851
- https://ubuntu.com/security/CVE-2022-1629
- https://ubuntu.com/security/CVE-2022-1796
- https://ubuntu.com/security/CVE-2022-1898
- https://ubuntu.com/security/CVE-2022-1735

Title: LSN-0087-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0087-1
Priorities: high,medium
Description:
Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-1966)

Ziming Zhang discovered that the netfilter subsystem in the Linux kernel
did not properly validate sets with multiple ranged fields. A local
attacker could use this to cause a denial of service or execute arbitrary
code.(CVE-2022-1972)
CVEs:
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2022-1972
- https://ubuntu.com/security/CVE-2022-1972
- https://ubuntu.com/security/CVE-2022-1966

Title: USN-5492-1: Vim vulnerability
URL: https://ubuntu.com/security/notices/USN-5492-1
Priorities: medium
Description:
It was discovered that Vim incorrectly handled memory when opening and
searching the contents of certain files. If an attacker could trick a user
into opening a specially crafted file, it could cause Vim to crash.
CVEs:
- https://ubuntu.com/security/CVE-2022-2042

Title: USN-5485-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5485-1
Priorities: medium
Description:
It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)
CVEs:
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2022-21125

Title: USN-5487-3: Apache HTTP Server regression
URL: https://ubuntu.com/security/notices/USN-5487-3
Priorities: medium,low
Description:
USN-5487-1 fixed several vulnerabilities in Apache HTTP Server.
Unfortunately it caused regressions. USN-5487-2 reverted the
patches that caused the regression in Ubuntu 14.04 ESM for further
investigation. This update re-adds the security fixes for Ubuntu
14.04 ESM and fixes two different regressions: one affecting mod_proxy
only in Ubuntu 14.04 ESM and another in mod_sed affecting also Ubuntu 16.04 ESM
and Ubuntu 18.04 LTS.

We apologize for the inconvenience.

Original advisory details:

It was discovered that Apache HTTP Server mod_proxy_ajp incorrectly handled
certain crafted request. A remote attacker could possibly use this issue to
perform an HTTP Request Smuggling attack. (CVE-2022-26377)

It was discovered that Apache HTTP Server incorrectly handled certain
request. An attacker could possibly use this issue to cause a denial
of service. (CVE-2022-28614)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to cause a crash or expose
sensitive information. (CVE-2022-28615)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-29404)

It was discovered that Apache HTTP Server incorrectly handled certain
request. An attacker could possibly use this issue to cause a crash.
(CVE-2022-30522)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to execute arbitrary code or cause
a crash. (CVE-2022-30556)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to bypass IP based authentication.
(CVE-2022-31813)
CVEs:
- https://ubuntu.com/security/CVE-2022-26377
- https://ubuntu.com/security/CVE-2022-28614
- https://ubuntu.com/security/CVE-2022-28615
- https://ubuntu.com/security/CVE-2022-29404
- https://ubuntu.com/security/CVE-2022-30522
- https://ubuntu.com/security/CVE-2022-30556
- https://ubuntu.com/security/CVE-2022-31813
- https://ubuntu.com/security/CVE-2022-26377
- https://ubuntu.com/security/CVE-2022-31813
- https://ubuntu.com/security/CVE-2022-28614
- https://ubuntu.com/security/CVE-2022-29404
- https://ubuntu.com/security/CVE-2022-28615
- https://ubuntu.com/security/CVE-2022-30522
- https://ubuntu.com/security/CVE-2022-30556

Title: USN-5487-1: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5487-1
Priorities: medium,low
Description:
It was discovered that Apache HTTP Server mod_proxy_ajp incorrectly handled
certain crafted request. A remote attacker could possibly use this issue to
perform an HTTP Request Smuggling attack. (CVE-2022-26377)

It was discovered that Apache HTTP Server incorrectly handled certain
request. An attacker could possibly use this issue to cause a denial
of service. (CVE-2022-28614)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to cause a crash or expose
sensitive information. (CVE-2022-28615)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-29404)

It was discovered that Apache HTTP Server incorrectly handled certain
request. An attacker could possibly use this issue to cause a crash.
(CVE-2022-30522)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to execute arbitrary code or cause
a crash. (CVE-2022-30556)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to bypass IP based authentication.
(CVE-2022-31813)
CVEs:
- https://ubuntu.com/security/CVE-2022-26377
- https://ubuntu.com/security/CVE-2022-28614
- https://ubuntu.com/security/CVE-2022-28615
- https://ubuntu.com/security/CVE-2022-29404
- https://ubuntu.com/security/CVE-2022-30522
- https://ubuntu.com/security/CVE-2022-30556
- https://ubuntu.com/security/CVE-2022-31813
- https://ubuntu.com/security/CVE-2022-29404
- https://ubuntu.com/security/CVE-2022-26377
- https://ubuntu.com/security/CVE-2022-31813
- https://ubuntu.com/security/CVE-2022-30556
- https://ubuntu.com/security/CVE-2022-30522
- https://ubuntu.com/security/CVE-2022-28614
- https://ubuntu.com/security/CVE-2022-28615

Title: USN-5499-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5499-1
Priorities: low,medium
Description:
Florian Kohnhuser discovered that curl incorrectly handled returning a
TLS server’s certificate chain details. A remote attacker could possibly
use this issue to cause curl to stop responding, resulting in a denial of
service. (CVE-2022-27781)

Harry Sintonen discovered that curl incorrectly handled certain FTP-KRB
messages. An attacker could possibly use this to perform a
machine-in-the-middle attack. (CVE-2022-32208)
CVEs:
- https://ubuntu.com/security/CVE-2022-27781
- https://ubuntu.com/security/CVE-2022-32208
- https://ubuntu.com/security/CVE-2022-32208
- https://ubuntu.com/security/CVE-2022-27781

Title: USN-5493-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5493-1
Priorities: medium
Description:
It was discovered that the 8 Devices USB2CAN interface implementation in
the Linux kernel did not properly handle certain error conditions, leading
to a double-free. A local attacker could possibly use this to cause a
denial of service (system crash).
CVEs:
- https://ubuntu.com/security/CVE-2022-28388

621.252

Available in the Broadcom Support portal

Release Date: June 17, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.80

USNs:


Title: USN-5477-1: ncurses vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5477-1
Priorities: negligible,low
Description:
Hosein Askari discovered that ncurses was incorrectly performing
memory management operations when dealing with long filenames while
writing structures into the file system. An attacker could possibly
use this issue to cause a denial of service or execute arbitrary
code. (CVE-2017-16879)

Chung-Yi Lin discovered that ncurses was incorrectly handling access
to invalid memory areas when parsing terminfo or termcap entries where
the use-name had invalid syntax. An attacker could possibly use this
issue to cause a denial of service. (CVE-2018-19211)

It was discovered that ncurses was incorrectly performing bounds
checks when processing invalid hashcodes. An attacker could possibly
use this issue to cause a denial of service or to expose sensitive
information. (CVE-2019-17594)

It was discovered that ncurses was incorrectly handling
end-of-string characters when processing terminfo and termcap files.
An attacker could possibly use this issue to cause a denial of
service or to expose sensitive information. (CVE-2019-17595)

It was discovered that ncurses was incorrectly handling
end-of-string characters when converting between termcap and
terminfo formats. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary code. (CVE-2021-39537)

It was discovered that ncurses was incorrectly performing bounds
checks when dealing with corrupt terminfo data while reading a
terminfo file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information.
(CVE-2022-29458)
CVEs:
- https://ubuntu.com/security/CVE-2017-16879
- https://ubuntu.com/security/CVE-2018-19211
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2019-17595
- https://ubuntu.com/security/CVE-2021-39537
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2017-16879
- https://ubuntu.com/security/CVE-2018-19211
- https://ubuntu.com/security/CVE-2019-17595
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2021-39537

Title: LSN-0087-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0087-1
Priorities: high,medium
Description:
Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-1966)

Ziming Zhang discovered that the netfilter subsystem in the Linux kernel
did not properly validate sets with multiple ranged fields. A local
attacker could use this to cause a denial of service or execute arbitrary
code.(CVE-2022-1972)
CVEs:
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2022-1972
- https://ubuntu.com/security/CVE-2022-1972
- https://ubuntu.com/security/CVE-2022-1966

621.251

Available in the Broadcom Support portal

Release Date: June 14, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.80

USNs:


Title: LSN-0086-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0086-1
Priorities: high,medium
Description:
It was discovered that a race condition existed in the network scheduling
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-39713)

Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges.(CVE-2022-0492)

It was discovered that the network traffic control implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2022-1055)

Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the Linux
kernel contained in integer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-1116)

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.(CVE-2022-21499)

Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code.(CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions.(CVE-2022-30594)
CVEs:
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2022-1055
- https://ubuntu.com/security/CVE-2022-1116
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-1055
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-1116
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2022-29581

Title: USN-5458-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5458-1
Priorities: low,medium
Description:
It was discovered that Vim was incorrectly handling virtual column
position operations, which could result in an out-of-bounds read. An
attacker could possibly use this issue to expose sensitive
information. (CVE-2021-4193)

It was discovered that Vim was not properly performing bounds checks
when updating windows present on a screen, which could result in a
heap buffer overflow. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2022-0213)

It was discovered that Vim was incorrectly handling window
exchanging operations when in Visual mode, which could result in an
out-of-bounds read. An attacker could possibly use this issue to
expose sensitive information. (CVE-2022-0319)

It was discovered that Vim was incorrectly handling recursion when
parsing conditional expressions. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary code.
(CVE-2022-0351)

It was discovered that Vim was not properly handling memory
allocation when processing data in Ex mode, which could result in a
heap buffer overflow. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code.
(CVE-2022-0359)

It was discovered that Vim was not properly performing bounds checks
when executing line operations in Visual mode, which could result in
a heap buffer overflow. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code.
(CVE-2022-0361, CVE-2022-0368)

It was discovered that Vim was not properly handling loop conditions
when looking for spell suggestions, which could result in a stack
buffer overflow. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary code. (CVE-2022-0408)

It was discovered that Vim was incorrectly handling memory access
when executing buffer operations, which could result in the usage of
freed memory. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2022-0443)
CVEs:
- https://ubuntu.com/security/CVE-2021-4193
- https://ubuntu.com/security/CVE-2022-0213
- https://ubuntu.com/security/CVE-2022-0319
- https://ubuntu.com/security/CVE-2022-0351
- https://ubuntu.com/security/CVE-2022-0359
- https://ubuntu.com/security/CVE-2022-0361
- https://ubuntu.com/security/CVE-2022-0368
- https://ubuntu.com/security/CVE-2022-0408
- https://ubuntu.com/security/CVE-2022-0443
- https://ubuntu.com/security/CVE-2022-0361
- https://ubuntu.com/security/CVE-2021-4193
- https://ubuntu.com/security/CVE-2022-0359
- https://ubuntu.com/security/CVE-2022-0319
- https://ubuntu.com/security/CVE-2022-0443
- https://ubuntu.com/security/CVE-2022-0368
- https://ubuntu.com/security/CVE-2022-0213
- https://ubuntu.com/security/CVE-2022-0351
- https://ubuntu.com/security/CVE-2022-0408

Title: USN-5464-1: e2fsprogs vulnerability
URL: https://ubuntu.com/security/notices/USN-5464-1
Priorities: medium
Description:
Nils Bars discovered that e2fsprogs incorrectly handled certain file
systems. A local attacker could use this issue with a crafted file
system image to possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-1304

Title: USN-5466-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5466-1
Priorities: high,low,medium
Description:
It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

It was discovered that the SCTP protocol implementation in the Linux kernel
did not properly verify VTAGs in some situations. A remote attacker could
possibly use this to cause a denial of service (connection disassociation).
(CVE-2021-3772)

It was discovered that the btrfs file system implementation in the Linux
kernel did not properly handle locking in certain error conditions. A local
attacker could use this to cause a denial of service (kernel deadlock).
(CVE-2021-4149)

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some error conditions. A local
attacker could use this to cause a denial of service. (CVE-2022-28356)

It was discovered that the EMS CAN/USB interface implementation in the
Linux kernel contained a double-free vulnerability when handling certain
error conditions. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-28390)
CVEs:
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2021-3772
- https://ubuntu.com/security/CVE-2021-4149
- https://ubuntu.com/security/CVE-2022-1016
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-28390
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-1016
- https://ubuntu.com/security/CVE-2021-4149
- https://ubuntu.com/security/CVE-2022-28390
- https://ubuntu.com/security/CVE-2021-3772
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-1419

Title: USN-5465-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5465-1
Priorities: high,medium
Description:
It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)
CVEs:
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-30594

Title: USN-5454-2: CUPS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5454-2
Priorities: medium,low
Description:
USN-5454-1 fixed several vulnerabilities in CUPS. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Joshua Mason discovered that CUPS incorrectly handled the secret key used
to access the administrative web interface. A remote attacker could
possibly use this issue to open a session as an administrator and execute
arbitrary code. (CVE-2022-26691)

It was discovered that CUPS incorrectly handled certain memory operations
when handling IPP printing. A remote attacker could possibly use this issue
to cause CUPS to crash, leading to a denial of service, or obtain sensitive
information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04
LTS. (CVE-2019-8842, CVE-2020-10001)
CVEs:
- https://ubuntu.com/security/CVE-2022-26691
- https://ubuntu.com/security/CVE-2019-8842
- https://ubuntu.com/security/CVE-2020-10001
- https://ubuntu.com/security/CVE-2022-26691
- https://ubuntu.com/security/CVE-2020-10001
- https://ubuntu.com/security/CVE-2019-8842

Title: USN-5456-1: ImageMagick vulnerability
URL: https://ubuntu.com/security/notices/USN-5456-1
Priorities: medium
Description:
It was discovered that ImageMagick incorrectly handled memory under
certain circumstances. If a user were tricked into opening a specially
crafted image, an attacker could possibly exploit this issue to cause a
denial of service or other unspecified impact.
CVEs:
- https://ubuntu.com/security/CVE-2022-28463

Title: USN-5462-2: Ruby vulnerability
URL: https://ubuntu.com/security/notices/USN-5462-2
Priorities: low
Description:
USN-5462-1 fixed several vulnerabilities in Ruby. This update provides
the corresponding CVE-2022-28739 update for ruby2.3 on Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-28739
- https://ubuntu.com/security/CVE-2022-28739

621.245

Available in the Broadcom Support portal

Release Date: June 02, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.78

USNs:


Title: USN-5449-1: libXv vulnerability
URL: https://ubuntu.com/security/notices/USN-5449-1
Priorities: low
Description:
It was discovered that libXv incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial
of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2016-5407

Title: USN-5437-1: libXfixes vulnerability
URL: https://ubuntu.com/security/notices/USN-5437-1
Priorities: low
Description:
Tobias Stoeckmann discovered that libXfixes incorrectly handled certain
inputs. An attacker could possibly use this issue to cause a denial
of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2016-7944

Title: LSN-0086-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0086-1
Priorities: high,medium
Description:
It was discovered that a race condition existed in the network scheduling
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-39713)

Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges.(CVE-2022-0492)

It was discovered that the network traffic control implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2022-1055)

Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the Linux
kernel contained in integer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-1116)

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.(CVE-2022-21499)

Nick Gregory discovered that the Linux kernel incorrectly handled network
offload functionality. A local attacker could use this to cause a denial of
service or possibly execute arbitrary code.(CVE-2022-25636)

Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code.(CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions.(CVE-2022-30594)
CVEs:
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2022-1055
- https://ubuntu.com/security/CVE-2022-1116
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-25636
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-1055
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2022-25636
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-1116
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2022-29581

Title: USN-5452-1: NTFS-3G vulnerability
URL: https://ubuntu.com/security/notices/USN-5452-1
Priorities: low
Description:
It was discovered that NTFS-3G was incorrectly validating NTFS
metadata in its ntfsck tool by not performing boundary checks. A
local attacker could possibly use this issue to cause a denial of
service or to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-46790

Title: USN-5402-2: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5402-2
Priorities: medium,low
Description:
USN-5402-1 fixed several vulnerabilities in OpenSSL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Elison Niven discovered that OpenSSL incorrectly handled the c_rehash
script. A local attacker could possibly use this issue to execute arbitrary
commands when c_rehash is run. (CVE-2022-1292)

Aliaksei Levin discovered that OpenSSL incorrectly handled resources when
decoding certificates and keys. A remote attacker could possibly use this
issue to cause OpenSSL to consume resources, leading to a denial of
service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1473)
CVEs:
- https://ubuntu.com/security/CVE-2022-1292
- https://ubuntu.com/security/CVE-2022-1473
- https://ubuntu.com/security/CVE-2022-1473
- https://ubuntu.com/security/CVE-2022-1292

Title: USN-5446-2: dpkg vulnerability
URL: https://ubuntu.com/security/notices/USN-5446-2
Priorities: medium
Description:
USN-5446-1 fixed a vulnerability in dpkg. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Max Justicz discovered that dpkg incorrectly handled unpacking certain
source packages. If a user or an automated system were tricked into
unpacking a specially crafted source package, a remote attacker could
modify files outside the target unpack directory, leading to a denial of
service or potentially gaining access to the system.
CVEs:
- https://ubuntu.com/security/CVE-2022-1664

Title: USN-5404-2: Rsyslog vulnerability
URL: https://ubuntu.com/security/notices/USN-5404-2
Priorities: medium
Description:
USN-5404-1 addressed a vulnerability in Rsyslog. This update
provides the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Pieter Agten discovered that Rsyslog incorrectly handled certain requests.
An attacker could possibly use this issue to cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2022-24903

Title: USN-5453-1: FreeType vulnerability
URL: https://ubuntu.com/security/notices/USN-5453-1
Priorities: low
Description:
It was discovered that FreeType incorrectly handled certain font files.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-27406

Title: USN-5443-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5443-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)
CVEs:
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594

621.244

Available in the Broadcom Support portal

Release Date: May 25, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.77

USNs:


Title: USN-5428-1: libXrandr vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5428-1
Priorities: low
Description:
Tobias Stoeckmann discovered that libXrandr incorrectly handled certain
responses. An attacker could possibly use this issue to cause a denial
of service, or possibly execute arbitrary code.
(CVE-2016-7947, CVE-2016-7948)
CVEs:
- https://ubuntu.com/security/CVE-2016-7947
- https://ubuntu.com/security/CVE-2016-7948
- https://ubuntu.com/security/CVE-2016-7947
- https://ubuntu.com/security/CVE-2016-7948

Title: USN-5436-1: libXrender vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5436-1
Priorities: low
Description:
Tobias Stoeckmann discovered that libXrender incorrectly handled certain
responses. An attacker could possibly use this issue to cause a denial
of service, or possibly execute arbitrary code.
(CVE-2016-7949, CVE-2016-7950)
CVEs:
- https://ubuntu.com/security/CVE-2016-7949
- https://ubuntu.com/security/CVE-2016-7950
- https://ubuntu.com/security/CVE-2016-7950
- https://ubuntu.com/security/CVE-2016-7949

Title: USN-5432-1: libpng vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5432-1
Priorities: low
Description:
It was discovered that libpng incorrectly handled memory when parsing
certain PNG files. If a user or automated system were tricked into opening
a specially crafted PNG file, an attacker could use this issue to cause
libpng to crash, resulting in a denial of service, or possible execute
arbitrary code. (CVE-2017-12652)

Zhengxiong Luo discovered that libpng incorrectly handled memory when parsing
certain PNG files. If a user or automated system were tricked into opening
a specially crafted PNG file, an attacker could use this issue to cause
libpng to crash, resulting in a denial of service, or possible execute
arbitrary code. (CVE-2018-14048)
CVEs:
- https://ubuntu.com/security/CVE-2017-12652
- https://ubuntu.com/security/CVE-2018-14048
- https://ubuntu.com/security/CVE-2017-12652
- https://ubuntu.com/security/CVE-2018-14048

Title: USN-5425-1: PCRE vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5425-1
Priorities: low,negligible
Description:
Yunho Kim discovered that PCRE incorrectly handled memory when
handling certain regular expressions. An attacker could possibly use
this issue to cause applications using PCRE to expose sensitive
information. This issue only affects Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 21.10 and Ubuntu 22.04 LTS. (CVE-2019-20838)

It was discovered that PCRE incorrectly handled memory when
handling certain regular expressions. An attacker could possibly use
this issue to cause applications using PCRE to have unexpected
behavior. This issue only affects Ubuntu 14.04 ESM, Ubuntu 16.04 ESM,
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-14155)
CVEs:
- https://ubuntu.com/security/CVE-2019-20838
- https://ubuntu.com/security/CVE-2020-14155
- https://ubuntu.com/security/CVE-2020-14155
- https://ubuntu.com/security/CVE-2019-20838

Title: USN-5421-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5421-1
Priorities: negligible,low,medium
Description:
It was discovered that LibTIFF incorrectly handled certain images.
An attacker could possibly use this issue to cause a crash,
resulting in a denial of service. This issue only affects
Ubuntu 14.04 ESM, Ubuntu 16.04 ESM, Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-35522)

Chintan Shah discovered that LibTIFF incorrectly handled memory when
handling certain images. An attacker could possibly use this issue to
cause a crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2022-0561, CVE-2022-0562, CVE-2022-0891)

It was discovered that LibTIFF incorrectly handled certain images.
An attacker could possibly use this issue to cause a crash,
resulting in a denial of service. This issue only affects
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 21.10. (CVE-2022-0865)
CVEs:
- https://ubuntu.com/security/CVE-2020-35522
- https://ubuntu.com/security/CVE-2022-0561
- https://ubuntu.com/security/CVE-2022-0562
- https://ubuntu.com/security/CVE-2022-0891
- https://ubuntu.com/security/CVE-2022-0865
- https://ubuntu.com/security/CVE-2022-0891
- https://ubuntu.com/security/CVE-2022-0562
- https://ubuntu.com/security/CVE-2022-0561
- https://ubuntu.com/security/CVE-2020-35522
- https://ubuntu.com/security/CVE-2022-0865

Title: USN-5423-2: ClamAV vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5423-2
Priorities: low,medium
Description:
USN-5423-1 fixed several vulnerabilities in ClamAV. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.


Original advisory details:

Michał Dardas discovered that ClamAV incorrectly handled parsing CHM files.
A remote attacker could possibly use this issue to cause ClamAV to stop
responding, resulting in a denial of service. (CVE-2022-20770)

Michał Dardas discovered that ClamAV incorrectly handled parsing TIFF
files. A remote attacker could possibly use this issue to cause ClamAV to
stop responding, resulting in a denial of service. (CVE-2022-20771)

Michał Dardas discovered that ClamAV incorrectly handled parsing HTML
files. A remote attacker could possibly use this issue to cause ClamAV to
consume resources, resulting in a denial of service. (CVE-2022-20785)

Michał Dardas discovered that ClamAV incorrectly handled loading the
signature database. A remote attacker could possibly use this issue to
cause ClamAV to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2022-20792)

Alexander Patrakov and Antoine Gatineau discovered that ClamAV incorrectly
handled the scan verdict cache check. A remote attacker could possibly use
this issue to cause ClamAV to crash, resulting in a denial of service, or
possibly execute arbitrary code.(CVE-2022-20796)
CVEs:
- https://ubuntu.com/security/CVE-2022-20770
- https://ubuntu.com/security/CVE-2022-20771
- https://ubuntu.com/security/CVE-2022-20785
- https://ubuntu.com/security/CVE-2022-20792
- https://ubuntu.com/security/CVE-2022-20796
- https://ubuntu.com/security/CVE-2022-20771
- https://ubuntu.com/security/CVE-2022-20796
- https://ubuntu.com/security/CVE-2022-20785
- https://ubuntu.com/security/CVE-2022-20792
- https://ubuntu.com/security/CVE-2022-20770

Title: USN-5424-2: OpenLDAP vulnerability
URL: https://ubuntu.com/security/notices/USN-5424-2
Priorities: medium
Description:
USN-5424-1 fixed a vulnerability in OpenLDAP. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that OpenLDAP incorrectly handled certain SQL statements
within LDAP queries in the experimental back-sql backend. A remote attacker
could possibly use this issue to perform an SQL injection attack and alter
the database.
CVEs:
- https://ubuntu.com/security/CVE-2022-29155

Title: USN-5443-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5443-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)
CVEs:
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594

621.241

Available in the Broadcom Support portal

Release Date: May 17, 2022

Known issues

Xenial Stemcell Versions 621.241 through 621.305 contain a Linux kernel slab memory leak.

Not all workloads and configurations are affected, but anyone planning to upgrade to one of these stemcell versions are urged to not use the affected versions and to use stemcell version 621.330 or later.

For more information about how to detect the issue, please see this Knowledge Base article: https://community.pivotal.io/s/article/Slab-memory-leak-Ubuntu-Xenial

NOTE: This issue has been resolved in Stemcell version 621.330.

Metadata:

BOSH Agent Version: 2.268.76

USNs:


Title: USN-5407-1: Cairo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5407-1
Priorities: low
Description:
Gustavo Grieco, Alberto Garcia, Francisco Oca, Suleman Ali, and others
discovered that Cairo incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2016-9082, CVE-2017-9814, CVE-2019-6462)

Stephan Bergmann discovered that Cairo incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service,
or possibly execute arbitrary code.
(CVE-2020-35492)
CVEs:
- https://ubuntu.com/security/CVE-2016-9082
- https://ubuntu.com/security/CVE-2017-9814
- https://ubuntu.com/security/CVE-2019-6462
- https://ubuntu.com/security/CVE-2020-35492
- https://ubuntu.com/security/CVE-2017-9814
- https://ubuntu.com/security/CVE-2020-35492
- https://ubuntu.com/security/CVE-2019-6462
- https://ubuntu.com/security/CVE-2016-9082

Title: USN-5389-1: Libcroco vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5389-1
Priorities: low
Description:
It was discovered that Libcroco was incorrectly accessing data structures when
reading bytes from memory, which could cause a heap buffer overflow. An attacker
could possibly use this issue to cause a denial of service. (CVE-2017-7960)

It was discovered that Libcroco was incorrectly handling invalid UTF-8 values
when processing CSS files. An attacker could possibly use this issue to cause
a denial of service. (CVE-2017-8834, CVE-2017-8871)

It was discovered that Libcroco was incorrectly implementing recursion in one
of its parsing functions, which could cause an infinite recursion loop and a
stack overflow due to stack consumption. An attacker could possibly use this
issue to cause a denial of service. (CVE-2020-12825)
CVEs:
- https://ubuntu.com/security/CVE-2017-7960
- https://ubuntu.com/security/CVE-2017-8834
- https://ubuntu.com/security/CVE-2017-8871
- https://ubuntu.com/security/CVE-2020-12825
- https://ubuntu.com/security/CVE-2020-12825
- https://ubuntu.com/security/CVE-2017-8834
- https://ubuntu.com/security/CVE-2017-8871
- https://ubuntu.com/security/CVE-2017-7960

Title: USN-5405-1: jbig2dec vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5405-1
Priorities: low
Description:
It was discovered that jbig2dec incorrectly handled memory when parsing
invalid files. An attacker could use this issue to cause jbig2dec to crash,
leading to a denial of service. (CVE-2017-9216)

It was discovered that jbig2dec incorrectly handled memory when processing
untrusted input. An attacker could use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2020-12268)
CVEs:
- https://ubuntu.com/security/CVE-2017-9216
- https://ubuntu.com/security/CVE-2020-12268
- https://ubuntu.com/security/CVE-2017-9216
- https://ubuntu.com/security/CVE-2020-12268

Title: USN-5259-3: Cron regression
URL: https://ubuntu.com/security/notices/USN-5259-3
Priorities: low
Description:
USN-5259-1 and USN-5259-2 fixed vulnerabilities in Cron. Unfortunately
that update was incomplete and could introduce a regression. This update
fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that the postinst maintainer script in Cron unsafely
handled file permissions during package install or update operations.
An attacker could possibly use this issue to perform a privilege
escalation attack. (CVE-2017-9525)

Florian Weimer discovered that Cron incorrectly handled certain memory
operations during crontab file creation. An attacker could possibly use
this issue to cause a denial of service. (CVE-2019-9704)

It was discovered that Cron incorrectly handled user input during crontab
file creation. An attacker could possibly use this issue to cause a denial
of service. (CVE-2019-9705)

It was discovered that Cron contained a use-after-free vulnerability in
its force_rescan_user function. An attacker could possibly use this issue
to cause a denial of service. (CVE-2019-9706)
CVEs:
- https://ubuntu.com/security/CVE-2017-9525
- https://ubuntu.com/security/CVE-2019-9704
- https://ubuntu.com/security/CVE-2019-9705
- https://ubuntu.com/security/CVE-2019-9706
- https://ubuntu.com/security/CVE-2017-9525

Title: USN-5419-1: Rsyslog vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5419-1
Priorities: low
Description:
It was discovered that Rsyslog improperly handled certain invalid input. An
attacker could use this issue to cause Rsyslog to crash.
CVEs:
- https://ubuntu.com/security/CVE-2018-16881
- https://ubuntu.com/security/CVE-2019-17042
- https://ubuntu.com/security/CVE-2019-17041

Title: USN-5413-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5413-1
Priorities: low,medium
Description:
Jeremy Cline discovered a use-after-free in the nouveau graphics driver of
the Linux kernel during device removal. A privileged or physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2020-27820)

It was discovered that a race condition existed in the network scheduling
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-39713)

It was discovered that the Parallel NFS (pNFS) implementation in the Linux
kernel did not properly perform bounds checking in some situations. An
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-4157)

It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)

It was discovered that the Xilinx USB2 device gadget driver in the Linux
kernel did not properly validate endpoint indices from the host. A
physically proximate attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-27223)

It was discovered that the EMS CAN/USB interface implementation in the
Linux kernel contained a double-free vulnerability when handling certain
error conditions. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-28390)
CVEs:
- https://ubuntu.com/security/CVE-2020-27820
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2021-4157
- https://ubuntu.com/security/CVE-2022-26490
- https://ubuntu.com/security/CVE-2022-27223
- https://ubuntu.com/security/CVE-2022-28390
- https://ubuntu.com/security/CVE-2021-4157
- https://ubuntu.com/security/CVE-2022-26490
- https://ubuntu.com/security/CVE-2022-28390
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2022-27223
- https://ubuntu.com/security/CVE-2020-27820

Title: USN-5418-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5418-1
Priorities: medium,low
Description:
Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk,
Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre
Variant 2 mitigations for AMD processors on Linux were insufficient in some
situations. A local attacker could possibly use this to expose sensitive
information. (CVE-2021-26401)

Demi Marie Obenour and Simon Gaiser discovered that several Xen para-
virtualization device frontends did not properly restrict the access rights
of device backends. An attacker could possibly use a malicious Xen backend
to gain access to memory pages of a guest VM or cause a denial of service
in the guest. (CVE-2022-23036, CVE-2022-23037, CVE-2022-23038,
CVE-2022-23039, CVE-2022-23040, CVE-2022-23042)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

It was discovered that the USB gadget subsystem in the Linux kernel did not
properly validate interface descriptor requests. An attacker could possibly
use this to cause a denial of service (system crash). (CVE-2022-25258)

It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in
the Linux kernel did not properly validate the size of the RNDIS_MSG_SET
command. An attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-25375)

It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)

It was discovered that the USB SR9700 ethernet device driver for the Linux
kernel did not properly validate the length of requests from the device. A
physically proximate attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2022-26966)

It was discovered that the Xilinx USB2 device gadget driver in the Linux
kernel did not properly validate endpoint indices from the host. A
physically proximate attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-27223)
CVEs:
- https://ubuntu.com/security/CVE-2021-26401
- https://ubuntu.com/security/CVE-2022-23036
- https://ubuntu.com/security/CVE-2022-23037
- https://ubuntu.com/security/CVE-2022-23038
- https://ubuntu.com/security/CVE-2022-23039
- https://ubuntu.com/security/CVE-2022-23040
- https://ubuntu.com/security/CVE-2022-23042
- https://ubuntu.com/security/CVE-2022-24958
- https://ubuntu.com/security/CVE-2022-25258
- https://ubuntu.com/security/CVE-2022-25375
- https://ubuntu.com/security/CVE-2022-26490
- https://ubuntu.com/security/CVE-2022-26966
- https://ubuntu.com/security/CVE-2022-27223
- https://ubuntu.com/security/CVE-2022-27223
- https://ubuntu.com/security/CVE-2022-23038
- https://ubuntu.com/security/CVE-2022-24958
- https://ubuntu.com/security/CVE-2021-26401
- https://ubuntu.com/security/CVE-2022-23042
- https://ubuntu.com/security/CVE-2022-25258
- https://ubuntu.com/security/CVE-2022-26490
- https://ubuntu.com/security/CVE-2022-26966
- https://ubuntu.com/security/CVE-2022-23039
- https://ubuntu.com/security/CVE-2022-23040
- https://ubuntu.com/security/CVE-2022-25375
- https://ubuntu.com/security/CVE-2022-23037
- https://ubuntu.com/security/CVE-2022-23036

Title: USN-5179-2: BusyBox vulnerability
URL: https://ubuntu.com/security/notices/USN-5179-2
Priorities: low
Description:
USN-5179-1 fixed vulnerabilities in BusyBox. This update provides the
corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that BusyBox incorrectly handled certain malformed gzip
archives. If a user or automated system were tricked into processing a
specially crafted gzip archive, a remote attacker could use this issue to
cause BusyBox to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-28831)
CVEs:
- https://ubuntu.com/security/CVE-2021-28831
- https://ubuntu.com/security/CVE-2021-28831

Title: USN-5392-1: Mutt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5392-1
Priorities: low,medium
Description:
It was discovered that Mutt incorrectly handled certain requests.
An attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 20.04 LTS. (CVE-2021-32055)

It was discovered that Mutt incorrectly handled certain input.
An attacker could possibly use this issue to cause a crash,
or expose sensitive information. (CVE-2022-1328)
CVEs:
- https://ubuntu.com/security/CVE-2021-32055
- https://ubuntu.com/security/CVE-2022-1328
- https://ubuntu.com/security/CVE-2022-1328
- https://ubuntu.com/security/CVE-2021-32055

Title: USN-5391-1: libsepol vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5391-1
Priorities: low
Description:
Nicolas Iooss discovered that libsepol incorrectly handled memory
when handling policies. An attacker could possibly use this issue
to cause a crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-36084)

It was discovered that libsepol incorrectly handled memory when
handling policies. An attacker could possibly use this issue to cause
a crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-36085)

It was discovered that libsepol incorrectly handled memory when
handling policies. An attacker could possibly use this issue to cause
a crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affects Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 21.10. (CVE-2021-36086)

It was discovered that libsepol incorrectly validated certain data,
leading to a heap overflow. An attacker could possibly use this issue
to cause a crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-36087)
CVEs:
- https://ubuntu.com/security/CVE-2021-36084
- https://ubuntu.com/security/CVE-2021-36085
- https://ubuntu.com/security/CVE-2021-36086
- https://ubuntu.com/security/CVE-2021-36087
- https://ubuntu.com/security/CVE-2021-36086
- https://ubuntu.com/security/CVE-2021-36085
- https://ubuntu.com/security/CVE-2021-36084
- https://ubuntu.com/security/CVE-2021-36087

Title: USN-5409-1: libsndfile vulnerability
URL: https://ubuntu.com/security/notices/USN-5409-1
Priorities: low
Description:
It was discovered that libsndfile was incorrectly performing memory
management operations and incorrectly using buffers when executing
its FLAC codec. If a user or automated system were tricked into
processing a specially crafted sound file, an attacker could
possibly use this issue to cause a denial of service or obtain
sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2021-4156

Title: USN-5385-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5385-1
Priorities: medium,low,negligible
Description:
Brendan Dolan-Gavitt discovered that the aQuantia AQtion Ethernet device
driver in the Linux kernel did not properly validate meta-data coming from
the device. A local attacker who can control an emulated device can use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2021-43975)

It was discovered that the UDF file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious UDF image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-0617)

Lyu Tao discovered that the NFS implementation in the Linux kernel did not
properly handle requests to open a directory on a regular file. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-24448)

It was discovered that the YAM AX.25 device driver in the Linux kernel did
not properly deallocate memory in some error conditions. A local privileged
attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2022-24959)
CVEs:
- https://ubuntu.com/security/CVE-2021-43975
- https://ubuntu.com/security/CVE-2022-0617
- https://ubuntu.com/security/CVE-2022-24448
- https://ubuntu.com/security/CVE-2022-24959
- https://ubuntu.com/security/CVE-2022-24448
- https://ubuntu.com/security/CVE-2022-24959
- https://ubuntu.com/security/CVE-2021-43975
- https://ubuntu.com/security/CVE-2022-0617

Title: USN-5400-2: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5400-2
Priorities: medium
Description:
USN-5400-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated in Ubuntu 16.04 ESM to MySQL 5.7.38.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-38.html
https://www.oracle.com/security-alerts/cpuapr2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21417
- https://ubuntu.com/security/CVE-2022-21451
- https://ubuntu.com/security/CVE-2022-21460
- https://ubuntu.com/security/CVE-2022-21444
- https://ubuntu.com/security/CVE-2022-21454
- https://ubuntu.com/security/CVE-2022-21427

Title: USN-5354-2: Twisted vulnerability
URL: https://ubuntu.com/security/notices/USN-5354-2
Priorities: medium
Description:
USN-5354-1 fixed vulnerabilities in Twisted. This update provides the
corresponding updates for Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and
Ubuntu 22.04 LTS.

Original advisory details:

It was discovered that Twisted incorrectly processed SSH handshake data on
connection establishments. A remote attacker could use this issue to cause
Twisted to crash, resulting in a denial of service. (CVE-2022-21716)
CVEs:
- https://ubuntu.com/security/CVE-2022-21716
- https://ubuntu.com/security/CVE-2022-21716

621.236

Available in the Broadcom Support portal

Release Date: April 21, 2022

Notice:

The kernel patches included in 621.224 are now in the main kernel repository and have been included in this release.

Metadata:

BOSH Agent Version: 2.268.72

USNs:


Title: USN-5371-1: nginx vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5371-1
Priorities: medium,low
Description:
It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11724)

It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to disclose sensitive
information. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-36309)

It was discovered that nginx mishandled the use of
compatible certificates among multiple encryption protocols.
If a remote attacker were able to intercept the communication,
this issue could be used to redirect traffic between subdomains.
(CVE-2021-3618)
CVEs:
- https://ubuntu.com/security/CVE-2020-11724
- https://ubuntu.com/security/CVE-2020-36309
- https://ubuntu.com/security/CVE-2021-3618
- https://ubuntu.com/security/CVE-2020-36309
- https://ubuntu.com/security/CVE-2021-3618
- https://ubuntu.com/security/CVE-2020-11724

Title: USN-5373-2: Django vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5373-2
Priorities: high,medium
Description:
USN-5373-1 fixed several vulnerabilities in Django. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Django incorrectly handled certain certain column
aliases in the QuerySet.annotate(), aggregate(), and extra() methods. A
remote attacker could possibly use this issue to perform an SQL injection
attack. (CVE-2022-28346)

It was discovered that the Django URLValidator function incorrectly handled
newlines and tabs. A remote attacker could possibly use this issue to
perform a header injection attack. (CVE-2021-32052)
CVEs:
- https://ubuntu.com/security/CVE-2022-28346
- https://ubuntu.com/security/CVE-2021-32052
- https://ubuntu.com/security/CVE-2021-32052
- https://ubuntu.com/security/CVE-2022-28346

621.224

Available in the Broadcom Support portal

Release Date: March 23, 2022

Notice:

This stemcell contains a patched version of the kernel to address the issues found in 621.216. We have tested this patched kernel against the problems seen in 621.216 and no longer see the problem. We will release another stemcell in mid-April when that kernel patch makes it into the main kernel repository.

Metadata:

BOSH Agent Version: 2.268.65

USNs:

Title: USN-5322-1: Subversion vulnerability
URL: https://ubuntu.com/security/notices/USN-5322-1
Priorities: medium
Description:
Thomas Akesson discovered that Subversion incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-17525

Title: USN-5328-2: OpenSSL vulnerability
URL: https://ubuntu.com/security/notices/USN-5328-2
Priorities: high
Description:
USN-5328-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Tavis Ormandy discovered that OpenSSL incorrectly parsed certain
certificates. A remote attacker could possibly use this issue to cause
OpenSSH to stop responding, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-0778

Title: USN-5320-1: Expat vulnerabilities and regression
URL: https://ubuntu.com/security/notices/USN-5320-1
Priorities: high,medium
Description:
USN-5288-1 fixed several vulnerabilities in Expat. For CVE-2022-25236 it
caused a regression and an additional patch was required. This update address
this regression and several other vulnerabilities.

It was discovered that Expat incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-25313)

It was discovered that Expat incorrectly handled certain files.
An attacker could possibly use this issue to cause a crash
or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 21.10. (CVE-2022-25314)

It was discovered that Expat incorrectly handled certain files.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. (CVE-2022-25315)

Original advisory details:

It was discovered that Expat incorrectly handled certain files.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code. (CVE-2022-25236)
CVEs:
- https://ubuntu.com/security/CVE-2022-25236
- https://ubuntu.com/security/CVE-2022-25313
- https://ubuntu.com/security/CVE-2022-25314
- https://ubuntu.com/security/CVE-2022-25315
- https://ubuntu.com/security/CVE-2022-25236
- https://ubuntu.com/security/CVE-2022-25314
- https://ubuntu.com/security/CVE-2022-25315
- https://ubuntu.com/security/CVE-2022-25313

Title: USN-5334-1: man-db vulnerability
URL: https://ubuntu.com/security/notices/USN-5334-1
Priorities: low
Description:
It was discovered that man-db incorrectly handled permission changing
operations in its daily cron job, and was therefore affected by a race
condition. An attacker could possibly use this issue to escalate privileges
and execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2015-1336

Title: USN-5331-1: tcpdump vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5331-1
Priorities: low
Description:
It was discovered that tcpdump incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2018-16301)

It was discovered that tcpdump incorrectly handled certain captured data.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2020-8037)
CVEs:
- https://ubuntu.com/security/CVE-2018-16301
- https://ubuntu.com/security/CVE-2020-8037
- https://ubuntu.com/security/CVE-2018-16301
- https://ubuntu.com/security/CVE-2020-8037

Title: USN-5325-1: Zsh vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5325-1
Priorities: low
Description:
Sam Foxman discovered that Zsh incorrectly handled certain inputs.
An attacker could possibly use this issue to regain dropped privileges.
(CVE-2019-20044)

It was discovered that Zsh incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-45444)
CVEs:
- https://ubuntu.com/security/CVE-2019-20044
- https://ubuntu.com/security/CVE-2021-45444
- https://ubuntu.com/security/CVE-2021-45444
- https://ubuntu.com/security/CVE-2019-20044

Title: USN-5329-1: tar vulnerability
URL: https://ubuntu.com/security/notices/USN-5329-1
Priorities: low
Description:
It was discovered that tar incorrectly handled certain files.
An attacker could possibly use this issue to cause tar to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2021-20193

Title: USN-5332-2: Bind vulnerability
URL: https://ubuntu.com/security/notices/USN-5332-2
Priorities: medium
Description:
USN-5332-1 fixed a vulnerability in Bind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Xiang Li, Baojun Liu, Chaoyi Lu, and Changgen Zou discovered that Bind
incorrectly handled certain bogus NS records when using forwarders. A
remote attacker could possibly use this issue to manipulate cache results.
(CVE-2021-25220)
CVEs:
- https://ubuntu.com/security/CVE-2021-25220
- https://ubuntu.com/security/CVE-2021-25220

Title: USN-5343-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5343-1
Priorities: high,low,medium,negligible
Description:
Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges. (CVE-2022-0492)

It was discovered that the aufs file system in the Linux kernel did not
properly restrict mount namespaces, when mounted with the non-default
allow_userns option set. A local attacker could use this to gain
administrative privileges. (CVE-2016-2853)

It was discovered that the aufs file system in the Linux kernel did not
properly maintain POSIX ACL xattr data, when mounted with the non-default
allow_userns option. A local attacker could possibly use this to gain
elevated privileges. (CVE-2016-2854)

It was discovered that the f2fs file system in the Linux kernel did not
properly validate metadata in some situations. An attacker could use this
to construct a malicious f2fs image that, when mounted and operated on,
could cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2019-19449)

It was discovered that the XFS file system implementation in the Linux
kernel did not properly validate meta data in some circumstances. An
attacker could use this to construct a malicious XFS image that, when
mounted, could cause a denial of service. (CVE-2020-12655)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2020-25670)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly deallocate memory in certain error
situations. A local attacker could use this to cause a denial of service
(memory exhaustion). (CVE-2020-25671, CVE-2020-25672)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly handle error conditions in some situations,
leading to an infinite loop. A local attacker could use this to cause a
denial of service. (CVE-2020-25673)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled EAPOL frames from unauthenticated senders. A physically
proximate attacker could inject malicious packets to cause a denial of
service (system crash). (CVE-2020-26139)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could
reassemble mixed encrypted and plaintext fragments. A physically proximate
attacker could possibly use this issue to inject packets or exfiltrate
selected fragments. (CVE-2020-26147)

It was discovered that the BR/EDR pin-code pairing procedure in the Linux
kernel was vulnerable to an impersonation attack. A physically proximate
attacker could possibly use this to pair to a device without knowledge of
the pin-code. (CVE-2020-26555)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly perform access control. An authenticated attacker could possibly
use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)

It was discovered that the FUSE user space file system implementation in
the Linux kernel did not properly handle bad inodes in some situations. A
local attacker could possibly use this to cause a denial of service.
(CVE-2020-36322)

It was discovered that the Infiniband RDMA userspace connection manager
implementation in the Linux kernel contained a race condition leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possible execute arbitrary code.
(CVE-2020-36385)

It was discovered that the DRM subsystem in the Linux kernel contained
double-free vulnerabilities. A privileged attacker could possibly use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2021-20292)

It was discovered that a race condition existed in the timer implementation
in the Linux kernel. A privileged attacker could use this to cause a denial
of service. (CVE-2021-20317)

Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the
nfc implementation in the Linux kernel. A privileged local attacker could
use this issue to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-23134)

It was discovered that the Xen paravirtualization backend in the Linux
kernel did not properly deallocate memory in some situations. A local
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2021-28688)

It was discovered that the RPA PCI Hotplug driver implementation in the
Linux kernel did not properly handle device name writes via sysfs, leading
to a buffer overflow. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2021-28972)

It was discovered that a race condition existed in the netfilter subsystem
of the Linux kernel when replacing tables. A local attacker could use this
to cause a denial of service (system crash). (CVE-2021-29650)

It was discovered that a race condition in the kernel Bluetooth subsystem
could lead to use-after-free of slab objects. An attacker could use this
issue to possibly execute arbitrary code. (CVE-2021-32399)

It was discovered that the CIPSO implementation in the Linux kernel did not
properly perform reference counting in some situations, leading to use-
after-free vulnerabilities. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33033)

It was discovered that a use-after-free existed in the Bluetooth HCI driver
of the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33034)

Asaf Modelevsky discovered that the Intel(R) Ethernet ixgbe driver for the
Linux kernel did not properly validate large MTU requests from Virtual
Function (VF) devices. A local attacker could possibly use this to cause a
denial of service. (CVE-2021-33098)

Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol
implementation in the Linux kernel did not properly initialize memory in
some situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2021-34693)

马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-3483)

It was discovered that an out-of-bounds (OOB) memory access flaw existed in
the f2fs module of the Linux kernel. A local attacker could use this issue
to cause a denial of service (system crash). (CVE-2021-3506)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device initialization failure, leading to a double-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3564)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device detach events, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3573)

Murray McAllister discovered that the joystick device interface in the
Linux kernel did not properly validate data passed via an ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code on systems with a joystick device
registered. (CVE-2021-3612)

It was discovered that the tracing subsystem in the Linux kernel did not
properly keep track of per-cpu ring buffer state. A privileged attacker
could use this to cause a denial of service. (CVE-2021-3679)

It was discovered that the Virtio console implementation in the Linux
kernel did not properly validate input lengths in some situations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2021-38160)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly compute the access permissions for shadow pages in
some situations. A local attacker could use this to cause a denial of
service. (CVE-2021-38198)

It was discovered that the MAX-3421 host USB device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2021-38204)

It was discovered that the NFC implementation in the Linux kernel did not
properly handle failed connect events leading to a NULL pointer
dereference. A local attacker could use this to cause a denial of service.
(CVE-2021-38208)

It was discovered that the configfs interface for USB gadgets in the Linux
kernel contained a race condition. A local attacker could possibly use this
to expose sensitive information (kernel memory). (CVE-2021-39648)

It was discovered that the ext4 file system in the Linux kernel contained a
race condition when writing xattrs to an inode. A local attacker could use
this to cause a denial of service or possibly gain administrative
privileges. (CVE-2021-40490)

It was discovered that the 6pack network protocol driver in the Linux
kernel did not properly perform validation checks. A privileged attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2021-42008)

It was discovered that the ISDN CAPI implementation in the Linux kernel
contained a race condition in certain situations that could trigger an
array out-of-bounds bug. A privileged local attacker could possibly use
this to cause a denial of service or execute arbitrary code.
(CVE-2021-43389)

It was discovered that the Phone Network protocol (PhoNet) implementation
in the Linux kernel did not properly perform reference counting in some
error conditions. A local attacker could possibly use this to cause a
denial of service (memory exhaustion). (CVE-2021-45095)

Wenqing Liu discovered that the f2fs file system in the Linux kernel did
not properly validate the last xattr entry in an inode. An attacker could
use this to construct a malicious f2fs image that, when mounted and
operated on, could cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-45469)

Amit Klein discovered that the IPv6 implementation in the Linux kernel
could disclose internal state in some situations. An attacker could
possibly use this to expose sensitive information. (CVE-2021-45485)

It was discovered that the per cpu memory allocator in the Linux kernel
could report kernel pointers via dmesg. An attacker could use this to
expose sensitive information or in conjunction with another kernel
vulnerability. (CVE-2018-5995)
CVEs:
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2016-2853
- https://ubuntu.com/security/CVE-2016-2854
- https://ubuntu.com/security/CVE-2019-19449
- https://ubuntu.com/security/CVE-2020-12655
- https://ubuntu.com/security/CVE-2020-25670
- https://ubuntu.com/security/CVE-2020-25671
- https://ubuntu.com/security/CVE-2020-25672
- https://ubuntu.com/security/CVE-2020-25673
- https://ubuntu.com/security/CVE-2020-26139
- https://ubuntu.com/security/CVE-2020-26147
- https://ubuntu.com/security/CVE-2020-26555
- https://ubuntu.com/security/CVE-2020-26558
- https://ubuntu.com/security/CVE-2021-0129
- https://ubuntu.com/security/CVE-2020-36322
- https://ubuntu.com/security/CVE-2020-36385
- https://ubuntu.com/security/CVE-2021-20292
- https://ubuntu.com/security/CVE-2021-20317
- https://ubuntu.com/security/CVE-2021-23134
- https://ubuntu.com/security/CVE-2021-28688
- https://ubuntu.com/security/CVE-2021-28972
- https://ubuntu.com/security/CVE-2021-29650
- https://ubuntu.com/security/CVE-2021-32399
- https://ubuntu.com/security/CVE-2021-33033
- https://ubuntu.com/security/CVE-2021-33034
- https://ubuntu.com/security/CVE-2021-33098
- https://ubuntu.com/security/CVE-2021-34693
- https://ubuntu.com/security/CVE-2021-3483
- https://ubuntu.com/security/CVE-2021-3506
- https://ubuntu.com/security/CVE-2021-3564
- https://ubuntu.com/security/CVE-2021-3573
- https://ubuntu.com/security/CVE-2021-3612
- https://ubuntu.com/security/CVE-2021-3679
- https://ubuntu.com/security/CVE-2021-38160
- https://ubuntu.com/security/CVE-2021-38198
- https://ubuntu.com/security/CVE-2021-38204
- https://ubuntu.com/security/CVE-2021-38208
- https://ubuntu.com/security/CVE-2021-39648
- https://ubuntu.com/security/CVE-2021-40490
- https://ubuntu.com/security/CVE-2021-42008
- https://ubuntu.com/security/CVE-2021-43389
- https://ubuntu.com/security/CVE-2021-45095
- https://ubuntu.com/security/CVE-2021-45469
- https://ubuntu.com/security/CVE-2021-45485
- https://ubuntu.com/security/CVE-2018-5995
- https://ubuntu.com/security/CVE-2020-25673
- https://ubuntu.com/security/CVE-2021-3564
- https://ubuntu.com/security/CVE-2021-0129
- https://ubuntu.com/security/CVE-2021-20317
- https://ubuntu.com/security/CVE-2020-26558
- https://ubuntu.com/security/CVE-2020-36385
- https://ubuntu.com/security/CVE-2021-39648
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2021-20292
- https://ubuntu.com/security/CVE-2020-25671
- https://ubuntu.com/security/CVE-2020-12655
- https://ubuntu.com/security/CVE-2021-34693
- https://ubuntu.com/security/CVE-2020-26147
- https://ubuntu.com/security/CVE-2018-5995
- https://ubuntu.com/security/CVE-2021-33034
- https://ubuntu.com/security/CVE-2020-25670
- https://ubuntu.com/security/CVE-2021-38198
- https://ubuntu.com/security/CVE-2021-40490
- https://ubuntu.com/security/CVE-2021-33033
- https://ubuntu.com/security/CVE-2021-43389
- https://ubuntu.com/security/CVE-2021-3612
- https://ubuntu.com/security/CVE-2021-38160
- https://ubuntu.com/security/CVE-2020-26139
- https://ubuntu.com/security/CVE-2016-2853
- https://ubuntu.com/security/CVE-2021-38204
- https://ubuntu.com/security/CVE-2021-33098
- https://ubuntu.com/security/CVE-2021-3573
- https://ubuntu.com/security/CVE-2021-45469
- https://ubuntu.com/security/CVE-2021-28688
- https://ubuntu.com/security/CVE-2021-38208
- https://ubuntu.com/security/CVE-2021-42008
- https://ubuntu.com/security/CVE-2020-25672
- https://ubuntu.com/security/CVE-2016-2854
- https://ubuntu.com/security/CVE-2021-45095
- https://ubuntu.com/security/CVE-2021-3679
- https://ubuntu.com/security/CVE-2020-36322
- https://ubuntu.com/security/CVE-2019-19449
- https://ubuntu.com/security/CVE-2021-45485
- https://ubuntu.com/security/CVE-2020-26555
- https://ubuntu.com/security/CVE-2021-28972
- https://ubuntu.com/security/CVE-2021-23134
- https://ubuntu.com/security/CVE-2021-32399
- https://ubuntu.com/security/CVE-2021-3506
- https://ubuntu.com/security/CVE-2021-3483
- https://ubuntu.com/security/CVE-2021-29650

Title: USN-5339-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5339-1
Priorities: high,medium,low
Description:
Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges. (CVE-2022-0492)

It was discovered that an out-of-bounds (OOB) memory access flaw existed in
the f2fs module of the Linux kernel. A local attacker could use this issue
to cause a denial of service (system crash). (CVE-2021-3506)

Brendan Dolan-Gavitt discovered that the Marvell WiFi-Ex USB device driver
in the Linux kernel did not properly handle some error conditions. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2021-43976)

It was discovered that the ARM Trusted Execution Environment (TEE)
subsystem in the Linux kernel contained a race condition leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service or possibly execute arbitrary code. (CVE-2021-44733)

It was discovered that the Phone Network protocol (PhoNet) implementation
in the Linux kernel did not properly perform reference counting in some
error conditions. A local attacker could possibly use this to cause a
denial of service (memory exhaustion). (CVE-2021-45095)

Samuel Page discovered that the Transparent Inter-Process Communication
(TIPC) protocol implementation in the Linux kernel contained a stack-based
buffer overflow. A remote attacker could use this to cause a denial of
service (system crash) for systems that have a TIPC bearer configured.
(CVE-2022-0435)
CVEs:
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2021-3506
- https://ubuntu.com/security/CVE-2021-43976
- https://ubuntu.com/security/CVE-2021-44733
- https://ubuntu.com/security/CVE-2021-45095
- https://ubuntu.com/security/CVE-2022-0435
- https://ubuntu.com/security/CVE-2022-0435
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2021-43976
- https://ubuntu.com/security/CVE-2021-3506
- https://ubuntu.com/security/CVE-2021-44733
- https://ubuntu.com/security/CVE-2021-45095

621.216

Release Date: March 09, 2022

Known Iissues

  • There are currently reported issues with this stemcell and TAS Diego Cells. We have removed this stemcell until we can resolve the issue. If you need access, please contact support.

Metadata:

BOSH Agent Version: 2.268.63

USNs:


Title: USN-5300-1: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5300-1
Priorities: low,medium
Description:
It was discovered that PHP incorrectly handled certain scripts.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2015-9253, CVE-2017-8923, CVE-2017-9118, CVE-2017-9120)

It was discovered that PHP incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service,
or possibly obtain sensitive information. (CVE-2017-9119)

It was discovered that PHP incorrectly handled certain scripts with XML
parsing functions.
An attacker could possibly use this issue to obtain sensitive information.
(CVE-2021-21707)
CVEs:
- https://ubuntu.com/security/CVE-2015-9253
- https://ubuntu.com/security/CVE-2017-8923
- https://ubuntu.com/security/CVE-2017-9118
- https://ubuntu.com/security/CVE-2017-9120
- https://ubuntu.com/security/CVE-2017-9119
- https://ubuntu.com/security/CVE-2021-21707
- https://ubuntu.com/security/CVE-2017-8923
- https://ubuntu.com/security/CVE-2017-9118
- https://ubuntu.com/security/CVE-2017-9120
- https://ubuntu.com/security/CVE-2015-9253
- https://ubuntu.com/security/CVE-2017-9119
- https://ubuntu.com/security/CVE-2021-21707

Title: USN-5299-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5299-1
Priorities: medium,low
Description:
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could
reassemble mixed encrypted and plaintext fragments. A physically proximate
attacker could possibly use this issue to inject packets or exfiltrate
selected fragments. (CVE-2020-26147)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly perform access control. An authenticated attacker could possibly
use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)

It was discovered that the RPA PCI Hotplug driver implementation in the
Linux kernel did not properly handle device name writes via sysfs, leading
to a buffer overflow. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2021-28972)

It was discovered that a use-after-free existed in the Bluetooth HCI driver
of the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33034)

Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol
implementation in the Linux kernel did not properly initialize memory in
some situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2021-34693)

马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-3483)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device initialization failure, leading to a double-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3564)

Murray McAllister discovered that the joystick device interface in the
Linux kernel did not properly validate data passed via an ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code on systems with a joystick device
registered. (CVE-2021-3612)

It was discovered that the tracing subsystem in the Linux kernel did not
properly keep track of per-cpu ring buffer state. A privileged attacker
could use this to cause a denial of service. (CVE-2021-3679)

It was discovered that the MAX-3421 host USB device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2021-38204)

It was discovered that the 6pack network protocol driver in the Linux
kernel did not properly perform validation checks. A privileged attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2021-42008)

Amit Klein discovered that the IPv6 implementation in the Linux kernel
could disclose internal state in some situations. An attacker could
possibly use this to expose sensitive information. (CVE-2021-45485)
CVEs:
- https://ubuntu.com/security/CVE-2020-26147
- https://ubuntu.com/security/CVE-2020-26558
- https://ubuntu.com/security/CVE-2021-0129
- https://ubuntu.com/security/CVE-2021-28972
- https://ubuntu.com/security/CVE-2021-33034
- https://ubuntu.com/security/CVE-2021-34693
- https://ubuntu.com/security/CVE-2021-3483
- https://ubuntu.com/security/CVE-2021-3564
- https://ubuntu.com/security/CVE-2021-3612
- https://ubuntu.com/security/CVE-2021-3679
- https://ubuntu.com/security/CVE-2021-38204
- https://ubuntu.com/security/CVE-2021-42008
- https://ubuntu.com/security/CVE-2021-45485
- https://ubuntu.com/security/CVE-2020-26558
- https://ubuntu.com/security/CVE-2021-3564
- https://ubuntu.com/security/CVE-2021-34693
- https://ubuntu.com/security/CVE-2021-3483
- https://ubuntu.com/security/CVE-2020-26147
- https://ubuntu.com/security/CVE-2021-28972
- https://ubuntu.com/security/CVE-2021-33034
- https://ubuntu.com/security/CVE-2021-42008
- https://ubuntu.com/security/CVE-2021-45485
- https://ubuntu.com/security/CVE-2021-38204
- https://ubuntu.com/security/CVE-2021-0129
- https://ubuntu.com/security/CVE-2021-3679
- https://ubuntu.com/security/CVE-2021-3612

Title: USN-5298-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5298-1
Priorities: medium,low
Description:
It was discovered that the Packet network protocol implementation in the
Linux kernel contained a double-free vulnerability. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2021-22600)

Jürgen Groß discovered that the Xen subsystem within the Linux kernel did
not adequately limit the number of events driver domains (unprivileged PV
backends) could send to other guest VMs. An attacker in a driver domain
could use this to cause a denial of service in other guest VMs.
(CVE-2021-28711, CVE-2021-28712, CVE-2021-28713)

Jürgen Groß discovered that the Xen network backend driver in the Linux
kernel did not adequately limit the amount of queued packets when a guest
did not process them. An attacker in a guest VM can use this to cause a
denial of service (excessive kernel memory consumption) in the network
backend domain. (CVE-2021-28714, CVE-2021-28715)

Szymon Heidrich discovered that the USB Gadget subsystem in the Linux
kernel did not properly restrict the size of control requests for certain
gadget types, leading to possible out of bounds reads or writes. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-39685)

Jann Horn discovered a race condition in the Unix domain socket
implementation in the Linux kernel that could result in a read-after-free.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-4083)

Kirill Tkhai discovered that the XFS file system implementation in the
Linux kernel did not calculate size correctly when pre-allocating space in
some situations. A local attacker could use this to expose sensitive
information. (CVE-2021-4155)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in
the Linux kernel did not perform a GPU TLB flush in some situations. A
local attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2022-0330)

It was discovered that the VMware Virtual GPU driver in the Linux kernel
did not properly handle certain failure conditions, leading to a stale
entry in the file descriptor table. A local attacker could use this to
expose sensitive information or possibly gain administrative privileges.
(CVE-2022-22942)
CVEs:
- https://ubuntu.com/security/CVE-2021-22600
- https://ubuntu.com/security/CVE-2021-28711
- https://ubuntu.com/security/CVE-2021-28712
- https://ubuntu.com/security/CVE-2021-28713
- https://ubuntu.com/security/CVE-2021-28714
- https://ubuntu.com/security/CVE-2021-28715
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2021-4083
- https://ubuntu.com/security/CVE-2021-4155
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-0330
- https://ubuntu.com/security/CVE-2022-22942
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2021-28715
- https://ubuntu.com/security/CVE-2021-28711
- https://ubuntu.com/security/CVE-2021-4083
- https://ubuntu.com/security/CVE-2021-28713
- https://ubuntu.com/security/CVE-2022-0330
- https://ubuntu.com/security/CVE-2021-28712
- https://ubuntu.com/security/CVE-2021-28714
- https://ubuntu.com/security/CVE-2021-22600
- https://ubuntu.com/security/CVE-2022-22942
- https://ubuntu.com/security/CVE-2021-4155
- https://ubuntu.com/security/CVE-2021-4202

Title: USN-5292-4: snapd regression
URL: https://ubuntu.com/security/notices/USN-5292-4
Priorities: medium,high
Description:
USN-5292-1 fixed a vulnerability in snapd. Unfortunately that update introduced
a regression that could break the fish shell. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

James Troup discovered that snap did not properly manage the permissions for
the snap directories. A local attacker could possibly use this issue to expose
sensitive information. (CVE-2021-3155)

Ian Johnson discovered that snapd did not properly validate content interfaces
and layout paths. A local attacker could possibly use this issue to inject
arbitrary AppArmor policy rules, resulting in a bypass of intended access
restrictions. (CVE-2021-4120)

The Qualys Research Team discovered that snapd did not properly validate the
location of the snap-confine binary. A local attacker could possibly use this
issue to execute other arbitrary binaries and escalate privileges.
(CVE-2021-44730)

The Qualys Research Team discovered that a race condition existed in the snapd
snap-confine binary when preparing a private mount namespace for a snap. A
local attacker could possibly use this issue to escalate privileges and
execute arbitrary code. (CVE-2021-44731)
CVEs:
- https://ubuntu.com/security/CVE-2021-3155
- https://ubuntu.com/security/CVE-2021-4120
- https://ubuntu.com/security/CVE-2021-44730
- https://ubuntu.com/security/CVE-2021-44731

Title: USN-5310-2: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5310-2
Priorities: medium,low
Description:
USN-5310-1 fixed several vulnerabilities in GNU. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that the GNU C library getcwd function incorrectly
handled buffers. An attacker could use this issue to cause the GNU C
Library to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-3999)

It was discovered that the GNU C Library sunrpc module incorrectly handled
buffer lengths. An attacker could possibly use this issue to cause the GNU
C Library to crash, resulting in a denial of service. (CVE-2022-23218,
CVE-2022-23219)
CVEs:
- https://ubuntu.com/security/CVE-2021-3999
- https://ubuntu.com/security/CVE-2022-23218
- https://ubuntu.com/security/CVE-2022-23219
- https://ubuntu.com/security/CVE-2022-23218
- https://ubuntu.com/security/CVE-2021-3999
- https://ubuntu.com/security/CVE-2022-23219

Title: USN-5319-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5319-1
Priorities: high
Description:
Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano
Giuffrida discovered that hardware mitigations added by Intel to their
processors to address Spectre-BTI were insufficient. A local attacker could
potentially use this to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-0001
- https://ubuntu.com/security/CVE-2022-0002

Title: USN-5301-2: Cyrus SASL vulnerability
URL: https://ubuntu.com/security/notices/USN-5301-2
Priorities: high
Description:
USN-5301-1 fixed a vulnerability in Cyrus. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that the Cyrus SASL SQL plugin incorrectly handled SQL
input. A remote attacker could use this issue to execute arbitrary SQL
commands.
CVEs:
- https://ubuntu.com/security/CVE-2022-24407

621.211

Available in the Broadcom Support portal

Release Date: February 21, 2022

Metadata:

BOSH Agent Version: 2.268.61

USNs:


Title: USN-5264-1: Graphviz vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5264-1
Priorities: low,medium
Description:
It was discovered that graphviz contains null pointer dereference
vulnerabilities. Exploitation via a specially crafted input file
can cause a denial of service.
(CVE-2018-10196, CVE-2019-11023)

It was discovered that graphviz contains a buffer overflow
vulnerability. Exploitation via a specially crafted input file can cause
a denial of service or possibly allow for arbitrary code execution.
(CVE-2020-18032)
CVEs:
- https://ubuntu.com/security/CVE-2018-10196
- https://ubuntu.com/security/CVE-2019-11023
- https://ubuntu.com/security/CVE-2020-18032
- https://ubuntu.com/security/CVE-2018-10196
- https://ubuntu.com/security/CVE-2020-18032
- https://ubuntu.com/security/CVE-2019-11023

Title: USN-5262-1: GPT fdisk vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5262-1
Priorities: low
Description:
The potential for an out of bounds write due to a missing bounds
check was discovered to impact the sgdisk utility of GPT fdisk.
Exploitation requires the use of a maliciously formatted storage
device and could cause sgdisk to crash as well as possibly
allow for local privilege escalation.
CVEs:
- https://ubuntu.com/security/CVE-2020-0256
- https://ubuntu.com/security/CVE-2021-0308

Title: USN-5280-1: Speex vulnerability
URL: https://ubuntu.com/security/notices/USN-5280-1
Priorities: medium
Description:
It was discovered that Speex incorrectly handled certain WAV files.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-23903

Title: USN-5292-3: snapd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5292-3
Priorities: medium,high
Description:
USN-5292-1 fixed several vulnerabilities in snapd. This update provides the
corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

James Troup discovered that snap did not properly manage the permissions for
the snap directories. A local attacker could possibly use this issue to expose
sensitive information. (CVE-2021-3155)

Ian Johnson discovered that snapd did not properly validate content interfaces
and layout paths. A local attacker could possibly use this issue to inject
arbitrary AppArmor policy rules, resulting in a bypass of intended access
restrictions. (CVE-2021-4120)

The Qualys Research Team discovered that snapd did not properly validate the
location of the snap-confine binary. A local attacker could possibly use this
issue to execute other arbitrary binaries and escalate privileges.
(CVE-2021-44730)

The Qualys Research Team discovered that a race condition existed in the snapd
snap-confine binary when preparing a private mount namespace for a snap. A
local attacker could possibly use this issue to escalate privileges and
execute arbitrary code. (CVE-2021-44731)
CVEs:
- https://ubuntu.com/security/CVE-2021-3155
- https://ubuntu.com/security/CVE-2021-4120
- https://ubuntu.com/security/CVE-2021-44730
- https://ubuntu.com/security/CVE-2021-44731
- https://ubuntu.com/security/CVE-2021-3155
- https://ubuntu.com/security/CVE-2021-4120
- https://ubuntu.com/security/CVE-2021-44730
- https://ubuntu.com/security/CVE-2021-44731

Title: USN-5275-1: BlueZ vulnerability
URL: https://ubuntu.com/security/notices/USN-5275-1
Priorities: medium
Description:
Ziming Zhang discovered that BlueZ incorrectly handled memory write operations
in its gatt server. A remote attacker could possibly use this to cause BlueZ to
crash leading to a denial of service, or potentially remotely execute code.
(CVE-2022-0204)
CVEs:
- https://ubuntu.com/security/CVE-2022-0204
- https://ubuntu.com/security/CVE-2022-0204

Title: USN-5269-2: Django vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5269-2
Priorities: medium
Description:
USN-5269-1 fixed several vulnerabilities in Django. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Keryn Knight discovered that Django incorrectly handled certain template
tags. A remote attacker could possibly use this issue to perform a
cross-site scripting attack. (CVE-2022-22818)

Alan Ryan discovered that Django incorrectly handled file uploads. A remote
attacker could possibly use this issue to cause Django to hang, resulting
in a denial of service. (CVE-2022-23833)
CVEs:
- https://ubuntu.com/security/CVE-2022-22818
- https://ubuntu.com/security/CVE-2022-23833
- https://ubuntu.com/security/CVE-2022-22818
- https://ubuntu.com/security/CVE-2022-23833

621.208

Available in the Broadcom Support portal

Release Date: February 10, 2022

Enhancements

  • /opt is now mounted to the ephemeral disk rather than the root disk. This is not a recommended storage point for bosh workloads, but some agents deployed on stemcells write their logs to this folder and that could cause the root disk to fill up.

Metadata:

BOSH Agent Version: 2.268.59

USNs:


Title: USN-5254-1: shadow vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5254-1
Priorities: low
Description:
It was discovered that shadow incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or
expose sensitive information. This issue only affected
Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2017-12424)

It was discovered that shadow incorrectly handled certain inputs.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2018-7169)
CVEs:
- https://ubuntu.com/security/CVE-2017-12424
- https://ubuntu.com/security/CVE-2018-7169
- https://ubuntu.com/security/CVE-2018-7169
- https://ubuntu.com/security/CVE-2017-12424

Title: USN-5259-1: Cron vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5259-1
Priorities: low
Description:
It was discovered that the postinst maintainer script in Cron unsafely
handled file permissions during package install or update operations.
An attacker could possibly use this issue to perform a privilege
escalation attack. (CVE-2017-9525)

Florian Weimer discovered that Cron incorrectly handled certain memory
operations during crontab file creation. An attacker could possibly use
this issue to cause a denial of service. (CVE-2019-9704)

It was discovered that Cron incorrectly handled user input during crontab
file creation. An attacker could possibly use this issue to cause a denial
of service. (CVE-2019-9705)

It was discovered that Cron contained a use-after-free vulnerability in
its force_rescan_user function. An attacker could possibly use this issue
to cause a denial of service. (CVE-2019-9706)
CVEs:
- https://ubuntu.com/security/CVE-2017-9525
- https://ubuntu.com/security/CVE-2019-9704
- https://ubuntu.com/security/CVE-2019-9705
- https://ubuntu.com/security/CVE-2019-9706
- https://ubuntu.com/security/CVE-2019-9704
- https://ubuntu.com/security/CVE-2019-9705
- https://ubuntu.com/security/CVE-2019-9706
- https://ubuntu.com/security/CVE-2017-9525

Title: USN-5234-1: Byobu vulnerability
URL: https://ubuntu.com/security/notices/USN-5234-1
Priorities: low
Description:
Sander Bos discovered that Byobu incorrectly handled certain Apport data.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2019-7306

Title: USN-5244-1: DBus vulnerability
URL: https://ubuntu.com/security/notices/USN-5244-1
Priorities: low
Description:
Daniel Onaca discovered that DBus contained a use-after-free vulnerability,
caused by the incorrect handling of usernames sharing the same UID. An
attacker could possibly use this issue to cause DBus to crash, resulting
in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-35512

Title: USN-5268-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5268-1
Priorities: medium
Description:
Keyu Man discovered that the ICMP implementation in the Linux kernel did
not properly handle received ICMP error packets. A remote attacker could
use this to facilitate attacks on UDP based services that depend on source
port randomization. (CVE-2021-20322)

It was discovered that the Bluetooth subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2021-3640)

Likang Luo discovered that a race condition existed in the Bluetooth
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-3752)

Luo Likang discovered that the FireDTV Firewire driver in the Linux kernel
did not properly perform bounds checking in some situations. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-42739)
CVEs:
- https://ubuntu.com/security/CVE-2021-20322
- https://ubuntu.com/security/CVE-2021-3640
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2021-42739
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2021-20322
- https://ubuntu.com/security/CVE-2021-3640
- https://ubuntu.com/security/CVE-2021-42739

Title: USN-5021-2: curl vulnerability
URL: https://ubuntu.com/security/notices/USN-5021-2
Priorities: low,medium
Description:
USN-5021-1 fixed vulnerabilities in curl. This update provides
the corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

Harry Sintonen and Tomas Hoger discovered that curl incorrectly handled
TELNET connections when the -t option was used on the command line.
Uninitialized data possibly containing sensitive information could be sent
to the remote server, contrary to expectations. (CVE-2021-22898,
CVE-2021-22925)
CVEs:
- https://ubuntu.com/security/CVE-2021-22898
- https://ubuntu.com/security/CVE-2021-22925
- https://ubuntu.com/security/CVE-2021-22898
- https://ubuntu.com/security/CVE-2021-22925

Title: USN-5064-2: GNU cpio vulnerability
URL: https://ubuntu.com/security/notices/USN-5064-2
Priorities: medium
Description:
USN-5064-1 fixed vulnerabilities in GNU cpio. This update provides
the corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

Maverick Chung and Qiaoyi Fang discovered that cpio incorrectly handled
certain pattern files. A remote attacker could use this issue to cause cpio
to crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2021-38185

Title: USN-5193-2: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5193-2
Priorities: medium
Description:
USN-5193-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain inputs. An attacker could use this issue to cause the server to
crash, resulting in a denial of service, or possibly execute arbitrary
code and escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2021-4009
- https://ubuntu.com/security/CVE-2021-4008
- https://ubuntu.com/security/CVE-2021-4011

Title: USN-5252-2: PolicyKit vulnerability
URL: https://ubuntu.com/security/notices/USN-5252-2
Priorities: high
Description:
USN-5252-1 fixed a vulnerability in policykit-1. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that the PolicyKit pkexec tool incorrectly handled
command-line arguments. A local attacker could use this issue to escalate
privileges to an administrator.
CVEs:
- https://ubuntu.com/security/CVE-2021-4034

Title: USN-5235-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5235-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled certain HTML files.
An attacker could possibly use this issue to cause a crash. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 21.04, and Ubuntu 21.10.
(CVE-2021-41816)

It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a regular expression
denial of service. (CVE-2021-41817)

It was discovered that Ruby incorrectly handled certain cookie names.
An attacker could possibly use this issue to access or expose
sensitive information. (CVE-2021-41819)
CVEs:
- https://ubuntu.com/security/CVE-2021-41816
- https://ubuntu.com/security/CVE-2021-41817
- https://ubuntu.com/security/CVE-2021-41819
- https://ubuntu.com/security/CVE-2021-41816
- https://ubuntu.com/security/CVE-2021-41819
- https://ubuntu.com/security/CVE-2021-41817

Title: USN-5260-3: Samba vulnerability
URL: https://ubuntu.com/security/notices/USN-5260-3
Priorities: high
Description:
USN-5260-1 fixed a vulnerability in Samba. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Orange Tsai discovered that the Samba vfs_fruit module incorrectly handled
certain memory operations. A remote attacker could use this issue to cause
Samba to crash, resulting in a denial of service, or possibly execute
arbitrary code as root. (CVE-2021-44142)
CVEs:
- https://ubuntu.com/security/CVE-2021-44142
- https://ubuntu.com/security/CVE-2021-44142

Title: USN-5250-2: strongSwan vulnerability
URL: https://ubuntu.com/security/notices/USN-5250-2
Priorities: medium
Description:
USN-5250-1 fixed a vulnerability in strongSwan. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Zhuowei Zhang discovered that stringSwan incorrectly handled EAP
authentication. A remote attacker could use this issue to cause strongSwan
to crash, resulting in a denial of service, or possibly bypass client and
server authentication.
CVEs:
- https://ubuntu.com/security/CVE-2021-45079

Title: USN-5243-2: AIDE vulnerability
URL: https://ubuntu.com/security/notices/USN-5243-2
Priorities: medium
Description:
USN-5243-1 fixed a vulnerability in aide. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.


Original advisory details:

David Bouman discovered that AIDE incorrectly handled base64 operations. A
local attacker could use this issue to cause AIDE to crash, resulting in a
denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-45417

Title: USN-5233-2: ClamAV vulnerability
URL: https://ubuntu.com/security/notices/USN-5233-2
Priorities: medium
Description:
USN-5233-1 fixed a vulnerability in ClamAV. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that ClamAV incorrectly handled memory when the
CL_SCAN_GENERAL_COLLECT_METADATA scan option was enabled. A remote attacker
could possibly use this issue to cause ClamAV to crash, resulting in a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-20698

Title: USN-5270-2: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5270-2
Priorities: medium
Description:
USN-5270-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.7.37 in Ubuntu 16.04 ESM.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-37.html
https://www.oracle.com/security-alerts/cpujan2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21304
- https://ubuntu.com/security/CVE-2022-21344
- https://ubuntu.com/security/CVE-2022-21367
- https://ubuntu.com/security/CVE-2022-21303
- https://ubuntu.com/security/CVE-2022-21270
- https://ubuntu.com/security/CVE-2022-21245

621.198

Available in the Broadcom Support portal

Release Date: January 18, 2022

Fixes

Fixes an issue that caused the bosh-agent to continually fail to start when either the cgroup v1 memory controller or the cgroup v2 controller was mounted in more than one location on the file system.

Metadata:

BOSH Agent Version: 2.268.54

USNs:


Title: USN-5225-1: lxml vulnerability
URL: https://ubuntu.com/security/notices/USN-5225-1
Priorities: medium
Description:
It was discovered that lxml incorrectly handled certain XML and HTML files.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-43818

Title: USN-5212-2: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5212-2
Priorities: medium
Description:
USN-5212-1 fixed several vulnerabilities in Apache. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that the Apache HTTP Server incorrectly handled certain
forward proxy requests. A remote attacker could use this issue to cause
the server to crash, resulting in a denial of service, or possibly perform
a Server Side Request Forgery attack. (CVE-2021-44224)

It was discovered that the Apache HTTP Server Lua module incorrectly
handled memory in the multipart parser. A remote attacker could use this
issue to cause the server to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2021-44790)
CVEs:
- https://ubuntu.com/security/CVE-2021-44224
- https://ubuntu.com/security/CVE-2021-44790
- https://ubuntu.com/security/CVE-2021-44790
- https://ubuntu.com/security/CVE-2021-44224

621.196

Available in the Broadcom Support portal

Release Date: January 07, 2022

Metadata:

BOSH Agent Version: 2.268.51

USNs:


Title: LSN-0083-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0083-1
Priorities: medium,high
Description:
The BPF subsystem in the Linux kernel before 4.17 mishandles
situations with a long jump over an instruction sequence where inner
instructions require substantial expansions into multiple BPF instructions,
leading to an overflow. This affects kernel/bpf/core.c and
net/core/filter.c.(CVE-2018-25020)

Maxim Levitsky discovered that the KVM hypervisor implementation for AMD
processors in the Linux kernel did not properly prevent a guest VM from
enabling AVIC in nested guest VMs. An attacker in a guest VM could use this
to write to portions of the host’s physical memory.(CVE-2021-3653)

Nadav Amit discovered that the hugetlb implementation in the Linux kernel
did not perform TLB flushes under certain conditions. A local attacker
could use this to leak or alter data from other processes that use huge
pages.(CVE-2021-4002)

Andy Nguyen discovered that the netfilter subsystem in the Linux kernel
contained an out-of-bounds write in its setsockopt() implementation. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-22555)

It was discovered that the virtual file system implementation in the Linux
kernel contained an unsigned to signed integer conversion error. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code.(CVE-2021-33909)
CVEs:
- https://ubuntu.com/security/CVE-2018-25020
- https://ubuntu.com/security/CVE-2021-3653
- https://ubuntu.com/security/CVE-2021-4002
- https://ubuntu.com/security/CVE-2021-22555
- https://ubuntu.com/security/CVE-2021-33909
- https://ubuntu.com/security/CVE-2021-33909
- https://ubuntu.com/security/CVE-2018-25020
- https://ubuntu.com/security/CVE-2021-4002
- https://ubuntu.com/security/CVE-2021-22555
- https://ubuntu.com/security/CVE-2021-3653

Title: USN-5211-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5211-1
Priorities: high
Description:
Nadav Amit discovered that the hugetlb implementation in the Linux kernel
did not perform TLB flushes under certain conditions. A local attacker
could use this to leak or alter data from other processes that use huge
pages.
CVEs:
- https://ubuntu.com/security/CVE-2021-4002

Title: USN-5209-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5209-1
Priorities: high,low,medium
Description:
Nadav Amit discovered that the hugetlb implementation in the Linux kernel
did not perform TLB flushes under certain conditions. A local attacker
could use this to leak or alter data from other processes that use huge
pages. (CVE-2021-4002)

It was discovered that a race condition existed in the timer implementation
in the Linux kernel. A privileged attacker could use this cause a denial of
service. (CVE-2021-20317)

It was discovered that a race condition existed in the overlay file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2021-20321)

It was discovered that the NFC subsystem in the Linux kernel contained a
use-after-free vulnerability in its NFC Controller Interface (NCI)
implementation. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2021-3760)

It was discovered that an integer overflow could be triggered in the eBPF
implementation in the Linux kernel when preallocating objects for stack
maps. A privileged local attacker could use this to cause a denial of
service or possibly execute arbitrary code. (CVE-2021-41864)

It was discovered that the ISDN CAPI implementation in the Linux kernel
contained a race condition in certain situations that could trigger an
array out-of-bounds bug. A privileged local attacker could possibly use
this to cause a denial of service or execute arbitrary code.
(CVE-2021-43389)
CVEs:
- https://ubuntu.com/security/CVE-2021-4002
- https://ubuntu.com/security/CVE-2021-20317
- https://ubuntu.com/security/CVE-2021-20321
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2021-41864
- https://ubuntu.com/security/CVE-2021-43389
- https://ubuntu.com/security/CVE-2021-4002
- https://ubuntu.com/security/CVE-2021-43389
- https://ubuntu.com/security/CVE-2021-20321
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2021-41864
- https://ubuntu.com/security/CVE-2021-20317

621.192

Available in the Broadcom Support portal

Release Date: December 17, 2021

Enhancements

  • /var/opt is now mounted to the ephemeral disk rather than the root disk. This is not a recommended storage point for bosh workloads, but some agents deployed on stemcells write their logs to this folder and that could cause the root disk to fill up.

Fixes

  • This release reverts the NATS firewall enhancement added in 621.183. Changes associated with this feature caused VMs to report a networking failed state and prevented monit firewall rules from being applied. The NATS firewall enhancement will be reintroduced in a future release.

Metadata:

BOSH Agent Version: 2.268.49

USNs:


Title: USN-5202-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5202-1
Priorities: medium
Description:
Varnavas Papaioannou discovered that the FTP client implementation in
OpenJDK accepted alternate server IP addresses when connecting with FTP
passive mode. An attacker controlling an FTP server that an application
connects to could possibly use this to expose sensitive information
(rudimentary port scans). This issue only affected Ubuntu 16.04 ESM,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 21.04. (CVE-2021-2341)

Markus Loewe discovered that OpenJDK did not properly handle JAR files
containing multiple manifest files. An attacker could possibly use
this to bypass JAR signature verification. This issue only affected
Ubuntu 16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu
21.04. (CVE-2021-2369)

Huixin Ma discovered that the Hotspot VM in OpenJDK did not properly
perform range check elimination in some situations. An attacker could
possibly use this to construct a Java class that could bypass Java
sandbox restrictions. This issue only affected Ubuntu 16.04 ESM,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 21.04. (CVE-2021-2388)

Asaf Greenholts discovered that OpenJDK preferred certain weak ciphers by
default. An attacker could possibly use this to expose sensitive
information. (CVE-2021-35550)

It was discovered that the Rich Text Format (RTF) Parser in OpenJDK did not
properly restrict the amount of memory allocated in some situations. An
attacker could use this to specially craft an RTF file that caused a denial
of service. (CVE-2021-35556)

It was discovered that the Rich Text Format (RTF) Reader in OpenJDK did not
properly restrict the amount of memory allocated in some situations. An
attacker could use this to specially craft an RTF file that caused a denial
of service. (CVE-2021-35559)

Markus Loewe discovered that the HashMap and HashSet implementations in
OpenJDK did not properly validate load factors during deserialization. An
attacker could use this to cause a denial of service (excessive memory
consumption). (CVE-2021-35561)

It was discovered that the Keytool component in OpenJDK did not properly
handle certificates with validity ending dates in the far future. An
attacker could use this to specially craft a certificate that when imported
could corrupt a keystore. (CVE-2021-35564)

Tristen Hayfield discovered that the HTTP server implementation in OpenJDK
did not properly handle TLS session close in some situations. A remote
attacker could possibly use this to cause a denial of service (application
infinite loop). (CVE-2021-35565)

Chuck Hunley discovered that the Kerberos implementation in OpenJDK did not
correctly report subject principals when using Kerberos Constrained
Delegation. An attacker could possibly use this to cause incorrect Kerberos
tickets to be used. (CVE-2021-35567)

it was discovered that the TLS implementation in OpenJDK did not properly
handle TLS handshakes in certain situations where a Java application is
acting as a TLS server. A remote attacker could possibly use this to cause
a denial of service (application crash). (CVE-2021-35578)

it was discovered that OpenJDK did not properly restrict the amount of
memory allocated when processing BMP images. An attacker could use this to
specially craft a BMP image file that could cause a denial of service.
(CVE-2021-35586)

It was discovered that the HotSpot VM in OpenJDK 8 did not properly perform
validation of inner class index values in some situations. An attacker
could use this to specially craft a class file that when loaded could cause
a denial of service (Java VM crash). (CVE-2021-35588)

Artem Smotrakov discovered that the TLS implementation in OpenJDK used non-
constant time comparisons during TLS handshakes. A remote attacker could
use this to expose sensitive information. (CVE-2021-35603)
CVEs:
- https://ubuntu.com/security/CVE-2021-2341
- https://ubuntu.com/security/CVE-2021-2369
- https://ubuntu.com/security/CVE-2021-2388
- https://ubuntu.com/security/CVE-2021-35550
- https://ubuntu.com/security/CVE-2021-35556
- https://ubuntu.com/security/CVE-2021-35559
- https://ubuntu.com/security/CVE-2021-35561
- https://ubuntu.com/security/CVE-2021-35564
- https://ubuntu.com/security/CVE-2021-35565
- https://ubuntu.com/security/CVE-2021-35567
- https://ubuntu.com/security/CVE-2021-35578
- https://ubuntu.com/security/CVE-2021-35586
- https://ubuntu.com/security/CVE-2021-35588
- https://ubuntu.com/security/CVE-2021-35603
- https://ubuntu.com/security/CVE-2021-35556
- https://ubuntu.com/security/CVE-2021-35561
- https://ubuntu.com/security/CVE-2021-35588
- https://ubuntu.com/security/CVE-2021-35578
- https://ubuntu.com/security/CVE-2021-2341
- https://ubuntu.com/security/CVE-2021-35564
- https://ubuntu.com/security/CVE-2021-35603
- https://ubuntu.com/security/CVE-2021-35559
- https://ubuntu.com/security/CVE-2021-35586
- https://ubuntu.com/security/CVE-2021-35550
- https://ubuntu.com/security/CVE-2021-35567
- https://ubuntu.com/security/CVE-2021-2369
- https://ubuntu.com/security/CVE-2021-35565
- https://ubuntu.com/security/CVE-2021-2388

Title: USN-5189-1: GLib vulnerability
URL: https://ubuntu.com/security/notices/USN-5189-1
Priorities: medium
Description:
It was discovered that GLib incorrectly handled certain environment variables.
An attacker could possibly use this issue to escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2021-3800

Title: USN-5168-4: NSS regression
URL: https://ubuntu.com/security/notices/USN-5168-4
Priorities: high
Description:
USN-5168-3 fixed a vulnerability in NSS. Unfortunately that update introduced
a regression that could break SSL connections. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Tavis Ormandy discovered that NSS incorrectly handled verifying DSA/RSA-PSS
signatures. A remote attacker could use this issue to cause NSS to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-43527

Title: USN-5192-2: Apache Log4j 2 vulnerability
URL: https://ubuntu.com/security/notices/USN-5192-2
Priorities: high
Description:
USN-5192-1 fixed a vulnerability in Apache Log4j 2. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Chen Zhaojun discovered that Apache Log4j 2 allows remote attackers to run
programs via a special crafted input. An attacker could use this vulnerability
to cause a denial of service or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-44228

621.183

Available in the Broadcom Support portal

Release Date: December 06, 2021

Enhancements

  • Added firewall rules to restrict access to the NATS message bus except by the bosh agent. This provides an additional layer of security so even if an attacker is able to gain access to the NATS credentials, they would be unable to use those from a workload on a Bosh deployed VM. If you are attempting to debug NATS connectivity problems by directly connecting to the Bosh NATS server, you will need additional access; instructions can be found here.

Known issues

Errors are present in the networking service post-start scripts for all BOSH-managed VMs which:
* Causes networking service to report a failed state
* Incorrectly allows external connections to the monit service
* Incorrectly allows external connections to the NATS service

Metadata:

BOSH Agent Version: 2.268.45

USNs:


Title: USN-5147-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5147-1
Priorities: low,medium
Description:
It was discovered that Vim incorrectly handled permissions on the .swp
file. A local attacker could possibly use this issue to obtain sensitive
information. This issue only affected Ubuntu 14.04 ESM. (CVE-2017-17087)

It was discovered that Vim incorrectly handled restricted mode. A local
attacker could possibly use this issue to bypass restricted mode and
execute arbitrary commands. Note: This update only makes executing shell
commands more difficult. Restricted mode should not be considered a
complete security measure. This issue only affected Ubuntu 14.04 ESM.
(CVE-2019-20807)

Brian Carpenter discovered that vim incorrectly handled memory
when opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. This issue only affected
Ubuntu 20.04 LTS, Ubuntu 21.04 and Ubuntu 21.10. (CVE-2021-3872)

It was discovered that vim incorrectly handled memory when
opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. (CVE-2021-3903)

It was discovered that vim incorrectly handled memory when
opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. (CVE-2021-3927)

It was discovered that vim incorrectly handled memory when
opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. (CVE-2021-3928)
CVEs:
- https://ubuntu.com/security/CVE-2017-17087
- https://ubuntu.com/security/CVE-2019-20807
- https://ubuntu.com/security/CVE-2021-3872
- https://ubuntu.com/security/CVE-2021-3903
- https://ubuntu.com/security/CVE-2021-3927
- https://ubuntu.com/security/CVE-2021-3928
- https://ubuntu.com/security/CVE-2021-3928
- https://ubuntu.com/security/CVE-2021-3927
- https://ubuntu.com/security/CVE-2017-17087
- https://ubuntu.com/security/CVE-2019-20807
- https://ubuntu.com/security/CVE-2021-3903
- https://ubuntu.com/security/CVE-2021-3872

Title: USN-5158-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5158-1
Priorities: low
Description:
It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. (CVE-2021-20244)

It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. (CVE-2021-20246)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service (CVE-2021-20309)

It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. (CVE-2021-20312)

It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. (CVE-2021-20313)
CVEs:
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2021-20313

Title: USN-5144-1: OpenEXR vulnerability
URL: https://ubuntu.com/security/notices/USN-5144-1
Priorities: medium
Description:
It was discovered that OpenEXR incorrectly handled certain EXR
image files. An attacker could possibly use this issue to cause a crash
or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-3933

Title: USN-5150-1: OpenEXR vulnerability
URL: https://ubuntu.com/security/notices/USN-5150-1
Priorities: medium
Description:
It was discovered that OpenEXR incorrectly handled certain EXR image files.
An attacker could possibly use this issue to cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2021-3941

Title: USN-5168-3: NSS vulnerability
URL: https://ubuntu.com/security/notices/USN-5168-3
Priorities: high
Description:
USN-5168-1 fixed a vulnerability in NSS. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Tavis Ormandy discovered that NSS incorrectly handled verifying DSA/RSA-PSS
signatures. A remote attacker could use this issue to cause NSS to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-43527

621.176

Available in the Broadcom Support portal

Release Date: November 11, 2021

Metadata:

BOSH Agent Version: 2.268.41

USNs:


Title: USN-5114-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5114-1
Priorities: medium,low
Description:
It was discovered that a race condition existed in the Atheros Ath9k WiFi
driver in the Linux kernel. An attacker could possibly use this to expose
sensitive information (WiFi network traffic). (CVE-2020-3702)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly compute the access permissions for shadow pages in
some situations. A local attacker could use this to cause a denial of
service. (CVE-2021-38198)

It was discovered that the ext4 file system in the Linux kernel contained a
race condition when writing xattrs to an inode. A local attacker could use
this to cause a denial of service or possibly gain administrative
privileges. (CVE-2021-40490)

It was discovered that the 6pack network protocol driver in the Linux
kernel did not properly perform validation checks. A privileged attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2021-42008)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3702
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-40490
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-38198
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-42008

Title: USN-5119-1: libcaca vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5119-1
Priorities: medium
Description:
It was discovered that libcaca incorrectly handled certain images. An attacker
could possibly use this issue to cause a crash. (CVE-2021-30498, CVE-2021-30499)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-30498
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-30499

Title: USN-5136-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5136-1
Priorities: low,medium
Description:
It was discovered that the f2fs file system in the Linux kernel did not
properly validate metadata in some situations. An attacker could use this
to construct a malicious f2fs image that, when mounted and operated on,
could cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2019-19449)

It was discovered that the FUSE user space file system implementation in
the Linux kernel did not properly handle bad inodes in some situations. A
local attacker could possibly use this to cause a denial of service.
(CVE-2020-36322)

It was discovered that the Infiniband RDMA userspace connection manager
implementation in the Linux kernel contained a race condition leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possible execute arbitrary code.
(CVE-2020-36385)

Ilja Van Sprundel discovered that the SCTP implementation in the Linux
kernel did not properly perform size validations on incoming packets in
some situations. An attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2021-3655)

It was discovered that the Qualcomm IPC Router protocol implementation in
the Linux kernel did not properly validate metadata in some situations. A
local attacker could use this to cause a denial of service (system crash)
or expose sensitive information. (CVE-2021-3743)

It was discovered that the virtual terminal (vt) device implementation in
the Linux kernel contained a race condition in its ioctl handling that led
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information. (CVE-2021-3753)

It was discovered that the Linux kernel did not properly account for the
memory usage of certain IPC objects. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2021-3759)

Michael Wakabayashi discovered that the NFSv4 client implementation in the
Linux kernel did not properly order connection setup operations. An
attacker controlling a remote NFS server could use this to cause a denial
of service on the client. (CVE-2021-38199)

It was discovered that the Aspeed Low Pin Count (LPC) Bus Controller
implementation in the Linux kernel did not properly perform boundary checks
in some situations, allowing out-of-bounds write access. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. In Ubuntu, this issue only affected systems running
armhf kernels. (CVE-2021-42252)
CVEs:
- https://ubuntu.com/security/CVE-2019-19449
- https://ubuntu.com/security/CVE-2020-36322
- https://ubuntu.com/security/CVE-2020-36385
- https://ubuntu.com/security/CVE-2021-3655
- https://ubuntu.com/security/CVE-2021-3743
- https://ubuntu.com/security/CVE-2021-3753
- https://ubuntu.com/security/CVE-2021-3759
- https://ubuntu.com/security/CVE-2021-38199
- https://ubuntu.com/security/CVE-2021-42252
- https://ubuntu.com/security/CVE-2021-38199
- https://ubuntu.com/security/CVE-2020-36322
- https://ubuntu.com/security/CVE-2021-3759
- https://ubuntu.com/security/CVE-2021-3753
- https://ubuntu.com/security/CVE-2020-36385
- https://ubuntu.com/security/CVE-2019-19449
- https://ubuntu.com/security/CVE-2021-3743
- https://ubuntu.com/security/CVE-2021-42252
- https://ubuntu.com/security/CVE-2021-3655

Title: USN-5133-1: ICU vulnerability
URL: https://ubuntu.com/security/notices/USN-5133-1
Priorities: low
Description:
It was discovered that ICU contains a use after free issue.
An attacker could use this issue to cause a denial of service with crafted input.
CVEs:
- https://ubuntu.com/security/CVE-2020-21913

Title: LSN-0082-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0082-1
Priorities: medium,high
Description:
Jann Horn discovered that the tty subsystem of the Linux kernel did not use
consistent locking in some situations, leading to a read-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information (kernel memory).(CVE-2020-29660)

Jann Horn discovered a race condition in the tty subsystem of the Linux
kernel in the locking for the TIOCSPGRP ioctl(), leading to a use-after-
free vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.(CVE-2020-29661)

De4dCr0w of 360 Alpha Lab discovered that the BPF verifier in the Linux
kernel did not properly handle mod32 destination register truncation when
the source register was known to be 0. A local attacker could use this to
expose sensitive information (kernel memory) or possibly execute arbitrary
code.(CVE-2021-3444)

kernel: use-after-free in route4_change() in
net/sched/cls_route.c(CVE-2021-3715)
CVEs:
- https://ubuntu.com/security/CVE-2020-29660
- https://ubuntu.com/security/CVE-2020-29661
- https://ubuntu.com/security/CVE-2021-3444
- https://ubuntu.com/security/CVE-2021-3715
- https://ubuntu.com/security/CVE-2020-29660
- https://ubuntu.com/security/CVE-2020-29661
- https://ubuntu.com/security/CVE-2021-3715
- https://ubuntu.com/security/CVE-2021-3444

Title: USN-5125-1: PHP vulnerability
URL: https://ubuntu.com/security/notices/USN-5125-1
Priorities: high
Description:
It was discovered that PHP-FPM in PHP incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-21703

Title: USN-5126-2: Bind vulnerability
URL: https://ubuntu.com/security/notices/USN-5126-2
Priorities: medium
Description:
USN-5126-1 fixed a vulnerability in Bind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Kishore Kumar Kothapalli discovered that Bind incorrectly handled the lame
cache when processing responses. A remote attacker could possibly use this
issue to cause Bind to consume resources, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2021-25219

Title: USN-5123-2: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5123-2
Priorities: medium
Description:
USN-5123-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.27 in Ubuntu 20.04 LTS, Ubuntu 21.04, and
Ubuntu 21.10. Ubuntu 18.04 LTS has been updated to MySQL 5.7.36.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-36.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-27.html
https://www.oracle.com/security-alerts/cpuoct2021.html
CVEs:
- https://ubuntu.com/security/CVE-2021-35624
- https://ubuntu.com/security/CVE-2021-35604

621.171

Available in the Broadcom Support portal

Release Date: October 25, 2021

Metadata:

BOSH Agent Version: 2.268.36
Bosh-agent is now build with Go 1.17

Features:

Allow to receive nats and blobstore updates via update settings action

USNs:


Title: USN-5109-1: nginx vulnerability
URL: https://ubuntu.com/security/notices/USN-5109-1
Priorities: medium
Description:
It was discovered that nginx incorrectly handled files with
certain modification dates. A remote attacker could possibly
use this issue to cause a denial of service or other unspecified
impact.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-20005

Title: USN-5022-3: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5022-3
Priorities: medium
Description:
USN-5022-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to MySQL 5.7.35 on Ubuntu 16.04 ESM.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-35.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-26.html
https://www.oracle.com/security-alerts/cpujul2021.html
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2179
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2162
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2389
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2390
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2194
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2146
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2372
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2342
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2169
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2171
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2180
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2154
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2166
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2226
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2307
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2385

Title: USN-5103-1: docker.io vulnerability
URL: https://ubuntu.com/security/notices/USN-5103-1
Priorities: medium
Description:
Lei Wang and Ruizhi Xiao discovered that the Moby Docker engine in
Docker incorrectly allowed the docker cp command to make permissions
changes in the host filesystem in some situations. A local attacker
could possibly use to this to expose sensitive information or gain
administrative privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-41089

Title: USN-5111-2: strongSwan vulnerability
URL: https://ubuntu.com/security/notices/USN-5111-2
Priorities: medium
Description:
USN-5111-1 fixed a vulnerability in strongSwan. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that strongSwan incorrectly handled replacing
certificates in the cache. A remote attacker could use this issue to cause
strongSwan to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-41991)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-41991

Title: USN-5121-1: Mailman vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5121-1
Priorities: high
Description:
Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman
did not properly associate cross-site request forgery (CSRF) tokens
to specific accounts. A remote attacker could use this to perform a
CSRF attack to gain access to another account. (CVE-2021-42097)

Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman’s
cross-site request forgery (CSRF) tokens for the options page are
derived from the admin password. A remote attacker could possibly use
this to assist in performing a brute force attack against the admin
password. (CVE-2021-42096)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-42096
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-42097

621.160

Available in the Broadcom Support portal

Release Date: October 01, 2021

Fixes

Fixes an issue introduced in v621.151 that caused frequent udev events and high CPU usage on Azure VMs.

Metadata:

BOSH Agent Version: 2.268.29

621.154

Available in the Broadcom Support portal

Release Date: September 16, 2021

Fixes

  • Fixes an issue introduced in v621.151 that caused persistent disks to frequently fail to mount.

Metadata:

BOSH Agent Version: 2.268.27

USNs:


Title: USN-5077-2: Apport vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5077-2
Priorities: medium
Description:
USN-5077-1 fixed several vulnerabilities in Apport. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Maik Münch and Stephen Röttger discovered that Apport incorrectly handled
certain information gathering operations. A local attacker could use this
issue to gain read access to arbitrary files, possibly containing sensitive
information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3709
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3710

Title: USN-5076-1: Git vulnerability
URL: https://ubuntu.com/security/notices/USN-5076-1
Priorities: medium
Description:
It was discovered that Git allowed newline characters in
certain repository paths. An attacker could potentially use this issue to perform
cross-protocol requests.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-40330

621.151

Available in the Broadcom Support portal

Release Date: September 14, 2021

Fixes

  • Updates the /var/vcap/bosh/bin/monit wrapper script to refer to monit-actual by absolute path, rather than relative path. This allows folks who reset or clear the PATH environment variable to actually be able to use the monit CLI. Prior to this fix, folks who cleared their PATH environment variable would see an error like: /var/vcap/bosh/bin/monit: line 9: exec: monit-actual: not found.
  • Fixes the “incorrect used memory reporting” issue introduced in stemcell version 621.141. The Bosh Agent will now report the correct amount of memory used by all processes in the VM that it manages, rather than just the processes in its cgroup.

Known issues

  • We’ve seen failures with this version of the stemcell in vSphere when attempting to attach a persistent disk to a running VM. We are currently planning to address this issue with an update to the vSphere CPI. It should be fixed in vSphere CPI release >= v69. We have pulled the vSphere version of this stemcell for now.

    Note: This issue is fixed in stemcell version 621.154

Metadata:

BOSH Agent Version: 2.268.27

USNs:


Title: USN-5066-2: PySAML2 vulnerability
URL: https://ubuntu.com/security/notices/USN-5066-2
Priorities: medium
Description:
USN-5066-1 fixed a vulnerability in PySAML2. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Brian Wolff discovered that PySAML2 incorrectly validated cryptographic
signatures. A remote attacker could possibly use this issue to alter SAML
documents.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-21239

Title: USN-5039-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5039-1
Priorities: high
Description:
Andy Nguyen discovered that the netfilter subsystem in the Linux kernel
contained an out-of-bounds write in its setsockopt() implementation. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22555

Title: LSN-0080-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0080-1
Priorities: high
Description:
Andy Nguyen discovered that the netfilter subsystem in the Linux kernel
contained an out-of-bounds write in its setsockopt() implementation. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-22555)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22555

Title: USN-5028-1: Exiv2 vulnerability
URL: https://ubuntu.com/security/notices/USN-5028-1
Priorities: medium
Description:
It was discovered that Exiv2 incorrectly handled certain images.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31291

Title: USN-5025-2: libsndfile vulnerability
URL: https://ubuntu.com/security/notices/USN-5025-2
Priorities: medium
Description:
USN-5025-1 fixed a vulnerability in libsndfile. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that libsndfile incorrectly handled certain malformed
files. A remote attacker could use this issue to cause libsndfile to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3246

Title: USN-5027-2: PEAR vulnerability
URL: https://ubuntu.com/security/notices/USN-5027-2
Priorities: medium
Description:
USN-5027-1 fixed a vulnerability in PEAR. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that PEAR incorrectly handled symbolic links in archives.
A remote attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32610

Title: USN-5044-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5044-1
Priorities: medium
Description:
It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device initialization failure, leading to a double-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3564)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device detach events, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3573)

It was discovered that the NFC implementation in the Linux kernel did not
properly handle failed connect events leading to a NULL pointer
dereference. A local attacker could use this to cause a denial of service.
(CVE-2021-3587)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3573
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3587
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3564

Title: USN-5073-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5073-1
Priorities: medium,low,high
Description:
Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor
implementation for AMD processors in the Linux kernel allowed a guest VM to
disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a
guest VM could use this to read or write portions of the host’s physical
memory. (CVE-2021-3656)

Maxim Levitsky discovered that the KVM hypervisor implementation for AMD
processors in the Linux kernel did not properly prevent a guest VM from
enabling AVIC in nested guest VMs. An attacker in a guest VM could use this
to write to portions of the host’s physical memory. (CVE-2021-3653)

Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol
implementation in the Linux kernel did not properly initialize memory in
some situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2021-34693)

Murray McAllister discovered that the joystick device interface in the
Linux kernel did not properly validate data passed via an ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code on systems with a joystick device
registered. (CVE-2021-3612)

It was discovered that the Virtio console implementation in the Linux
kernel did not properly validate input lengths in some situations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2021-38160)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3612
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-34693
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-38160
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3653

Title: USN-5062-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5062-1
Priorities: high
Description:
Maxim Levitsky discovered that the KVM hypervisor implementation for AMD
processors in the Linux kernel did not properly prevent a guest VM from
enabling AVIC in nested guest VMs. An attacker in a guest VM could use this
to write to portions of the host’s physical memory.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3653

Title: LSN-0081-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0081-1
Priorities: high
Description:
Maxim Levitsky discovered that the KVM hypervisor implementation for AMD
processors in the Linux kernel did not properly prevent a guest VM from
enabling AVIC in nested guest VMs. An attacker in a guest VM could use this
to write to portions of the host’s physical memory.(CVE-2021-3653)

Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor
implementation for AMD processors in the Linux kernel allowed a guest VM to
disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a
guest VM could use this to read or write portions of the host’s physical
memory.(CVE-2021-3656)

Andy Nguyen discovered that the netfilter subsystem in the Linux kernel
contained an out-of-bounds write in its setsockopt() implementation. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-22555)

It was discovered that the virtual file system implementation in the Linux
kernel contained an unsigned to signed integer conversion error. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code.(CVE-2021-33909)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3653
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22555
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33909

Title: USN-5034-2: c-ares vulnerability
URL: https://ubuntu.com/security/notices/USN-5034-2
Priorities: medium
Description:
USN-5034-1 fixed a vulnerability in c-ares. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Philipp Jeitner and Haya Shulman discovered that c-ares incorrectly
validated certain hostnames returned by DNS servers. A remote attacker
could possibly use this issue to perform Domain Hijacking attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3672

Title: USN-5026-2: QPDF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5026-2
Priorities: medium,low
Description:
USN-5026-1 fixed several vulnerabilities in QPDF. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:

It was discovered that QPDF incorrectly handled certain malformed PDF
files. A remote attacker could use this issue to cause QPDF to consume
resources, resulting in a denial of service. (CVE-2018-18020)

It was discovered that QPDF incorrectly handled certain malformed PDF
files. A remote attacker could use this issue to cause QPDF to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2021-36978)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-36978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18020

Title: USN-5051-2: OpenSSL vulnerability
URL: https://ubuntu.com/security/notices/USN-5051-2
Priorities: medium
Description:
USN-5051-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Ingo Schwarze discovered that OpenSSL incorrectly handled certain ASN.1
strings. A remote attacker could use this issue to cause OpenSSL to crash,
resulting in a denial of service, or possibly obtain sensitive information.
(CVE-2021-3712)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3712

Title: USN-5043-1: Exiv2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5043-1
Priorities: medium
Description:
It was discovered that Exiv2 incorrectly handled certain image files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2021-32815, CVE-2021-34334, CVE-2021-37620, CVE-2021-37622)

It was discovered that Exiv2 incorrectly handled certain image files.
An attacker could possibly use this issue to cause a denial of service.
These issues only affected Ubuntu 20.04 LTS and Ubuntu 21.04.
(CVE-2021-34335, CVE-2021-37615, CVE-2021-37616, CVE-2021-37618,
CVE-2021-37619, CVE-2021-37621, CVE-2021-37623)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37622
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32815
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37623
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37621
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37620
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37618
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-34335
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37615
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37619
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37616
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-34334

Title: USN-5055-1: GNOME grilo vulnerability
URL: https://ubuntu.com/security/notices/USN-5055-1
Priorities: medium
Description:
Michael Catanzaro discovered that grilo incorrectly handled certain TLS
certificate verification. An attacker could possibly use this issue to
MITM attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-39365

Title: USN-5068-1: GD library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5068-1
Priorities: medium,low
Description:
It was discovered that GD Graphics Library incorrectly handled certain GD and GD2 files.
An attacker could possibly use this issue to cause a crash or expose sensitive information.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 ESM, and Ubuntu 14.04 ESM.
(CVE-2017-6363)

It was discovered that GD Graphics Library incorrectly handled certain TGA files.
An attacker could possibly use this issue to cause a denial of service or
expose sensitive information. (CVE-2021-381)

It was discovered that GD Graphics Library incorrectly handled certain files.
An attacker could possibly use this issue to cause a crash.
(CVE-2021-40145)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-40145
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-38115
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6363

621.141

Available in the Broadcom Support portal

Release Date: August 30, 2021

Enhancements

  • Added firewall rules to restrict Monit API access to the Monit CLI and BOSH Agent. To see how to grant your program access to the Monit API, examine the new monit wrapper script, found at /var/vcap/bosh/bin/monit.

Known issues

  • The memory used by the VM that a Bosh Agent manages is incorrectly reported. The Agent will report very significantly smaller amounts of memory used by the VM than are actually used. This means that the “memory used” information in the output of bosh vms --vitals and related commands is incorrect. For now, avoid using this stemcell version, if you rely on the VM memory usage information reported by the Bosh Agent, Director, or the bosh CLI.
    NOTE: This issue has been resolved in Stemcell version 621.151.


Metadata:

BOSH Agent Version: 2.268.23

USNs:


Title: USN-5039-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5039-1
Priorities: high
Description:
Andy Nguyen discovered that the netfilter subsystem in the Linux kernel
contained an out-of-bounds write in its setsockopt() implementation. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22555

Title: LSN-0080-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0080-1
Priorities: high
Description:
Andy Nguyen discovered that the netfilter subsystem in the Linux kernel
contained an out-of-bounds write in its setsockopt() implementation. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-22555)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22555

Title: USN-5028-1: Exiv2 vulnerability
URL: https://ubuntu.com/security/notices/USN-5028-1
Priorities: medium
Description:
It was discovered that Exiv2 incorrectly handled certain images.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31291

Title: USN-5025-2: libsndfile vulnerability
URL: https://ubuntu.com/security/notices/USN-5025-2
Priorities: medium
Description:
USN-5025-1 fixed a vulnerability in libsndfile. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that libsndfile incorrectly handled certain malformed
files. A remote attacker could use this issue to cause libsndfile to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3246

Title: USN-5027-2: PEAR vulnerability
URL: https://ubuntu.com/security/notices/USN-5027-2
Priorities: medium
Description:
USN-5027-1 fixed a vulnerability in PEAR. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that PEAR incorrectly handled symbolic links in archives.
A remote attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32610

Title: USN-5044-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5044-1
Priorities: medium
Description:
It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device initialization failure, leading to a double-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3564)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device detach events, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3573)

It was discovered that the NFC implementation in the Linux kernel did not
properly handle failed connect events leading to a NULL pointer
dereference. A local attacker could use this to cause a denial of service.
(CVE-2021-3587)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3573
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3587
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3564

Title: USN-5034-2: c-ares vulnerability
URL: https://ubuntu.com/security/notices/USN-5034-2
Priorities: medium
Description:
USN-5034-1 fixed a vulnerability in c-ares. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Philipp Jeitner and Haya Shulman discovered that c-ares incorrectly
validated certain hostnames returned by DNS servers. A remote attacker
could possibly use this issue to perform Domain Hijacking attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3672

Title: USN-5026-2: QPDF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5026-2
Priorities: medium,low
Description:
USN-5026-1 fixed several vulnerabilities in QPDF. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:

It was discovered that QPDF incorrectly handled certain malformed PDF
files. A remote attacker could use this issue to cause QPDF to consume
resources, resulting in a denial of service. (CVE-2018-18020)

It was discovered that QPDF incorrectly handled certain malformed PDF
files. A remote attacker could use this issue to cause QPDF to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2021-36978)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-36978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18020

Title: USN-5043-1: Exiv2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5043-1
Priorities: medium
Description:
It was discovered that Exiv2 incorrectly handled certain image files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2021-32815, CVE-2021-34334, CVE-2021-37620, CVE-2021-37622)

It was discovered that Exiv2 incorrectly handled certain image files.
An attacker could possibly use this issue to cause a denial of service.
These issues only affected Ubuntu 20.04 LTS and Ubuntu 21.04.
(CVE-2021-34335, CVE-2021-37615, CVE-2021-37616, CVE-2021-37618,
CVE-2021-37619, CVE-2021-37621, CVE-2021-37623)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37622
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32815
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37623
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37621
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37620
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37618
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-34335
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37615
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37619
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37616
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-34334

621.136

Available in the Broadcom Support portal

Release Date: July 26, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: USN-4336-2: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4336-2
Priorities: low,medium
Description:
USN-4336-1 fixed several vulnerabilities in GNU binutils. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that GNU binutils contained a large number of security
issues. If a user or automated system were tricked into processing a
specially-crafted file, a remote attacker could cause GNU binutils to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19932
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9074
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18309
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12451
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16828
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7302
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9751
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17080
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12700
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14130
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18483
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7568
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14128
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9749
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12458
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9070
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9755
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10534
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9746
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12972
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7300
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-9138
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7299
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4488
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15020
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9742
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17125
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14939
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14250
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14129
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12967
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17124
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12934
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7210
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8395
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7227
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12459
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9754
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20002
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4489
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9073
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-8945
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12448
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4491
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17794
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13710
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14333
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15021
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14940
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14930
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7225
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7223
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12452
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6965
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18701
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15024
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10372
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18484
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16832
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9748
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15225
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7569
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16831
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17358
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6543
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7224
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4493
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17121
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9041
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9071
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19931
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9756
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18700
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10373
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17451
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12697
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18606
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12641
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17123
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4492
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16826
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9753
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6323
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8394
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16827
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12450
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6131
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14529
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9038
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-2226
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9747
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4490
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12456
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20671
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10535
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4487
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15939
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7643
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-13033
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9039
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8393
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20623
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9744
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7642
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9752
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12698
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12699
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15996
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9044
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6759
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9745
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7208
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6969
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12449
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14932
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7614
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12454
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-1000876
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8396
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8397
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12455
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9954
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17360
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14444
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9075
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17985
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8398
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18607
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8421
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17450
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12799
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15938
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7301
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9750
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7226
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15025
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18605
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9042
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12457
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12453
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17359
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9040
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7209
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9077
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6966
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14938

Title: USN-5020-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5020-1
Priorities: medium,low
Description:
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-31799)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to conduct
port scans and service banner extractions. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-31810)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to perform
man-in-the-middle attackers to bypass the TLS protection.
(CVE-2021-32066)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31799
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32066
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31810

Title: LSN-0079-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0079-1
Priorities: high
Description:
It was discovered that the eBPF implementation in the Linux kernel did not
properly track bounds information for 32 bit registers when performing div
and mod operations. A local attacker could use this to possibly execute
arbitrary code.(CVE-2021-3600)

It was discovered that the virtual file system implementation in the Linux
kernel contained an unsigned to signed integer conversion error. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code.(CVE-2021-33909)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3600
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33909

621.135

Available in the Broadcom Support portal

Release Date: July 21, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: USN-5013-2: systemd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5013-2
Priorities: low,high
Description:
USN-5013-1 fixed several vulnerabilities in systemd. This update provides
the corresponding update for Ubuntu 16.04 ESM.


Original advisory details:

It was discovered that systemd incorrectly handled certain mount paths. A
local attacker could possibly use this issue to cause systemd to crash,
resulting in a denial of service. (CVE-2021-33910)

Mitchell Frank discovered that systemd incorrectly handled DHCP FORCERENEW
packets. A remote attacker could possibly use this issue to reconfigure
servers. (CVE-2020-13529)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13529
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33910

Title: USN-5018-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5018-1
Priorities: medium,high
Description:
It was discovered that the virtual file system implementation in the Linux
kernel contained an unsigned to signed integer conversion error. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2021-33909)

Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly enforce limits for pointer operations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-33200)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did
not properly clear received fragments from memory in some situations. A
physically proximate attacker could possibly use this issue to inject
packets or expose sensitive information. (CVE-2020-24586)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled encrypted fragments. A physically proximate attacker
could possibly use this issue to decrypt fragments. (CVE-2020-24587)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled EAPOL frames from unauthenticated senders. A physically
proximate attacker could inject malicious packets to cause a denial of
service (system crash). (CVE-2020-26139)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could
reassemble mixed encrypted and plaintext fragments. A physically proximate
attacker could possibly use this issue to inject packets or exfiltrate
selected fragments. (CVE-2020-26147)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly perform access control. An authenticated attacker could possibly
use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)

Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the
nfc implementation in the Linux kernel. A privileged local attacker could
use this issue to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-23134)

Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly prevent speculative loads in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-31829)

It was discovered that a race condition in the kernel Bluetooth subsystem
could lead to use-after-free of slab objects. An attacker could use this
issue to possibly execute arbitrary code. (CVE-2021-32399)

It was discovered that a use-after-free existed in the Bluetooth HCI driver
of the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33034)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-0129
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24586
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33909
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23134
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33200
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33034
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26139
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26147
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24587
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31829
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26558
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32399

Title: USN-5014-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5014-1
Priorities: high
Description:
It was discovered that the virtual file system implementation in the Linux
kernel contained an unsigned to signed integer conversion error. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33909

621.134

Available in the Broadcom Support portal

Release Date: July 19, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: LSN-0078-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0078-1
Priorities: high
Description:
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code.(CVE-2021-3609)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3609

621.133

Available in the Broadcom Support portal

Release Date: July 15, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: USN-5006-2: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5006-2
Priorities: low,medium
Description:
USN-5006-1 fixed several vulnerabilities in PHP. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that PHP incorrectly handled certain PHAR files. A remote
attacker could possibly use this issue to cause PHP to crash, resulting in
a denial of service, or possibly obtain sensitive information. (CVE-2020-7068)

It was discovered that PHP incorrectly handled parsing URLs with passwords.
A remote attacker could possibly use this issue to cause PHP to mis-parse
the URL and produce wrong data. (CVE-2020-7071)

It was discovered that PHP incorrectly handled certain malformed XML data
when being parsed by the SOAP extension. A remote attacker could possibly
use this issue to cause PHP to crash, resulting in a denial of service.
(CVE-2021-21702)

It was discovered that PHP incorrectly handled the pdo_firebase module. A
remote attacker could possibly use this issue to cause PHP to crash,
resulting in a denial of service. (CVE-2021-21704)

It was discovered that PHP incorrectly handled the FILTER_VALIDATE_URL
check. A remote attacker could possibly use this issue to perform a server-
side request forgery attack. (CVE-2021-21705)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-21702
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7071
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-21705
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7068
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-21704

Title: USN-5004-1: RabbitMQ vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5004-1
Priorities: medium,low
Description:
It was discovered that RabbitMQ incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2019-11287)

Jonathan Knudsen discovered RabbitMQ incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2021-22116)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22116
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11287

Title: USN-5008-2: Avahi vulnerability
URL: https://ubuntu.com/security/notices/USN-5008-2
Priorities: medium
Description:
USN-5008-1 fixed a vulnerability in avahi. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Thomas Kremer discovered that Avahi incorrectly handled termination signals
on the Unix socket. A local attacker could possibly use this issue to cause
Avahi to hang, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3468

Title: USN-5005-1: DjVuLibre vulnerability
URL: https://ubuntu.com/security/notices/USN-5005-1
Priorities: medium
Description:
It was discovered that DjVuLibre incorrectly handled certain djvu files.
An attacker could possibly use this issue to execute arbitrary code or
cause a crash.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3630

621.131

Available in the Broadcom Support portal

Release Date: June 23, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: USN-4986-2: rpcbind vulnerability
URL: https://ubuntu.com/security/notices/USN-4986-2
Priorities: low
Description:
USN-4986-1 fixed a vulnerability in rpcbind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that rpcbind incorrectly handled certain large data
sizes. A remote attacker could use this issue to cause rpcbind to consume
resources, leading to a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8779

Title: USN-4989-2: BlueZ vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4989-2
Priorities: medium,low
Description:
USN-4989-1 fixed several vulnerabilities in BlueZ. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that BlueZ incorrectly checked certain permissions when
pairing. A local attacker could possibly use this issue to impersonate
devices. (CVE-2020-26558)

Jay LV discovered that BlueZ incorrectly handled redundant disconnect MGMT
events. A local attacker could use this issue to cause BlueZ to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-27153)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26558
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27153

Title: USN-4971-2: libwebp vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4971-2
Priorities: medium
Description:
USN-4971-1 fixed several vulnerabilities in libwebp. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that libwebp incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image file, a remote attacker could use this issue to cause libwebp
to crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36331
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25014
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36328
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25012
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25009
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25013
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25011
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25010
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36330
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36329

Title: USN-5003-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5003-1
Priorities: medium,high
Description:
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)

It was discovered that the eBPF implementation in the Linux kernel did not
properly track bounds information for 32 bit registers when performing div
and mod operations. A local attacker could use this to possibly execute
arbitrary code. (CVE-2021-3600)

Or Cohen discovered that the SCTP implementation in the Linux kernel
contained a race condition in some situations, leading to a use-after-free
condition. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-23133)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23133
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3609
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3600

Title: USN-4994-2: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4994-2
Priorities: medium,low
Description:
USN-4994-1 fixed several vulnerabilities in Apache. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Antonio Morales discovered that the Apache mod_auth_digest module
incorrectly handled certain Digest nonces. A remote attacker could possibly
use this issue to cause Apache to crash, resulting in a denial of service.
(CVE-2020-35452)

Antonio Morales discovered that the Apache mod_session module incorrectly
handled certain Cookie headers. A remote attacker could possibly use this
issue to cause Apache to crash, resulting in a denial of service.
(CVE-2021-26690)

Christophe Jaillet discovered that the Apache mod_session module
incorrectly handled certain SessionHeader values. A remote attacker could
use this issue to cause Apache to crash, resulting in a denial of service,
or possibly execute arbitrary code. (CVE-2021-26691)

Christoph Anton Mitterer discovered that the new MergeSlashes configuration
option resulted in unexpected behaviour in certain situations.
(CVE-2021-30641)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26691
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35452
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-30641
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26690

Title: USN-4991-1: libxml2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4991-1
Priorities: medium,low
Description:
Yunho Kim discovered that libxml2 incorrectly handled certain error
conditions. A remote attacker could exploit this with a crafted XML file to
cause a denial of service, or possibly cause libxml2 to expose sensitive
information. This issue only affected Ubuntu 14.04 ESM, and Ubuntu 16.04
ESM. (CVE-2017-8872)

Zhipeng Xie discovered that libxml2 incorrectly handled certain XML
schemas. A remote attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM,
and Ubuntu 18.04 LTS. (CVE-2019-20388)

It was discovered that libxml2 incorrectly handled invalid UTF-8 input. A
remote attacker could possibly exploit this with a crafted XML file to
cause libxml2 to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS and Ubuntu 20.10. (CVE-2020-24977)

It was discovered that libxml2 incorrectly handled invalid UTF-8 input. A
remote attacker could possibly exploit this with a crafted XML file to
cause libxml2 to crash, resulting in a denial of service. (CVE-2021-3517)

It was discovered that libxml2 did not properly handle certain crafted XML
files. A local attacker could exploit this with a crafted input to cause
libxml2 to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-3516, CVE-2021-3518)

It was discovered that libxml2 incorrectly handled error states. A remote
attacker could exploit this with a crafted XML file to cause libxml2 to
crash, resulting in a denial of service. (CVE-2021-3537)

Sebastian Pipping discovered that libxml2 did not properly handle certain
crafted XML files. A remote attacker could exploit this with a crafted XML
file to cause libxml2 to crash, resulting in a denial of service. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04.
(CVE-2021-3541)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3516
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8872
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24977
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3541
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3537
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3517
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3518
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20388

Title: USN-4996-2: OpenEXR vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4996-2
Priorities: medium,low
Description:
USN-4996-1 fixed several vulnerabilities in OpenEXR. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image file,
a remote attacker could cause a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3605
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26260
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20296
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23215
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3598

621.130

Available in the Broadcom Support portal

Release Date: June 09, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: USN-4985-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4985-1
Priorities: medium,high
Description:
It was discovered that some Intel processors may not properly invalidate
cache entries used by Intel Virtualization Technology for Directed I/O
(VT-d). This may allow a local user to perform a privilege escalation
attack. (CVE-2021-24489)

Joseph Nuzman discovered that some Intel processors may not properly apply
EIBRS mitigations (originally developed for CVE-2017-5715) and hence may
allow unauthorized memory reads via sidechannel attacks. A local attacker
could use this to expose sensitive information, including kernel
memory. (CVE-2020-24511)

Travis Downs discovered that some Intel processors did not properly flush
cache-lines for trivial-data values. This may allow an unauthorized user to
infer the presence of these trivial-data-cache-lines via timing sidechannel
attacks. A local attacker could use this to expose sensitive
information. (CVE-2020-24512)

It was discovered that certain Intel Atom processors could expose memory
contents stored in microarchitectural buffers. A local attacker could use
this to expose sensitive information. (CVE-2020-24513)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24512
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-24489
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24513
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24511

Title: USN-4967-2: nginx vulnerability
URL: https://ubuntu.com/security/notices/USN-4967-2
Priorities: medium
Description:
USN-4967-1 fixed a vulnerability in nginx. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.

Original advisory details:

Luis Merino, Markus Vervier, and Eric Sesterhenn discovered that nginx
incorrectly handled responses to the DNS resolver. A remote attacker could
use this issue to cause nginx to crash, resulting in a denial of service,
or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23017

Title: USN-4969-2: DHCP vulnerability
URL: https://ubuntu.com/security/notices/USN-4969-2
Priorities: medium
Description:
USN-4969-1 fixed a vulnerability in DHCP. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.


Original advisory details:

Jon Franklin and Pawel Wieczorkiewicz discovered that DHCP incorrectly
handled lease file parsing. A remote attacker could possibly use this issue
to cause DHCP to crash, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25217

Title: USN-4966-2: libx11 vulnerability
URL: https://ubuntu.com/security/notices/USN-4966-2
Priorities: medium
Description:
USN-4966-1 fixed a vulnerability in libx11. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that libx11 incorrectly validated certain parameter
lengths. A remote attacker could possibly use this issue to trick libx11
into emitting extra X protocol requests.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31535

Title: USN-4979-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4979-1
Priorities: medium,low
Description:
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2020-25670)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly deallocate memory in certain error
situations. A local attacker could use this to cause a denial of service
(memory exhaustion). (CVE-2020-25671, CVE-2020-25672)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly handle error conditions in some situations,
leading to an infinite loop. A local attacker could use this to cause a
denial of service. (CVE-2020-25673)

It was discovered that the Realtek RTL8188EU Wireless device driver in the
Linux kernel did not properly validate ssid lengths in some situations. An
attacker could use this to cause a denial of service (system crash).
(CVE-2021-28660)

Zygo Blaxell discovered that the btrfs file system implementation in the
Linux kernel contained a race condition during certain cloning operations.
A local attacker could possibly use this to cause a denial of service
(system crash). (CVE-2021-28964)

Vince Weaver discovered that the perf subsystem in the Linux kernel did not
properly handle certain PEBS records properly for some Intel Haswell
processors. A local attacker could use this to cause a denial of service
(system crash). (CVE-2021-28971)

It was discovered that the RPA PCI Hotplug driver implementation in the
Linux kernel did not properly handle device name writes via sysfs, leading
to a buffer overflow. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2021-28972)

It was discovered that the Qualcomm IPC router implementation in the Linux
kernel did not properly initialize memory passed to user space. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-29647)

Dan Carpenter discovered that the block device manager (dm) implementation
in the Linux kernel contained a buffer overflow in the ioctl for listing
devices. A privileged local attacker could use this to cause a denial of
service (system crash). (CVE-2021-31916)

It was discovered that the CIPSO implementation in the Linux kernel did not
properly perform reference counting in some situations, leading to use-
after-free vulnerabilities. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33033)

Wolfgang Frisch discovered that the ext4 file system implementation in the
Linux kernel contained an integer overflow when handling metadata inode
extents. An attacker could use this to construct a malicious ext4 file
system image that, when mounted, could cause a denial of service (system
crash). (CVE-2021-3428)

马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-3483)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31916
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3428
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25670
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25673
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25672
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28971
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28964
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29647
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3483
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33033
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25671
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28972

Title: USN-4975-2: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-4975-2
Priorities: low
Description:
USN-4975-1 fixed a vulnerability in Django. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Rasmus Lerchedahl Petersen and Rasmus Wriedt Larsen discovered that Django
incorrectly handled path sanitation in admindocs. A remote attacker could
possibly use this issue to determine the existence of arbitrary files and
in certain configurations obtain their contents. (CVE-2021-33203)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33203

621.129

Available in the Broadcom Support portal

Release Date: May 26, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: USN-4954-1: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4954-1
Priorities: negligible,low
Description:
Jason Royes and Samuel Dytrych discovered that the memcpy()
implementation for 32 bit ARM processors in the GNU C Library contained
an integer underflow vulnerability. An attacker could possibly use
this to cause a denial of service (application crash) or execute
arbitrary code. (CVE-2020-6096)

It was discovered that the POSIX regex implementation in the GNU C
Library did not properly parse alternatives. An attacker could use this
to cause a denial of service. (CVE-2009-5155)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2009-5155
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6096

Title: USN-4934-2: Exim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4934-2
Priorities: medium
Description:
USN-4934-1 fixed several vulnerabilities in Exim. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
CVE-2020-28026 only affected Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Exim contained multiple security issues. An attacker
could use these issues to cause a denial of service, execute arbitrary
code remotely, obtain sensitive information, or escalate local privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28011
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28009
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27216
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28025
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28026
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28024
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28014
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28007
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28016
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28020
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28013
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28008
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28015
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28017
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28012

Title: USN-4953-1: AWStats vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4953-1
Priorities: low,medium
Description:
Sean Boran discovered that AWStats incorrectly filtered certain parameters.
A remote attacker could possibly use this issue to execute arbitrary code.
(CVE-2020-29600)

It was discovered that AWStats incorrectly filtered certain parameters. A
remote attacker could possibly use this issue to access sensitive
information. (CVE-2020-35176)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35176
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-1000501
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29600

Title: USN-4962-1: Babel vulnerability
URL: https://ubuntu.com/security/notices/USN-4962-1
Priorities: medium
Description:
It was discovered that Babel incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20095

Title: USN-4930-1: Samba vulnerability
URL: https://ubuntu.com/security/notices/USN-4930-1
Priorities: medium
Description:
Peter Eriksson discovered that Samba incorrectly handled certain negative
idmap cache entries. This issue could result in certain users gaining
unauthorized access to files, contrary to expected behaviour.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20254

Title: USN-4946-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4946-1
Priorities: low,medium
Description:
It was discovered that the DRM subsystem in the Linux kernel contained
double-free vulnerabilities. A privileged attacker could possibly use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2021-20292)

Olivier Benjamin, Norbert Manthey, Martin Mazein, and Jan H. Schönherr
discovered that the Xen paravirtualization backend in the Linux kernel did
not properly propagate errors to frontend drivers in some situations. An
attacker in a guest VM could possibly use this to cause a denial of service
(host domain crash). (CVE-2021-26930)

Jan Beulich discovered that multiple Xen backends in the Linux kernel did
not properly handle certain error conditions under paravirtualization. An
attacker in a guest VM could possibly use this to cause a denial of service
(host domain crash). (CVE-2021-26931)

Jan Beulich discovered that the Xen netback backend in the Linux kernel did
not properly handle certain error conditions under paravirtualization. An
attacker in a guest VM could possibly use this to cause a denial of service
(host domain crash). (CVE-2021-28038)

It was discovered that the Xen paravirtualization backend in the Linux
kernel did not properly deallocate memory in some situations. A local
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2021-28688)

It was discovered that the Freescale Gianfar Ethernet driver for the Linux
kernel did not properly handle receive queue overrun when jumbo frames were
enabled in some situations. An attacker could use this to cause a denial of
service (system crash). (CVE-2021-29264)

It was discovered that the USB/IP driver in the Linux kernel contained race
conditions during the update of local and shared status. An attacker could
use this to cause a denial of service (system crash). (CVE-2021-29265)

It was discovered that a race condition existed in the netfilter subsystem
of the Linux kernel when replacing tables. A local attacker could use this
to cause a denial of service (system crash). (CVE-2021-29650)

Arnd Bergmann discovered that the video4linux subsystem in the Linux kernel
did not properly deallocate memory in some situations. A local attacker
could use this to cause a denial of service (memory exhaustion).
(CVE-2021-30002)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20292
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26930
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29264
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29265
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29650
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28688
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26931
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28038
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-30002

Title: USN-4941-1: Exiv2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4941-1
Priorities: medium
Description:
It was discovered that Exiv2 incorrectly handled certain images.
An attacker could possibly use this issue to execute arbitrary code or cause
a crash. (CVE-2021-29457)

It was discovered that Exiv2 incorrectly handled certain images.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2021-29458, CVE-2021-29470)

It was discovered that Exiv2 incorrectly handled certain images.
An attacker could possibly use this issue to execute arbitrary code or
cause a crash. (CVE-2021-3482)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29458
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3482
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29470
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29457

Title: USN-4964-1: Exiv2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4964-1
Priorities: low,medium
Description:
It was discovered that Exiv2 incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10 and Ubuntu 21.04.
(CVE-2021-29463)

It was discovered that Exiv2 incorrectly handled certain files.
An attacker could possibly use this issue to execute arbitrary code.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10 and Ubuntu 21.04.
(CVE-2021-29464)

It was discovered that Exiv2 incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2021-29473, CVE-2021-32617)

It was discovered that Exiv2 incorrectly handled certain files.
An attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10 and Ubuntu 21.04.
(CVE-2021-29623)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29464
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29463
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32617
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29623
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29473

Title: USN-4932-2: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-4932-2
Priorities: medium
Description:
USN-4932-1 fixed a vulnerability in Django. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Django incorrectly handled certain
filenames. A remote attacker could possibly use this issue to create or
overwrite files in unexpected directories.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31542

Title: USN-4957-2: DjVuLibre vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4957-2
Priorities: medium,low
Description:
USN-4957-1 fixed several vulnerabilities in DjVuLibre. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that DjVuLibre incorrectly handled certain memory
operations. If a user or automated system were tricked into processing a
specially crafted DjVu file, a remote attacker could cause applications
to hang or crash, resulting in a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32491
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32492
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32493
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32490
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3500

Title: USN-4965-2: Apport vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4965-2
Priorities: medium
Description:
USN-4965-1 fixed several vulnerabilities in Apport. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:

Maik Münch discovered that Apport incorrectly handled certain information
gathering operations. A local attacker could use these issues to read and
write arbitrary files as an administrator, and possibly escalate
privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32549
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32555
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32551
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32548
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32550
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32554
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32553
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32557
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32552
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32547
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32556

621.125

Available in the Broadcom Support portal

Release Date: April 30, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: USN-4924-1: Dnsmasq vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4924-1
Priorities: low
Description:
It was discovered that Dnsmasq incorrectly handled certain wildcard
synthesized NSEC records. A remote attacker could possibly use this issue
to prove the non-existence of hostnames that actually exist.
(CVE-2017-15107)

It was discovered that Dnsmasq incorrectly handled certain large DNS
packets. A remote attacker could possibly use this issue to cause Dnsmasq
to crash, resulting in a denial of service. (CVE-2019-14513)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14513
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15107

Title: USN-4919-1: OpenSLP vulnerability
URL: https://ubuntu.com/security/notices/USN-4919-1
Priorities: medium
Description:
It was discovered that OpenSLP did not properly validate URLs. A remote
attacker could use this issue to cause OpenSLP to crash or possibly execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5544

Title: USN-4927-1: File Roller vulnerability
URL: https://ubuntu.com/security/notices/USN-4927-1
Priorities: medium
Description:
It was discovered that File Roller incorrectly handled symlinks.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36314

Title: USN-4918-1: ClamAV vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4918-1
Priorities: medium
Description:
It was discovered that ClamAV incorrectly handled parsing Excel documents.
A remote attacker could possibly use this issue to cause ClamAV to hang,
resulting in a denial of service. (CVE-2021-1252)

It was discovered that ClamAV incorrectly handled parsing PDF documents. A
remote attacker could possibly use this issue to cause ClamAV to crash,
resulting in a denial of service. (CVE-2021-1404)

It was discovered that ClamAV incorrectly handled parsing email. A remote
attacker could possibly use this issue to cause ClamAV to crash, resulting
in a denial of service. (CVE-2021-1405)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-1405
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-1404
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-1252

Title: USN-4892-1: OpenJDK vulnerability
URL: https://ubuntu.com/security/notices/USN-4892-1
Priorities: medium
Description:
It was discovered that OpenJDK incorrectly verified Jar signatures. An
attacker could possibly use this issue to bypass intended security
restrictions when using Jar files signed with a disabled algorithm.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2163

Title: USN-4913-1: Underscore vulnerability
URL: https://ubuntu.com/security/notices/USN-4913-1
Priorities: medium
Description:
It was discovered that Underscore incorrectly handled certain inputs.
An attacker could possibly use this issue to inject arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23358

Title: USN-4926-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4926-1
Priorities: medium
Description:
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, spoof the
browser UI, bypass security restrictions, trick the user into disclosing
confidential information, or execute arbitrary code. (CVE-2021-23994,
CVE-2021-23996, CVE-2021-23997, CVE-2021-23998, CVE-2021-23999,
CVE-2021-24000, CVE-2021-24001, CVE-2021-29945, CVE-2021-29946,
CVE-2021-29947)

A use-after-free was discovered when Responsive Design Mode was
enabled. If a user were tricked into opening a specially crafted
website with Responsive Design Mode enabled, an attacker could
potentially exploit this to cause a denial of service, or execute
arbitrary code. (CVE-2021-23995)

It was discovered that Firefox mishandled ftp URLs with encoded newline
characters. If a user were tricked into clicking on a specially crafted
link, an attacker could potentially exploit this to send arbitrary
FTP commands. (CVE-2021-24002)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-24000
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23996
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23997
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23995
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29946
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23999
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23994
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23998
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29945
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-24001
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-24002
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29947

Title: USN-4922-1: Ruby vulnerability
URL: https://ubuntu.com/security/notices/USN-4922-1
Priorities: medium
Description:
Juho Nurminen discovered that the REXML gem bundled with Ruby incorrectly
parsed and serialized XML documents. A remote attacker could possibly use
this issue to perform an XML round-trip attack.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28965

Title: USN-4921-1: libcaca vulnerability
URL: https://ubuntu.com/security/notices/USN-4921-1
Priorities: medium
Description:
It was discovered that libcaca incorrectly handled certain images.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3410

Title: USN-4916-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4916-1
Priorities: high
Description:
It was discovered that the overlayfs implementation in the Linux kernel did
not properly validate the application of file system capabilities with
respect to user namespaces. A local attacker could use this to gain
elevated privileges. (CVE-2021-3493)

Piotr Krysiuk discovered that the BPF JIT compiler for x86 in the Linux
kernel did not properly validate computation of branch displacements in
some situations. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-29154)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3493
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29154

Title: USN-4928-1: GStreamer Good Plugins vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4928-1
Priorities: medium
Description:
It was discovered that GStreamer Good Plugins incorrectly handled certain files.
An attacker could possibly use this issue to cause access sensitive information
or cause a crash. (CVE-2021-3497)

It was discovered that GStreamer Good Plugins incorrectly handled certain files.
An attacker could possibly use this issue to execute arbitrary code or cause
a crash. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu
20.10. (CVE-2021-3498)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3498
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3497

621.123

Available in the Broadcom Support portal

Release Date: April 19, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: USN-4899-1: SpamAssassin vulnerability
URL: https://ubuntu.com/security/notices/USN-4899-1
Priorities: medium
Description:
Damian Lukowski discovered that SpamAssassin incorrectly handled certain CF
files. If a user or automated system were tricked into using a specially-
crafted CF file, a remote attacker could possibly run arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1946

Title: USN-4895-1: Squid vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4895-1
Priorities: medium,low
Description:
Alex Rousskov and Amit Klein discovered that Squid incorrectly handled
certain Content-Length headers. A remote attacker could possibly use this
issue to perform an HTTP request smuggling attack, resulting in cache
poisoning. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-15049)

Jianjun Chen discovered that Squid incorrectly validated certain input. A
remote attacker could use this issue to perform HTTP Request Smuggling and
possibly access services forbidden by the security controls.
(CVE-2020-25097)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25097
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15049

Title: USN-4561-2: Rack vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4561-2
Priorities: low,medium
Description:
USN-4561-1 fixed vulnerabilities in Rack. This update provides the
corresponding update for Ubuntu 16.04 LTS, Ubuntu 20.04 LTS and Ubuntu 20.10.

Original advisory details:

It was discovered that Rack incorrectly handled certain paths. An attacker
could possibly use this issue to obtain sensitive information. This issue
only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2020-8161)

It was discovered that Rack incorrectly validated cookies. An attacker
could possibly use this issue to forge a secure cookie. (CVE-2020-8184)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8161
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8184

Title: USN-4885-1: Pygments vulnerability
URL: https://ubuntu.com/security/notices/USN-4885-1
Priorities: medium
Description:
It was discovered that Pygments incorrectly handled parsing SML files. If a
user or automated system were tricked into parsing a specially crafted SML
file, a remote attacker could cause Pygments to hang, resulting in a denial
of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20270

Title: USN-4898-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4898-1
Priorities: medium
Description:
Viktor Szakats discovered that curl did not strip off user credentials
from referrer header fields. A remote attacker could possibly use this
issue to obtain sensitive information. (CVE-2021-22876)

Mingtao Yang discovered that curl incorrectly handled session tickets when
using an HTTPS proxy. A remote attacker in control of an HTTPS proxy could
use this issue to bypass certificate checks and intercept communications.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 20.10.
(CVE-2021-22890)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22890
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22876

Title: USN-4893-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4893-1
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information, or execute arbitrary code. (CVE-2021-23981, CVE-2021-23982,
CVE-2021-23983, CVE-2021-23987, CVE-2021-23988)

It was discovered that extensions could open popup windows with control
of the window title in some circumstances. If a user were tricked into
installing a specially crafted extension, an attacker could potentially
exploit this to spook a website and trick the user into providing
credentials. (CVE-2021-23984)

It was discovered that the DevTools remote debugging feature could be
enabled without an indication to the user. If a local attacker could
modify the browser configuration, a remote attacker could potentially
exploit this to obtain sensitive information. (CVE-2021-23985)

It was discovered that extensions could read the response of cross
origin requests in some circumstances. If a user were tricked into
installing a specially crafted extension, an attacker could potentially
exploit this to obtain sensitive information. (CVE-2021-23986)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23987
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23986
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23985
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23988
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23984
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23981
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23982
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23983

Title: USN-4897-1: Pygments vulnerability
URL: https://ubuntu.com/security/notices/USN-4897-1
Priorities: medium
Description:
Ben Caller discovered that Pygments incorrectly handled parsing certain
files. If a user or automated system were tricked into parsing a specially
crafted file, a remote attacker could cause Pygments to hang or consume
resources, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27291

Title: USN-4883-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4883-1
Priorities: high,medium
Description:
Adam Nichols discovered that heap overflows existed in the iSCSI subsystem
in the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-27365)

Adam Nichols discovered that the iSCSI subsystem in the Linux kernel did
not properly restrict access to iSCSI transport handles. A local attacker
could use this to cause a denial of service or expose sensitive information
(kernel pointer addresses). (CVE-2021-27363)

Adam Nichols discovered that an out-of-bounds read existed in the iSCSI
subsystem in the Linux kernel. A local attacker could use this to cause a
denial of service (system crash) or expose sensitive information (kernel
memory). (CVE-2021-27364)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27365
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27363
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27364

Title: USN-4902-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-4902-1
Priorities: low
Description:
Dennis Brinkrolf discovered that Django incorrectly handled certain
filenames. A remote attacker could possibly use this issue to create or
overwrite files in unexpected directories.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28658

Title: USN-4896-1: lxml vulnerability
URL: https://ubuntu.com/security/notices/USN-4896-1
Priorities: medium
Description:
It was discovered that lxml incorrectly handled certain HTML attributes. A
remote attacker could possibly use this issue to perform cross-site
scripting (XSS) attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28957

Title: USN-4905-1: X.Org X Server vulnerability
URL: https://ubuntu.com/security/notices/USN-4905-1
Priorities: medium
Description:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain lengths of XInput extension ChangeFeedbackControl requests. An
attacker could use this issue to cause the server to crash, resulting in a
denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3472

Title: USN-4900-1: OpenEXR vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4900-1
Priorities: medium,low
Description:
It was discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image file,
a remote attacker could cause a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3476
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3475
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3474
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3477
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3478
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3479

Title: USN-4916-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4916-1
Priorities: high
Description:
It was discovered that the overlayfs implementation in the Linux kernel did
not properly validate the application of file system capabilities with
respect to user namespaces. A local attacker could use this to gain
elevated privileges. (CVE-2021-3493)

Piotr Krysiuk discovered that the BPF JIT compiler for x86 in the Linux
kernel did not properly validate computation of branch displacements in
some situations. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-29154)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3493
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29154

621.117

Available in the Broadcom Support portal

Release Date: March 25, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: USN-4888-1: ldb vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4888-1
Priorities: high
Description:
Douglas Bagnall discovered that ldb, when used with Samba, incorrectly
handled certain LDAP attributes. A remote attacker could possibly use this
issue to cause the LDAP server to crash, resulting in a denial of service.
(CVE-2021-20277)

Douglas Bagnall discovered that ldb, when used with Samba, incorrectly
handled certain DN strings. A remote attacker could use this issue to
cause the LDAP server to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2020-27840)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20277
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27840

Title: USN-4890-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4890-1
Priorities: high
Description:
Piotr Krysiuk discovered that the BPF subsystem in the Linux kernel did not
properly compute a speculative execution limit on pointer arithmetic in
some situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2020-27171)

Piotr Krysiuk discovered that the BPF subsystem in the Linux kernel did not
properly apply speculative execution limits on some pointer types. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-27170)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27170
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27171

621.115

Available in the Broadcom Support portal

Release Date: March 22, 2021

Metadata:

BOSH Agent Version: 2.268.21

USNs:


Title: USN-4758-1: Go vulnerability
URL: https://ubuntu.com/security/notices/USN-4758-1
Priorities: low
Description:
It was discovered that Go applications incorrectly handled uploaded content. If
a user were tricked into visiting a malicious page, a remote attacker could
exploit this with a crafted file to conduct cross-site scripting (XSS) attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24553

Title: USN-4761-1: Git vulnerability
URL: https://ubuntu.com/security/notices/USN-4761-1
Priorities: medium
Description:
Matheus Tavares discovered that Git incorrectly handled delay-capable
clean/smudge filters when being used on case-insensitive filesystems. A
remote attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-21300

Title: USN-4759-1: GLib vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4759-1
Priorities: medium
Description:
Krzesimir Nowak discovered that GLib incorrectly handled certain large
buffers. A remote attacker could use this issue to cause applications
linked to GLib to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-27218)

Kevin Backhouse discovered that GLib incorrectly handled certain memory
allocations. A remote attacker could use this issue to cause applications
linked to GLib to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-27219)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27218
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27219

Title: USN-4763-1: Pillow vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4763-1
Priorities: medium
Description:
It was discovered that Pillow incorrectly handled certain Tiff image files.
If a user or automated system were tricked into opening a specially-crafted
Tiff file, a remote attacker could cause Pillow to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 20.04 LTS and Ubuntu 20.10. (CVE-2021-25289,
CVE-2021-25291)

It was discovered that Pillow incorrectly handled certain Tiff image files.
If a user or automated system were tricked into opening a specially-crafted
Tiff file, a remote attacker could cause Pillow to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2021-25290)

It was discovered that Pillow incorrectly handled certain PDF files. If a
user or automated system were tricked into opening a specially-crafted
PDF file, a remote attacker could cause Pillow to hang, resulting in a
denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, and Ubuntu 20.10. (CVE-2021-25292)

It was discovered that Pillow incorrectly handled certain SGI image files.
If a user or automated system were tricked into opening a specially-crafted
SGI file, a remote attacker could possibly cause Pillow to crash,
resulting in a denial of service. This issue only affected Ubuntu 18.04
LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10. (CVE-2021-25293)

Jiayi Lin, Luke Shaffer, Xinran Xie, and Akshay Ajayan discovered that
Pillow incorrectly handled certain BLP files. If a user or automated system
were tricked into opening a specially-crafted BLP file, a remote attacker
could possibly cause Pillow to consume resources, resulting in a denial of
service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 20.10. (CVE-2021-27921)

Jiayi Lin, Luke Shaffer, Xinran Xie, and Akshay Ajayan discovered that
Pillow incorrectly handled certain ICNS files. If a user or automated
system were tricked into opening a specially-crafted ICNS file, a remote
attacker could possibly cause Pillow to consume resources, resulting in a
denial of service. (CVE-2021-27922)

Jiayi Lin, Luke Shaffer, Xinran Xie, and Akshay Ajayan discovered that
Pillow incorrectly handled certain ICO files. If a user or automated
system were tricked into opening a specially-crafted ICO file, a remote
attacker could possibly cause Pillow to consume resources, resulting in a
denial of service. (CVE-2021-27922)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27922
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25291
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27921
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25293
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27923
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25290
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25292
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25289

621.113

Available in the Broadcom Support portal

Release Date: March 15, 2021

Metadata:

BOSH Agent Version: 2.268.20

USNs:


Title: USN-4755-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4755-1
Priorities: medium
Description:
It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image, a remote attacker could crash the application, leading to a
denial of service, or possibly execute arbitrary code with user privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35524
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35523

Title: USN-4756-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4756-1
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information, conduct cross-site scripting (XSS) attacks, bypass HTTP auth
phishing warnings, or execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23971
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23973
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23970
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23972
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23969
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23968
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23975
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23979

Title: USN-4757-1: wpa_supplicant and hostapd vulnerability
URL: https://ubuntu.com/security/notices/USN-4757-1
Priorities: medium
Description:
It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) provision discovery requests in some situations. A
physically proximate attacker could use this to cause a denial of service
or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27803

Title: USN-4754-4: Python 2.7 vulnerability
URL: https://ubuntu.com/security/notices/USN-4754-4
Priorities: medium
Description:
USN-4754-1 fixed vulnerabilities in Python. Because of a regression, a
subsequent update removed the fix for CVE-2021-3177. This update reinstates
the security fix for CVE-2021-3177.

We apologize for the inconvenience.

Original advisory details:

It was discovered that Python incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code
or cause a denial of service. (CVE-2020-27619, CVE-2021-3177)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3177

621.109

Available in the Broadcom Support portal

Release Date: March 05, 2021

Fixes Issues:


GCP rsyslog behavior is fixed - cf ssh and rsyslog should be working as expected

Important Notice:


As of this release, on all IAASs, rsyslog will not start until /var/log is mounted. When used with a Bosh Agent, /var/log will automatically be mounted, and no further action is required.

If you use this stemcell without a Bosh Agent and do not mount /var/log, then you need to do one of these two actions:

* Remove the ExecStartPre= line from /etc/systemd/system/rsyslog.service
* Blank out the contents of /usr/local/bin/wait_for_var_log_to_be_mounted

Either action will cause rsyslog to no longer wait for /var/log to be mounted before starting.

Metadata:

BOSH Agent Version: 2.268.19

USNs:


Title: USN-4754-1: Python vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4754-1
Priorities: medium,low
Description:
It was discovered that Python incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code
or cause a denial of service. (CVE-2020-27619, CVE-2021-3177)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3177
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27619

621.108

Available in the Broadcom Support portal

Release Date: March 01, 2021

Known Issues:

This version of the stemcell has the following issues when used on GCP:
* Attempts to use cf ssh timeout.
* The iptables-logger job fails to deploy

This is because rsyslog is started before /var/log is mounted. This causes it to log to the root filesystem rather than the mounted persistent disk.

This issue is fixed in stemcell version 621.109.

Metadata:

BOSH Agent Version: 2.268.19

USNs:


Title: USN-4741-1: Jackson vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4741-1
Priorities: medium
Description:
It was discovered that Jackson Databind incorrectly handled
deserialization. An attacker could possibly use this issue to execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15095
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7525
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-10172

Title: USN-4749-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4749-1
Priorities: medium,low
Description:
Bodong Zhao discovered a use-after-free in the Sun keyboard driver
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service or possibly execute arbitrary code.
(CVE-2020-25669)

It was discovered that the jfs file system implementation in the Linux
kernel contained an out-of-bounds read vulnerability. A local attacker
could use this to possibly cause a denial of service (system crash).
(CVE-2020-27815)

Shisong Qin and Bodong Zhao discovered that Speakup screen reader driver in
the Linux kernel did not correctly handle setting line discipline in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2020-27830, CVE-2020-28941)

It was discovered that the memory management subsystem in the Linux kernel
did not properly handle copy-on-write operations in some situations. A
local attacker could possibly use this to gain unintended write access to
read-only memory pages. (CVE-2020-29374)

Michael Kurth and Pawel Wieczorkiewicz discovered that the Xen event
processing backend in the Linux kernel did not properly limit the number of
events queued. An attacker in a guest VM could use this to cause a denial
of service in the host OS. (CVE-2020-29568)

Olivier Benjamin and Pawel Wieczorkiewicz discovered a race condition the
Xen paravirt block backend in the Linux kernel, leading to a use-after-free
vulnerability. An attacker in a guest VM could use this to cause a denial
of service in the host OS. (CVE-2020-29569)

Jann Horn discovered that the tty subsystem of the Linux kernel did not use
consistent locking in some situations, leading to a read-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information (kernel memory).
(CVE-2020-29660)

Jann Horn discovered a race condition in the tty subsystem of the Linux
kernel in the locking for the TIOCSPGRP ioctl(), leading to a use-after-
free vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2020-29661)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27815
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27830
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29568
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29374
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29569
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29661
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25669
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28941

Title: USN-4748-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4748-1
Priorities: medium,low
Description:
It was discovered that the jfs file system implementation in the Linux
kernel contained an out-of-bounds read vulnerability. A local attacker
could use this to possibly cause a denial of service (system crash).
(CVE-2020-27815)

It was discovered that the memory management subsystem in the Linux kernel
did not properly handle copy-on-write operations in some situations. A
local attacker could possibly use this to gain unintended write access to
read-only memory pages. (CVE-2020-29374)

Michael Kurth and Pawel Wieczorkiewicz discovered that the Xen event
processing backend in the Linux kernel did not properly limit the number of
events queued. An attacker in a guest VM could use this to cause a denial
of service in the host OS. (CVE-2020-29568)

Jann Horn discovered that the tty subsystem of the Linux kernel did not use
consistent locking in some situations, leading to a read-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information (kernel memory).
(CVE-2020-29660)

Jann Horn discovered a race condition in the tty subsystem of the Linux
kernel in the locking for the TIOCSPGRP ioctl(), leading to a use-after-
free vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2020-29661)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29374
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29661
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29568
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27815

Title: USN-4747-1: GNU Screen vulnerability
URL: https://ubuntu.com/security/notices/USN-4747-1
Priorities: medium
Description:
Felix Weinmann discovered that GNU Screen incorrectly handled certain
character sequences. A remote attacker could use this issue to cause GNU
Screen to crash, resulting in a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26937

Title: USN-4746-1: xterm vulnerability
URL: https://ubuntu.com/security/notices/USN-4746-1
Priorities: medium
Description:
Tavis Ormandy discovered that xterm incorrectly handled certain character
sequences. A remote attacker could use this issue to cause xterm to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27135 Known Issues: When used on GCP, rsyslog is started before /var/log is mounted. This causes it to log to the root filesystem rather than the mounted persistent disk.

621.107

Available in the Broadcom Support portal

Release Date: February 24, 2021

Known Issues:

This version of the stemcell has the following issues when used on GCP:
* Attempts to use cf ssh timeout.
* The iptables-logger job fails to deploy

This is because rsyslog is started before /var/log is mounted. This causes it to log to the root filesystem rather than the mounted persistent disk.

This issue is fixed in stemcell version 621.109.

Metadata:

BOSH Agent Version: 2.268.19

USNs:


Title: USN-4728-1: snapd vulnerability
URL: https://ubuntu.com/security/notices/USN-4728-1
Priorities: high
Description:
Gilad Reti discovered that snapd did not correctly specify cgroup
delegation when generating systemd service units for various container
management snaps. This could allow a local attacker to escalate privileges
via access to arbitrary devices of the container host from within a
compromised or malicious container.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27352

Title: USN-4718-1: fastd vulnerability
URL: https://ubuntu.com/security/notices/USN-4718-1
Priorities: medium
Description:
It was discovered that fastd incorrectly handled certain packets.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27638

Title: USN-4729-1: Open vSwitch vulnerability
URL: https://ubuntu.com/security/notices/USN-4729-1
Priorities: medium
Description:
Joakim Hindersson discovered that Open vSwitch incorrectly parsed certain
network packets. A remote attacker could use this issue to cause a denial
of service, or possibly alter packet classification.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35498

Title: USN-4724-1: OpenLDAP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4724-1
Priorities: medium
Description:
It was discovered that OpenLDAP incorrectly handled Certificate Exact
Assertion processing. A remote attacker could possibly use this issue to
cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36221)

It was discovered that OpenLDAP incorrectly handled saslAuthzTo processing.
A remote attacker could use this issue to cause OpenLDAP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2020-36222, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226)

It was discovered that OpenLDAP incorrectly handled Return Filter control
handling. A remote attacker could use this issue to cause OpenLDAP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2020-36223)

It was discovered that OpenLDAP incorrectly handled certain cancel
operations. A remote attacker could possibly use this issue to cause
OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36227)

It was discovered that OpenLDAP incorrectly handled Certificate List
Extract Assertion processing. A remote attacker could possibly use this
issue to cause OpenLDAP to crash, resulting in a denial of service.
(CVE-2020-36228)

It was discovered that OpenLDAP incorrectly handled X.509 DN parsing. A
remote attacker could possibly use this issue to cause OpenLDAP to crash,
resulting in a denial of service. (CVE-2020-36229, CVE-2020-36230)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36223
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36226
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36227
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36230
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36221
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36229
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36224
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36225
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36228
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36222

Title: USN-4737-1: Bind vulnerability
URL: https://ubuntu.com/security/notices/USN-4737-1
Priorities: medium
Description:
It was discovered that Bind incorrectly handled GSSAPI security policy
negotiation. A remote attacker could use this issue to cause Bind to crash,
resulting in a denial of service, or possibly execute arbitrary code. In
the default installation, attackers would be isolated by the Bind AppArmor
profile.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8625

Title: USN-4734-1: wpa_supplicant and hostapd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4734-1
Priorities: high,medium
Description:
It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) group information in some situations, leading to a
heap overflow. A physically proximate attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2021-0326)

It was discovered that hostapd did not properly handle UPnP subscribe
messages in some circumstances. An attacker could use this to cause a
denial of service. (CVE-2020-12695)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-0326
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12695

Title: USN-4720-1: Apport vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4720-1
Priorities: medium
Description:
Itai Greenhut discovered that Apport incorrectly parsed certain files in
the /proc filesystem. A local attacker could use this issue to escalate
privileges and run arbitrary code. (CVE-2021-25682, CVE-2021-25683)

Itai Greenhut discovered that Apport incorrectly handled opening certain
special files. A local attacker could possibly use this issue to cause
Apport to hang, resulting in a denial of service. (CVE-2021-25684)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25683
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25682
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25684 Known Issues: When used on GCP, rsyslog is started before /var/log is mounted. This causes it to log to the root filesystem rather than the mounted persistent disk.

621.101

Available in the Broadcom Support portal

Release Date: February 03, 2021

Metadata:

BOSH Agent Version: 2.268.17

USNs:


Title: USN-4702-1: Pound vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4702-1
Priorities: medium
Description:
It was discovered that Pound incorrectly handled certain HTTP requests
A remote attacker could use it to retrieve some sensitive
information. (CVE-2016-10711, CVE-2018-21245)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-21245
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-10711

Title: USN-4708-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4708-1
Priorities: medium,low
Description:
Wen Xu discovered that the XFS filesystem implementation in the Linux
kernel did not properly track inode validations. An attacker could use this
to construct a malicious XFS image that, when mounted, could cause a denial
of service (system crash). (CVE-2018-13093)

It was discovered that the btrfs file system implementation in the Linux
kernel did not properly validate file system metadata in some situations.
An attacker could use this to construct a malicious btrfs image that, when
mounted, could cause a denial of service (system crash). (CVE-2019-19813,
CVE-2019-19816)

Bodong Zhao discovered a use-after-free in the Sun keyboard driver
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service or possibly execute arbitrary code.
(CVE-2020-25669)

Daniel Axtens discovered that PowerPC RTAS implementation in the Linux
kernel did not properly restrict memory accesses in some situations. A
privileged local attacker could use this to arbitrarily modify kernel
memory, potentially bypassing kernel lockdown restrictions.
(CVE-2020-27777)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27777
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-13093
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19816
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25669
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19813

Title: USN-4709-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4709-1
Priorities: high,low
Description:
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data. (CVE-2020-28374)

Wen Xu discovered that the XFS filesystem implementation in the Linux
kernel did not properly track inode validations. An attacker could use this
to construct a malicious XFS image that, when mounted, could cause a denial
of service (system crash). (CVE-2018-13093)

It was discovered that the btrfs file system implementation in the Linux
kernel did not properly validate file system metadata in some situations.
An attacker could use this to construct a malicious btrfs image that, when
mounted, could cause a denial of service (system crash). (CVE-2019-19813,
CVE-2019-19816)

Bodong Zhao discovered a use-after-free in the Sun keyboard driver
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service or possibly execute arbitrary code.
(CVE-2020-25669)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28374
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19816
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25669
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19813
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-13093

Title: USN-4711-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4711-1
Priorities: high,medium
Description:
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data. (CVE-2020-28374)

Kiyin (尹亮) discovered that the perf subsystem in the Linux kernel did
not properly deallocate memory in some situations. A privileged attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2020-25704)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28374
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25704

Title: USN-4716-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4716-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.23 in Ubuntu 20.04 LTS and Ubuntu 20.10.
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.33.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-33.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-23.html
https://www.oracle.com/security-alerts/cpujan2021.html
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2088
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2076
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2061
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2081
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2065
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2070
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2002
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2072
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2122
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2046
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2048
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2038
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2031
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2056
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2087
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2010
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2036
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2060
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2021
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2024
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2014
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2032
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2058
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2011

Title: USN-4717-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4717-1
Priorities: medium
Description:
Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information, conduct clickjacking attacks, or execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23954
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23964
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23958
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23960
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23963
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23955
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23961
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23962
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23953
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23956
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23965

Title: USN-4703-1: Mutt vulnerability
URL: https://ubuntu.com/security/notices/USN-4703-1
Priorities: medium
Description:
It was discovered that Mutt incorrectly handled certain email messages.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3181

Title: USN-4715-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-4715-1
Priorities: medium
Description:
Wang Baohua discovered that Django incorrectly extracted archive files. A
remote attacker could possibly use this issue to extract files outside of
their expected location.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3281

621.99

Available in the Broadcom Support portal

Release Date: January 27, 2021

Metadata:

BOSH Agent Version: 2.268.16

USNs:


USN: 4705-1
URL: https://ubuntu.com/security/notices/USN-4705-1

USN: 4704-1
URL: https://ubuntu.com/security/notices/USN-4704-1

USN: 4703-1
URL: https://ubuntu.com/security/notices/USN-4703-1

USN: 4702-1
URL: https://ubuntu.com/security/notices/USN-4702-1

USN: 4700-1
URL: https://ubuntu.com/security/notices/USN-4700-1

USN: 4699-1
URL: https://ubuntu.com/security/notices/USN-4699-1

USN: 4698-1
URL: https://ubuntu.com/security/notices/USN-4698-1

USN: 4697-1
URL: https://ubuntu.com/security/notices/USN-4697-1

USN: 4696-1
URL: https://ubuntu.com/security/notices/USN-4696-1

USN: 4695-1
URL: https://ubuntu.com/security/notices/USN-4695-1

USN: 4694-1
URL: https://ubuntu.com/security/notices/USN-4694-1

621.97

Available in the Broadcom Support portal

Release Date: January 15, 2021

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4688-1: JasPer vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4688-1
Priorities: negligible,low,medium
Description:
It was discovered that Jasper incorrectly certain files.
An attacker could possibly use this issue to cause a crash.
(CVE-2018-18873)

It was discovered that Jasper incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2018-19542)

It was discovered that Jasper incorrectly handled certain JPC encoders.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2020-27828)

It was discovered that Jasper incorrectly handled certain images.
An attacker could possibly use this issue to expose sensitive information
or cause a crash.
(CVE-2017-9782)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9782
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18873
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19542
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27828

Title: USN-4672-1: unzip vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4672-1
Priorities: low,negligible
Description:
Rene Freingruber discovered that unzip incorrectly handled certain
specially crafted password protected ZIP archives. If a user or automated
system using unzip were tricked into opening a specially crafted zip file,
an attacker could exploit this to cause a crash, resulting in a denial of
service. (CVE-2018-1000035)

Antonio Carista discovered that unzip incorrectly handled certain
specially crafted ZIP archives. If a user or automated system using unzip
were tricked into opening a specially crafted zip file, an attacker could
exploit this to cause a crash, resulting in a denial of service. This
issue only affected Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
(CVE-2018-18384)

It was discovered that unzip incorrectly handled certain specially crafted
ZIP archives. If a user or automated system using unzip were tricked into
opening a specially crafted zip file, an attacker could exploit this to
cause resource consumption, resulting in a denial of service.
(CVE-2019-13232)

Martin Carpenter discovered that unzip incorrectly handled certain
specially crafted ZIP archives. If a user or automated system using unzip
were tricked into opening a specially crafted zip file, an attacker could
exploit this to cause a crash, resulting in a denial of service. This
issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04
LTS. (CVE-2014-9913)

Alexis Vanden Eijnde discovered that unzip incorrectly handled certain
specially crafted ZIP archives. If a user or automated system using unzip
were tricked into opening a specially crafted zip file, an attacker could
exploit this to cause a crash, resulting in a denial of service. This
issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04
LTS. (CVE-2016-9844)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-1000035
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18384
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-9913
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9844
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13232

Title: USN-4684-1: EDK II vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4684-1
Priorities: low
Description:
Laszlo Ersek discovered that EDK II incorrectly validated certain signed
images. An attacker could possibly use this issue with a specially crafted
image to cause EDK II to hang, resulting in a denial of service. This issue
only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS.
(CVE-2019-14562)

It was discovered that EDK II incorrectly parsed signed PKCS #7 data. An
attacker could use this issue to cause EDK II to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2019-14584)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14584
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14562

Title: USN-4670-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4670-1
Priorities: low,negligible
Description:
It was discovered that ImageMagick incorrectly handled certain specially
crafted image files. If a user or automated system using ImageMagick were
tricked into opening a specially crafted image, an attacker could exploit
this to cause a denial of service or other unspecified impact. This issue
only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.10.
(CVE-2019-19948, CVE-2019-19949)

It was discovered that ImageMagick incorrectly handled certain specially
crafted image files. If a user or automated system using ImageMagick were
tricked into opening a specially crafted image, an attacker could exploit
this to cause a denial of service. (CVE-2020-27560)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19949
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27560
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19948

Title: USN-4680-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4680-1
Priorities: low,medium
Description:
It was discovered that debugfs in the Linux kernel as used by blktrace
contained a use-after-free in some situations. A privileged local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2019-19770)

It was discovered that a race condition existed in the binder IPC
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-0423)

Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered
that legacy pairing and secure-connections pairing authentication in the
Bluetooth protocol could allow an unauthenticated user to complete
authentication without pairing credentials via adjacent access. A
physically proximate attacker could use this to impersonate a previously
paired Bluetooth device. (CVE-2020-10135)

It was discovered that the console keyboard driver in the Linux kernel
contained a race condition. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2020-25656)

Minh Yuan discovered that the tty driver in the Linux kernel contained race
conditions when handling fonts. A local attacker could possibly use this to
expose sensitive information (kernel memory). (CVE-2020-25668)

Keyu Man discovered that the ICMP global rate limiter in the Linux kernel
could be used to assist in scanning open UDP ports. A remote attacker could
use to facilitate attacks on UDP based services that depend on source port
randomization. (CVE-2020-25705)

Jinoh Kang discovered that the Xen event channel infrastructure in the
Linux kernel contained a race condition. An attacker in guest could
possibly use this to cause a denial of service (dom0 crash).
(CVE-2020-27675)

Daniel Axtens discovered that PowerPC RTAS implementation in the Linux
kernel did not properly restrict memory accesses in some situations. A
privileged local attacker could use this to arbitrarily modify kernel
memory, potentially bypassing kernel lockdown restrictions.
(CVE-2020-27777)

Minh Yuan discovered that the framebuffer console driver in the Linux
kernel did not properly handle fonts in some conditions. A local attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information (kernel memory). (CVE-2020-28974)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0423
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27675
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27777
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25705
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19770
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25668

Title: USN-4687-1: Firefox vulnerability
URL: https://ubuntu.com/security/notices/USN-4687-1
Priorities: medium
Description:
A use-after-free was discovered in Firefox when handling SCTP packets.
An attacker could potentially exploit this to cause a denial of service,
or execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16044

Title: USN-4674-1: Dovecot vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4674-1
Priorities: medium
Description:
It was discovered that Dovecot incorrectly handled certain imap hibernation
commands. A remote authenticated attacker could possibly use this issue to
access other users’ email. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 20.10. (CVE-2020-24386)

Innokentii Sennovskiy discovered that Dovecot incorrectly handled MIME
parsing. A remote attacker could possibly use this issue to cause Dovecot
to crash, resulting in a denial of service. (CVE-2020-25275)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24386
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25275

Title: USN-4681-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4681-1
Priorities: medium,low
Description:
Ryan Hall discovered that the Intel 700 Series Ethernet Controllers driver
in the Linux kernel did not properly deallocate memory in some conditions.
A local attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2019-0148)

It was discovered that the console keyboard driver in the Linux kernel
contained a race condition. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2020-25656)

Minh Yuan discovered that the tty driver in the Linux kernel contained race
conditions when handling fonts. A local attacker could possibly use this to
expose sensitive information (kernel memory). (CVE-2020-25668)

Jinoh Kang discovered that the Xen event channel infrastructure in the
Linux kernel contained a race condition. An attacker in guest could
possibly use this to cause a denial of service (dom0 crash).
(CVE-2020-27675)

Minh Yuan discovered that the framebuffer console driver in the Linux
kernel did not properly handle fonts in some conditions. A local attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information (kernel memory). (CVE-2020-28974)

It was discovered that Power 9 processors could be coerced to expose
information from the L1 cache in certain situations. A local attacker could
use this to expose sensitive information. (CVE-2020-4788)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25668
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-4788
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0148
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27675
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25656

Title: USN-4671-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4671-1
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information, bypass the CSS sanitizer, bypass security restrictions,
spoof the URL bar, or execute arbitrary code. (CVE-2020-16042,
CVE-2020-26971, CVE-2020-26972, CVE-2020-26793, CVE-2020-26974,
CVE-2020-26976, CVE-2020-26978, CVE-2020-26979,
CVE-2020-35113, CVE-2020-35114)

It was discovered that the proxy.onRequest API did not catch
view-source URLs. If a user were tricked in to installing an
extension with the proxy permission and opening View Source, an
attacker could potentially exploit this to obtain sensitive
information. (CVE-2020-35111)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26971
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26973
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26979
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35111
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26972
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26976
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35113
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35114
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16042

Title: USN-4666-2: lxml vulnerability
URL: https://ubuntu.com/security/notices/USN-4666-2
Priorities: medium
Description:
USN-4666-1 partially fixed a vulnerability in lxml, but an additional patch was needed. This update provides
the corresponding additional patch in order to properly fix the vulnerability.

Original advisory details:

It was discovered that lxml incorrectly handled certain HTML.
An attacker could possibly use this issue to cross-site scripting (XSS) attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27783

Title: USN-4686-1: Ghostscript vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4686-1
Priorities: medium,low,negligible
Description:
It was discovered that Ghostscript incorrectly handled certain image
files. If a user or automated system were tricked into processing a
specially crafted file, a remote attacker could use this issue to cause
Ghostscript to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27842
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27845
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27814
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27841
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6851
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27824
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27843
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8112
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-5727

Title: USN-4694-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-4694-1
Priorities: high
Description:
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28374

621.95

Available in the Broadcom Support portal

Release Date: December 21, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4669-1: SquirrelMail vulnerability
URL: https://ubuntu.com/security/notices/USN-4669-1
Priorities: medium
Description:
It was discovered that a cross-site scripting (XSS) vulnerability in
SquirrelMail allows remote attackers to use malicious script content from
HTML e-mail to execute code and/or provoke a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12970

Title: USN-4657-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4657-1
Priorities: low,medium
Description:
Elena Petrova discovered that the pin controller device tree implementation
in the Linux kernel did not properly handle string references. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-0427)

Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered
that legacy pairing and secure-connections pairing authentication in the
Bluetooth protocol could allow an unauthenticated user to complete
authentication without pairing credentials via adjacent access. A
physically proximate attacker could use this to impersonate a previously
paired Bluetooth device. (CVE-2020-10135)

Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux
kernel did not properly initialize memory in some situations. A physically
proximate remote attacker could use this to expose sensitive information
(kernel memory). (CVE-2020-12352)

It was discovered that a race condition existed in the perf subsystem of
the Linux kernel, leading to a use-after-free vulnerability. An attacker
with access to the perf subsystem could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2020-14351)

It was discovered that the frame buffer implementation in the Linux kernel
did not properly handle some edge cases in software scrollback. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-14390)

It was discovered that the netfilter connection tracker for netlink in the
Linux kernel did not properly perform bounds checking in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2020-25211)

It was discovered that the Rados block device (rbd) driver in the Linux
kernel did not properly perform privilege checks for access to rbd devices
in some situations. A local attacker could use this to map or unmap rbd
block devices. (CVE-2020-25284)

It was discovered that the HDLC PPP implementation in the Linux kernel did
not properly validate input in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2020-25643)

It was discovered that the GENEVE tunnel implementation in the Linux kernel
when combined with IPSec did not properly select IP routes in some
situations. An attacker could use this to expose sensitive information
(unencrypted network traffic). (CVE-2020-25645)

Keyu Man discovered that the ICMP global rate limiter in the Linux kernel
could be used to assist in scanning open UDP ports. A remote attacker could
use to facilitate attacks on UDP based services that depend on source port
randomization. (CVE-2020-25705)

It was discovered that the framebuffer implementation in the Linux kernel
did not properly perform range checks in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-28915)

It was discovered that Power 9 processors could be coerced to expose
information from the L1 cache in certain situations. A local attacker could
use this to expose sensitive information. (CVE-2020-4788)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14351
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25284
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25211
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25705
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0427
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25645
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28915
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-4788
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12352
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25643
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14390

Title: USN-4660-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4660-1
Priorities: low,medium
Description:
It was discovered that a race condition existed in the perf subsystem of
the Linux kernel, leading to a use-after-free vulnerability. An attacker
with access to the perf subsystem could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2020-14351)

It was discovered that the frame buffer implementation in the Linux kernel
did not properly handle some edge cases in software scrollback. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-14390)

It was discovered that the netfilter connection tracker for netlink in the
Linux kernel did not properly perform bounds checking in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2020-25211)

It was discovered that the Rados block device (rbd) driver in the Linux
kernel did not properly perform privilege checks for access to rbd devices
in some situations. A local attacker could use this to map or unmap rbd
block devices. (CVE-2020-25284)

It was discovered that a race condition existed in the hugetlb sysctl
implementation in the Linux kernel. A privileged attacker could use this to
cause a denial of service (system crash). (CVE-2020-25285)

It was discovered that the block layer subsystem in the Linux kernel did
not properly handle zero-length requests. A local attacker could use this
to cause a denial of service. (CVE-2020-25641)

It was discovered that the HDLC PPP implementation in the Linux kernel did
not properly validate input in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2020-25643)

It was discovered that the GENEVE tunnel implementation in the Linux kernel
when combined with IPSec did not properly select IP routes in some
situations. An attacker could use this to expose sensitive information
(unencrypted network traffic). (CVE-2020-25645)

It was discovered that the framebuffer implementation in the Linux kernel
did not properly perform range checks in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-28915)

It was discovered that Power 9 processors could be coerced to expose
information from the L1 cache in certain situations. A local attacker could
use this to expose sensitive information. (CVE-2020-4788)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14351
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25643
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25284
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25285
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25645
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28915
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-4788
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25211
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14390
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25641

Title: USN-4661-1: Snapcraft vulnerability
URL: https://ubuntu.com/security/notices/USN-4661-1
Priorities: medium
Description:
It was discovered that Snapcraft includes the current directory when
configuring LD_LIBRARY_PATH for application commands. If a user were
tricked into installing a malicious snap or downloading a malicious
library, under certain circumstances an attacker could exploit this to
affect strict mode snaps that have access to the library and when
launched from the directory containing the library.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27348

Title: USN-4664-1: Aptdaemon vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4664-1
Priorities: medium
Description:
Kevin Backhouse discovered that Aptdaemon incorrectly handled certain
properties. A local attacker could use this issue to test for the presence
of local files. (CVE-2020-16128)

Kevin Backhouse discovered that Aptdaemon incorrectly handled permission
checks. A local attacker could possibly use this issue to cause a denial of
service. (CVE-2020-27349)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27349
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16128

Title: USN-4667-1: APT vulnerability
URL: https://ubuntu.com/security/notices/USN-4667-1
Priorities: medium
Description:
Kevin Backhouse discovered that APT incorrectly handled certain packages.
A local attacker could possibly use this issue to cause APT to crash or
stop responding, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27350

Title: USN-4668-1: python-apt vulnerability
URL: https://ubuntu.com/security/notices/USN-4668-1
Priorities: medium
Description:
Kevin Backhouse discovered that python-apt incorrectly handled resources. A
local attacker could possibly use this issue to cause python-apt to consume
resources, leading to a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27351

Title: USN-4665-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4665-1
Priorities: medium,low
Description:
Marc Aldorasi discovered that curl incorrectly handled the libcurl
CURLOPT_CONNECT_ONLY option. This could result in data being sent to the
wrong destination, possibly exposing sensitive information. This issue only
affected Ubuntu 20.10. (CVE-2020-8231)

Varnavas Papaioannou discovered that curl incorrectly handled FTP PASV
responses. An attacker could possibly use this issue to trick curl into
connecting to an arbitrary IP address and be used to perform port scanner
and other information gathering. (CVE-2020-8284)

It was discovered that curl incorrectly handled FTP wildcard matchins. A
remote attacker could possibly use this issue to cause curl to consume
resources and crash, resulting in a denial of service. (CVE-2020-8285)

It was discovered that curl incorrectly handled OCSP response verification.
A remote attacker could possibly use this issue to provide a fraudulent
OCSP response. (CVE-2020-8286)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8286
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8285
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8231
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8284

621.94

Release Date: December 08, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4652-1: SniffIt vulnerability
URL: https://ubuntu.com/security/notices/USN-4652-1
Priorities: medium
Description:
It was discovered that SniffIt incorrectly handled certain configuration
files. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-5439

Title: USN-4662-1: OpenSSL vulnerability
URL: https://ubuntu.com/security/notices/USN-4662-1
Priorities: high
Description:
David Benjamin discovered that OpenSSL incorrectly handled comparing
certificates containing a EDIPartyName name type. A remote attacker could
possibly use this issue to cause OpenSSL to crash, resulting in a denial of
service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1971

621.93

Release Date: December 01, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:

621.92

Release Date: November 16, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4587-1: iTALC vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4587-1
Priorities: medium,low
Description:
Nicolas Ruff discovered that iTALC had buffer overflows, divide-by-zero errors and didn’t check malloc return values. A remote attacker could use these issues to cause a denial of service or possibly execute arbitrary code. (CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054, CVE-2014-6055)
Josef Gajdusek discovered that iTALC had…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6051
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6053
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6054
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6055
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9941
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9942
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-15127
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20019
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20020
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20021
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20023
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20024
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20748
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20749
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20750
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7225
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15681

Title: USN-4552-2: Pam-python vulnerability
URL: https://ubuntu.com/security/notices/USN-4552-2
Priorities: medium
Description:
Malte Kraus discovered that Pam-python mishandled certain environment variables. A local attacker could potentially use this vulnerability to execute programs as root.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16729

621.90

Release Date: October 23, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4593-1: FreeType vulnerability
URL: https://ubuntu.com/security/notices/USN-4593-1
Priorities: high
Description:
Sergei Glazunov discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15999

621.89

Release Date: October 20, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4582-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4582-1
Priorities: low
Description:
It was discovered that Vim incorrectly handled permissions on the .swp file. A local attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-17087)
It was discovered that Vim incorrectly handled restricted mode. A local attacker could possibly use this issue to bypass restricted…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17087
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20807

Title: USN-4579-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4579-1
Priorities: low,medium,high
Description:
Hador Manor discovered that the DCCP protocol implementation in the Linux kernel improperly handled socket reuse, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-16119)
Wen Xu discovered that the XFS file system in the Linux kernel…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10322
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14314
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16119
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25285

Title: USN-4591-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4591-1
Priorities: high,medium
Description:
Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12351)
Andy Nguyen discovered that the Bluetooth A2MP implementation in the…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12351
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12352

Title: USN-4589-1: containerd vulnerability
URL: https://ubuntu.com/security/notices/USN-4589-1
Priorities: medium
Description:
It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user’s registry credentials.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15157

Title: USN-4589-2: Docker vulnerability
URL: https://ubuntu.com/security/notices/USN-4589-2
Priorities: medium
Description:
USN-4589-1 fixed a vulnerability in containerd. This update provides the corresponding update for docker.io.
Original advisory details:
It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user’s…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15157

Title: USN-4581-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-4581-1
Priorities: medium
Description:
It was discovered that Python incorrectly handled certain character sequences. A remote attacker could possibly use this issue to perform CRLF injection.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26116

Title: USN-4584-1: HtmlUnit vulnerability
URL: https://ubuntu.com/security/notices/USN-4584-1
Priorities: medium
Description:
It was discovered that HtmlUnit incorrectly initialized Rhino engine. An Attacker could possibly use this issue to execute arbitrary Java code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5529

Title: USN-4583-1: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4583-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain encrypt ciphers. An attacker could possibly use this issue to decrease security or cause incorrect encryption data. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-7069)
It was discorevered that PHP incorrectly handled certain HTTP cookies. An attacker could…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7069
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7070

621.87

Release Date: October 14, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4573-1: Vino vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4573-1
Priorities: medium,low
Description:
Nicolas Ruff discovered that Vino incorrectly handled large ClientCutText messages. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2014-6053)
It was discovered that Vino incorrectly handled certain packet lengths. A remote attacker could possibly use this issue to obtain…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6053
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7225
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15681
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14397
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14402
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14403
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14404

Title: USN-4554-1: libPGF vulnerability
URL: https://ubuntu.com/security/notices/USN-4554-1
Priorities: medium
Description:
It was discovered that libPGF lacked proper validation when opening a specially crafted PGF file. An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2015-6673

Title: USN-4557-1: Tomcat vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4557-1
Priorities: low,medium
Description:
It was discovered that the Tomcat realm implementations incorrectly handled passwords when a username didn’t exist. A remote attacker could possibly use this issue to enumerate usernames. (CVE-2016-0762)
Alvaro Munoz and Alexander Mirosh discovered that Tomcat incorrectly limited use of a certain utility method. A malicious application…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-0762
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-5018
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6794
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6796
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6797
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6816
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-8735

Title: USN-4578-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4578-1
Priorities: low,medium,high
Description:
Hador Manor discovered that the DCCP protocol implementation in the Linux kernel improperly handled socket reuse, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-16119)
Wen Xu discovered that the XFS file system in the Linux kernel…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10322
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19448
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14314
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16119
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16120
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25212
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26088

Title: USN-4547-2: SSVNC vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4547-2
Priorities: medium
Description:
It was discovered that the LibVNCClient vendored in SSVNC incorrectly handled certain packet lengths. A remote attacker could possibly use this issue to obtain sensitive information, cause a denial of service, or execute arbitrary code. (CVE-2018-20020, CVE-2018-20021, CVE-2018-20022, CVE-2018-2024)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20020
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20021
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20024

Title: USN-4571-1: rack-cors vulnerability
URL: https://ubuntu.com/security/notices/USN-4571-1
Priorities: medium
Description:
It was discovered that rack-cors did not properly handle relative file paths. An attacker could use this vulnerability to access arbitrary files.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18978

Title: USN-4572-1: Spice vulnerability
URL: https://ubuntu.com/security/notices/USN-4572-1
Priorities: medium
Description:
Frediano Ziglio discovered that Spice incorrectly handled QUIC image decoding. A remote attacker could use this to cause Spice to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14355

Title: USN-4559-1: Samba update
URL: https://ubuntu.com/security/notices/USN-4559-1
Priorities: medium
Description:
Tom Tervoort discovered that the Netlogon protocol implemented by Samba incorrectly handled the authentication scheme. A remote attacker could use this issue to forge an authentication token and steal the credentials of the domain admin.
While a previous security update fixed the issue by changing the "server schannel" setting to default to…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1472

Title: USN-4551-1: Squid vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4551-1
Priorities: low,medium
Description:
Alex Rousskov and Amit Klein discovered that Squid incorrectly handled certain Content-Length headers. A remote attacker could possibly use this issue to perform an HTTP request smuggling attack, resulting in cache poisoning. (CVE-2020-15049)
Amit Klein discovered that Squid incorrectly validated certain data. A remote attacker could possibly use…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15049
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15810
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15811
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24606

Title: USN-4564-1: Apache Tika vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4564-1
Priorities: medium,low
Description:
It was discovered that Apache Tika can have an excessive memory usage by using a crafted or corrupt PSD file. An attacker could use it to cause a denial of service (crash). (CVE-2020-1950, CVE-2020-1951)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1950
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1951

Title: USN-4570-1: urllib3 vulnerability
URL: https://ubuntu.com/security/notices/USN-4570-1
Priorities: medium
Description:
It was discovered that urllib3 incorrectly handled certain character sequences. A remote attacker could possibly use this issue to perform CRLF injection.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26137

Title: USN-4568-1: Brotli vulnerability
URL: https://ubuntu.com/security/notices/USN-4568-1
Priorities: medium
Description:
It was discovered that Brotli incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8927

621.85

Release Date: September 28, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4500-1: bsdiff vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4500-1
Priorities: medium
Description:
It was discovered that bsdiff mishandled certain input. If a user were tricked into opening a malicious file, an attacker could cause bsdiff to crash or potentially execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-9862

Title: USN-4506-1: MCabber vulnerability
URL: https://ubuntu.com/security/notices/USN-4506-1
Priorities: medium
Description:
It was discovered that MCabber does not properly manage roster pushes. An attacker could possibly use this issue to remotely perform man-in-the-middle attacks. (CVE-2016-9928).
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9928

Title: USN-4513-1: apng2gif vulnerability
URL: https://ubuntu.com/security/notices/USN-4513-1
Priorities: medium
Description:
Dileep Kumar Jallepalli discovered that apng2gif incorrectly handled loading APNG files. An attacker could exploit this with a crafted APNG file to access sensitive information. (CVE-2017-6960)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6960

Title: USN-4517-1: Email-Address-List vulnerability
URL: https://ubuntu.com/security/notices/USN-4517-1
Priorities: medium
Description:
It was discovered that Email-Address-List does not properly parse email addresses during email-ingestion. A remote attacker could use this issue to cause an algorithmic complexity attack, resulting in a denial of service. (CVE-2018-18898)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18898

Title: USN-4507-1: ncmpc vulnerability
URL: https://ubuntu.com/security/notices/USN-4507-1
Priorities: medium
Description:
It was discovered that ncmpc incorrectly handled long chat messages. A remote attacker could possibly exploit this with a crafted chat message, causing ncmpc to crash, resulting in a denial of service. (CVE-2018-9240)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-9240

Title: USN-4499-1: MilkyTracker vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4499-1
Priorities: medium
Description:
It was discovered that MilkyTracker did not properly handle certain input. If a user were tricked into opening a malicious file, an attacker could cause MilkyTracker to crash or potentially execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14464
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14496
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14497

Title: USN-4504-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4504-1
Priorities: low
Description:
Robert Merget, Marcus Brinkmann, Nimrod Aviram, and Juraj Somorovsky discovered that certain Diffie-Hellman ciphersuites in the TLS specification and implemented by OpenSSL contained a flaw. A remote attacker could possibly use this issue to eavesdrop on encrypted communications. This was fixed in this update by removing the insecure ciphersuites…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1547
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1551
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1563
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1968

Title: USN-4498-1: Loofah vulnerability
URL: https://ubuntu.com/security/notices/USN-4498-1
Priorities: medium
Description:
It was discovered that Loofah does not properly sanitize JavaScript in sanitized output. An attacker could possibly use this issue to perform XSS attacks. (CVE-2019-15587)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15587

Title: USN-4496-1: Apache XML-RPC vulnerability
URL: https://ubuntu.com/security/notices/USN-4496-1
Priorities: medium
Description:
It was discovered that Apache XML-RPC (aka ws-xmlrpc) does not properly deserialize untrusted data. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-17570)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17570

Title: USN-4526-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4526-1
Priorities: low,medium
Description:
It was discovered that the AMD Cryptographic Coprocessor device driver in the Linux kernel did not properly deallocate memory in some situations. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-18808)
It was discovered that the Conexant 23885 TV card device driver for the Linux kernel did not properly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18808
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19054
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19061
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19067
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19073
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19074
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9445
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12888
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14356
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16166

Title: USN-4527-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4527-1
Priorities: low,medium
Description:
It was discovered that the Conexant 23885 TV card device driver for the Linux kernel did not properly deallocate memory in some error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19054)
It was discovered that the Atheros HTC based wireless driver in the Linux kernel did not properly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19054
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19073
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19074
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20811
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9445
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9453
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0067
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25212

Title: USN-4520-1: Exim SpamAssassin vulnerability
URL: https://ubuntu.com/security/notices/USN-4520-1
Priorities: medium
Description:
It was discovered that Exim SpamAssassin does not properly handle configuration strings. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-19920)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19920

Title: USN-4534-1: Perl DBI module vulnerability
URL: https://ubuntu.com/security/notices/USN-4534-1
Priorities: medium
Description:
It was discovered that Perl DBI module incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20919

Title: USN-4535-1: RDFLib vulnerability
URL: https://ubuntu.com/security/notices/USN-4535-1
Priorities: medium
Description:
Gabriel Corona discovered that RDFLib did not properly load modules on the command-line. An attacker could possibly use this issue to cause RDFLib to execute arbitrary code. (CVE-2019-7653)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7653

Title: USN-4528-1: Ceph vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4528-1
Priorities: medium
Description:
Adam Mohammed discovered that Ceph incorrectly handled certain CORS ExposeHeader tags. A remote attacker could possibly use this issue to preform an HTTP header injection attack. (CVE-2020-10753)
Lei Cao discovered that Ceph incorrectly handled certain POST requests with invalid tagging XML. A remote attacker could possibly use this issue…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10753
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12059
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1760

Title: USN-4518-1: xawtv vulnerability
URL: https://ubuntu.com/security/notices/USN-4518-1
Priorities: low
Description:
Matthias Gerstner discovered that xawtv incorrectly handled opening files. A local attacker could possibly use this issue to open and write to arbitrary files and escalate privileges. (CVE-2020-13696)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13696

Title: USN-4521-1: pam_tacplus vulnerability
URL: https://ubuntu.com/security/notices/USN-4521-1
Priorities: low
Description:
It was discovered that pam_tacplus did not properly manage shared secrets if DEBUG loglevel and journald are used. A remote attacker could use this issue to expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13881

Title: USN-4511-1: QEMU vulnerability
URL: https://ubuntu.com/security/notices/USN-4511-1
Priorities: medium
Description:
Ziming Zhang, Xiao Wei, Gonglei Arei, and Yanyu Zhang discovered that QEMU incorrectly handled certain USB packets. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code on the host. In the default installation, when QEMU is used with libvirt, attackers would…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14364

Title: USN-4503-1: Perl DBI module vulnerability
URL: https://ubuntu.com/security/notices/USN-4503-1
Priorities: medium
Description:
It was discovered that Perl DBI module incorrectly handled certain calls. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14392

Title: USN-4537-1: Aptdaemon vulnerability
URL: https://ubuntu.com/security/notices/USN-4537-1
Priorities: medium
Description:
Vaisha Bernard discovered that Aptdaemon incorrectly handled the Locale property. A local attacker could use this issue to test for the presence of local files.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15703

Title: USN-4519-1: PulseAudio vulnerability
URL: https://ubuntu.com/security/notices/USN-4519-1
Priorities: medium
Description:
Ratchanan Srirattanamet discovered that an Ubuntu-specific patch caused PulseAudio to incorrectly handle memory under certain error conditions in the Bluez 5 module. An attacker could use this issue to cause PulseAudio to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-15710)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15710

Title: USN-4501-1: LuaJIT vulnerability
URL: https://ubuntu.com/security/notices/USN-4501-1
Priorities: low
Description:
It was discovered that an out-of-bounds read existed in LuaJIT. An attacker could use this to cause a denial of service (application crash) or possibly expose sensitive information. (CVE-2020-15890)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15890

Title: USN-4538-1: PackageKit vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4538-1
Priorities: low,medium
Description:
Vaisha Bernard discovered that PackageKit incorrectly handled certain methods. A local attacker could use this issue to learn the MIME type of any file on the system. (CVE-2020-16121)
Sami Niemimäki discovered that PackageKit incorrectly handled local deb packages. A local user could possibly use this issue to install untrusted packages, contrary…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16121
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16122

Title: USN-4514-1: libproxy vulnerability
URL: https://ubuntu.com/security/notices/USN-4514-1
Priorities: medium
Description:
It was discovered that libproxy incorrectly handled certain PAC files. An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25219

Title: USN-4508-1: StoreBackup vulnerability
URL: https://ubuntu.com/security/notices/USN-4508-1
Priorities: medium
Description:
It was discovered that StoreBackup did not properly manage lock files. A local attacker could use this issue to cause a denial of service or escalate privileges and run arbitrary code. (CVE-2020-7040)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7040

Title: USN-4515-1: Pure-FTPd vulnerability
URL: https://ubuntu.com/security/notices/USN-4515-1
Priorities: low
Description:
Antonio Norales discovered that Pure-FTPd incorrectly handled directory aliases. An attacker could possibly use this issue to access sensitive information. (CVE-2020-9274)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9274

621.84

Release Date: September 09, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4470-1: sane-backends vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4470-1
Priorities: low,medium
Description:
Kritphong Mongkhonvanit discovered that sane-backends incorrectly handled certain packets. A remote attacker could possibly use this issue to obtain sensitive memory information. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-6318)
It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker could…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6318
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12861
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12862
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12863
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12864
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12865
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12866
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12867

Title: USN-4485-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4485-1
Priorities: low,medium,negligible
Description:
Timothy Michaud discovered that the i915 graphics driver in the Linux kernel did not properly validate user memory locations for the i915_gem_execbuffer2_ioctl. A local attacker could possibly use this to cause a denial of service or execute arbitrary code. (CVE-2018-20669)
It was discovered that the Kvaser CAN/USB driver in the Linux kernel…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20669
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19947
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20810
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10732
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10766
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10767
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10768
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10781
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12655
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12771
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15393
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24394

Title: USN-4476-1: NSS vulnerability
URL: https://ubuntu.com/security/notices/USN-4476-1
Priorities: medium
Description:
It was discovered that NSS incorrectly handled some inputs. An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12403

Title: USN-4490-1: X.Org X Server vulnerability
URL: https://ubuntu.com/security/notices/USN-4490-1
Priorities: medium
Description:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled the XkbSetNames function. A local attacker could possibly use this issue to escalate privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14345

Title: USN-4489-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-4489-1
Priorities: high
Description:
Or Cohen discovered that the AF_PACKET implementation in the Linux kernel did not properly perform bounds checking in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14386

Title: USN-4471-1: Net-SNMP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4471-1
Priorities: medium
Description:
Tobias Neitzel discovered that Net-SNMP incorrectly handled certain symlinks. An attacker could possibly use this issue to access sensitive information. (CVE-2020-15861)
It was discovered that Net-SNMP incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15861
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15862

Title: USN-4482-1: Ark vulnerability
URL: https://ubuntu.com/security/notices/USN-4482-1
Priorities: medium
Description:
Fabian Vogt discovered that Ark incorrectly handled symbolic links in tar archive files. An attacker could use this to construct a malicious tar archive that, when opened, would create files outside the extraction directory.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24654

621.82

Release Date: August 21, 2020

This release changes the way the Linux Google light stemcell works to reference a source image. It will lead to a decrease in the time it takes to upload the light stemcell. This change will also help mitigate the impact of the new GCP image creation rate limit which any user uploading more than 6 GCP stemcells an hour would hit.

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4459-1: Salt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4459-1
Priorities: medium
Description:
It was discovered that Salt allows remote attackers to determine which files exist on the server. An attacker could use that to extract sensitive information. (CVE-2018-15750)
It was discovered that Salt has a vulnerability that allows an user to bypass authentication. An attacker could use that to extract sensitive information, execute abritrary…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-15750
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-15751
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17361
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11651
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11652

Title: USN-4463-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4463-1
Priorities: low
Description:
It was discovered that the bcache subsystem in the Linux kernel did not properly release a lock in some error conditions. A local attacker could possibly use this to cause a denial of service. (CVE-2020-12771)
Kyungtae Kim discovered that the USB testing driver in the Linux kernel did not properly deallocate memory on disconnect events. A…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12771
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15393

621.81

Release Date: August 19, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:

Title: USN-4427-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4427-1
Priorities: negligible,low,medium
Description:
It was discovered that the Kvaser CAN/USB driver in the Linux kernel did not properly initialize memory in certain situations. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2019-19947)
Chuhong Yuan discovered that go7007 USB audio device driver in the Linux kernel did not properly deallocate memory…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12380
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19947
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20810
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20908
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10732
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10766
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10767
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10768
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13974

Title: USN-4446-1: Squid vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4446-1
Priorities: medium
Description:
Jeriko One discovered that Squid incorrectly handled caching certain requests. A remote attacker could possibly use this issue to perform cache-injection attacks or gain access to reverse proxy features such as ESI. (CVE-2019-12520)
Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly handled certain URN requests. A remote…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12520
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12523
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12524
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18676

Title: USN-4426-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4426-1
Priorities: medium
Description:
Jason A. Donenfeld discovered that the ACPI implementation in the Linux kernel did not properly restrict loading SSDT code from an EFI variable. A privileged attacker could use this to bypass Secure Boot lockdown restrictions and execute arbitrary code in the kernel. (CVE-2019-20908)
Fan Yang discovered that the mremap implementation in the Linux…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20908
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10757
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15780

Title: USN-4432-1: GRUB 2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4432-1
Priorities: high,medium
Description:
Jesse Michael and Mickey Shkatov discovered that the configuration parser in GRUB2 did not properly exit when errors were discovered, resulting in heap-based buffer overflows. A local attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. (CVE-2020-10713)
Chris Coulson discovered that the GRUB2 function…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10713
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14308
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14309
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14310
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14311
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15705
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15706
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15707

Title: USN-4449-1: Apport vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4449-1
Priorities: medium
Description:
Ryota Shiga discovered that Apport incorrectly dropped privileges when making certain D-Bus calls. A local attacker could use this issue to read arbitrary files. (CVE-2020-11936)
Seong-Joong Kim discovered that Apport incorrectly parsed configuration files. A local attacker could use this issue to cause Apport to crash, resulting in a denial of…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11936
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15701
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15702

Title: USN-4456-1: Dovecot vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4456-1
Priorities: medium
Description:
It was discovered that Dovecot incorrectly handled deeply nested MIME parts. A remote attacker could possibly use this issue to cause Dovecot to consume resources, resulting in a denial of service. (CVE-2020-12100)
It was discovered that Dovecot incorrectly handled memory when using NTLM. A remote attacker could possibly use this issue to cause…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12100
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12673
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12674

Title: USN-4455-1: NSS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4455-1
Priorities: medium
Description:
It was discovered that NSS incorrectly handled certain signatures. An attacker could possibly use this issue to expose sensitive information. (CVE-2020-12400, CVE-2020-12401, CVE-2020-6829)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12400
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12401
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6829

Title: USN-4448-1: Tomcat vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4448-1
Priorities: medium,low
Description:
It was discovered that Tomcat incorrectly validated the payload length in a WebSocket frame. A remote attacker could possibly use this issue to cause Tomcat to hang, resulting in a denial of service. (CVE-2020-13935)
It was discovered that Tomcat incorrectly handled HTTP header parsing. In certain environments where Tomcat is located behind a…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9484

Title: USN-4454-1: Samba vulnerability
URL: https://ubuntu.com/security/notices/USN-4454-1
Priorities: medium
Description:
Martin von Wittich and Wilko Meyer discovered that Samba incorrectly handled certain empty UDP packets when being used as a AD DC NBT server. A remote attacker could possibly use this issue to cause Samba to crash, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14303

Title: USN-4441-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4441-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.21 in Ubuntu 20.04 LTS. Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.31.
In addition to security fixes, the updated packages contain bug fixes, new features, and…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14539
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14540
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14547
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14550
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14553
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14559
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14568
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14575
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14576
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14586
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14591
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14597
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14619
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14620
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14623
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14624
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14631
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14632
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14633
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14634
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14641
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14643
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14651
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14654
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14663
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14678
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14680
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14697
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14702

Title: USN-4453-1: OpenJDK 8 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4453-1
Priorities: medium
Description:
Johannes Kuhn discovered that OpenJDK 8 incorrectly handled access control contexts. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-14556)
Philippe Arteau discovered that OpenJDK 8 incorrectly verified names in TLS server’s X.509 certificates. An attacker could possibly use this issue to obtain sensitive…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14556
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14577
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14578
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14579
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14581
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14583
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14593
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14621

Title: USN-4443-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4443-1
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass iframe sandbox restrictions, confuse the user, or execute arbitrary code. (CVE-2020-6463, CVE-2020-6514,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15652
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15653
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15654
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15655
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15658
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15659
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6463
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6514

Title: USN-4451-1: ppp vulnerability
URL: https://ubuntu.com/security/notices/USN-4451-1
Priorities: medium
Description:
Thomas Chauchefoin working with Trend Micro´s Zero Day Initiative, discovered that ppp incorrectly handled module loading. A local attacker could use this issue to load arbitrary kernel modules and possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15704

Title: USN-4447-1: libssh vulnerability
URL: https://ubuntu.com/security/notices/USN-4447-1
Priorities: medium
Description:
It was discovered that libssh incorrectly handled certain requests. An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16135

621.78

Release Date: July 30, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4427-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4427-1
Priorities: low,medium,negligible
Description:
It was discovered that the Kvaser CAN/USB driver in the Linux kernel did not properly initialize memory in certain situations. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2019-19947)
Chuhong Yuan discovered that go7007 USB audio device driver in the Linux kernel did not properly deallocate memory…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12380
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19947
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20810
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20908
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10732
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10766
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10767
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10768
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13974

Title: USN-4426-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4426-1
Priorities: medium
Description:
Jason A. Donenfeld discovered that the ACPI implementation in the Linux kernel did not properly restrict loading SSDT code from an EFI variable. A privileged attacker could use this to bypass Secure Boot lockdown restrictions and execute arbitrary code in the kernel. (CVE-2019-20908)
Fan Yang discovered that the mremap implementation in the Linux…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20908
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10757
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15780

Title: USN-4436-1: librsvg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4436-1
Priorities: low
Description:
It was discovered that librsvg incorrectly handled parsing certain SVG files. A remote attacker could possibly use this issue to cause librsvg to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-11464)
It was discovered that librsvg incorrectly handled parsing certain SVG files with nested patterns. A…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-11464
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20446

Title: USN-4435-1: ClamAV vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4435-1
Priorities: medium
Description:
It was discovered that ClamAV incorrectly handled parsing ARJ archives. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. (CVE-2020-3327)
It was discovered that ClamAV incorrectly handled scanning malicious files. A local attacker could possibly use this issue to delete arbitrary…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3327
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3350
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3481

Title: USN-4434-1: LibVNCServer vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4434-1
Priorities: medium
Description:
Ramin Farajpour Cami discovered that LibVNCServer incorrectly handled certain malformed unix socket names. A remote attacker could exploit this with a crafted socket name, leading to a denial of service, or possibly execute arbitrary code. (CVE-2019-20839)
It was discovered that LibVNCServer did not properly access byte-aligned data. A remote…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20839
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20840
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14396
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14397
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14398
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14399
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14400
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14401
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14402
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14403
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14404
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14405

Title: USN-4431-1: FFmpeg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4431-1
Priorities: low,medium
Description:
It was discovered that FFmpeg incorrectly verified empty audio packets or HEVC data. An attacker could possibly use this issue to cause a denial of service via a crafted file. This issue only affected Ubuntu 16.04 LTS, as it was already fixed in Ubuntu 18.04 LTS. For more information see: https://usn.ubuntu.com/usn/usn-3967-1 (CVE-2018-15822,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-15822
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11338
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12730
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13312
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13390
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17539
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17542
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12284
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13904

Title: USN-4428-1: Python vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4428-1
Priorities: low,medium
Description:
It was discovered that Python documentation had a misleading information. A security issue could be possibly caused by wrong assumptions of this information. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-17514)
It was discovered that Python incorrectly handled certain TAR…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17514
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20907
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9674
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14422

Title: USN-4424-1: snapd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4424-1
Priorities: medium
Description:
It was discovered that cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices ran on every boot without restrictions. A physical attacker could exploit this to craft cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption….
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11933
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11934

Title: USN-4421-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4421-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, or execute arbtirary code. (CVE-2020-12405, CVE-2020-12406, CVE-2020-12410, CVE-2020-12417,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12398
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12399
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12405
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12406
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12410
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12417
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12418
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12419
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12420
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12421

Title: USN-4419-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4419-1
Priorities: low,medium
Description:
It was discovered that a race condition existed in the Precision Time Protocol (PTP) implementation in the Linux kernel, leading to a use-after- free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-10690)
Matthew Sheets discovered that the SELinux…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10690
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10711
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12770
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13143
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8992

Title: USN-4414-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4414-1
Priorities: low,medium,negligible
Description:
It was discovered that the network block device (nbd) implementation in the Linux kernel did not properly check for error conditions in some situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-16089)
It was discovered that the btrfs file system implementation in the Linux kernel did not properly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12380
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16089
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19036
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19039
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19318
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19377
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19462
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19813
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19816
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10711
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12770
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13143

Title: USN-4416-1: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4416-1
Priorities: low,medium
Description:
Florian Weimer discovered that the GNU C Library incorrectly handled certain memory operations. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-12133)
It was discovered that the GNU C Library…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12133
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-18269
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-11236
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-11237
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19591
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6485
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19126
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9169
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10029
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1751
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1752

Title: USN-4415-1: coTURN vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4415-1
Priorities: medium
Description:
Felix Dörre discovered that coTURN response buffer is not initialized properly. An attacker could possibly use this issue to obtain sensitive information. (CVE-2020-4067)
It was discovered that coTURN web server incorrectly handled HTTP POST requests. An attacker could possibly use this issue to cause a denial of service, obtain sensitive…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-4067
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6061
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6062

Title: USN-4408-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4408-1
Priorities: medium
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass permission prompts, or execute arbitrary code. (CVE-2020-12415, CVE-2020-12416, CVE-2020-12417,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12415
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12416
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12417
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12418
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12419
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12420
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12421
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12422
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12424
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12425
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12426

Title: USN-4409-1: Samba vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4409-1
Priorities: medium
Description:
Andrew Bartlett discovered that Samba incorrectly handled certain LDAP queries. A remote attacker could use this issue to cause Samba to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-10730)
Douglas Bagnall discovered that Samba…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10730
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10745
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10760

Title: USN-4407-1: LibVNCServer vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4407-1
Priorities: low,medium
Description:
It was discovered that LibVNCServer incorrectly handled decompressing data. An attacker could possibly use this issue to cause LibVNCServer to crash, resulting in a denial of service. (CVE-2019-15680)
It was discovered that an information disclosure vulnerability existed in LibVNCServer when sending a ServerCutText message. An attacker could…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-18922
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15680
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15681
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15690
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20788

Title: USN-4403-1: Mutt vulnerability and regression
URL: https://ubuntu.com/security/notices/USN-4403-1
Priorities: medium
Description:
It was discovered that Mutt incorrectly handled certain requests. An attacker could possibly use this issue to enable MITM attacks. (CVE-2020-14954)
This update also address a regression caused in the last update USN-4401-1. It only affected Ubuntu 12.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 19.10.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14954

Title: USN-4402-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4402-1
Priorities: medium
Description:
Marek Szlagor, Gregory Jefferis and Jeroen Ooms discovered that curl incorrectly handled certain credentials. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-8169)
It was discovered that curl incorrectly handled certain parameters. An attacker could…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8169
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8177

621.77

Release Date: July 20, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4397-1: NSS vulnerabilities
URL: https://usn.ubuntu.com/4397-1/
Priorities: low,medium
Description:
It was discovered that NSS incorrectly handled the TLS State Machine. A remote attacker could possibly use this issue to cause NSS to hang, resulting in a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 19.10. (CVE-2019-17023)
Cesar Pereida Garcia discovered that NSS incorrectly handled DSA key generation. A local attacker…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17023
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12399

Title: USN-4400-1: nfs-utils vulnerability
URL: https://usn.ubuntu.com/4400-1/
Priorities: low
Description:
It was discovered that the nfs-utils package set incorrect permissions on the /var/lib/nfs directory. An attacker could possibly use this issue to escalate privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-3689

Title: USN-4396-1: libexif vulnerabilities
URL: https://usn.ubuntu.com/4396-1/
Priorities: low,medium
Description:
It was discovered that libexif incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. (CVE-2020-0093, CVE-2020-0182)
It was discovered that libexif incorrectly handled certain inputs. An attacker could possibly use this issue to cause a remote denial of service. (CVE-2020-0198)
It was…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0093
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0182
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0198
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13112
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13113
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13114

Title: USN-4395-1: fwupd vulnerability
URL: https://usn.ubuntu.com/4395-1/
Priorities: medium
Description:
Justin Steven discovered that fwupd incorrectly handled certain signature verification. An attacker could possibly use this issue to install an unsigned firmware.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10759

Title: USN-4398-1: DBus vulnerability
URL: https://usn.ubuntu.com/4398-1/
Priorities: medium
Description:
Kevin Backhouse discovered that DBus incorrectly handled file descriptors. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12049

Title: USN-4401-1: Mutt vulnerabilities
URL: https://usn.ubuntu.com/4401-1/
Priorities: medium,low
Description:
It was discovered that Mutt incorrectly handled certain requests. An attacker could possibly use this issue to enable MITM attacks. (CVE-2020-14093)
It was discovered that Mutt incorrectly handled certain requests. An attacker could possibly use this issue to proceeds with a connection even if the user rejects an expired intermediate…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14093
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14154

621.76

Release Date: June 17, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4385-1: Intel Microcode vulnerabilities
URL: https://usn.ubuntu.com/4385-1/
Priorities: medium
Description:
It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information….
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0543
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0548
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0549

Title: LSN-0068-1: Kernel Live Patch Security Notice
URL: https://usn.ubuntu.com/lsn/0068-1/
Priorities: medium
Description:
Several security issues were fixed in the kernel.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0543
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8647
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8648
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8649
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11494
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12114

Title: USN-4386-1: libjpeg-turbo vulnerability
URL: https://usn.ubuntu.com/4386-1/
Priorities: medium
Description:
It was discovered that libjpeg-turbo incorrectly handled certain PPM files. An attacker could possibly use this issue to access sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13790

Known Issue:

If you use the NSX-T Container Plugin (NCP) tile v3.0.1 or earlier, do not upgrade to stemcell 621.76. 621.76 is not compatible with the NCP tile v3.0.1 and causes the openvswitch job to fail when you deploy. Please upgrade the NCP tile to 3.0.2 before updating to stemcell 621.76 or newer.

621.75

Release Date: June 09, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4358-1: libexif vulnerabilities
URL: https://usn.ubuntu.com/4358-1/
Priorities: low,medium
Description:
It was discovered that libexif incorrectly handled certain tags. An attacker could possibly use this issue to cause a denial of service. (CVE-2018-20030)
It was discovered that libexif incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash. (CVE-2020-12767)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20030
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12767

Title: USN-4351-1: Linux firmware vulnerability
URL: https://usn.ubuntu.com/4351-1/
Priorities: medium
Description:
Eli Biham and Lior Neumann discovered that certain Bluetooth devices incorrectly validated key exchange parameters. An attacker could possibly use this issue to obtain sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-5383

Title: USN-4364-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4364-1/
Priorities: low,medium
Description:
It was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19060)
It was discovered that the vhost net driver in the Linux kernel contained a stack buffer overflow. A local…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19060
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10942
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11494
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11565
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11608
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11609
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11668

Title: USN-4354-1: Mailman vulnerability
URL: https://usn.ubuntu.com/4354-1/
Priorities: medium
Description:
It was discovered that Mailman incorrectly handled certain inputs. An attacker could possibly use this issue to inject arbitrary content in the login page.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12108

Title: USN-4352-1: OpenLDAP vulnerability
URL: https://usn.ubuntu.com/4352-1/
Priorities: medium
Description:
It was discovered that OpenLDAP incorrectly handled certain queries. A remote attacker could possibly use this issue to cause OpenLDAP to consume resources, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12243

Title: USN-4353-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4353-1/
Priorities: medium
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, bypass security restrictions, spoof the URL bar, or execute arbitrary code. (CVE-2020-6831, CVE-2020-12387, CVE-2020-12390, CVE-2020-12391, CVE-2020-12394,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12387
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12390
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12391
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12392
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12394
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12395
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12396
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6831

Title: USN-4360-1: json-c vulnerability
URL: https://usn.ubuntu.com/4360-1/
Priorities: medium
Description:
It was discovered that json-c incorrectly handled certain JSON files. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12762

Title: USN-4350-1: MySQL vulnerabilities
URL: https://usn.ubuntu.com/4350-1/
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.80 in Ubuntu 19.10 and Ubuntu 20.04 LTS. Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.30.
In addition to security fixes, the updated packages contain bug fixes,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2759
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2760
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2762
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2763
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2765
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2780
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2804
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2812
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2892
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2893
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2895
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2896
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2897
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2898
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2901
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2903
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2904
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2921
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2922
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2923
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2924
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2925
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2926
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2928
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2930

Title: USN-4359-1: APT vulnerability
URL: https://usn.ubuntu.com/4359-1/
Priorities: medium
Description:
It was discovered that APT incorrectly handled certain filenames during package installation. If an attacker could provide a specially crafted package to be installed by the system administrator, this could cause APT to crash.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3810

Title: USN-4365-1: Bind vulnerabilities
URL: https://usn.ubuntu.com/4365-1/
Priorities: medium
Description:
Lior Shafir, Yehuda Afek, and Anat Bremler-Barr discovered that Bind incorrectly limited certain fetches. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service, or possibly use Bind to perform a reflection attack. (CVE-2020-8616)
Tobias Klein discovered that Bind incorrectly handled…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8616
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8617

Title: LSN-0066-1: Kernel Live Patch Security Notice
URL: https://usn.ubuntu.com/lsn/0066-1/
Priorities: medium
Description:
Several security issues were fixed in the Linux kernel.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8647
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8648
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8649

621.74

Release Date: May 12, 2020

Metadata:

BOSH Agent Version: 2.268.16

USNs:


Title: USN-4339-1: OpenEXR vulnerabilities
URL: https://usn.ubuntu.com/4339-1/
Priorities: low,medium
Description:
Brandon Perry discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 20.04 LTS. (CVE-2017-9111, CVE-2017-9113, CVE-2017-9115)
Tan Jie…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9111
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9113
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9115
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18444
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11758
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11759
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11760
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11761
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11762
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11763
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11764
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11765

Title: USN-4348-1: Mailman vulnerabilities
URL: https://usn.ubuntu.com/4348-1/
Priorities: low,medium
Description:
It was discovered that Mailman incorrectly handled certain inputs. An attacker could possibly use this to issue execute arbitrary scripts or HTML. (CVE-2018-0618)
It was discovered that Mailman incorrectly handled certain inputs. An attacker could possibly use this issue to display arbitrary text on a web page. (CVE-2018-13796)
It was discovered…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-0618
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-13796
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12137

Title: USN-4349-1: EDK II vulnerabilities
URL: https://usn.ubuntu.com/4349-1/
Priorities: medium,low
Description:
A buffer overflow was discovered in the network stack. An unprivileged user could potentially enable escalation of privilege and/or denial of service. This issue was already fixed in a previous release for 18.04 LTS and 19.10. (CVE-2018-12178)
A buffer overflow was discovered in BlockIo service. An unauthenticated user could potentially enable…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12178
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12180
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12181
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14558
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14559
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14563
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14575
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14586
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14587

Title: USN-4346-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4346-1/
Priorities: low,medium
Description:
It was discovered that the QLogic Fibre Channel driver in the Linux kernel did not properly check for error, leading to a NULL pointer dereference. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-16233)
It was discovered that the Intel Wi-Fi driver in the Linux kernel did not properly check for…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16233
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16234
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19768
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8648
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9383

Title: USN-4345-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4345-1/
Priorities: low,medium,high
Description:
Al Viro discovered that the Linux kernel for s390x systems did not properly perform page table upgrades for kernel sections that use secondary address mode. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2020-11884)
It was discovered that the Intel Wi-Fi driver in the Linux kernel did…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16234
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19768
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10942
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11608
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11609
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11668
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11884
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8648
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9383

Title: USN-4340-1: CUPS vulnerabilities
URL: https://usn.ubuntu.com/4340-1/
Priorities: low,medium
Description:
It was discovered that CUPS incorrectly handled certain language values. A local attacker could possibly use this issue to cause CUPS to crash, leading to a denial of service, or possibly obtain sensitive information. This issue only applied to Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 19.10. (CVE-2019-2228)
Stephan Zeisberg discovered that…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2228
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3898

Title: USN-4341-1: Samba vulnerabilities
URL: https://usn.ubuntu.com/4341-1/
Priorities: medium
Description:
Andrei Popa discovered that Samba incorrectly handled certain LDAP queries. A remote attacker could use this issue to cause Samba to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-10700)
It was discovered that Samba incorrectly handled certain LDAP…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10700
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10704

621.71

Release Date: April 23, 2020

Metadata:

BOSH Agent Version: 2.268.15

USNs:


Title: USN-4333-1: Python vulnerabilities
URL: https://usn.ubuntu.com/4333-1/
Priorities: medium,low
Description:
It was discovered that Python incorrectly stripped certain characters from requests. A remote attacker could use this issue to perform CRLF injection. (CVE-2019-18348)
It was discovered that Python incorrectly handled certain HTTP requests. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-8492)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18348
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8492

Title: USN-4334-1: Git vulnerability
URL: https://usn.ubuntu.com/4334-1/
Priorities: medium
Description:
Carlo Arenas discovered that Git incorrectly handled certain URLs containing newlines, empty hosts, or lacking a scheme. A remote attacker could possibly use this issue to trick Git into returning credential information for a wrong host.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11008

Title: USN-4332-1: File Roller vulnerability
URL: https://usn.ubuntu.com/4332-1/
Priorities: medium
Description:
It was discovered that File Roller incorrectly handled symlinks. An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11736

621.69

Release Date: April 21, 2020

Metadata:

BOSH Agent Version: 2.268.15

USNs:


Title: USN-4326-1: libiberty vulnerabilities
URL: https://usn.ubuntu.com/4326-1/
Priorities: low,medium
Description:
It was discovered that libiberty incorrectly handled parsing certain binaries. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause libiberty to crash, resulting in a denial of service, or possibly execute arbitrary code
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12641
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12697
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12698
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12934
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17794
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17985
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18483
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18484
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18700
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18701
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-9138
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14250
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9070
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9071

Title: USN-4323-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4323-1/
Priorities: medium
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, or execute arbitrary code. (CVE-2020-6821, CVE-2020-6822, CVE-2020-6824, CVE-2020-6825, CVE-2020-6826)
It was discovered that…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6821
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6822
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6823
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6824
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6825
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6826

Title: USN-4320-1: Linux kernel vulnerability
URL: https://usn.ubuntu.com/4320-1/
Priorities: medium
Description:
Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory).
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8428

Title: USN-4318-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4318-1/
Priorities: medium,low
Description:
Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2020-8428)
Gustavo Romero and Paul Mackerras discovered that the KVM implementation in the Linux kernel for…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8428
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8834
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8992

Title: USN-4324-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4324-1/
Priorities: medium,low
Description:
Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2020-8428)
Shijie Luo discovered that the ext4 file system implementation in the Linux kernel did not…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8428
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8992

621.64

Release Date: April 06, 2020

Metadata:

BOSH Agent Version: 2.268.12

USNs:


Title: USN-4311-1: BlueZ vulnerabilities
URL: https://usn.ubuntu.com/4311-1/
Priorities: low,medium
Description:
It was discovered that BlueZ incorrectly handled bonding HID and HOGP devices. A local attacker could possibly use this issue to impersonate non-bonded devices. (CVE-2020-0556)
It was discovered that BlueZ incorrectly handled certain commands. A local attacker could use this issue to cause BlueZ to crash, resulting in a denial of service, or…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-7837
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0556

Title: USN-4316-1: GD Graphics Library vulnerabilities
URL: https://usn.ubuntu.com/4316-1/
Priorities: low
Description:
It was discovered that GD Graphics Library incorrectly handled cloning an image. An attacker could possibly use this issue to cause GD Graphics Library to crash, resulting in a denial of service. (CVE-2018-14553)
It was discovered that GD Graphics Library incorrectly handled loading images from X bitmap format files. An attacker could possibly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14553
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11038

Title: USN-4134-3: IBus vulnerability
URL: https://usn.ubuntu.com/4134-3/
Priorities: medium
Description:
USN-4134-1 fixed a vulnerability in IBus. The update caused a regression in some Qt applications and the fix was subsequently reverted in USN-4134-2. The regression has since been resolved and so this update fixes the original vulnerability.
We apologize for the inconvenience.
Original advisory details:
Simon McVittie discovered that IBus did…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14822

Title: USN-4314-1: pam-krb5 vulnerability
URL: https://usn.ubuntu.com/4314-1/
Priorities: medium
Description:
Russ Allbery discovered that pam-krb5 incorrectly handled some responses. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10595

Title: USN-4317-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4317-1/
Priorities: high
Description:
Two use-after-free bugs were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could exploit these to cause a denial of service or execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6819
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6820

Title: USN-4315-1: Apport vulnerabilities
URL: https://usn.ubuntu.com/4315-1/
Priorities: high,medium
Description:
Maximilien Bourgeteau discovered that the Apport lock file was created with insecure permissions. This could allow a local attacker to escalate their privileges via a symlink attack. (CVE-2020-8831)
Maximilien Bourgeteau discovered a race condition in Apport when setting crash report permissions. This could allow a local attacker to…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8831
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8833

621.61

Release Date: March 24, 2020

Metadata:

BOSH Agent Version: 2.268.12

USNs:


Title: USN-4298-1: SQLite vulnerabilities
URL: https://usn.ubuntu.com/4298-1/
Priorities: medium,low
Description:
It was discovered that SQLite incorrectly handled certain shadow tables. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2019-13734, CVE-2019-13750, CVE-2019-13753)
It was discovered that SQLite incorrectly handled certain corrupt records. An attacker could use…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13734
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13750
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13751
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13752
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13753
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19880
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19923
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19924
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19925
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19926
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19959
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20218
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9327

Title: USN-4299-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4299-1/
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the URL or other browser chrome, obtain sensitive information, bypass Content Security Policy (CSP) protections, or execute arbitrary…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20503
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6805
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6806
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6807
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6808
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6809
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6810
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6811
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6812
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6813
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6814
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6815

Title: USN-4296-1: Django vulnerability
URL: https://usn.ubuntu.com/4296-1/
Priorities: medium
Description:
Norbert Szetei discovered that Django incorrectly handled the GIS functions and aggregates on Oracle. A remote attacker could possibly use this issue to perform an SQL injection attack.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9402

621.59

Release Date: March 03, 2020

Metadata:

BOSH Agent Version: 2.268.12

USNs:


Title: USN-4279-2: PHP regression
URL: https://usn.ubuntu.com/4279-2/
Priorities: low
Description:
USN-4279-1 fixed vulnerabilities in PHP. The updated packages caused a regression. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that PHP incorrectly handled certain scripts. An attacker could possibly use this issue to cause a denial of service. This issue only affected…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2015-9253

Title: USN-4290-1: libpam-radius-auth vulnerability
URL: https://usn.ubuntu.com/4290-1/
Priorities: medium
Description:
It was discovered that libpam-radius-auth incorrectly handled certain long passwords. A remote attacker could possibly use this issue to cause libpam-radius-auth to crash, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2015-9542

Title: USN-4292-1: rsync vulnerabilities
URL: https://usn.ubuntu.com/4292-1/
Priorities: low
Description:
It was discovered that rsync incorrectly handled pointer arithmetic in zlib. An attacker could use this issue to cause rsync to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841)
It was discovered that rsync incorrectly handled vectors involving left shifts of negative integers in zlib. An…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9840
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9841
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9842
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9843

Title: USN-4289-1: Squid vulnerabilities
URL: https://usn.ubuntu.com/4289-1/
Priorities: medium
Description:
Jeriko One discovered that Squid incorrectly handled memory when connected to an FTP server. A remote attacker could possibly use this issue to obtain sensitive information from Squid memory. (CVE-2019-12528)
Regis Leroy discovered that Squid incorrectly handled certain HTTP requests. A remote attacker could possibly use this issue to access…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12528
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8449
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8450
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8517

Title: USN-4293-1: libarchive vulnerabilities
URL: https://usn.ubuntu.com/4293-1/
Priorities: low,medium
Description:
It was discovered that libarchive incorrectly handled certain archive files. An attacker could possibly use this issue to access sensitive information. (CVE-2019-19221)
It was discovered that libarchive incorrectly handled certain archive files. An attacker could possibly use this issue to cause a crash resulting in a denial of service or…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19221
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9308

Title: USN-4278-2: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4278-2/
Priorities: medium
Description:
USN-4278-1 fixed vulnerabilities in Firefox. This update provides the corresponding update for Ubuntu 16.04 LTS.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, conduct…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6796
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6798
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6800
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6801

Title: USN-4288-1: ppp vulnerability
URL: https://usn.ubuntu.com/4288-1/
Priorities: medium
Description:
It was discovered that ppp incorrectly handled certain rhostname values. A remote attacker could use this issue to cause ppp to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8597

621.57

Release Date: February 19, 2020

Metadata:

BOSH Agent Version: 2.268.12

USNs:


Title: USN-4277-1: libexif vulnerabilities
URL: https://usn.ubuntu.com/4277-1/
Priorities: low,medium
Description:
Liu Bingchang discovered that libexif incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information or cause a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. (CVE-2016-6328)
Lili Xu and Bingchang Liu discovered that libexif incorrectly handled…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6328
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7544
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9278

Title: USN-4275-1: Qt vulnerabilities
URL: https://usn.ubuntu.com/4275-1/
Priorities: low,medium
Description:
It was discovered that Qt incorrectly handled certain PPM images. If a user or automated system were tricked into opening a specially crafted PPM file, a remote attacker could cause Qt to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-19872)
It was discovered that Qt incorrectly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19872
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18281
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0569
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0570

Title: USN-4272-1: Pillow vulnerabilities
URL: https://usn.ubuntu.com/4272-1/
Priorities: low,medium
Description:
It was discovered that Pillow incorrectly handled certain images. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-16865, CVE-2019-19911)
It was discovered that Pillow incorrectly handled certain images. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-5312)
It was discovered that…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16865
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19911
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5310
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5311
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5312
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5313

Title: USN-4273-1: ReportLab vulnerability
URL: https://usn.ubuntu.com/4273-1/
Priorities: medium
Description:
It was discovered that ReportLab incorrectly handled certain XML documents. If a user or automated system were tricked into processing a specially crafted document, a remote attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17626

Title: USN-4274-1: libxml2 vulnerabilities
URL: https://usn.ubuntu.com/4274-1/
Priorities: low,medium
Description:
It was discovered that libxml2 incorrectly handled certain XML files. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-19956, CVE-2020-7595)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19956
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7595

621.55

Release Date: February 06, 2020

Metadata:

BOSH Agent Version: 2.268.12

USNs:


Title: USN-4259-1: Apache Solr vulnerability
URL: https://usn.ubuntu.com/4259-1/
Priorities: high
Description:
Michael Stepankin and Olga Barinova discovered that Apache Solr was vulnerable to an XXE attack. An attacker could use this vulnerability to remotely execute code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12629

Title: USN-4252-1: tcpdump vulnerabilities
URL: https://usn.ubuntu.com/4252-1/
Priorities: low,medium
Description:
Multiple security issues were discovered in tcpdump. A remote attacker could use these issues to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16808
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10103
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10105
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14461
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14462
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14463
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14464
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14465
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14466
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14467
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14468
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14469
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14470
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14879
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14880
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14881
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14882
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16227
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16228
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16229
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16230
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16300
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16451
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16452
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19519
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1010220
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15166
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15167

Title: USN-4254-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4254-1/
Priorities: medium,negligible,low
Description:
It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors. A local attacker could use this to expose sensitive information. (CVE-2019-14615)
It was discovered that a race condition existed in the Virtual Video Test Driver in the Linux kernel. An attacker with write…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14615
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15291
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18683
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18885
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19057
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19062
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19063
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19227
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19332

Title: USN-4255-2: Linux kernel (HWE) vulnerabilities
URL: https://usn.ubuntu.com/4255-2/
Priorities: medium
Description:
USN-4255-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu 16.04 LTS.
It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14615
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7053

Title: USN-4263-1: Sudo vulnerability
URL: https://usn.ubuntu.com/4263-1/
Priorities: low
Description:
Joe Vennix discovered that Sudo incorrectly handled memory operations when the pwfeedback option is enabled. A local attacker could possibly use this issue to obtain unintended access to the administrator account.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18634

Title: USN-4256-1: Cyrus SASL vulnerability
URL: https://usn.ubuntu.com/4256-1/
Priorities: medium
Description:
It was discovered that Cyrus SASL incorrectly handled certain LDAP packets. An attacker could possibly use this issue to execute arbitrary code or cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19906

Title: USN-4265-1: SpamAssassin vulnerabilities
URL: https://usn.ubuntu.com/4265-1/
Priorities: medium
Description:
It was discovered that SpamAssassin incorrectly handled certain CF files. If a user or automated system were tricked into using a specially-crafted CF file, a remote attacker could possibly run arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1930
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1931

Title: USN-4250-1: MySQL vulnerabilities
URL: https://usn.ubuntu.com/4250-1/
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.19 in Ubuntu 19.10. Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.29.
In addition to security fixes, the updated packages contain bug fixes, new features, and possibly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2570
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2572
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2573
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2574
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2577
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2579
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2584
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2588
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2589
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2627
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2679
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2686
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2694

Title: USN-4257-1: OpenJDK vulnerabilities
URL: https://usn.ubuntu.com/4257-1/
Priorities: low,medium
Description:
It was discovered that OpenJDK incorrectly handled exceptions during deserialization in BeanContextSupport. An attacker could possibly use this issue to cause a denial of service or other unspecified impact. (CVE-2020-2583)
It was discovered that OpenJDK incorrectly validated properties of SASL messages included in Kerberos GSSAPI. An…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2583
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2590
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2593
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2601
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2604
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2654
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2655
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2659

621.51

Release Date: January 24, 2020

Bug Fixes


* Addresses https://github.com/cloudfoundry/bosh/issues/2223 - prevent AWS from overriding search domains

Metadata:

BOSH Agent Version: 2.268.11

USNs:


Title: USN-4246-1: zlib vulnerabilities
URL: https://usn.ubuntu.com/4246-1/
Priorities: low
Description:
It was discovered that zlib incorrectly handled pointer arithmetic. An attacker could use this issue to cause zlib to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841)
It was discovered that zlib incorrectly handled vectors involving left shifts of negative integers. An attacker could use…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9840
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9841
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9842
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9843

Title: USN-4248-1: GraphicsMagick vulnerabilities
URL: https://usn.ubuntu.com/4248-1/
Priorities: medium
Description:
It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16545
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16547
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16669
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17498
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17500
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17501
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17502
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17503
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17782
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17783

Title: USN-4244-1: Samba vulnerabilities
URL: https://usn.ubuntu.com/4244-1/
Priorities: low,medium
Description:
It was discovered that Samba did not automatically replicate ACLs set to inherit down a subtree on AD Directory, contrary to expectations. This issue was only addressed in Ubuntu 18.04 LTS, Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-14902)
Robert Święcki discovered that Samba incorrectly handled certain character conversions when the log level is…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14902
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14907
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19344

Title: USN-4247-1: python-apt vulnerabilities
URL: https://usn.ubuntu.com/4247-1/
Priorities: medium
Description:
It was discovered that python-apt would still use MD5 hashes to validate certain downloaded packages. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered packages. (CVE-2019-15795)
It was discovered that python-apt could install packages from untrusted repositories, contrary…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15795
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15796

Title: USN-4249-1: e2fsprogs vulnerability
URL: https://usn.ubuntu.com/4249-1/
Priorities: medium
Description:
It was discovered that e2fsprogs incorrectly handled certain ext4 partitions. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5188

Title: USN-4245-1: PySAML2 vulnerability
URL: https://usn.ubuntu.com/4245-1/
Priorities: medium
Description:
It was discovered that PySAML2 incorrectly handled certain SAML files. An attacker could possibly use this issue to bypass signature verification with arbitrary data.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5390

621.50

Release Date: January 21, 2020

Metadata:

BOSH Agent Version: 2.268.10

USNs:


Title: USN-4232-1: GraphicsMagick vulnerabilities
URL: https://usn.ubuntu.com/4232-1/
Priorities: medium,low
Description:
It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14165
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14314
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14504
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14649
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14733
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14994
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14997
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15277
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15930
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16352
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16353

Title: USN-4237-1: SpamAssassin vulnerabilities
URL: https://usn.ubuntu.com/4237-1/
Priorities: medium
Description:
It was discovered that SpamAssassin incorrectly handled certain CF files. If a user or automated system were tricked into using a specially-crafted CF file, a remote attacker could possibly run arbitrary code. (CVE-2018-11805)
It was discovered that SpamAssassin incorrectly handled certain messages. A remote attacker could possibly use this issue…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-11805
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12420

Title: USN-4238-1: SDL_image vulnerabilities
URL: https://usn.ubuntu.com/4238-1/
Priorities: medium,low
Description:
It was discovered that SDL_image incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-3977
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12216
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12217
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12218
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12219
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12220
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12221
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12222
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13616
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5051
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7635

Title: USN-4240-1: Kamailio vulnerability
URL: https://usn.ubuntu.com/4240-1/
Priorities: high
Description:
It was discovered that Kamailio can be exploited by using a specially crafted message that can cause a buffer overflow issue.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-8828

Title: USN-4239-1: PHP vulnerabilities
URL: https://usn.ubuntu.com/4239-1/
Priorities: low
Description:
It was discovered that PHP incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 ESM, 16.04 LTS, 18.04 LTS, 19.04 and 19.10. (CVE-2019-11045)
It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to expose…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11045
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11046
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11047
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11050

Title: USN-4236-2: Libgcrypt vulnerability
URL: https://usn.ubuntu.com/4236-2/
Priorities: medium
Description:
USN-4236-1 fixed a vulnerability in Libgcrypt. This update provides the corresponding fix for Ubuntu 16.04 LTS.
Original advisory details:
It was discovered that Libgcrypt was susceptible to a ECDSA timing attack. An attacker could possibly use this attack to recover sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13627

Title: USN-4227-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4227-1/
Priorities: medium,low
Description:
It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-14895, CVE-2019-14901)
It was discovered that a heap-based buffer overflow existed in the…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14895
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14896
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14897
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14901
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16231
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16233
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19045
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19083
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19524
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19529
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19534
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19807

Title: USN-4228-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4228-1/
Priorities: medium,low
Description:
It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-14895, CVE-2019-14901)
It was discovered that a heap-based buffer overflow existed in the…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14895
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14896
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14897
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14901
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19524
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19534

Title: USN-4230-1: ClamAV vulnerability
URL: https://usn.ubuntu.com/4230-1/
Priorities: medium
Description:
It was discovered that ClamAV incorrectly handled certain MIME messages. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15961

Title: USN-4231-1: NSS vulnerability
URL: https://usn.ubuntu.com/4231-1/
Priorities: medium
Description:
It was discovered that NSS incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17006

Title: USN-4234-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4234-1/
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass Content Security Policy (CSP) restrictions, conduct cross-site scripting (XSS) attacks, or execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17016
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17017
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17020
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17023
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17024
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17025
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17026

Title: USN-4235-1: nginx vulnerability
URL: https://usn.ubuntu.com/4235-1/
Priorities: medium
Description:
Bert JW Regeer and Francisco Oca Gonzalez discovered that nginx incorrectly handled certain error_page configurations. A remote attacker could possibly use this issue to perform HTTP request smuggling attacks and access resources contrary to expectations.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20372

621.41

Release Date: February 04, 2020

BOSH Agent version: 2.268.9
USNs:

Title: USN-4222-1: GraphicsMagick vulnerabilities
URL: https://usn.ubuntu.com/4222-1/
Priorities: medium,low
Description:
It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-11638
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-11641
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-11642
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-11643
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12936
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12937
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13063
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13064
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13065
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13134
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13737
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13775
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13776
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13777

Title: USN-4216-2: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4216-2/
Priorities: medium
Description:
USN-4216-1 fixed vulnerabilities in Firefox. This update provides the corresponding update for Ubuntu 16.04 LTS.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11745
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11756
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17005
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17008
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17010
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17011
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17012
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17013
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17014

Title: USN-4220-1: Git vulnerabilities
URL: https://usn.ubuntu.com/4220-1/
Priorities: medium,low
Description:
Joern Schneeweisz and Nicolas Joly discovered that Git contained various security flaws. An attacker could possibly use these issues to overwrite arbitrary paths, execute arbitrary code, and overwrite files in the .git directory.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1348
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1349
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1350
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1351
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1352
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1353
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1354
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1387
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19604

Title: USN-4217-1: Samba vulnerabilities
URL: https://usn.ubuntu.com/4217-1/
Priorities: medium
Description:
Andreas Oster discovered that the Samba DNS management server incorrectly handled certain records. An authenticated attacker could possibly use this issue to crash Samba, resulting in a denial of service. (CVE-2019-14861)
Isaac Boukris discovered that Samba did not enforce the Kerberos DelegationNotAllowed feature restriction, contrary to…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14861
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14870

Title: USN-4219-1: libssh vulnerability
URL: https://usn.ubuntu.com/4219-1/
Priorities: medium
Description:
It was discovered that libssh incorrectly handled certain scp commands. If a user or automated system were tricked into using a specially-crafted scp command, a remote attacker could execute arbitrary commands on the server.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14889

Title: USN-4221-1: libpcap vulnerability
URL: https://usn.ubuntu.com/4221-1/
Priorities: medium
Description:
It was discovered that libpcap did not properly validate PHB headers in some situations. An attacker could use this to cause a denial of service (memory exhaustion).
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15165

Title: USN-4214-2: RabbitMQ vulnerability
URL: https://usn.ubuntu.com/4214-2/
Priorities: medium
Description:
USN-4214-1 fixed a vulnerability in RabbitMQ. This update provides the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that RabbitMQ incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18609

Title: USN-4224-1: Django vulnerability
URL: https://usn.ubuntu.com/4224-1/
Priorities: high
Description:
Simon Charette discovered that the password reset functionality in Django used a Unicode case insensitive query to retrieve accounts associated with an email address. An attacker could possibly use this to obtain password reset tokens and hijack accounts.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19844

Title: USN-4223-1: OpenJDK vulnerabilities
URL: https://usn.ubuntu.com/4223-1/
Priorities: medium
Description:
Jan Jancar, Petr Svenda, and Vladimir Sedlacek discovered that a side- channel vulnerability existed in the ECDSA implementation in OpenJDK. An Attacker could use this to expose sensitive information. (CVE-2019-2894)
It was discovered that the Socket implementation in OpenJDK did not properly restrict the creation of subclasses with a custom…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2894
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2945
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2949
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2962
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2964
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2973
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2975
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2977
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2981
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2983
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2987
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2988
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2989
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2992
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2999

621.29

Release Date: December 10, 2019

BOSH Agent version: 2.268.7
USNs:

Title: USN-4211-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4211-1/
Priorities: medium,negligible
Description:
Zhipeng Xie discovered that an infinite loop could be triggered in the CFS Linux kernel process scheduler. A local attacker could possibly use this to cause a denial of service. (CVE-2018-20784)
Nicolas Waisman discovered that the WiFi driver stack in the Linux kernel did not properly validate SSID lengths. A physically proximate attacker could…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20784
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17075
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17133

Title: USN-4205-1: SQLite vulnerabilities
URL: https://usn.ubuntu.com/4205-1/
Priorities: low,medium
Description:
It was discovered that SQLite incorrectly handled certain schemas. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 ESM. (CVE-2018-8740)
It was discovered that SQLite incorrectly handled certain schemas. An attacker could possibly use this issue to cause a denial of service. This issue…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-8740
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16168
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19242
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19244
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5018
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5827

Title: USN-4203-1: NSS vulnerability
URL: https://usn.ubuntu.com/4203-1/
Priorities: medium
Description:
It was discovered that NSS incorrectly handled certain memory operations. A remote attacker could use this issue to cause NSS to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11745

Title: USN-4213-1: Squid vulnerabilities
URL: https://usn.ubuntu.com/4213-1/
Priorities: medium,low
Description:
Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly handled certain URN requests. A remote attacker could possibly use this issue to bypass access checks and access restricted servers. This issue was only addressed in Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-12523)
Jeriko One discovered that Squid incorrectly handed URN…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12523
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12526
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12854
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18676
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18677
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18678
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18679

Title: USN-4210-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4210-1/
Priorities: medium,negligible,low
Description:
It was discovered that a buffer overflow existed in the 802.11 Wi-Fi configuration interface for the Linux kernel when handling beacon settings. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-16746)
Nicolas Waisman discovered that the WiFi driver stack in the Linux…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16746
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17075
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17133
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19060
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19065
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19075

Title: USN-4204-1: psutil vulnerability
URL: https://usn.ubuntu.com/4204-1/
Priorities: medium
Description:
Riccardo Schirone discovered that psutil incorrectly handled certain reference counting operations. An attacker could use this issue to cause psutil to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18874

621.26

Release Date: November 26, 2019

BOSH Agent version: 2.268.7
USNs:

Title: USN-4198-1: DjVuLibre vulnerabilities
URL: https://usn.ubuntu.com/4198-1/
Priorities: low
Description:
It was discovered that DjVuLibre incorrectly handled certain memory operations. If a user or automated system were tricked into processing a specially crafted DjVu file, a remote attacker could cause applications to hang or crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15142
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15143
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15144
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15145
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18804

621.23

Release Date: November 18, 2019

BOSH Agent version: 2.268.6
USNs:

Title: USN-4186-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4186-1/
Priorities: high,medium
Description:
Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12207
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0154
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0155
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15098
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16746
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17053
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17054
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17055
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17056
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17666
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2215

Title: USN-4185-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4185-1/
Priorities: high,medium
Description:
Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12207
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0154
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0155
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15098
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17053
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17054
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17055
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17056
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17666

Title: USN-4190-1: libjpeg-turbo vulnerabilities
URL: https://usn.ubuntu.com/4190-1/
Priorities: low,medium
Description:
It was discovered that libjpeg-turbo incorrectly handled certain BMP images. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-14498)
It was discovered that libjpeg-turbo incorrectly handled certain JPEG images. An attacker could possibly use this…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14498
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19664
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20330
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2201

Title: USN-4185-3: Linux kernel vulnerability and regression
URL: https://usn.ubuntu.com/4185-3/
Priorities: high
Description:
USN-4185-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 (i915 missing Blitter Command Streamer check) was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables (EPT) are disabled or not supported. This update…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0155

Title: USN-4186-3: Linux kernel vulnerability
URL: https://usn.ubuntu.com/4186-3/
Priorities: high
Description:
USN-4186-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 (i915 missing Blitter Command Streamer check) was incomplete on 64-bit Intel x86 systems. This update addresses the issue.
We apologize for the inconvenience.
Original advisory details:
Stephan van Schaik, Alyssa Milburn, Sebastian…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0155

Title: USN-4182-1: Intel Microcode update
URL: https://usn.ubuntu.com/4182-1/
Priorities: high,medium
Description:
Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11139

Title: USN-4191-1: QEMU vulnerabilities
URL: https://usn.ubuntu.com/4191-1/
Priorities: low
Description:
It was discovered that the LSI SCSI adapter emulator implementation in QEMU did not properly validate executed scripts. A local attacker could use this to cause a denial of service. (CVE-2019-12068)
Sergej Schumilo, Cornelius Aschermann and Simon Wörner discovered that the qxl paravirtual graphics driver implementation in QEMU contained a…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12068
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12155
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13164
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14378
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15890

Title: USN-4192-1: ImageMagick vulnerabilities
URL: https://usn.ubuntu.com/4192-1/
Priorities: low,negligible,medium
Description:
It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12975
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12976
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12977
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12979
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13137
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13295
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13297
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13300
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13301
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13304
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13305
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13306
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13307
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13308
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13309
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13310
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13311
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13391
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13454
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14981
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15139
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15140
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16708
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16709
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16710
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16711
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16713

621.12

Release Date: November 12, 2019

BOSH Agent version: 2.268.5
USNs:

Title: USN-4176-1: GNU cpio vulnerability
URL: https://usn.ubuntu.com/4176-1/
Priorities: medium
Description:
Thomas Habets discovered that GNU cpio incorrectly handled certain inputs. An attacker could possibly use this issue to access sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14866

Title: USN-4174-1: HAproxy vulnerability
URL: https://usn.ubuntu.com/4174-1/
Priorities: medium
Description:
It was discovered that HAproxy incorrectly handled certain HTTP requests. An attacker could possibly use this issue to a privilege escalation (Request Smuggling).
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18277

Title: USN-4175-1: Nokogiri vulnerability
URL: https://usn.ubuntu.com/4175-1/
Priorities: medium
Description:
It was discovered that Nokogiri incorrectly handled inputs. A remote attacker could possibly use this issue to execute arbitrary OS commands.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5477

621.5

Release Date: October 31, 2019

New stemcell line!

* rev the stemcell_api_version to 3 for upcoming signed url feature - https://www.pivotaltracker.com/epic/show/4392899
* blacklist nouveau kernel module (#96)



BOSH Agent version: 2.268.3

456.x

This section includes release notes for the 456.x line of Linux stemcells used with Tanzu Operations Manager.

456.298

Available in the Broadcom Support portal

Release Date: September 06, 2022

Metadata:

BOSH Agent Version: 2.234.78

USNs:


Title: USN-5575-2: Libxslt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5575-2
Priorities: medium
Description:
USN-5575-1 fixed vulnerabilities in Libxslt. This update provides
the corresponding updates for Ubuntu 14.04 ESM and Ubuntu 16.04
ESM.

Original advisory details:

Nicolas Grégoire discovered that Libxslt incorrectly handled certain XML.
An attacker could possibly use this issue to expose sensitive information
or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS.
(CVE-2019-5815)

Alexey Neyman incorrectly handled certain HTML pages.
An attacker could possibly use this issue to expose sensitive information
or execute arbitrary code. (CVE-2021-30560)
CVEs:
- https://ubuntu.com/security/CVE-2019-5815
- https://ubuntu.com/security/CVE-2021-30560
- https://ubuntu.com/security/CVE-2019-5815
- https://ubuntu.com/security/CVE-2021-30560

Title: USN-5580-1: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5580-1
Priorities: medium
Description:
It was discovered that the framebuffer driver on the Linux kernel did not
verify size limits when changing font or screen size, leading to an out-of-
bounds write. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-33655)

It was discovered that the virtual terminal driver in the Linux kernel did
not properly handle VGA console font changes, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2021-33656)

It was discovered that the Packet network protocol implementation in the
Linux kernel contained an out-of-bounds access. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-20368)

Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter
subsystem in the Linux kernel did not properly handle rules that truncated
packets below the packet header size. When such rules are in place, a
remote attacker could possibly use this to cause a denial of service
(system crash). (CVE-2022-36946)
CVEs:
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2021-33656
- https://ubuntu.com/security/CVE-2022-20368
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2022-36946
- https://ubuntu.com/security/CVE-2021-33656
- https://ubuntu.com/security/CVE-2021-33655
- https://ubuntu.com/security/CVE-2022-20368

Title: USN-5591-2: Linux kernel (HWE) vulnerability
URL: https://ubuntu.com/security/notices/USN-5591-2
Priorities: medium
Description:
It was discovered that the virtual terminal driver in the Linux kernel did
not properly handle VGA console font changes, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-33656

Title: USN-5591-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5591-1
Priorities: medium
Description:
It was discovered that the virtual terminal driver in the Linux kernel did
not properly handle VGA console font changes, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-33656

Title: USN-5572-1: Linux kernel (AWS) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5572-1
Priorities: medium
Description:
Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741)
CVEs:
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740

Title: USN-5579-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5579-1
Priorities: medium
Description:
Roger Pau Monné discovered that the Xen virtual block driver in the Linux
kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-26365)

Roger Pau Monné discovered that the Xen paravirtualization frontend in the
Linux kernel did not properly initialize memory pages to be used for shared
communication with the backend. A local attacker could use this to expose
sensitive information (guest kernel memory). (CVE-2022-33740)

It was discovered that the Xen paravirtualization frontend in the Linux
kernel incorrectly shared unrelated data when communicating with certain
backends. A local attacker could use this to cause a denial of service
(guest crash) or expose sensitive information (guest kernel memory).
(CVE-2022-33741)
CVEs:
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-33741
- https://ubuntu.com/security/CVE-2022-26365
- https://ubuntu.com/security/CVE-2022-33740

Title: USN-5584-1: Schroot vulnerability
URL: https://ubuntu.com/security/notices/USN-5584-1
Priorities: medium
Description:
It was discovered that Schroot incorrectly handled certain Schroot names.
An attacker could possibly use this issue to break schroot’s internal
state causing a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-2787

Title: USN-5578-2: Open VM Tools vulnerability
URL: https://ubuntu.com/security/notices/USN-5578-2
Priorities: medium
Description:
USN-5578-1 fixed a vulnerability in Open VM Tools. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Open VM Tools incorrectly handled certain requests.
An attacker inside the guest could possibly use this issue to gain root
privileges inside the virtual machine.
CVEs:
- https://ubuntu.com/security/CVE-2022-31676

Title: USN-5586-1: SDL vulnerability
URL: https://ubuntu.com/security/notices/USN-5586-1
Priorities: low
Description:
It was discovered that SDL (Simple DirectMedia Layer) incorrectly handled
memory. An attacker could potentially use this issue to cause a denial
of service or other unexpected behavior.
CVEs:
- https://ubuntu.com/security/CVE-2022-34568

Title: USN-5573-1: rsync vulnerability
URL: https://ubuntu.com/security/notices/USN-5573-1
Priorities: medium
Description:
Evgeny Legerov discovered that zlib incorrectly handled memory when
performing certain inflate operations. An attacker could use this issue
to cause rsync to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-37434

Title: USN-5570-1: zlib vulnerability
URL: https://ubuntu.com/security/notices/USN-5570-1
Priorities: medium
Description:
Evgeny Legerov discovered that zlib incorrectly handled memory when
performing certain inflate operations. An attacker could use this issue
to cause zlib to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-37434

Title: USN-5574-1: Exim vulnerability
URL: https://ubuntu.com/security/notices/USN-5574-1
Priorities: medium
Description:
It was discovered that Exim incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-37452

456.287

Available in the Broadcom Support portal

Release Date: August 11, 2022

Metadata:

BOSH Agent Version: 2.234.74

USNs:


Title: USN-5548-1: libxml2 vulnerability
URL: https://ubuntu.com/security/notices/USN-5548-1
Priorities: medium
Description:
It was discovered that libxml2 incorrectly handled certain XML files.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2016-3709

Title: USN-5553-1: libjpeg-turbo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5553-1
Priorities: low
Description:
It was discovered that libjpeg-turbo was not properly handling EOF characters,
which could lead to excessive memory consumption through the execution of a
large loop. An attacker could possibly use this issue to cause a denial of
service. (CVE-2018-11813)

It was discovered that libjpeg-turbo was not properly performing bounds
check operations, which could lead to a heap-based buffer overread. If a user
or automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 14.04 ESM. (CVE-2018-14498)

It was discovered that libjpeg-turbo was not properly limiting the amount of
main memory being consumed by the system during decompression or multi-pass
compression operations, which could lead to excessive memory consumption. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2020-14152)

It was discovered that libjpeg-turbo was not properly setting variable sizes
when performing certain kinds of encoding operations, which could lead to a
stack-based buffer overflow. If a user or automated system were tricked into
opening a specially crafted file, an attacker could possibly use this issue to
cause a denial of service. (CVE-2020-17541)
CVEs:
- https://ubuntu.com/security/CVE-2018-11813
- https://ubuntu.com/security/CVE-2018-14498
- https://ubuntu.com/security/CVE-2020-14152
- https://ubuntu.com/security/CVE-2020-17541
- https://ubuntu.com/security/CVE-2020-17541
- https://ubuntu.com/security/CVE-2020-14152
- https://ubuntu.com/security/CVE-2018-14498
- https://ubuntu.com/security/CVE-2018-11813

Title: USN-5555-1: GStreamer Good Plugins vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5555-1
Priorities: medium
Description:
It was discovered that GStreamer Good Plugins incorrectly handled certain files.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2022-1920, CVE-2022-1921)

It was discovered that GStreamer Good Plugins incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2022-1922, CVE-2022-1923, CVE-2022-1924,
CVE-2022-1925, CVE-2022-2122)
CVEs:
- https://ubuntu.com/security/CVE-2022-1920
- https://ubuntu.com/security/CVE-2022-1921
- https://ubuntu.com/security/CVE-2022-1922
- https://ubuntu.com/security/CVE-2022-1923
- https://ubuntu.com/security/CVE-2022-1924
- https://ubuntu.com/security/CVE-2022-1925
- https://ubuntu.com/security/CVE-2022-2122
- https://ubuntu.com/security/CVE-2022-1921
- https://ubuntu.com/security/CVE-2022-1923
- https://ubuntu.com/security/CVE-2022-2122
- https://ubuntu.com/security/CVE-2022-1922
- https://ubuntu.com/security/CVE-2022-1924
- https://ubuntu.com/security/CVE-2022-1920
- https://ubuntu.com/security/CVE-2022-1925

Title: USN-5546-2: OpenJDK 8 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5546-2
Priorities: high,medium
Description:
USN-5546-1 fixed vulnerabilities in OpenJDK.
This update provides the corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

Neil Madden discovered that OpenJDK did not properly verify ECDSA
signatures. A remote attacker could possibly use this issue to insert,
edit or obtain sensitive information. This issue only affected OpenJDK
17 and OpenJDK 18. (CVE-2022-21449)

It was discovered that OpenJDK incorrectly limited memory when compiling a
specially crafted XPath expression. An attacker could possibly use this
issue to cause a denial of service. This issue was fixed in OpenJDK 8 and
OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11
and OpenJDK 17. (CVE-2022-21426)

It was discovered that OpenJDK incorrectly handled converting certain
object arguments into their textual representations. An attacker could
possibly use this issue to cause a denial of service. This issue was
fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed
this issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21434)

It was discovered that OpenJDK incorrectly validated the encoded length of
certain object identifiers. An attacker could possibly use this issue to
cause a denial of service. This issue was fixed in OpenJDK 8 and OpenJDK 18.
USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11 and OpenJDK 17.
(CVE-2022-21443)

It was discovered that OpenJDK incorrectly validated certain paths. An
attacker could possibly use this issue to bypass the secure validation
feature and expose sensitive information in XML files. This issue was
fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this
issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21476)

It was discovered that OpenJDK incorrectly parsed certain URI strings. An
attacker could possibly use this issue to make applications accept
invalid of malformed URI strings. This issue was fixed in OpenJDK 8 and
OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11
and OpenJDK 17. (CVE-2022-21496)

It was discovered that OpenJDK incorrectly generated class code in the
Hotspot component. An attacker could possibly use this issue to obtain
sensitive information. (CVE-2022-21540)

It was dicovered that OpenJDK incorrectly restricted access to the
invokeBasic() method in the Hotspot component. An attacker could possibly
use this issue to insert, edit or obtain sensitive information.
(CVE-2022-21541)

It was discovered that OpenJDK incorrectly computed exponentials. An
attacker could possibly use this issue to insert, edit or obtain sensitive
information. This issue only affected OpenJDK 17.
(CVE-2022-21549)

It was discovered that OpenJDK includes a copy of Xalan that incorrectly
handled integer truncation. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2022-34169)
CVEs:
- https://ubuntu.com/security/CVE-2022-21449
- https://ubuntu.com/security/CVE-2022-21426
- https://ubuntu.com/security/CVE-2022-21434
- https://ubuntu.com/security/CVE-2022-21443
- https://ubuntu.com/security/CVE-2022-21476
- https://ubuntu.com/security/CVE-2022-21496
- https://ubuntu.com/security/CVE-2022-21540
- https://ubuntu.com/security/CVE-2022-21541
- https://ubuntu.com/security/CVE-2022-21549
- https://ubuntu.com/security/CVE-2022-34169
- https://ubuntu.com/security/CVE-2022-21434
- https://ubuntu.com/security/CVE-2022-34169
- https://ubuntu.com/security/CVE-2022-21426
- https://ubuntu.com/security/CVE-2022-21541
- https://ubuntu.com/security/CVE-2022-21540
- https://ubuntu.com/security/CVE-2022-21443
- https://ubuntu.com/security/CVE-2022-21496
- https://ubuntu.com/security/CVE-2022-21476

Title: USN-5560-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5560-2
Priorities: high,medium,low
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)

It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)

It was discovered that the block layer subsystem in the Linux kernel did
not properly initialize memory in some situations. A privileged local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-0494)

Hu Jiahui discovered that multiple race conditions existed in the Advanced
Linux Sound Architecture (ALSA) framework, leading to use-after-free
vulnerabilities. A local attacker could use these to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2022-1048)

It was discovered that the implementation of the 6pack and mkiss protocols
in the Linux kernel did not handle detach events properly in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2022-1195)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

Norbert Slusarek discovered that a race condition existed in the perf
subsystem in the Linux kernel, resulting in a use-after-free vulnerability.
A privileged local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-1729)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2022-1734)

Duoming Zhou discovered a race condition in the NFC subsystem in the Linux
kernel, leading to a use-after-free vulnerability. A privileged local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2022-1974)

Duoming Zhou discovered that the NFC subsystem in the Linux kernel did not
properly prevent context switches from occurring during certain atomic
context operations. A privileged local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1975)

Minh Yuan discovered that the floppy driver in the Linux kernel contained a
race condition in some situations, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-33981)

Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel
did not properly perform data validation. A local attacker could use this
to escalate privileges in certain situations. (CVE-2022-34918)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-0494
- https://ubuntu.com/security/CVE-2022-1048
- https://ubuntu.com/security/CVE-2022-1195
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-33981
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-1975
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-1729
- https://ubuntu.com/security/CVE-2022-34918
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-0494
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1974
- https://ubuntu.com/security/CVE-2022-33981
- https://ubuntu.com/security/CVE-2022-1195
- https://ubuntu.com/security/CVE-2022-1048
- https://ubuntu.com/security/CVE-2022-1734

Title: USN-5557-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5557-1
Priorities: high
Description:
Zhenpeng Lin discovered that the network packet scheduler implementation in
the Linux kernel did not properly remove all references to a route filter
before freeing it in some situations. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2588)

It was discovered that the netfilter subsystem of the Linux kernel did not
prevent one nft object from referencing an nft set in another nft table,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-2586)
CVEs:
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586
- https://ubuntu.com/security/CVE-2022-2588
- https://ubuntu.com/security/CVE-2022-2586

Title: USN-5463-2: NTFS-3G vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5463-2
Priorities: medium
Description:
USN-5463-1 fixed vulnerabilities in NTFS-3G. This update provides the
corresponding updates for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Roman Fiedler discovered that NTFS-3G incorrectly handled certain return
codes. A local attacker could possibly use this issue to intercept
protocol traffic between FUSE and the kernel. (CVE-2022-30783)

It was discovered that NTFS-3G incorrectly handled certain NTFS disk
images. If a user or automated system were tricked into mounting a
specially crafted disk image, a remote attacker could use this issue to
cause a denial of service, or possibly execute arbitrary code.
(CVE-2022-30784, CVE-2022-30786, CVE-2022-30788, CVE-2022-30789)

Roman Fiedler discovered that NTFS-3G incorrectly handled certain file
handles. A local attacker could possibly use this issue to read and write
arbitrary memory. (CVE-2022-30785, CVE-2022-30787)
CVEs:
- https://ubuntu.com/security/CVE-2022-30783
- https://ubuntu.com/security/CVE-2022-30784
- https://ubuntu.com/security/CVE-2022-30786
- https://ubuntu.com/security/CVE-2022-30788
- https://ubuntu.com/security/CVE-2022-30789
- https://ubuntu.com/security/CVE-2022-30785
- https://ubuntu.com/security/CVE-2022-30787
- https://ubuntu.com/security/CVE-2022-30783
- https://ubuntu.com/security/CVE-2022-30785
- https://ubuntu.com/security/CVE-2022-30784
- https://ubuntu.com/security/CVE-2022-30787
- https://ubuntu.com/security/CVE-2022-30786
- https://ubuntu.com/security/CVE-2022-30788
- https://ubuntu.com/security/CVE-2022-30789

456.283

Available in the Broadcom Support portal

Release Date: August 03, 2022

Metadata:

BOSH Agent Version: 2.234.73

USNs:


Title: USN-5519-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-5519-1
Priorities: low
Description:
It was discovered that Python incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2015-20107

Title: USN-5535-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5535-1
Priorities: medium
Description:
Joseph Nuzman discovered that some Intel processors did not properly
initialise shared resources. A local attacker could use this to obtain
sensitive information. (CVE-2021-0145)

Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel
processors did not prevent test and debug logic from being activated at
runtime. A local attacker could use this to escalate
privileges. (CVE-2021-0146)

It was discovered that some Intel processors did not implement sufficient
control flow management. A local attacker could use this to cause a denial
of service (system crash). (CVE-2021-0127)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123,
CVE-2022-21127)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that
some Intel processors improperly optimised security-critical code. A local
attacker could possibly use this to expose sensitive
information. (CVE-2022-21151)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

It was discovered that some Intel processors did not properly restrict
access in some situations. A local attacker could use this to obtain
sensitive information. (CVE-2021-33117)

Brandon Miller discovered that some Intel processors did not properly
restrict access in some situations. A local attacker could use this to
obtain sensitive information or a remote attacker could use this to
cause a denial of service (system crash). (CVE-2021-33120)
CVEs:
- https://ubuntu.com/security/CVE-2021-0145
- https://ubuntu.com/security/CVE-2021-0146
- https://ubuntu.com/security/CVE-2021-0127
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21127
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2022-21151
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2021-33117
- https://ubuntu.com/security/CVE-2021-33120
- https://ubuntu.com/security/CVE-2021-0145
- https://ubuntu.com/security/CVE-2022-21127
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2021-33117
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2021-33120
- https://ubuntu.com/security/CVE-2021-0146
- https://ubuntu.com/security/CVE-2022-21151
- https://ubuntu.com/security/CVE-2021-0127

Title: USN-5505-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5505-1
Priorities: high,medium,low
Description:
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)

Likang Luo discovered that a race condition existed in the Bluetooth
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-3752)

It was discovered that the NFC subsystem in the Linux kernel contained a
use-after-free vulnerability in its NFC Controller Interface (NCI)
implementation. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2021-3760)

Szymon Heidrich discovered that the USB Gadget subsystem in the Linux
kernel did not properly restrict the size of control requests for certain
gadget types, leading to possible out of bounds reads or writes. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-39685)

It was discovered that the Ion Memory Manager subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2021-39714)

Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in
the Linux kernel did not perform a GPU TLB flush in some situations. A
local attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2022-0330)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some error conditions. A local
attacker could use this to cause a denial of service. (CVE-2022-28356)

It was discovered that the 8 Devices USB2CAN interface implementation in
the Linux kernel did not properly handle certain error conditions, leading
to a double-free. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2022-28388)
CVEs:
- https://ubuntu.com/security/CVE-2021-3609
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2021-39714
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-0330
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2022-24958
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-28388
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2021-3609
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2022-24958
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2021-39714
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-28388
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-0330

Title: USN-5515-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5515-1
Priorities: medium,low
Description:
Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Jann Horn discovered that the FUSE file system in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2022-1011)

Duoming Zhou discovered that the 6pack protocol implementation in the Linux
kernel did not handle detach events properly in some situations, leading to
a use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash). (CVE-2022-1198)

Duoming Zhou discovered that the AX.25 amateur radio protocol
implementation in the Linux kernel did not handle detach events properly in
some situations. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2022-1199)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel during device detach operations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1204)

Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol
implementation in the Linux kernel, leading to use-after-free
vulnerabilities. A local attacker could possibly use this to cause a denial
of service (system crash). (CVE-2022-1205)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the implementation of X.25 network protocols in the
Linux kernel did not terminate link layer sessions properly. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2022-1516)

Zheyu Ma discovered that the Silicon Motion SM712 framebuffer driver in the
Linux kernel did not properly handle very small reads. A local attacker
could use this to cause a denial of service (system crash). (CVE-2022-2380)

It was discovered that the Microchip CAN BUS Analyzer interface
implementation in the Linux kernel did not properly handle certain error
conditions, leading to a double-free. A local attacker could possibly use
this to cause a denial of service (system crash). (CVE-2022-28389)
CVEs:
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2022-1011
- https://ubuntu.com/security/CVE-2022-1198
- https://ubuntu.com/security/CVE-2022-1199
- https://ubuntu.com/security/CVE-2022-1204
- https://ubuntu.com/security/CVE-2022-1205
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1516
- https://ubuntu.com/security/CVE-2022-2380
- https://ubuntu.com/security/CVE-2022-28389
- https://ubuntu.com/security/CVE-2022-1199
- https://ubuntu.com/security/CVE-2022-1205
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2022-28389
- https://ubuntu.com/security/CVE-2022-2380
- https://ubuntu.com/security/CVE-2022-1198
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1204
- https://ubuntu.com/security/CVE-2022-1011
- https://ubuntu.com/security/CVE-2022-1516

Title: USN-5523-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5523-1
Priorities: medium,negligible
Description:
It was discovered that LibTIFF was not properly performing checks to
guarantee that allocated memory space existed, which could lead to a
NULL pointer dereference via a specially crafted file. An attacker
could possibly use this issue to cause a denial of service.
(CVE-2022-0907, CVE-2022-0908)

It was discovered that LibTIFF was not properly performing checks to
avoid division calculations where the denominator value was zero,
which could lead to an undefined behavior situation via a specially
crafted file. An attacker could possibly use this issue to cause a
denial of service. (CVE-2022-0909)

It was discovered that LibTIFF was not properly performing bounds
checks, which could lead to an out-of-bounds read via a specially
crafted file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information. (CVE-2022-0924)

It was discovered that LibTIFF was not properly performing the
calculation of data that would eventually be used as a reference for
bounds checking operations, which could lead to an out-of-bounds
read via a specially crafted file. An attacker could possibly use
this issue to cause a denial of service or to expose sensitive
information. (CVE-2020-19131)

It was discovered that LibTIFF was not properly terminating a
function execution when processing incorrect data, which could lead
to an out-of-bounds read via a specially crafted file. An attacker
could possibly use this issue to cause a denial of service or to
expose sensitive information. (CVE-2020-19144)

It was discovered that LibTIFF was not properly performing checks
when setting the value for data later used as reference during memory
access, which could lead to an out-of-bounds read via a specially
crafted file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information.
(CVE-2022-22844)
CVEs:
- https://ubuntu.com/security/CVE-2022-0907
- https://ubuntu.com/security/CVE-2022-0908
- https://ubuntu.com/security/CVE-2022-0909
- https://ubuntu.com/security/CVE-2022-0924
- https://ubuntu.com/security/CVE-2020-19131
- https://ubuntu.com/security/CVE-2020-19144
- https://ubuntu.com/security/CVE-2022-22844
- https://ubuntu.com/security/CVE-2020-19144
- https://ubuntu.com/security/CVE-2020-19131
- https://ubuntu.com/security/CVE-2022-0909
- https://ubuntu.com/security/CVE-2022-0924
- https://ubuntu.com/security/CVE-2022-22844
- https://ubuntu.com/security/CVE-2022-0907
- https://ubuntu.com/security/CVE-2022-0908

Title: USN-5533-1: Vim vulnerability
URL: https://ubuntu.com/security/notices/USN-5533-1
Priorities: low
Description:
It was discovered that Vim incorrectly handled memory access. If a
user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-2129

Title: USN-5537-2: MySQL vulnerability
URL: https://ubuntu.com/security/notices/USN-5537-2
Priorities: low
Description:
USN-5537-1 fixed a vulnerability in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.7.39 in Ubuntu 16.04 ESM.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-39.html
https://www.oracle.com/security-alerts/cpujul2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21515

Title: USN-5516-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5516-1
Priorities: low,medium
Description:
It was discovered that Vim incorrectly handled memory access. An attacker
could potentially use this issue to cause the corruption of sensitive
information, a crash, or arbitrary code execution.
CVEs:
- https://ubuntu.com/security/CVE-2022-2210
- https://ubuntu.com/security/CVE-2022-2000
- https://ubuntu.com/security/CVE-2022-2207

Title: USN-5510-2: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5510-2
Priorities: medium
Description:
USN-5510-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain inputs. An attacker could use this issue to cause the server to
crash, resulting in a denial of service, or possibly execute arbitrary
code and escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2022-2319
- https://ubuntu.com/security/CVE-2022-2320

Title: USN-5520-2: HTTP-Daemon vulnerability
URL: https://ubuntu.com/security/notices/USN-5520-2
Priorities: medium
Description:
USN-5520-1 fixed a vulnerability in HTTP-Daemon. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that HTTP-Daemon incorrectly handled certain crafted
requests. A remote attacker could possibly use this issue to perform an
HTTP Request Smuggling attack.
CVEs:
- https://ubuntu.com/security/CVE-2022-31081

Title: USN-5534-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5534-1
Priorities: medium
Description:
It was discovered that ImageMagick incorrectly handled certain values.
If a user were tricked into processing a specially crafted image file,
an attacker could possibly exploit this issue to cause a denial of service
or other unspecified impact. (CVE-2022-32545, CVE-2022-32546)

It was discovered that ImageMagick incorrectly handled memory under
certain circumstances. If a user were tricked into processing a specially
crafted image file, an attacker could possibly exploit this issue to cause
a denial of service or other unspecified impact. (CVE-2022-32547)
CVEs:
- https://ubuntu.com/security/CVE-2022-32545
- https://ubuntu.com/security/CVE-2022-32546
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2022-32546
- https://ubuntu.com/security/CVE-2022-32547
- https://ubuntu.com/security/CVE-2022-32545

Title: USN-5503-2: GnuPG vulnerability
URL: https://ubuntu.com/security/notices/USN-5503-2
Priorities: medium
Description:
USN-5503-1 fixed a vulnerability in GnuPG. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Demi Marie Obenour discovered that GnuPG incorrectly handled injection in
the status message. A remote attacker could possibly use this issue to
forge signatures.
CVEs:
- https://ubuntu.com/security/CVE-2022-34903

456.278

Available in the Broadcom Support portal

Release Date: July 11, 2022

Metadata:

BOSH Agent Version: 2.234.70

USNs:


Title: USN-5478-1: util-linux vulnerability
URL: https://ubuntu.com/security/notices/USN-5478-1
Priorities: low
Description:
Christian Moch and Michael Gruhn discovered that the libblkid library
of util-linux did not properly manage memory under certain
circumstances. A local attacker could possibly use this issue
to cause denial of service by consuming all memory through
a specially crafted MSDOS partition table.
CVEs:
- https://ubuntu.com/security/CVE-2016-5011

Title: USN-5490-1: Protocol Buffers vulnerability
URL: https://ubuntu.com/security/notices/USN-5490-1
Priorities: low
Description:
It was discovered that Protocol Buffers did not properly parse certain symbols.
An attacker could possibly use this issue to cause a denial of service or other
unspecified impact.
CVEs:
- https://ubuntu.com/security/CVE-2021-22570

Title: USN-5505-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5505-1
Priorities: high,medium,low
Description:
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)

Likang Luo discovered that a race condition existed in the Bluetooth
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-3752)

It was discovered that the NFC subsystem in the Linux kernel contained a
use-after-free vulnerability in its NFC Controller Interface (NCI)
implementation. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2021-3760)

Szymon Heidrich discovered that the USB Gadget subsystem in the Linux
kernel did not properly restrict the size of control requests for certain
gadget types, leading to possible out of bounds reads or writes. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-39685)

It was discovered that the Ion Memory Manager subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could possibly
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2021-39714)

Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in
the Linux kernel did not perform a GPU TLB flush in some situations. A
local attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2022-0330)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)

It was discovered that the USB Gadget file system interface in the Linux
kernel contained a use-after-free vulnerability. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2022-24958)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some error conditions. A local
attacker could use this to cause a denial of service. (CVE-2022-28356)

It was discovered that the 8 Devices USB2CAN interface implementation in
the Linux kernel did not properly handle certain error conditions, leading
to a double-free. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2022-28388)
CVEs:
- https://ubuntu.com/security/CVE-2021-3609
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2021-39714
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-0330
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2022-24958
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-28388
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2021-3609
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2022-24958
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2021-39714
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-28388
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-0330

Title: USN-5500-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5500-1
Priorities: medium,low
Description:
Eric Biederman discovered that the cgroup process migration implementation
in the Linux kernel did not perform permission checks correctly in some
situations. A local attacker could possibly use this to gain administrative
privileges. (CVE-2021-4197)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

It was discovered that the PF_KEYv2 implementation in the Linux kernel did
not properly initialize kernel memory in some situations. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2022-1353)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

Minh Yuan discovered that the floppy disk driver in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could possibly use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2022-1652)

It was discovered that the Atheros ath9k wireless device driver in the
Linux kernel did not properly handle some error conditions, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2022-1679)

It was discovered that the Marvell NFC device driver implementation in the
Linux kernel did not properly perform memory cleanup operations in some
situations, leading to a use-after-free vulnerability. A local attacker
could possibly use this to cause a denial of service (system) or execute
arbitrary code. (CVE-2022-1734)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some error conditions. A local
attacker could use this to cause a denial of service. (CVE-2022-28356)
CVEs:
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1679
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-1652
- https://ubuntu.com/security/CVE-2022-1353
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-1734
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2021-4197
- https://ubuntu.com/security/CVE-2022-1679

Title: USN-5498-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5498-1
Priorities: low,medium
Description:
It was discovered that Vim incorrectly handled memory when opening certain
files. If an attacker could trick a user into opening a specially crafted
file, it could cause Vim to crash, or possible execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-1733
- https://ubuntu.com/security/CVE-2022-0413
- https://ubuntu.com/security/CVE-2022-1785
- https://ubuntu.com/security/CVE-2022-1851
- https://ubuntu.com/security/CVE-2022-1629
- https://ubuntu.com/security/CVE-2022-1796
- https://ubuntu.com/security/CVE-2022-1898
- https://ubuntu.com/security/CVE-2022-1735

Title: LSN-0087-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0087-1
Priorities: high,medium
Description:
Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-1966)

Ziming Zhang discovered that the netfilter subsystem in the Linux kernel
did not properly validate sets with multiple ranged fields. A local
attacker could use this to cause a denial of service or execute arbitrary
code.(CVE-2022-1972)
CVEs:
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2022-1972
- https://ubuntu.com/security/CVE-2022-1972
- https://ubuntu.com/security/CVE-2022-1966

Title: USN-5492-1: Vim vulnerability
URL: https://ubuntu.com/security/notices/USN-5492-1
Priorities: medium
Description:
It was discovered that Vim incorrectly handled memory when opening and
searching the contents of certain files. If an attacker could trick a user
into opening a specially crafted file, it could cause Vim to crash.
CVEs:
- https://ubuntu.com/security/CVE-2022-2042

Title: USN-5488-2: OpenSSL vulnerability
URL: https://ubuntu.com/security/notices/USN-5488-2
Priorities: medium
Description:
USN-5488-1 fixed vulnerabilities in OpenSSL. This update provides the
corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

Chancen and Daniel Fiala discovered that OpenSSL incorrectly handled the
c_rehash script. A local attacker could possibly use this issue to execute
arbitrary commands when c_rehash is run.
CVEs:
- https://ubuntu.com/security/CVE-2022-2068

Title: USN-5485-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5485-1
Priorities: medium
Description:
It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123)

It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)

It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)
CVEs:
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21125
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2022-21123
- https://ubuntu.com/security/CVE-2022-21166
- https://ubuntu.com/security/CVE-2022-21125

Title: USN-5487-3: Apache HTTP Server regression
URL: https://ubuntu.com/security/notices/USN-5487-3
Priorities: medium,low
Description:
USN-5487-1 fixed several vulnerabilities in Apache HTTP Server.
Unfortunately it caused regressions. USN-5487-2 reverted the
patches that caused the regression in Ubuntu 14.04 ESM for further
investigation. This update re-adds the security fixes for Ubuntu
14.04 ESM and fixes two different regressions: one affecting mod_proxy
only in Ubuntu 14.04 ESM and another in mod_sed affecting also Ubuntu 16.04 ESM
and Ubuntu 18.04 LTS.

We apologize for the inconvenience.

Original advisory details:

It was discovered that Apache HTTP Server mod_proxy_ajp incorrectly handled
certain crafted request. A remote attacker could possibly use this issue to
perform an HTTP Request Smuggling attack. (CVE-2022-26377)

It was discovered that Apache HTTP Server incorrectly handled certain
request. An attacker could possibly use this issue to cause a denial
of service. (CVE-2022-28614)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to cause a crash or expose
sensitive information. (CVE-2022-28615)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-29404)

It was discovered that Apache HTTP Server incorrectly handled certain
request. An attacker could possibly use this issue to cause a crash.
(CVE-2022-30522)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to execute arbitrary code or cause
a crash. (CVE-2022-30556)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to bypass IP based authentication.
(CVE-2022-31813)
CVEs:
- https://ubuntu.com/security/CVE-2022-26377
- https://ubuntu.com/security/CVE-2022-28614
- https://ubuntu.com/security/CVE-2022-28615
- https://ubuntu.com/security/CVE-2022-29404
- https://ubuntu.com/security/CVE-2022-30522
- https://ubuntu.com/security/CVE-2022-30556
- https://ubuntu.com/security/CVE-2022-31813
- https://ubuntu.com/security/CVE-2022-26377
- https://ubuntu.com/security/CVE-2022-31813
- https://ubuntu.com/security/CVE-2022-28614
- https://ubuntu.com/security/CVE-2022-29404
- https://ubuntu.com/security/CVE-2022-28615
- https://ubuntu.com/security/CVE-2022-30522
- https://ubuntu.com/security/CVE-2022-30556

Title: USN-5487-1: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5487-1
Priorities: medium,low
Description:
It was discovered that Apache HTTP Server mod_proxy_ajp incorrectly handled
certain crafted request. A remote attacker could possibly use this issue to
perform an HTTP Request Smuggling attack. (CVE-2022-26377)

It was discovered that Apache HTTP Server incorrectly handled certain
request. An attacker could possibly use this issue to cause a denial
of service. (CVE-2022-28614)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to cause a crash or expose
sensitive information. (CVE-2022-28615)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-29404)

It was discovered that Apache HTTP Server incorrectly handled certain
request. An attacker could possibly use this issue to cause a crash.
(CVE-2022-30522)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to execute arbitrary code or cause
a crash. (CVE-2022-30556)

It was discovered that Apache HTTP Server incorrectly handled certain request.
An attacker could possibly use this issue to bypass IP based authentication.
(CVE-2022-31813)
CVEs:
- https://ubuntu.com/security/CVE-2022-26377
- https://ubuntu.com/security/CVE-2022-28614
- https://ubuntu.com/security/CVE-2022-28615
- https://ubuntu.com/security/CVE-2022-29404
- https://ubuntu.com/security/CVE-2022-30522
- https://ubuntu.com/security/CVE-2022-30556
- https://ubuntu.com/security/CVE-2022-31813
- https://ubuntu.com/security/CVE-2022-29404
- https://ubuntu.com/security/CVE-2022-26377
- https://ubuntu.com/security/CVE-2022-31813
- https://ubuntu.com/security/CVE-2022-30556
- https://ubuntu.com/security/CVE-2022-30522
- https://ubuntu.com/security/CVE-2022-28614
- https://ubuntu.com/security/CVE-2022-28615

Title: USN-5499-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5499-1
Priorities: low,medium
Description:
Florian Kohnhuser discovered that curl incorrectly handled returning a
TLS server’s certificate chain details. A remote attacker could possibly
use this issue to cause curl to stop responding, resulting in a denial of
service. (CVE-2022-27781)

Harry Sintonen discovered that curl incorrectly handled certain FTP-KRB
messages. An attacker could possibly use this to perform a
machine-in-the-middle attack. (CVE-2022-32208)
CVEs:
- https://ubuntu.com/security/CVE-2022-27781
- https://ubuntu.com/security/CVE-2022-32208
- https://ubuntu.com/security/CVE-2022-32208
- https://ubuntu.com/security/CVE-2022-27781

Title: USN-5493-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5493-1
Priorities: medium
Description:
It was discovered that the 8 Devices USB2CAN interface implementation in
the Linux kernel did not properly handle certain error conditions, leading
to a double-free. A local attacker could possibly use this to cause a
denial of service (system crash).
CVEs:
- https://ubuntu.com/security/CVE-2022-28388

Title: USN-5479-2: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5479-2
Priorities: medium
Description:
USN-5479-1 fixed vulnerabilities in PHP. This update provides the
corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

Charles Fol discovered that PHP incorrectly handled initializing certain
arrays when handling the pg_query_params function. A remote attacker could
use this issue to cause PHP to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2022-31625)

Charles Fol discovered that PHP incorrectly handled passwords in mysqlnd. A
remote attacker could use this issue to cause PHP to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2022-31626)
CVEs:
- https://ubuntu.com/security/CVE-2022-31625
- https://ubuntu.com/security/CVE-2022-31626
- https://ubuntu.com/security/CVE-2022-31626
- https://ubuntu.com/security/CVE-2022-31625

456.274

Available in the Broadcom Support portal

Release Date: June 17, 2022

Metadata:

BOSH Agent Version: 2.234.66

USNs:


Title: USN-5477-1: ncurses vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5477-1
Priorities: negligible,low
Description:
Hosein Askari discovered that ncurses was incorrectly performing
memory management operations when dealing with long filenames while
writing structures into the file system. An attacker could possibly
use this issue to cause a denial of service or execute arbitrary
code. (CVE-2017-16879)

Chung-Yi Lin discovered that ncurses was incorrectly handling access
to invalid memory areas when parsing terminfo or termcap entries where
the use-name had invalid syntax. An attacker could possibly use this
issue to cause a denial of service. (CVE-2018-19211)

It was discovered that ncurses was incorrectly performing bounds
checks when processing invalid hashcodes. An attacker could possibly
use this issue to cause a denial of service or to expose sensitive
information. (CVE-2019-17594)

It was discovered that ncurses was incorrectly handling
end-of-string characters when processing terminfo and termcap files.
An attacker could possibly use this issue to cause a denial of
service or to expose sensitive information. (CVE-2019-17595)

It was discovered that ncurses was incorrectly handling
end-of-string characters when converting between termcap and
terminfo formats. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary code. (CVE-2021-39537)

It was discovered that ncurses was incorrectly performing bounds
checks when dealing with corrupt terminfo data while reading a
terminfo file. An attacker could possibly use this issue to cause a
denial of service or to expose sensitive information.
(CVE-2022-29458)
CVEs:
- https://ubuntu.com/security/CVE-2017-16879
- https://ubuntu.com/security/CVE-2018-19211
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2019-17595
- https://ubuntu.com/security/CVE-2021-39537
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2017-16879
- https://ubuntu.com/security/CVE-2018-19211
- https://ubuntu.com/security/CVE-2019-17595
- https://ubuntu.com/security/CVE-2019-17594
- https://ubuntu.com/security/CVE-2022-29458
- https://ubuntu.com/security/CVE-2021-39537

Title: LSN-0087-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0087-1
Priorities: high,medium
Description:
Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-1966)

Ziming Zhang discovered that the netfilter subsystem in the Linux kernel
did not properly validate sets with multiple ranged fields. A local
attacker could use this to cause a denial of service or execute arbitrary
code.(CVE-2022-1972)
CVEs:
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2022-1972
- https://ubuntu.com/security/CVE-2022-1972
- https://ubuntu.com/security/CVE-2022-1966

456.273

Available in the Broadcom Support portal

Release Date: June 14, 2022

Metadata:

BOSH Agent Version: 2.234.66

USNs:


Title: LSN-0086-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0086-1
Priorities: high,medium
Description:
It was discovered that a race condition existed in the network scheduling
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-39713)

Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges.(CVE-2022-0492)

It was discovered that the network traffic control implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2022-1055)

Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the Linux
kernel contained in integer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-1116)

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.(CVE-2022-21499)

Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code.(CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions.(CVE-2022-30594)
CVEs:
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2022-1055
- https://ubuntu.com/security/CVE-2022-1116
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-1055
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-1116
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2022-29581

Title: USN-5458-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5458-1
Priorities: low,medium
Description:
It was discovered that Vim was incorrectly handling virtual column
position operations, which could result in an out-of-bounds read. An
attacker could possibly use this issue to expose sensitive
information. (CVE-2021-4193)

It was discovered that Vim was not properly performing bounds checks
when updating windows present on a screen, which could result in a
heap buffer overflow. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2022-0213)

It was discovered that Vim was incorrectly handling window
exchanging operations when in Visual mode, which could result in an
out-of-bounds read. An attacker could possibly use this issue to
expose sensitive information. (CVE-2022-0319)

It was discovered that Vim was incorrectly handling recursion when
parsing conditional expressions. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary code.
(CVE-2022-0351)

It was discovered that Vim was not properly handling memory
allocation when processing data in Ex mode, which could result in a
heap buffer overflow. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code.
(CVE-2022-0359)

It was discovered that Vim was not properly performing bounds checks
when executing line operations in Visual mode, which could result in
a heap buffer overflow. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code.
(CVE-2022-0361, CVE-2022-0368)

It was discovered that Vim was not properly handling loop conditions
when looking for spell suggestions, which could result in a stack
buffer overflow. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary code. (CVE-2022-0408)

It was discovered that Vim was incorrectly handling memory access
when executing buffer operations, which could result in the usage of
freed memory. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2022-0443)
CVEs:
- https://ubuntu.com/security/CVE-2021-4193
- https://ubuntu.com/security/CVE-2022-0213
- https://ubuntu.com/security/CVE-2022-0319
- https://ubuntu.com/security/CVE-2022-0351
- https://ubuntu.com/security/CVE-2022-0359
- https://ubuntu.com/security/CVE-2022-0361
- https://ubuntu.com/security/CVE-2022-0368
- https://ubuntu.com/security/CVE-2022-0408
- https://ubuntu.com/security/CVE-2022-0443
- https://ubuntu.com/security/CVE-2022-0361
- https://ubuntu.com/security/CVE-2021-4193
- https://ubuntu.com/security/CVE-2022-0359
- https://ubuntu.com/security/CVE-2022-0319
- https://ubuntu.com/security/CVE-2022-0443
- https://ubuntu.com/security/CVE-2022-0368
- https://ubuntu.com/security/CVE-2022-0213
- https://ubuntu.com/security/CVE-2022-0351
- https://ubuntu.com/security/CVE-2022-0408

Title: USN-5464-1: e2fsprogs vulnerability
URL: https://ubuntu.com/security/notices/USN-5464-1
Priorities: medium
Description:
Nils Bars discovered that e2fsprogs incorrectly handled certain file
systems. A local attacker could use this issue with a crafted file
system image to possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2022-1304

Title: USN-5466-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5466-1
Priorities: high,low,medium
Description:
It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

It was discovered that the SCTP protocol implementation in the Linux kernel
did not properly verify VTAGs in some situations. A remote attacker could
possibly use this to cause a denial of service (connection disassociation).
(CVE-2021-3772)

It was discovered that the btrfs file system implementation in the Linux
kernel did not properly handle locking in certain error conditions. A local
attacker could use this to cause a denial of service (kernel deadlock).
(CVE-2021-4149)

David Bouman discovered that the netfilter subsystem in the Linux kernel
did not initialize memory in some situations. A local attacker could use
this to expose sensitive information (kernel memory). (CVE-2022-1016)

It was discovered that the virtual graphics memory manager implementation
in the Linux kernel was subject to a race condition, potentially leading to
an information leak. (CVE-2022-1419)

赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not
properly perform reference counting in some error conditions. A local
attacker could use this to cause a denial of service. (CVE-2022-28356)

It was discovered that the EMS CAN/USB interface implementation in the
Linux kernel contained a double-free vulnerability when handling certain
error conditions. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-28390)
CVEs:
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2021-3772
- https://ubuntu.com/security/CVE-2021-4149
- https://ubuntu.com/security/CVE-2022-1016
- https://ubuntu.com/security/CVE-2022-1419
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-28390
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-1016
- https://ubuntu.com/security/CVE-2021-4149
- https://ubuntu.com/security/CVE-2022-28390
- https://ubuntu.com/security/CVE-2021-3772
- https://ubuntu.com/security/CVE-2022-28356
- https://ubuntu.com/security/CVE-2022-1419

Title: USN-5465-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5465-1
Priorities: high,medium
Description:
It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.
(CVE-2022-21499)

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did
not properly handle the removal of stateful expressions in some situations,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or execute arbitrary code.
(CVE-2022-1966)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)
CVEs:
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-1966
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-30594

Title: USN-5454-2: CUPS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5454-2
Priorities: medium,low
Description:
USN-5454-1 fixed several vulnerabilities in CUPS. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Joshua Mason discovered that CUPS incorrectly handled the secret key used
to access the administrative web interface. A remote attacker could
possibly use this issue to open a session as an administrator and execute
arbitrary code. (CVE-2022-26691)

It was discovered that CUPS incorrectly handled certain memory operations
when handling IPP printing. A remote attacker could possibly use this issue
to cause CUPS to crash, leading to a denial of service, or obtain sensitive
information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04
LTS. (CVE-2019-8842, CVE-2020-10001)
CVEs:
- https://ubuntu.com/security/CVE-2022-26691
- https://ubuntu.com/security/CVE-2019-8842
- https://ubuntu.com/security/CVE-2020-10001
- https://ubuntu.com/security/CVE-2022-26691
- https://ubuntu.com/security/CVE-2020-10001
- https://ubuntu.com/security/CVE-2019-8842

Title: USN-5456-1: ImageMagick vulnerability
URL: https://ubuntu.com/security/notices/USN-5456-1
Priorities: medium
Description:
It was discovered that ImageMagick incorrectly handled memory under
certain circumstances. If a user were tricked into opening a specially
crafted image, an attacker could possibly exploit this issue to cause a
denial of service or other unspecified impact.
CVEs:
- https://ubuntu.com/security/CVE-2022-28463

Title: USN-5462-2: Ruby vulnerability
URL: https://ubuntu.com/security/notices/USN-5462-2
Priorities: low
Description:
USN-5462-1 fixed several vulnerabilities in Ruby. This update provides
the corresponding CVE-2022-28739 update for ruby2.3 on Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-28739
- https://ubuntu.com/security/CVE-2022-28739

456.269

Available in the Broadcom Support portal

Release Date: June 02, 2022

Metadata:

BOSH Agent Version: 2.234.64

USNs:


Title: USN-5449-1: libXv vulnerability
URL: https://ubuntu.com/security/notices/USN-5449-1
Priorities: low
Description:
It was discovered that libXv incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial
of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2016-5407

Title: USN-5437-1: libXfixes vulnerability
URL: https://ubuntu.com/security/notices/USN-5437-1
Priorities: low
Description:
Tobias Stoeckmann discovered that libXfixes incorrectly handled certain
inputs. An attacker could possibly use this issue to cause a denial
of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2016-7944

Title: LSN-0086-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0086-1
Priorities: high,medium
Description:
It was discovered that a race condition existed in the network scheduling
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-39713)

Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges.(CVE-2022-0492)

It was discovered that the network traffic control implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code.(CVE-2022-1055)

Bing-Jhong Billy Jheng discovered that the io_uring subsystem in the Linux
kernel contained in integer overflow. A local attacker could use this to
cause a denial of service (system crash) or execute arbitrary code.(CVE-2022-1116)

It was discovered that the Linux kernel did not properly restrict access to
the kernel debugger when booted in secure boot environments. A privileged
attacker could use this to bypass UEFI Secure Boot restrictions.(CVE-2022-21499)

Nick Gregory discovered that the Linux kernel incorrectly handled network
offload functionality. A local attacker could use this to cause a denial of
service or possibly execute arbitrary code.(CVE-2022-25636)

Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code.(CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions.(CVE-2022-30594)
CVEs:
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2022-1055
- https://ubuntu.com/security/CVE-2022-1116
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2022-25636
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-1055
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2022-25636
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-1116
- https://ubuntu.com/security/CVE-2022-21499
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2022-29581

Title: USN-5452-1: NTFS-3G vulnerability
URL: https://ubuntu.com/security/notices/USN-5452-1
Priorities: low
Description:
It was discovered that NTFS-3G was incorrectly validating NTFS
metadata in its ntfsck tool by not performing boundary checks. A
local attacker could possibly use this issue to cause a denial of
service or to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-46790

Title: USN-5402-2: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5402-2
Priorities: medium,low
Description:
USN-5402-1 fixed several vulnerabilities in OpenSSL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Elison Niven discovered that OpenSSL incorrectly handled the c_rehash
script. A local attacker could possibly use this issue to execute arbitrary
commands when c_rehash is run. (CVE-2022-1292)

Aliaksei Levin discovered that OpenSSL incorrectly handled resources when
decoding certificates and keys. A remote attacker could possibly use this
issue to cause OpenSSL to consume resources, leading to a denial of
service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1473)
CVEs:
- https://ubuntu.com/security/CVE-2022-1292
- https://ubuntu.com/security/CVE-2022-1473
- https://ubuntu.com/security/CVE-2022-1473
- https://ubuntu.com/security/CVE-2022-1292

Title: USN-5404-2: Rsyslog vulnerability
URL: https://ubuntu.com/security/notices/USN-5404-2
Priorities: medium
Description:
USN-5404-1 addressed a vulnerability in Rsyslog. This update
provides the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Pieter Agten discovered that Rsyslog incorrectly handled certain requests.
An attacker could possibly use this issue to cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2022-24903

Title: USN-5453-1: FreeType vulnerability
URL: https://ubuntu.com/security/notices/USN-5453-1
Priorities: low
Description:
It was discovered that FreeType incorrectly handled certain font files.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-27406

Title: USN-5443-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5443-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)
CVEs:
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594

456.267

Available in the Broadcom Support portal

Release Date: May 25, 2022

Metadata:

BOSH Agent Version: 2.234.63

USNs:


Title: USN-5428-1: libXrandr vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5428-1
Priorities: low
Description:
Tobias Stoeckmann discovered that libXrandr incorrectly handled certain
responses. An attacker could possibly use this issue to cause a denial
of service, or possibly execute arbitrary code.
(CVE-2016-7947, CVE-2016-7948)
CVEs:
- https://ubuntu.com/security/CVE-2016-7947
- https://ubuntu.com/security/CVE-2016-7948
- https://ubuntu.com/security/CVE-2016-7947
- https://ubuntu.com/security/CVE-2016-7948

Title: USN-5436-1: libXrender vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5436-1
Priorities: low
Description:
Tobias Stoeckmann discovered that libXrender incorrectly handled certain
responses. An attacker could possibly use this issue to cause a denial
of service, or possibly execute arbitrary code.
(CVE-2016-7949, CVE-2016-7950)
CVEs:
- https://ubuntu.com/security/CVE-2016-7949
- https://ubuntu.com/security/CVE-2016-7950
- https://ubuntu.com/security/CVE-2016-7950
- https://ubuntu.com/security/CVE-2016-7949

Title: USN-5432-1: libpng vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5432-1
Priorities: low
Description:
It was discovered that libpng incorrectly handled memory when parsing
certain PNG files. If a user or automated system were tricked into opening
a specially crafted PNG file, an attacker could use this issue to cause
libpng to crash, resulting in a denial of service, or possible execute
arbitrary code. (CVE-2017-12652)

Zhengxiong Luo discovered that libpng incorrectly handled memory when parsing
certain PNG files. If a user or automated system were tricked into opening
a specially crafted PNG file, an attacker could use this issue to cause
libpng to crash, resulting in a denial of service, or possible execute
arbitrary code. (CVE-2018-14048)
CVEs:
- https://ubuntu.com/security/CVE-2017-12652
- https://ubuntu.com/security/CVE-2018-14048
- https://ubuntu.com/security/CVE-2017-12652
- https://ubuntu.com/security/CVE-2018-14048

Title: USN-5425-1: PCRE vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5425-1
Priorities: low,negligible
Description:
Yunho Kim discovered that PCRE incorrectly handled memory when
handling certain regular expressions. An attacker could possibly use
this issue to cause applications using PCRE to expose sensitive
information. This issue only affects Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 21.10 and Ubuntu 22.04 LTS. (CVE-2019-20838)

It was discovered that PCRE incorrectly handled memory when
handling certain regular expressions. An attacker could possibly use
this issue to cause applications using PCRE to have unexpected
behavior. This issue only affects Ubuntu 14.04 ESM, Ubuntu 16.04 ESM,
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-14155)
CVEs:
- https://ubuntu.com/security/CVE-2019-20838
- https://ubuntu.com/security/CVE-2020-14155
- https://ubuntu.com/security/CVE-2020-14155
- https://ubuntu.com/security/CVE-2019-20838

Title: USN-5421-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5421-1
Priorities: negligible,low,medium
Description:
It was discovered that LibTIFF incorrectly handled certain images.
An attacker could possibly use this issue to cause a crash,
resulting in a denial of service. This issue only affects
Ubuntu 14.04 ESM, Ubuntu 16.04 ESM, Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-35522)

Chintan Shah discovered that LibTIFF incorrectly handled memory when
handling certain images. An attacker could possibly use this issue to
cause a crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2022-0561, CVE-2022-0562, CVE-2022-0891)

It was discovered that LibTIFF incorrectly handled certain images.
An attacker could possibly use this issue to cause a crash,
resulting in a denial of service. This issue only affects
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 21.10. (CVE-2022-0865)
CVEs:
- https://ubuntu.com/security/CVE-2020-35522
- https://ubuntu.com/security/CVE-2022-0561
- https://ubuntu.com/security/CVE-2022-0562
- https://ubuntu.com/security/CVE-2022-0891
- https://ubuntu.com/security/CVE-2022-0865
- https://ubuntu.com/security/CVE-2022-0891
- https://ubuntu.com/security/CVE-2022-0562
- https://ubuntu.com/security/CVE-2022-0561
- https://ubuntu.com/security/CVE-2020-35522
- https://ubuntu.com/security/CVE-2022-0865

Title: USN-5423-2: ClamAV vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5423-2
Priorities: low,medium
Description:
USN-5423-1 fixed several vulnerabilities in ClamAV. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.


Original advisory details:

Michał Dardas discovered that ClamAV incorrectly handled parsing CHM files.
A remote attacker could possibly use this issue to cause ClamAV to stop
responding, resulting in a denial of service. (CVE-2022-20770)

Michał Dardas discovered that ClamAV incorrectly handled parsing TIFF
files. A remote attacker could possibly use this issue to cause ClamAV to
stop responding, resulting in a denial of service. (CVE-2022-20771)

Michał Dardas discovered that ClamAV incorrectly handled parsing HTML
files. A remote attacker could possibly use this issue to cause ClamAV to
consume resources, resulting in a denial of service. (CVE-2022-20785)

Michał Dardas discovered that ClamAV incorrectly handled loading the
signature database. A remote attacker could possibly use this issue to
cause ClamAV to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2022-20792)

Alexander Patrakov and Antoine Gatineau discovered that ClamAV incorrectly
handled the scan verdict cache check. A remote attacker could possibly use
this issue to cause ClamAV to crash, resulting in a denial of service, or
possibly execute arbitrary code.(CVE-2022-20796)
CVEs:
- https://ubuntu.com/security/CVE-2022-20770
- https://ubuntu.com/security/CVE-2022-20771
- https://ubuntu.com/security/CVE-2022-20785
- https://ubuntu.com/security/CVE-2022-20792
- https://ubuntu.com/security/CVE-2022-20796
- https://ubuntu.com/security/CVE-2022-20771
- https://ubuntu.com/security/CVE-2022-20796
- https://ubuntu.com/security/CVE-2022-20785
- https://ubuntu.com/security/CVE-2022-20792
- https://ubuntu.com/security/CVE-2022-20770

Title: USN-5424-2: OpenLDAP vulnerability
URL: https://ubuntu.com/security/notices/USN-5424-2
Priorities: medium
Description:
USN-5424-1 fixed a vulnerability in OpenLDAP. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that OpenLDAP incorrectly handled certain SQL statements
within LDAP queries in the experimental back-sql backend. A remote attacker
could possibly use this issue to perform an SQL injection attack and alter
the database.
CVEs:
- https://ubuntu.com/security/CVE-2022-29155

Title: USN-5443-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5443-1
Priorities: high,medium
Description:
Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)
CVEs:
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594
- https://ubuntu.com/security/CVE-2022-29581
- https://ubuntu.com/security/CVE-2022-30594

456.265

Available in the Broadcom Support portal

Release Date: May 17, 2022

Metadata:

BOSH Agent Version: 2.234.62

USNs:


Title: USN-5398-1: Simple DirectMedia Layer vulnerability
URL: https://ubuntu.com/security/notices/USN-5398-1
Priorities:
Description:
It was discovered that SDL (Simple DirectMedia Layer) incorrectly handled
certain files. An attacker could possibly use this issue to cause a denial
of service, or possibly execute arbitrary code.
CVEs:


Title: USN-5407-1: Cairo vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5407-1
Priorities: low
Description:
Gustavo Grieco, Alberto Garcia, Francisco Oca, Suleman Ali, and others
discovered that Cairo incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2016-9082, CVE-2017-9814, CVE-2019-6462)

Stephan Bergmann discovered that Cairo incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service,
or possibly execute arbitrary code.
(CVE-2020-35492)
CVEs:
- https://ubuntu.com/security/CVE-2016-9082
- https://ubuntu.com/security/CVE-2017-9814
- https://ubuntu.com/security/CVE-2019-6462
- https://ubuntu.com/security/CVE-2020-35492
- https://ubuntu.com/security/CVE-2017-9814
- https://ubuntu.com/security/CVE-2020-35492
- https://ubuntu.com/security/CVE-2019-6462
- https://ubuntu.com/security/CVE-2016-9082

Title: USN-5389-1: Libcroco vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5389-1
Priorities: low
Description:
It was discovered that Libcroco was incorrectly accessing data structures when
reading bytes from memory, which could cause a heap buffer overflow. An attacker
could possibly use this issue to cause a denial of service. (CVE-2017-7960)

It was discovered that Libcroco was incorrectly handling invalid UTF-8 values
when processing CSS files. An attacker could possibly use this issue to cause
a denial of service. (CVE-2017-8834, CVE-2017-8871)

It was discovered that Libcroco was incorrectly implementing recursion in one
of its parsing functions, which could cause an infinite recursion loop and a
stack overflow due to stack consumption. An attacker could possibly use this
issue to cause a denial of service. (CVE-2020-12825)
CVEs:
- https://ubuntu.com/security/CVE-2017-7960
- https://ubuntu.com/security/CVE-2017-8834
- https://ubuntu.com/security/CVE-2017-8871
- https://ubuntu.com/security/CVE-2020-12825
- https://ubuntu.com/security/CVE-2020-12825
- https://ubuntu.com/security/CVE-2017-8834
- https://ubuntu.com/security/CVE-2017-8871
- https://ubuntu.com/security/CVE-2017-7960

Title: USN-5405-1: jbig2dec vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5405-1
Priorities: low
Description:
It was discovered that jbig2dec incorrectly handled memory when parsing
invalid files. An attacker could use this issue to cause jbig2dec to crash,
leading to a denial of service. (CVE-2017-9216)

It was discovered that jbig2dec incorrectly handled memory when processing
untrusted input. An attacker could use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2020-12268)
CVEs:
- https://ubuntu.com/security/CVE-2017-9216
- https://ubuntu.com/security/CVE-2020-12268
- https://ubuntu.com/security/CVE-2017-9216
- https://ubuntu.com/security/CVE-2020-12268

Title: USN-5259-3: Cron regression
URL: https://ubuntu.com/security/notices/USN-5259-3
Priorities: low
Description:
USN-5259-1 and USN-5259-2 fixed vulnerabilities in Cron. Unfortunately
that update was incomplete and could introduce a regression. This update
fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that the postinst maintainer script in Cron unsafely
handled file permissions during package install or update operations.
An attacker could possibly use this issue to perform a privilege
escalation attack. (CVE-2017-9525)

Florian Weimer discovered that Cron incorrectly handled certain memory
operations during crontab file creation. An attacker could possibly use
this issue to cause a denial of service. (CVE-2019-9704)

It was discovered that Cron incorrectly handled user input during crontab
file creation. An attacker could possibly use this issue to cause a denial
of service. (CVE-2019-9705)

It was discovered that Cron contained a use-after-free vulnerability in
its force_rescan_user function. An attacker could possibly use this issue
to cause a denial of service. (CVE-2019-9706)
CVEs:
- https://ubuntu.com/security/CVE-2017-9525
- https://ubuntu.com/security/CVE-2019-9704
- https://ubuntu.com/security/CVE-2019-9705
- https://ubuntu.com/security/CVE-2019-9706
- https://ubuntu.com/security/CVE-2017-9525

Title: USN-5413-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5413-1
Priorities: low,medium
Description:
Jeremy Cline discovered a use-after-free in the nouveau graphics driver of
the Linux kernel during device removal. A privileged or physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2020-27820)

It was discovered that a race condition existed in the network scheduling
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-39713)

It was discovered that the Parallel NFS (pNFS) implementation in the Linux
kernel did not properly perform bounds checking in some situations. An
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-4157)

It was discovered that the ST21NFCA NFC driver in the Linux kernel did not
properly validate the size of certain data in EVT_TRANSACTION events. A
physically proximate attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2022-26490)

It was discovered that the Xilinx USB2 device gadget driver in the Linux
kernel did not properly validate endpoint indices from the host. A
physically proximate attacker could possibly use this to cause a denial of
service (system crash). (CVE-2022-27223)

It was discovered that the EMS CAN/USB interface implementation in the
Linux kernel contained a double-free vulnerability when handling certain
error conditions. A local attacker could use this to cause a denial of
service (memory exhaustion). (CVE-2022-28390)
CVEs:
- https://ubuntu.com/security/CVE-2020-27820
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2021-4157
- https://ubuntu.com/security/CVE-2022-26490
- https://ubuntu.com/security/CVE-2022-27223
- https://ubuntu.com/security/CVE-2022-28390
- https://ubuntu.com/security/CVE-2021-4157
- https://ubuntu.com/security/CVE-2022-26490
- https://ubuntu.com/security/CVE-2022-28390
- https://ubuntu.com/security/CVE-2021-39713
- https://ubuntu.com/security/CVE-2022-27223
- https://ubuntu.com/security/CVE-2020-27820

Title: USN-5179-2: BusyBox vulnerability
URL: https://ubuntu.com/security/notices/USN-5179-2
Priorities: low
Description:
USN-5179-1 fixed vulnerabilities in BusyBox. This update provides the
corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that BusyBox incorrectly handled certain malformed gzip
archives. If a user or automated system were tricked into processing a
specially crafted gzip archive, a remote attacker could use this issue to
cause BusyBox to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-28831)
CVEs:
- https://ubuntu.com/security/CVE-2021-28831
- https://ubuntu.com/security/CVE-2021-28831

Title: USN-5392-1: Mutt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5392-1
Priorities: low,medium
Description:
It was discovered that Mutt incorrectly handled certain requests.
An attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 20.04 LTS. (CVE-2021-32055)

It was discovered that Mutt incorrectly handled certain input.
An attacker could possibly use this issue to cause a crash,
or expose sensitive information. (CVE-2022-1328)
CVEs:
- https://ubuntu.com/security/CVE-2021-32055
- https://ubuntu.com/security/CVE-2022-1328
- https://ubuntu.com/security/CVE-2022-1328
- https://ubuntu.com/security/CVE-2021-32055

Title: USN-5391-1: libsepol vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5391-1
Priorities: low
Description:
Nicolas Iooss discovered that libsepol incorrectly handled memory
when handling policies. An attacker could possibly use this issue
to cause a crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-36084)

It was discovered that libsepol incorrectly handled memory when
handling policies. An attacker could possibly use this issue to cause
a crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-36085)

It was discovered that libsepol incorrectly handled memory when
handling policies. An attacker could possibly use this issue to cause
a crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affects Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 21.10. (CVE-2021-36086)

It was discovered that libsepol incorrectly validated certain data,
leading to a heap overflow. An attacker could possibly use this issue
to cause a crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-36087)
CVEs:
- https://ubuntu.com/security/CVE-2021-36084
- https://ubuntu.com/security/CVE-2021-36085
- https://ubuntu.com/security/CVE-2021-36086
- https://ubuntu.com/security/CVE-2021-36087
- https://ubuntu.com/security/CVE-2021-36086
- https://ubuntu.com/security/CVE-2021-36085
- https://ubuntu.com/security/CVE-2021-36084
- https://ubuntu.com/security/CVE-2021-36087

Title: USN-5409-1: libsndfile vulnerability
URL: https://ubuntu.com/security/notices/USN-5409-1
Priorities: low
Description:
It was discovered that libsndfile was incorrectly performing memory
management operations and incorrectly using buffers when executing
its FLAC codec. If a user or automated system were tricked into
processing a specially crafted sound file, an attacker could
possibly use this issue to cause a denial of service or obtain
sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2021-4156

Title: USN-5385-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5385-1
Priorities: medium,low,negligible
Description:
Brendan Dolan-Gavitt discovered that the aQuantia AQtion Ethernet device
driver in the Linux kernel did not properly validate meta-data coming from
the device. A local attacker who can control an emulated device can use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2021-43975)

It was discovered that the UDF file system implementation in the Linux
kernel could attempt to dereference a null pointer in some situations. An
attacker could use this to construct a malicious UDF image that, when
mounted and operated on, could cause a denial of service (system crash).
(CVE-2022-0617)

Lyu Tao discovered that the NFS implementation in the Linux kernel did not
properly handle requests to open a directory on a regular file. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2022-24448)

It was discovered that the YAM AX.25 device driver in the Linux kernel did
not properly deallocate memory in some error conditions. A local privileged
attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2022-24959)
CVEs:
- https://ubuntu.com/security/CVE-2021-43975
- https://ubuntu.com/security/CVE-2022-0617
- https://ubuntu.com/security/CVE-2022-24448
- https://ubuntu.com/security/CVE-2022-24959
- https://ubuntu.com/security/CVE-2022-24448
- https://ubuntu.com/security/CVE-2022-24959
- https://ubuntu.com/security/CVE-2021-43975
- https://ubuntu.com/security/CVE-2022-0617

Title: USN-5400-2: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5400-2
Priorities: medium
Description:
USN-5400-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated in Ubuntu 16.04 ESM to MySQL 5.7.38.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-38.html
https://www.oracle.com/security-alerts/cpuapr2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21417
- https://ubuntu.com/security/CVE-2022-21451
- https://ubuntu.com/security/CVE-2022-21460
- https://ubuntu.com/security/CVE-2022-21444
- https://ubuntu.com/security/CVE-2022-21454
- https://ubuntu.com/security/CVE-2022-21427

Title: USN-5354-2: Twisted vulnerability
URL: https://ubuntu.com/security/notices/USN-5354-2
Priorities: medium
Description:
USN-5354-1 fixed vulnerabilities in Twisted. This update provides the
corresponding updates for Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and
Ubuntu 22.04 LTS.

Original advisory details:

It was discovered that Twisted incorrectly processed SSH handshake data on
connection establishments. A remote attacker could use this issue to cause
Twisted to crash, resulting in a denial of service. (CVE-2022-21716)
CVEs:
- https://ubuntu.com/security/CVE-2022-21716
- https://ubuntu.com/security/CVE-2022-21716

456.261

Available in the Broadcom Support portal

Release Date: April 21, 2022

Notice:

The kernel patches included in 456.252 are now in the main kernel repository and have been included in this release.

Metadata:

BOSH Agent Version: 2.234.58

USNs:


Title: USN-5371-1: nginx vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5371-1
Priorities: medium,low
Description:
It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11724)

It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to disclose sensitive
information. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-36309)

It was discovered that nginx mishandled the use of
compatible certificates among multiple encryption protocols.
If a remote attacker were able to intercept the communication,
this issue could be used to redirect traffic between subdomains.
(CVE-2021-3618)
CVEs:
- https://ubuntu.com/security/CVE-2020-11724
- https://ubuntu.com/security/CVE-2020-36309
- https://ubuntu.com/security/CVE-2021-3618
- https://ubuntu.com/security/CVE-2020-36309
- https://ubuntu.com/security/CVE-2021-3618
- https://ubuntu.com/security/CVE-2020-11724

Title: USN-5373-2: Django vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5373-2
Priorities: high,medium
Description:
USN-5373-1 fixed several vulnerabilities in Django. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Django incorrectly handled certain certain column
aliases in the QuerySet.annotate(), aggregate(), and extra() methods. A
remote attacker could possibly use this issue to perform an SQL injection
attack. (CVE-2022-28346)

It was discovered that the Django URLValidator function incorrectly handled
newlines and tabs. A remote attacker could possibly use this issue to
perform a header injection attack. (CVE-2021-32052)
CVEs:
- https://ubuntu.com/security/CVE-2022-28346
- https://ubuntu.com/security/CVE-2021-32052
- https://ubuntu.com/security/CVE-2021-32052
- https://ubuntu.com/security/CVE-2022-28346

456.252

Available in the Broadcom Support portal

Release Date: March 23, 2022

Notice:

This stemcell contains a patched version of the kernel to address the issues found in 456.244. We have tested this patched kernel against the problems seen in 456.244 and no longer see the problem. We will release another stemcell in mid-April when that kernel patch makes it into the main kernel repository.

Metadata:

BOSH Agent Version: 2.234.54

USNs:


Title: USN-5322-1: Subversion vulnerability
URL: https://ubuntu.com/security/notices/USN-5322-1
Priorities: medium
Description:
Thomas Akesson discovered that Subversion incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-17525

Title: USN-5328-2: OpenSSL vulnerability
URL: https://ubuntu.com/security/notices/USN-5328-2
Priorities: high
Description:
USN-5328-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Tavis Ormandy discovered that OpenSSL incorrectly parsed certain
certificates. A remote attacker could possibly use this issue to cause
OpenSSH to stop responding, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-0778

Title: USN-5320-1: Expat vulnerabilities and regression
URL: https://ubuntu.com/security/notices/USN-5320-1
Priorities: high,medium
Description:
USN-5288-1 fixed several vulnerabilities in Expat. For CVE-2022-25236 it
caused a regression and an additional patch was required. This update address
this regression and several other vulnerabilities.

It was discovered that Expat incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2022-25313)

It was discovered that Expat incorrectly handled certain files.
An attacker could possibly use this issue to cause a crash
or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 21.10. (CVE-2022-25314)

It was discovered that Expat incorrectly handled certain files.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. (CVE-2022-25315)

Original advisory details:

It was discovered that Expat incorrectly handled certain files.
An attacker could possibly use this issue to cause a crash or
execute arbitrary code. (CVE-2022-25236)
CVEs:
- https://ubuntu.com/security/CVE-2022-25236
- https://ubuntu.com/security/CVE-2022-25313
- https://ubuntu.com/security/CVE-2022-25314
- https://ubuntu.com/security/CVE-2022-25315
- https://ubuntu.com/security/CVE-2022-25236
- https://ubuntu.com/security/CVE-2022-25314
- https://ubuntu.com/security/CVE-2022-25315
- https://ubuntu.com/security/CVE-2022-25313

Title: USN-5334-1: man-db vulnerability
URL: https://ubuntu.com/security/notices/USN-5334-1
Priorities: low
Description:
It was discovered that man-db incorrectly handled permission changing
operations in its daily cron job, and was therefore affected by a race
condition. An attacker could possibly use this issue to escalate privileges
and execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2015-1336

Title: USN-5331-1: tcpdump vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5331-1
Priorities: low
Description:
It was discovered that tcpdump incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2018-16301)

It was discovered that tcpdump incorrectly handled certain captured data.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2020-8037)
CVEs:
- https://ubuntu.com/security/CVE-2018-16301
- https://ubuntu.com/security/CVE-2020-8037
- https://ubuntu.com/security/CVE-2018-16301
- https://ubuntu.com/security/CVE-2020-8037

Title: USN-5325-1: Zsh vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5325-1
Priorities: low
Description:
Sam Foxman discovered that Zsh incorrectly handled certain inputs.
An attacker could possibly use this issue to regain dropped privileges.
(CVE-2019-20044)

It was discovered that Zsh incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-45444)
CVEs:
- https://ubuntu.com/security/CVE-2019-20044
- https://ubuntu.com/security/CVE-2021-45444
- https://ubuntu.com/security/CVE-2021-45444
- https://ubuntu.com/security/CVE-2019-20044

Title: USN-5329-1: tar vulnerability
URL: https://ubuntu.com/security/notices/USN-5329-1
Priorities: low
Description:
It was discovered that tar incorrectly handled certain files.
An attacker could possibly use this issue to cause tar to crash,
resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2021-20193

Title: USN-5332-2: Bind vulnerability
URL: https://ubuntu.com/security/notices/USN-5332-2
Priorities: medium
Description:
USN-5332-1 fixed a vulnerability in Bind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Xiang Li, Baojun Liu, Chaoyi Lu, and Changgen Zou discovered that Bind
incorrectly handled certain bogus NS records when using forwarders. A
remote attacker could possibly use this issue to manipulate cache results.
(CVE-2021-25220)
CVEs:
- https://ubuntu.com/security/CVE-2021-25220
- https://ubuntu.com/security/CVE-2021-25220

Title: USN-5343-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5343-1
Priorities: high,low,medium,negligible
Description:
Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges. (CVE-2022-0492)

It was discovered that the aufs file system in the Linux kernel did not
properly restrict mount namespaces, when mounted with the non-default
allow_userns option set. A local attacker could use this to gain
administrative privileges. (CVE-2016-2853)

It was discovered that the aufs file system in the Linux kernel did not
properly maintain POSIX ACL xattr data, when mounted with the non-default
allow_userns option. A local attacker could possibly use this to gain
elevated privileges. (CVE-2016-2854)

It was discovered that the f2fs file system in the Linux kernel did not
properly validate metadata in some situations. An attacker could use this
to construct a malicious f2fs image that, when mounted and operated on,
could cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2019-19449)

It was discovered that the XFS file system implementation in the Linux
kernel did not properly validate meta data in some circumstances. An
attacker could use this to construct a malicious XFS image that, when
mounted, could cause a denial of service. (CVE-2020-12655)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2020-25670)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly deallocate memory in certain error
situations. A local attacker could use this to cause a denial of service
(memory exhaustion). (CVE-2020-25671, CVE-2020-25672)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly handle error conditions in some situations,
leading to an infinite loop. A local attacker could use this to cause a
denial of service. (CVE-2020-25673)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled EAPOL frames from unauthenticated senders. A physically
proximate attacker could inject malicious packets to cause a denial of
service (system crash). (CVE-2020-26139)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could
reassemble mixed encrypted and plaintext fragments. A physically proximate
attacker could possibly use this issue to inject packets or exfiltrate
selected fragments. (CVE-2020-26147)

It was discovered that the BR/EDR pin-code pairing procedure in the Linux
kernel was vulnerable to an impersonation attack. A physically proximate
attacker could possibly use this to pair to a device without knowledge of
the pin-code. (CVE-2020-26555)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly perform access control. An authenticated attacker could possibly
use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)

It was discovered that the FUSE user space file system implementation in
the Linux kernel did not properly handle bad inodes in some situations. A
local attacker could possibly use this to cause a denial of service.
(CVE-2020-36322)

It was discovered that the Infiniband RDMA userspace connection manager
implementation in the Linux kernel contained a race condition leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possible execute arbitrary code.
(CVE-2020-36385)

It was discovered that the DRM subsystem in the Linux kernel contained
double-free vulnerabilities. A privileged attacker could possibly use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2021-20292)

It was discovered that a race condition existed in the timer implementation
in the Linux kernel. A privileged attacker could use this to cause a denial
of service. (CVE-2021-20317)

Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the
nfc implementation in the Linux kernel. A privileged local attacker could
use this issue to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-23134)

It was discovered that the Xen paravirtualization backend in the Linux
kernel did not properly deallocate memory in some situations. A local
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2021-28688)

It was discovered that the RPA PCI Hotplug driver implementation in the
Linux kernel did not properly handle device name writes via sysfs, leading
to a buffer overflow. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2021-28972)

It was discovered that a race condition existed in the netfilter subsystem
of the Linux kernel when replacing tables. A local attacker could use this
to cause a denial of service (system crash). (CVE-2021-29650)

It was discovered that a race condition in the kernel Bluetooth subsystem
could lead to use-after-free of slab objects. An attacker could use this
issue to possibly execute arbitrary code. (CVE-2021-32399)

It was discovered that the CIPSO implementation in the Linux kernel did not
properly perform reference counting in some situations, leading to use-
after-free vulnerabilities. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33033)

It was discovered that a use-after-free existed in the Bluetooth HCI driver
of the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33034)

Asaf Modelevsky discovered that the Intel(R) Ethernet ixgbe driver for the
Linux kernel did not properly validate large MTU requests from Virtual
Function (VF) devices. A local attacker could possibly use this to cause a
denial of service. (CVE-2021-33098)

Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol
implementation in the Linux kernel did not properly initialize memory in
some situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2021-34693)

马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-3483)

It was discovered that an out-of-bounds (OOB) memory access flaw existed in
the f2fs module of the Linux kernel. A local attacker could use this issue
to cause a denial of service (system crash). (CVE-2021-3506)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device initialization failure, leading to a double-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3564)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device detach events, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3573)

Murray McAllister discovered that the joystick device interface in the
Linux kernel did not properly validate data passed via an ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code on systems with a joystick device
registered. (CVE-2021-3612)

It was discovered that the tracing subsystem in the Linux kernel did not
properly keep track of per-cpu ring buffer state. A privileged attacker
could use this to cause a denial of service. (CVE-2021-3679)

It was discovered that the Virtio console implementation in the Linux
kernel did not properly validate input lengths in some situations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2021-38160)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly compute the access permissions for shadow pages in
some situations. A local attacker could use this to cause a denial of
service. (CVE-2021-38198)

It was discovered that the MAX-3421 host USB device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2021-38204)

It was discovered that the NFC implementation in the Linux kernel did not
properly handle failed connect events leading to a NULL pointer
dereference. A local attacker could use this to cause a denial of service.
(CVE-2021-38208)

It was discovered that the configfs interface for USB gadgets in the Linux
kernel contained a race condition. A local attacker could possibly use this
to expose sensitive information (kernel memory). (CVE-2021-39648)

It was discovered that the ext4 file system in the Linux kernel contained a
race condition when writing xattrs to an inode. A local attacker could use
this to cause a denial of service or possibly gain administrative
privileges. (CVE-2021-40490)

It was discovered that the 6pack network protocol driver in the Linux
kernel did not properly perform validation checks. A privileged attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2021-42008)

It was discovered that the ISDN CAPI implementation in the Linux kernel
contained a race condition in certain situations that could trigger an
array out-of-bounds bug. A privileged local attacker could possibly use
this to cause a denial of service or execute arbitrary code.
(CVE-2021-43389)

It was discovered that the Phone Network protocol (PhoNet) implementation
in the Linux kernel did not properly perform reference counting in some
error conditions. A local attacker could possibly use this to cause a
denial of service (memory exhaustion). (CVE-2021-45095)

Wenqing Liu discovered that the f2fs file system in the Linux kernel did
not properly validate the last xattr entry in an inode. An attacker could
use this to construct a malicious f2fs image that, when mounted and
operated on, could cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-45469)

Amit Klein discovered that the IPv6 implementation in the Linux kernel
could disclose internal state in some situations. An attacker could
possibly use this to expose sensitive information. (CVE-2021-45485)

It was discovered that the per cpu memory allocator in the Linux kernel
could report kernel pointers via dmesg. An attacker could use this to
expose sensitive information or in conjunction with another kernel
vulnerability. (CVE-2018-5995)
CVEs:
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2016-2853
- https://ubuntu.com/security/CVE-2016-2854
- https://ubuntu.com/security/CVE-2019-19449
- https://ubuntu.com/security/CVE-2020-12655
- https://ubuntu.com/security/CVE-2020-25670
- https://ubuntu.com/security/CVE-2020-25671
- https://ubuntu.com/security/CVE-2020-25672
- https://ubuntu.com/security/CVE-2020-25673
- https://ubuntu.com/security/CVE-2020-26139
- https://ubuntu.com/security/CVE-2020-26147
- https://ubuntu.com/security/CVE-2020-26555
- https://ubuntu.com/security/CVE-2020-26558
- https://ubuntu.com/security/CVE-2021-0129
- https://ubuntu.com/security/CVE-2020-36322
- https://ubuntu.com/security/CVE-2020-36385
- https://ubuntu.com/security/CVE-2021-20292
- https://ubuntu.com/security/CVE-2021-20317
- https://ubuntu.com/security/CVE-2021-23134
- https://ubuntu.com/security/CVE-2021-28688
- https://ubuntu.com/security/CVE-2021-28972
- https://ubuntu.com/security/CVE-2021-29650
- https://ubuntu.com/security/CVE-2021-32399
- https://ubuntu.com/security/CVE-2021-33033
- https://ubuntu.com/security/CVE-2021-33034
- https://ubuntu.com/security/CVE-2021-33098
- https://ubuntu.com/security/CVE-2021-34693
- https://ubuntu.com/security/CVE-2021-3483
- https://ubuntu.com/security/CVE-2021-3506
- https://ubuntu.com/security/CVE-2021-3564
- https://ubuntu.com/security/CVE-2021-3573
- https://ubuntu.com/security/CVE-2021-3612
- https://ubuntu.com/security/CVE-2021-3679
- https://ubuntu.com/security/CVE-2021-38160
- https://ubuntu.com/security/CVE-2021-38198
- https://ubuntu.com/security/CVE-2021-38204
- https://ubuntu.com/security/CVE-2021-38208
- https://ubuntu.com/security/CVE-2021-39648
- https://ubuntu.com/security/CVE-2021-40490
- https://ubuntu.com/security/CVE-2021-42008
- https://ubuntu.com/security/CVE-2021-43389
- https://ubuntu.com/security/CVE-2021-45095
- https://ubuntu.com/security/CVE-2021-45469
- https://ubuntu.com/security/CVE-2021-45485
- https://ubuntu.com/security/CVE-2018-5995
- https://ubuntu.com/security/CVE-2020-25673
- https://ubuntu.com/security/CVE-2021-3564
- https://ubuntu.com/security/CVE-2021-0129
- https://ubuntu.com/security/CVE-2021-20317
- https://ubuntu.com/security/CVE-2020-26558
- https://ubuntu.com/security/CVE-2020-36385
- https://ubuntu.com/security/CVE-2021-39648
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2021-20292
- https://ubuntu.com/security/CVE-2020-25671
- https://ubuntu.com/security/CVE-2020-12655
- https://ubuntu.com/security/CVE-2021-34693
- https://ubuntu.com/security/CVE-2020-26147
- https://ubuntu.com/security/CVE-2018-5995
- https://ubuntu.com/security/CVE-2021-33034
- https://ubuntu.com/security/CVE-2020-25670
- https://ubuntu.com/security/CVE-2021-38198
- https://ubuntu.com/security/CVE-2021-40490
- https://ubuntu.com/security/CVE-2021-33033
- https://ubuntu.com/security/CVE-2021-43389
- https://ubuntu.com/security/CVE-2021-3612
- https://ubuntu.com/security/CVE-2021-38160
- https://ubuntu.com/security/CVE-2020-26139
- https://ubuntu.com/security/CVE-2016-2853
- https://ubuntu.com/security/CVE-2021-38204
- https://ubuntu.com/security/CVE-2021-33098
- https://ubuntu.com/security/CVE-2021-3573
- https://ubuntu.com/security/CVE-2021-45469
- https://ubuntu.com/security/CVE-2021-28688
- https://ubuntu.com/security/CVE-2021-38208
- https://ubuntu.com/security/CVE-2021-42008
- https://ubuntu.com/security/CVE-2020-25672
- https://ubuntu.com/security/CVE-2016-2854
- https://ubuntu.com/security/CVE-2021-45095
- https://ubuntu.com/security/CVE-2021-3679
- https://ubuntu.com/security/CVE-2020-36322
- https://ubuntu.com/security/CVE-2019-19449
- https://ubuntu.com/security/CVE-2021-45485
- https://ubuntu.com/security/CVE-2020-26555
- https://ubuntu.com/security/CVE-2021-28972
- https://ubuntu.com/security/CVE-2021-23134
- https://ubuntu.com/security/CVE-2021-32399
- https://ubuntu.com/security/CVE-2021-3506
- https://ubuntu.com/security/CVE-2021-3483
- https://ubuntu.com/security/CVE-2021-29650

Title: USN-5339-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5339-1
Priorities: high,medium,low
Description:
Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the
Linux kernel did not properly restrict access to the cgroups v1
release_agent feature. A local attacker could use this to gain
administrative privileges. (CVE-2022-0492)

It was discovered that an out-of-bounds (OOB) memory access flaw existed in
the f2fs module of the Linux kernel. A local attacker could use this issue
to cause a denial of service (system crash). (CVE-2021-3506)

Brendan Dolan-Gavitt discovered that the Marvell WiFi-Ex USB device driver
in the Linux kernel did not properly handle some error conditions. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2021-43976)

It was discovered that the ARM Trusted Execution Environment (TEE)
subsystem in the Linux kernel contained a race condition leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service or possibly execute arbitrary code. (CVE-2021-44733)

It was discovered that the Phone Network protocol (PhoNet) implementation
in the Linux kernel did not properly perform reference counting in some
error conditions. A local attacker could possibly use this to cause a
denial of service (memory exhaustion). (CVE-2021-45095)

Samuel Page discovered that the Transparent Inter-Process Communication
(TIPC) protocol implementation in the Linux kernel contained a stack-based
buffer overflow. A remote attacker could use this to cause a denial of
service (system crash) for systems that have a TIPC bearer configured.
(CVE-2022-0435)
CVEs:
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2021-3506
- https://ubuntu.com/security/CVE-2021-43976
- https://ubuntu.com/security/CVE-2021-44733
- https://ubuntu.com/security/CVE-2021-45095
- https://ubuntu.com/security/CVE-2022-0435
- https://ubuntu.com/security/CVE-2022-0435
- https://ubuntu.com/security/CVE-2022-0492
- https://ubuntu.com/security/CVE-2021-43976
- https://ubuntu.com/security/CVE-2021-3506
- https://ubuntu.com/security/CVE-2021-44733
- https://ubuntu.com/security/CVE-2021-45095

456.244

Release Date: March 09, 2022

Known Iissues

  • There are currently reported issues with this stemcell and TAS Diego Cells. We have removed this stemcell until we can resolve the issue. If you need access, please contact support.

Metadata:

BOSH Agent Version: 2.234.51

USNs:


Title: USN-5300-1: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5300-1
Priorities: low,medium
Description:
It was discovered that PHP incorrectly handled certain scripts.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2015-9253, CVE-2017-8923, CVE-2017-9118, CVE-2017-9120)

It was discovered that PHP incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service,
or possibly obtain sensitive information. (CVE-2017-9119)

It was discovered that PHP incorrectly handled certain scripts with XML
parsing functions.
An attacker could possibly use this issue to obtain sensitive information.
(CVE-2021-21707)
CVEs:
- https://ubuntu.com/security/CVE-2015-9253
- https://ubuntu.com/security/CVE-2017-8923
- https://ubuntu.com/security/CVE-2017-9118
- https://ubuntu.com/security/CVE-2017-9120
- https://ubuntu.com/security/CVE-2017-9119
- https://ubuntu.com/security/CVE-2021-21707
- https://ubuntu.com/security/CVE-2017-8923
- https://ubuntu.com/security/CVE-2017-9118
- https://ubuntu.com/security/CVE-2017-9120
- https://ubuntu.com/security/CVE-2015-9253
- https://ubuntu.com/security/CVE-2017-9119
- https://ubuntu.com/security/CVE-2021-21707

Title: USN-5299-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5299-1
Priorities: medium,low
Description:
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could
reassemble mixed encrypted and plaintext fragments. A physically proximate
attacker could possibly use this issue to inject packets or exfiltrate
selected fragments. (CVE-2020-26147)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly perform access control. An authenticated attacker could possibly
use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)

It was discovered that the RPA PCI Hotplug driver implementation in the
Linux kernel did not properly handle device name writes via sysfs, leading
to a buffer overflow. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2021-28972)

It was discovered that a use-after-free existed in the Bluetooth HCI driver
of the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33034)

Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol
implementation in the Linux kernel did not properly initialize memory in
some situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2021-34693)

马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-3483)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device initialization failure, leading to a double-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3564)

Murray McAllister discovered that the joystick device interface in the
Linux kernel did not properly validate data passed via an ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code on systems with a joystick device
registered. (CVE-2021-3612)

It was discovered that the tracing subsystem in the Linux kernel did not
properly keep track of per-cpu ring buffer state. A privileged attacker
could use this to cause a denial of service. (CVE-2021-3679)

It was discovered that the MAX-3421 host USB device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2021-38204)

It was discovered that the 6pack network protocol driver in the Linux
kernel did not properly perform validation checks. A privileged attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2021-42008)

Amit Klein discovered that the IPv6 implementation in the Linux kernel
could disclose internal state in some situations. An attacker could
possibly use this to expose sensitive information. (CVE-2021-45485)
CVEs:
- https://ubuntu.com/security/CVE-2020-26147
- https://ubuntu.com/security/CVE-2020-26558
- https://ubuntu.com/security/CVE-2021-0129
- https://ubuntu.com/security/CVE-2021-28972
- https://ubuntu.com/security/CVE-2021-33034
- https://ubuntu.com/security/CVE-2021-34693
- https://ubuntu.com/security/CVE-2021-3483
- https://ubuntu.com/security/CVE-2021-3564
- https://ubuntu.com/security/CVE-2021-3612
- https://ubuntu.com/security/CVE-2021-3679
- https://ubuntu.com/security/CVE-2021-38204
- https://ubuntu.com/security/CVE-2021-42008
- https://ubuntu.com/security/CVE-2021-45485
- https://ubuntu.com/security/CVE-2020-26558
- https://ubuntu.com/security/CVE-2021-3564
- https://ubuntu.com/security/CVE-2021-34693
- https://ubuntu.com/security/CVE-2021-3483
- https://ubuntu.com/security/CVE-2020-26147
- https://ubuntu.com/security/CVE-2021-28972
- https://ubuntu.com/security/CVE-2021-33034
- https://ubuntu.com/security/CVE-2021-42008
- https://ubuntu.com/security/CVE-2021-45485
- https://ubuntu.com/security/CVE-2021-38204
- https://ubuntu.com/security/CVE-2021-0129
- https://ubuntu.com/security/CVE-2021-3679
- https://ubuntu.com/security/CVE-2021-3612

Title: USN-5298-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5298-1
Priorities: medium,low
Description:
It was discovered that the Packet network protocol implementation in the
Linux kernel contained a double-free vulnerability. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2021-22600)

Jürgen Groß discovered that the Xen subsystem within the Linux kernel did
not adequately limit the number of events driver domains (unprivileged PV
backends) could send to other guest VMs. An attacker in a driver domain
could use this to cause a denial of service in other guest VMs.
(CVE-2021-28711, CVE-2021-28712, CVE-2021-28713)

Jürgen Groß discovered that the Xen network backend driver in the Linux
kernel did not adequately limit the amount of queued packets when a guest
did not process them. An attacker in a guest VM can use this to cause a
denial of service (excessive kernel memory consumption) in the network
backend domain. (CVE-2021-28714, CVE-2021-28715)

Szymon Heidrich discovered that the USB Gadget subsystem in the Linux
kernel did not properly restrict the size of control requests for certain
gadget types, leading to possible out of bounds reads or writes. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-39685)

Jann Horn discovered a race condition in the Unix domain socket
implementation in the Linux kernel that could result in a read-after-free.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-4083)

Kirill Tkhai discovered that the XFS file system implementation in the
Linux kernel did not calculate size correctly when pre-allocating space in
some situations. A local attacker could use this to expose sensitive
information. (CVE-2021-4155)

Lin Ma discovered that the NFC Controller Interface (NCI) implementation in
the Linux kernel contained a race condition, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-4202)

Sushma Venkatesh Reddy discovered that the Intel i915 graphics driver in
the Linux kernel did not perform a GPU TLB flush in some situations. A
local attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2022-0330)

It was discovered that the VMware Virtual GPU driver in the Linux kernel
did not properly handle certain failure conditions, leading to a stale
entry in the file descriptor table. A local attacker could use this to
expose sensitive information or possibly gain administrative privileges.
(CVE-2022-22942)
CVEs:
- https://ubuntu.com/security/CVE-2021-22600
- https://ubuntu.com/security/CVE-2021-28711
- https://ubuntu.com/security/CVE-2021-28712
- https://ubuntu.com/security/CVE-2021-28713
- https://ubuntu.com/security/CVE-2021-28714
- https://ubuntu.com/security/CVE-2021-28715
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2021-4083
- https://ubuntu.com/security/CVE-2021-4155
- https://ubuntu.com/security/CVE-2021-4202
- https://ubuntu.com/security/CVE-2022-0330
- https://ubuntu.com/security/CVE-2022-22942
- https://ubuntu.com/security/CVE-2021-39685
- https://ubuntu.com/security/CVE-2021-28715
- https://ubuntu.com/security/CVE-2021-28711
- https://ubuntu.com/security/CVE-2021-4083
- https://ubuntu.com/security/CVE-2021-28713
- https://ubuntu.com/security/CVE-2022-0330
- https://ubuntu.com/security/CVE-2021-28712
- https://ubuntu.com/security/CVE-2021-28714
- https://ubuntu.com/security/CVE-2021-22600
- https://ubuntu.com/security/CVE-2022-22942
- https://ubuntu.com/security/CVE-2021-4155
- https://ubuntu.com/security/CVE-2021-4202

Title: USN-5292-4: snapd regression
URL: https://ubuntu.com/security/notices/USN-5292-4
Priorities: medium,high
Description:
USN-5292-1 fixed a vulnerability in snapd. Unfortunately that update introduced
a regression that could break the fish shell. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

James Troup discovered that snap did not properly manage the permissions for
the snap directories. A local attacker could possibly use this issue to expose
sensitive information. (CVE-2021-3155)

Ian Johnson discovered that snapd did not properly validate content interfaces
and layout paths. A local attacker could possibly use this issue to inject
arbitrary AppArmor policy rules, resulting in a bypass of intended access
restrictions. (CVE-2021-4120)

The Qualys Research Team discovered that snapd did not properly validate the
location of the snap-confine binary. A local attacker could possibly use this
issue to execute other arbitrary binaries and escalate privileges.
(CVE-2021-44730)

The Qualys Research Team discovered that a race condition existed in the snapd
snap-confine binary when preparing a private mount namespace for a snap. A
local attacker could possibly use this issue to escalate privileges and
execute arbitrary code. (CVE-2021-44731)
CVEs:
- https://ubuntu.com/security/CVE-2021-3155
- https://ubuntu.com/security/CVE-2021-4120
- https://ubuntu.com/security/CVE-2021-44730
- https://ubuntu.com/security/CVE-2021-44731

Title: USN-5310-2: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5310-2
Priorities: medium,low
Description:
USN-5310-1 fixed several vulnerabilities in GNU. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that the GNU C library getcwd function incorrectly
handled buffers. An attacker could use this issue to cause the GNU C
Library to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-3999)

It was discovered that the GNU C Library sunrpc module incorrectly handled
buffer lengths. An attacker could possibly use this issue to cause the GNU
C Library to crash, resulting in a denial of service. (CVE-2022-23218,
CVE-2022-23219)
CVEs:
- https://ubuntu.com/security/CVE-2021-3999
- https://ubuntu.com/security/CVE-2022-23218
- https://ubuntu.com/security/CVE-2022-23219
- https://ubuntu.com/security/CVE-2022-23218
- https://ubuntu.com/security/CVE-2021-3999
- https://ubuntu.com/security/CVE-2022-23219

Title: USN-5319-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5319-1
Priorities: high
Description:
Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, and Cristiano
Giuffrida discovered that hardware mitigations added by Intel to their
processors to address Spectre-BTI were insufficient. A local attacker could
potentially use this to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2022-0001
- https://ubuntu.com/security/CVE-2022-0002

Title: USN-5301-2: Cyrus SASL vulnerability
URL: https://ubuntu.com/security/notices/USN-5301-2
Priorities: high
Description:
USN-5301-1 fixed a vulnerability in Cyrus. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that the Cyrus SASL SQL plugin incorrectly handled SQL
input. A remote attacker could use this issue to execute arbitrary SQL
commands.
CVEs:
- https://ubuntu.com/security/CVE-2022-24407

456.239

Available in the Broadcom Support portal

Release Date: February 21, 2022

Metadata:

BOSH Agent Version: 2.234.49

USNs:


Title: USN-5264-1: Graphviz vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5264-1
Priorities: low,medium
Description:
It was discovered that graphviz contains null pointer dereference
vulnerabilities. Exploitation via a specially crafted input file
can cause a denial of service.
(CVE-2018-10196, CVE-2019-11023)

It was discovered that graphviz contains a buffer overflow
vulnerability. Exploitation via a specially crafted input file can cause
a denial of service or possibly allow for arbitrary code execution.
(CVE-2020-18032)
CVEs:
- https://ubuntu.com/security/CVE-2018-10196
- https://ubuntu.com/security/CVE-2019-11023
- https://ubuntu.com/security/CVE-2020-18032
- https://ubuntu.com/security/CVE-2018-10196
- https://ubuntu.com/security/CVE-2020-18032
- https://ubuntu.com/security/CVE-2019-11023

Title: USN-5262-1: GPT fdisk vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5262-1
Priorities: low
Description:
The potential for an out of bounds write due to a missing bounds
check was discovered to impact the sgdisk utility of GPT fdisk.
Exploitation requires the use of a maliciously formatted storage
device and could cause sgdisk to crash as well as possibly
allow for local privilege escalation.
CVEs:
- https://ubuntu.com/security/CVE-2020-0256
- https://ubuntu.com/security/CVE-2021-0308

Title: USN-5280-1: Speex vulnerability
URL: https://ubuntu.com/security/notices/USN-5280-1
Priorities: medium
Description:
It was discovered that Speex incorrectly handled certain WAV files.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-23903

Title: USN-5292-3: snapd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5292-3
Priorities: medium,high
Description:
USN-5292-1 fixed several vulnerabilities in snapd. This update provides the
corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

James Troup discovered that snap did not properly manage the permissions for
the snap directories. A local attacker could possibly use this issue to expose
sensitive information. (CVE-2021-3155)

Ian Johnson discovered that snapd did not properly validate content interfaces
and layout paths. A local attacker could possibly use this issue to inject
arbitrary AppArmor policy rules, resulting in a bypass of intended access
restrictions. (CVE-2021-4120)

The Qualys Research Team discovered that snapd did not properly validate the
location of the snap-confine binary. A local attacker could possibly use this
issue to execute other arbitrary binaries and escalate privileges.
(CVE-2021-44730)

The Qualys Research Team discovered that a race condition existed in the snapd
snap-confine binary when preparing a private mount namespace for a snap. A
local attacker could possibly use this issue to escalate privileges and
execute arbitrary code. (CVE-2021-44731)
CVEs:
- https://ubuntu.com/security/CVE-2021-3155
- https://ubuntu.com/security/CVE-2021-4120
- https://ubuntu.com/security/CVE-2021-44730
- https://ubuntu.com/security/CVE-2021-44731
- https://ubuntu.com/security/CVE-2021-3155
- https://ubuntu.com/security/CVE-2021-4120
- https://ubuntu.com/security/CVE-2021-44730
- https://ubuntu.com/security/CVE-2021-44731

Title: USN-5275-1: BlueZ vulnerability
URL: https://ubuntu.com/security/notices/USN-5275-1
Priorities: medium
Description:
Ziming Zhang discovered that BlueZ incorrectly handled memory write operations
in its gatt server. A remote attacker could possibly use this to cause BlueZ to
crash leading to a denial of service, or potentially remotely execute code.
(CVE-2022-0204)
CVEs:
- https://ubuntu.com/security/CVE-2022-0204
- https://ubuntu.com/security/CVE-2022-0204

Title: USN-5269-2: Django vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5269-2
Priorities: medium
Description:
USN-5269-1 fixed several vulnerabilities in Django. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Keryn Knight discovered that Django incorrectly handled certain template
tags. A remote attacker could possibly use this issue to perform a
cross-site scripting attack. (CVE-2022-22818)

Alan Ryan discovered that Django incorrectly handled file uploads. A remote
attacker could possibly use this issue to cause Django to hang, resulting
in a denial of service. (CVE-2022-23833)
CVEs:
- https://ubuntu.com/security/CVE-2022-22818
- https://ubuntu.com/security/CVE-2022-23833
- https://ubuntu.com/security/CVE-2022-22818
- https://ubuntu.com/security/CVE-2022-23833

456.236

Available in the Broadcom Support portal

Release Date: February 10, 2022

Metadata:

BOSH Agent Version: 2.234.47

USNs:


Title: USN-5254-1: shadow vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5254-1
Priorities: low
Description:
It was discovered that shadow incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or
expose sensitive information. This issue only affected
Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. (CVE-2017-12424)

It was discovered that shadow incorrectly handled certain inputs.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2018-7169)
CVEs:
- https://ubuntu.com/security/CVE-2017-12424
- https://ubuntu.com/security/CVE-2018-7169
- https://ubuntu.com/security/CVE-2018-7169
- https://ubuntu.com/security/CVE-2017-12424

Title: USN-5259-1: Cron vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5259-1
Priorities: low
Description:
It was discovered that the postinst maintainer script in Cron unsafely
handled file permissions during package install or update operations.
An attacker could possibly use this issue to perform a privilege
escalation attack. (CVE-2017-9525)

Florian Weimer discovered that Cron incorrectly handled certain memory
operations during crontab file creation. An attacker could possibly use
this issue to cause a denial of service. (CVE-2019-9704)

It was discovered that Cron incorrectly handled user input during crontab
file creation. An attacker could possibly use this issue to cause a denial
of service. (CVE-2019-9705)

It was discovered that Cron contained a use-after-free vulnerability in
its force_rescan_user function. An attacker could possibly use this issue
to cause a denial of service. (CVE-2019-9706)
CVEs:
- https://ubuntu.com/security/CVE-2017-9525
- https://ubuntu.com/security/CVE-2019-9704
- https://ubuntu.com/security/CVE-2019-9705
- https://ubuntu.com/security/CVE-2019-9706
- https://ubuntu.com/security/CVE-2019-9704
- https://ubuntu.com/security/CVE-2019-9705
- https://ubuntu.com/security/CVE-2019-9706
- https://ubuntu.com/security/CVE-2017-9525

Title: USN-5234-1: Byobu vulnerability
URL: https://ubuntu.com/security/notices/USN-5234-1
Priorities: low
Description:
Sander Bos discovered that Byobu incorrectly handled certain Apport data.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://ubuntu.com/security/CVE-2019-7306

Title: USN-5244-1: DBus vulnerability
URL: https://ubuntu.com/security/notices/USN-5244-1
Priorities: low
Description:
Daniel Onaca discovered that DBus contained a use-after-free vulnerability,
caused by the incorrect handling of usernames sharing the same UID. An
attacker could possibly use this issue to cause DBus to crash, resulting
in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2020-35512

Title: USN-5268-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5268-1
Priorities: medium
Description:
Keyu Man discovered that the ICMP implementation in the Linux kernel did
not properly handle received ICMP error packets. A remote attacker could
use this to facilitate attacks on UDP based services that depend on source
port randomization. (CVE-2021-20322)

It was discovered that the Bluetooth subsystem in the Linux kernel
contained a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2021-3640)

Likang Luo discovered that a race condition existed in the Bluetooth
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2021-3752)

Luo Likang discovered that the FireDTV Firewire driver in the Linux kernel
did not properly perform bounds checking in some situations. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2021-42739)
CVEs:
- https://ubuntu.com/security/CVE-2021-20322
- https://ubuntu.com/security/CVE-2021-3640
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2021-42739
- https://ubuntu.com/security/CVE-2021-3752
- https://ubuntu.com/security/CVE-2021-20322
- https://ubuntu.com/security/CVE-2021-3640
- https://ubuntu.com/security/CVE-2021-42739

Title: USN-5021-2: curl vulnerability
URL: https://ubuntu.com/security/notices/USN-5021-2
Priorities: low,medium
Description:
USN-5021-1 fixed vulnerabilities in curl. This update provides
the corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

Harry Sintonen and Tomas Hoger discovered that curl incorrectly handled
TELNET connections when the -t option was used on the command line.
Uninitialized data possibly containing sensitive information could be sent
to the remote server, contrary to expectations. (CVE-2021-22898,
CVE-2021-22925)
CVEs:
- https://ubuntu.com/security/CVE-2021-22898
- https://ubuntu.com/security/CVE-2021-22925
- https://ubuntu.com/security/CVE-2021-22898
- https://ubuntu.com/security/CVE-2021-22925

Title: USN-5064-2: GNU cpio vulnerability
URL: https://ubuntu.com/security/notices/USN-5064-2
Priorities: medium
Description:
USN-5064-1 fixed vulnerabilities in GNU cpio. This update provides
the corresponding updates for Ubuntu 16.04 ESM.

Original advisory details:

Maverick Chung and Qiaoyi Fang discovered that cpio incorrectly handled
certain pattern files. A remote attacker could use this issue to cause cpio
to crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://ubuntu.com/security/CVE-2021-38185

Title: USN-5193-2: X.Org X Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5193-2
Priorities: medium
Description:
USN-5193-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain inputs. An attacker could use this issue to cause the server to
crash, resulting in a denial of service, or possibly execute arbitrary
code and escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2021-4009
- https://ubuntu.com/security/CVE-2021-4008
- https://ubuntu.com/security/CVE-2021-4011

Title: USN-5252-2: PolicyKit vulnerability
URL: https://ubuntu.com/security/notices/USN-5252-2
Priorities: high
Description:
USN-5252-1 fixed a vulnerability in policykit-1. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that the PolicyKit pkexec tool incorrectly handled
command-line arguments. A local attacker could use this issue to escalate
privileges to an administrator.
CVEs:
- https://ubuntu.com/security/CVE-2021-4034

Title: USN-5235-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5235-1
Priorities: medium
Description:
It was discovered that Ruby incorrectly handled certain HTML files.
An attacker could possibly use this issue to cause a crash. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 21.04, and Ubuntu 21.10.
(CVE-2021-41816)

It was discovered that Ruby incorrectly handled certain regular expressions.
An attacker could possibly use this issue to cause a regular expression
denial of service. (CVE-2021-41817)

It was discovered that Ruby incorrectly handled certain cookie names.
An attacker could possibly use this issue to access or expose
sensitive information. (CVE-2021-41819)
CVEs:
- https://ubuntu.com/security/CVE-2021-41816
- https://ubuntu.com/security/CVE-2021-41817
- https://ubuntu.com/security/CVE-2021-41819
- https://ubuntu.com/security/CVE-2021-41816
- https://ubuntu.com/security/CVE-2021-41819
- https://ubuntu.com/security/CVE-2021-41817

Title: USN-5260-3: Samba vulnerability
URL: https://ubuntu.com/security/notices/USN-5260-3
Priorities: high
Description:
USN-5260-1 fixed a vulnerability in Samba. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Orange Tsai discovered that the Samba vfs_fruit module incorrectly handled
certain memory operations. A remote attacker could use this issue to cause
Samba to crash, resulting in a denial of service, or possibly execute
arbitrary code as root. (CVE-2021-44142)
CVEs:
- https://ubuntu.com/security/CVE-2021-44142
- https://ubuntu.com/security/CVE-2021-44142

Title: USN-5250-2: strongSwan vulnerability
URL: https://ubuntu.com/security/notices/USN-5250-2
Priorities: medium
Description:
USN-5250-1 fixed a vulnerability in strongSwan. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Zhuowei Zhang discovered that stringSwan incorrectly handled EAP
authentication. A remote attacker could use this issue to cause strongSwan
to crash, resulting in a denial of service, or possibly bypass client and
server authentication.
CVEs:
- https://ubuntu.com/security/CVE-2021-45079

Title: USN-5243-2: AIDE vulnerability
URL: https://ubuntu.com/security/notices/USN-5243-2
Priorities: medium
Description:
USN-5243-1 fixed a vulnerability in aide. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.


Original advisory details:

David Bouman discovered that AIDE incorrectly handled base64 operations. A
local attacker could use this issue to cause AIDE to crash, resulting in a
denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-45417

Title: USN-5233-2: ClamAV vulnerability
URL: https://ubuntu.com/security/notices/USN-5233-2
Priorities: medium
Description:
USN-5233-1 fixed a vulnerability in ClamAV. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that ClamAV incorrectly handled memory when the
CL_SCAN_GENERAL_COLLECT_METADATA scan option was enabled. A remote attacker
could possibly use this issue to cause ClamAV to crash, resulting in a
denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2022-20698

Title: USN-5270-2: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5270-2
Priorities: medium
Description:
USN-5270-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 5.7.37 in Ubuntu 16.04 ESM.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-37.html
https://www.oracle.com/security-alerts/cpujan2022.html
CVEs:
- https://ubuntu.com/security/CVE-2022-21304
- https://ubuntu.com/security/CVE-2022-21344
- https://ubuntu.com/security/CVE-2022-21367
- https://ubuntu.com/security/CVE-2022-21303
- https://ubuntu.com/security/CVE-2022-21270
- https://ubuntu.com/security/CVE-2022-21245

456.227

Available in the Broadcom Support portal

Release Date: January 18, 2022

Fixes

Fixes an issue that caused the bosh-agent to continually fail to start when either the cgroup v1 memory controller or the cgroup v2 controller was mounted in more than one location on the file system.

Metadata:

BOSH Agent Version: 2.234.42

USNs:


Title: USN-5225-1: lxml vulnerability
URL: https://ubuntu.com/security/notices/USN-5225-1
Priorities: medium
Description:
It was discovered that lxml incorrectly handled certain XML and HTML files.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-43818

Title: USN-5212-2: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5212-2
Priorities: medium
Description:
USN-5212-1 fixed several vulnerabilities in Apache. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that the Apache HTTP Server incorrectly handled certain
forward proxy requests. A remote attacker could use this issue to cause
the server to crash, resulting in a denial of service, or possibly perform
a Server Side Request Forgery attack. (CVE-2021-44224)

It was discovered that the Apache HTTP Server Lua module incorrectly
handled memory in the multipart parser. A remote attacker could use this
issue to cause the server to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2021-44790)
CVEs:
- https://ubuntu.com/security/CVE-2021-44224
- https://ubuntu.com/security/CVE-2021-44790
- https://ubuntu.com/security/CVE-2021-44790
- https://ubuntu.com/security/CVE-2021-44224

456.224

Available in the Broadcom Support portal

Release Date: January 07, 2022

Metadata:

BOSH Agent Version: 2.234.39

USNs:


Title: LSN-0083-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0083-1
Priorities: medium,high
Description:
The BPF subsystem in the Linux kernel before 4.17 mishandles
situations with a long jump over an instruction sequence where inner
instructions require substantial expansions into multiple BPF instructions,
leading to an overflow. This affects kernel/bpf/core.c and
net/core/filter.c.(CVE-2018-25020)

Maxim Levitsky discovered that the KVM hypervisor implementation for AMD
processors in the Linux kernel did not properly prevent a guest VM from
enabling AVIC in nested guest VMs. An attacker in a guest VM could use this
to write to portions of the host’s physical memory.(CVE-2021-3653)

Nadav Amit discovered that the hugetlb implementation in the Linux kernel
did not perform TLB flushes under certain conditions. A local attacker
could use this to leak or alter data from other processes that use huge
pages.(CVE-2021-4002)

Andy Nguyen discovered that the netfilter subsystem in the Linux kernel
contained an out-of-bounds write in its setsockopt() implementation. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-22555)

It was discovered that the virtual file system implementation in the Linux
kernel contained an unsigned to signed integer conversion error. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code.(CVE-2021-33909)
CVEs:
- https://ubuntu.com/security/CVE-2018-25020
- https://ubuntu.com/security/CVE-2021-3653
- https://ubuntu.com/security/CVE-2021-4002
- https://ubuntu.com/security/CVE-2021-22555
- https://ubuntu.com/security/CVE-2021-33909
- https://ubuntu.com/security/CVE-2021-33909
- https://ubuntu.com/security/CVE-2018-25020
- https://ubuntu.com/security/CVE-2021-4002
- https://ubuntu.com/security/CVE-2021-22555
- https://ubuntu.com/security/CVE-2021-3653

Title: USN-5211-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5211-1
Priorities: high
Description:
Nadav Amit discovered that the hugetlb implementation in the Linux kernel
did not perform TLB flushes under certain conditions. A local attacker
could use this to leak or alter data from other processes that use huge
pages.
CVEs:
- https://ubuntu.com/security/CVE-2021-4002

Title: USN-5209-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5209-1
Priorities: high,low,medium
Description:
Nadav Amit discovered that the hugetlb implementation in the Linux kernel
did not perform TLB flushes under certain conditions. A local attacker
could use this to leak or alter data from other processes that use huge
pages. (CVE-2021-4002)

It was discovered that a race condition existed in the timer implementation
in the Linux kernel. A privileged attacker could use this cause a denial of
service. (CVE-2021-20317)

It was discovered that a race condition existed in the overlay file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2021-20321)

It was discovered that the NFC subsystem in the Linux kernel contained a
use-after-free vulnerability in its NFC Controller Interface (NCI)
implementation. A local attacker could possibly use this to cause a denial
of service (system crash) or execute arbitrary code. (CVE-2021-3760)

It was discovered that an integer overflow could be triggered in the eBPF
implementation in the Linux kernel when preallocating objects for stack
maps. A privileged local attacker could use this to cause a denial of
service or possibly execute arbitrary code. (CVE-2021-41864)

It was discovered that the ISDN CAPI implementation in the Linux kernel
contained a race condition in certain situations that could trigger an
array out-of-bounds bug. A privileged local attacker could possibly use
this to cause a denial of service or execute arbitrary code.
(CVE-2021-43389)
CVEs:
- https://ubuntu.com/security/CVE-2021-4002
- https://ubuntu.com/security/CVE-2021-20317
- https://ubuntu.com/security/CVE-2021-20321
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2021-41864
- https://ubuntu.com/security/CVE-2021-43389
- https://ubuntu.com/security/CVE-2021-4002
- https://ubuntu.com/security/CVE-2021-43389
- https://ubuntu.com/security/CVE-2021-20321
- https://ubuntu.com/security/CVE-2021-3760
- https://ubuntu.com/security/CVE-2021-41864
- https://ubuntu.com/security/CVE-2021-20317

456.220

Available in the Broadcom Support portal

Release Date: December 17, 2021

Fixes

  • This release reverts the NATS firewall enhancement added in 456.213. Changes associated with this feature caused VMs to report a networking failed state and prevented monit firewall rules from being applied. The NATS firewall enhancement will be reintroduced in a future release.

Metadata:

BOSH Agent Version: 2.234.37

USNs:


Title: USN-5202-1: OpenJDK vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5202-1
Priorities: medium
Description:
Varnavas Papaioannou discovered that the FTP client implementation in
OpenJDK accepted alternate server IP addresses when connecting with FTP
passive mode. An attacker controlling an FTP server that an application
connects to could possibly use this to expose sensitive information
(rudimentary port scans). This issue only affected Ubuntu 16.04 ESM,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 21.04. (CVE-2021-2341)

Markus Loewe discovered that OpenJDK did not properly handle JAR files
containing multiple manifest files. An attacker could possibly use
this to bypass JAR signature verification. This issue only affected
Ubuntu 16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu
21.04. (CVE-2021-2369)

Huixin Ma discovered that the Hotspot VM in OpenJDK did not properly
perform range check elimination in some situations. An attacker could
possibly use this to construct a Java class that could bypass Java
sandbox restrictions. This issue only affected Ubuntu 16.04 ESM,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 21.04. (CVE-2021-2388)

Asaf Greenholts discovered that OpenJDK preferred certain weak ciphers by
default. An attacker could possibly use this to expose sensitive
information. (CVE-2021-35550)

It was discovered that the Rich Text Format (RTF) Parser in OpenJDK did not
properly restrict the amount of memory allocated in some situations. An
attacker could use this to specially craft an RTF file that caused a denial
of service. (CVE-2021-35556)

It was discovered that the Rich Text Format (RTF) Reader in OpenJDK did not
properly restrict the amount of memory allocated in some situations. An
attacker could use this to specially craft an RTF file that caused a denial
of service. (CVE-2021-35559)

Markus Loewe discovered that the HashMap and HashSet implementations in
OpenJDK did not properly validate load factors during deserialization. An
attacker could use this to cause a denial of service (excessive memory
consumption). (CVE-2021-35561)

It was discovered that the Keytool component in OpenJDK did not properly
handle certificates with validity ending dates in the far future. An
attacker could use this to specially craft a certificate that when imported
could corrupt a keystore. (CVE-2021-35564)

Tristen Hayfield discovered that the HTTP server implementation in OpenJDK
did not properly handle TLS session close in some situations. A remote
attacker could possibly use this to cause a denial of service (application
infinite loop). (CVE-2021-35565)

Chuck Hunley discovered that the Kerberos implementation in OpenJDK did not
correctly report subject principals when using Kerberos Constrained
Delegation. An attacker could possibly use this to cause incorrect Kerberos
tickets to be used. (CVE-2021-35567)

it was discovered that the TLS implementation in OpenJDK did not properly
handle TLS handshakes in certain situations where a Java application is
acting as a TLS server. A remote attacker could possibly use this to cause
a denial of service (application crash). (CVE-2021-35578)

it was discovered that OpenJDK did not properly restrict the amount of
memory allocated when processing BMP images. An attacker could use this to
specially craft a BMP image file that could cause a denial of service.
(CVE-2021-35586)

It was discovered that the HotSpot VM in OpenJDK 8 did not properly perform
validation of inner class index values in some situations. An attacker
could use this to specially craft a class file that when loaded could cause
a denial of service (Java VM crash). (CVE-2021-35588)

Artem Smotrakov discovered that the TLS implementation in OpenJDK used non-
constant time comparisons during TLS handshakes. A remote attacker could
use this to expose sensitive information. (CVE-2021-35603)
CVEs:
- https://ubuntu.com/security/CVE-2021-2341
- https://ubuntu.com/security/CVE-2021-2369
- https://ubuntu.com/security/CVE-2021-2388
- https://ubuntu.com/security/CVE-2021-35550
- https://ubuntu.com/security/CVE-2021-35556
- https://ubuntu.com/security/CVE-2021-35559
- https://ubuntu.com/security/CVE-2021-35561
- https://ubuntu.com/security/CVE-2021-35564
- https://ubuntu.com/security/CVE-2021-35565
- https://ubuntu.com/security/CVE-2021-35567
- https://ubuntu.com/security/CVE-2021-35578
- https://ubuntu.com/security/CVE-2021-35586
- https://ubuntu.com/security/CVE-2021-35588
- https://ubuntu.com/security/CVE-2021-35603
- https://ubuntu.com/security/CVE-2021-35556
- https://ubuntu.com/security/CVE-2021-35561
- https://ubuntu.com/security/CVE-2021-35588
- https://ubuntu.com/security/CVE-2021-35578
- https://ubuntu.com/security/CVE-2021-2341
- https://ubuntu.com/security/CVE-2021-35564
- https://ubuntu.com/security/CVE-2021-35603
- https://ubuntu.com/security/CVE-2021-35559
- https://ubuntu.com/security/CVE-2021-35586
- https://ubuntu.com/security/CVE-2021-35550
- https://ubuntu.com/security/CVE-2021-35567
- https://ubuntu.com/security/CVE-2021-2369
- https://ubuntu.com/security/CVE-2021-35565
- https://ubuntu.com/security/CVE-2021-2388

Title: USN-5189-1: GLib vulnerability
URL: https://ubuntu.com/security/notices/USN-5189-1
Priorities: medium
Description:
It was discovered that GLib incorrectly handled certain environment variables.
An attacker could possibly use this issue to escalate privileges.
CVEs:
- https://ubuntu.com/security/CVE-2021-3800

Title: USN-5168-4: NSS regression
URL: https://ubuntu.com/security/notices/USN-5168-4
Priorities: high
Description:
USN-5168-3 fixed a vulnerability in NSS. Unfortunately that update introduced
a regression that could break SSL connections. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Tavis Ormandy discovered that NSS incorrectly handled verifying DSA/RSA-PSS
signatures. A remote attacker could use this issue to cause NSS to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-43527

Title: USN-5192-2: Apache Log4j 2 vulnerability
URL: https://ubuntu.com/security/notices/USN-5192-2
Priorities: high
Description:
USN-5192-1 fixed a vulnerability in Apache Log4j 2. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Chen Zhaojun discovered that Apache Log4j 2 allows remote attackers to run
programs via a special crafted input. An attacker could use this vulnerability
to cause a denial of service or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-44228

456.213

Available in the Broadcom Support portal

Release Date: December 06, 2021

Enhancements

  • Added firewall rules to restrict access to the NATS message bus except by the bosh agent. This provides an additional layer of security so even if an attacker is able to gain access to the NATS credentials, they would be unable to use those from a workload on a Bosh deployed VM. If you are attempting to debug NATS connectivity problems by directly connecting to the Bosh NATS server, you will need additional access; instructions can be found here.

Known Issue:

Errors are present in the networking service post-start scripts for all BOSH-managed VMs which:

* Causes networking service to report a failed state
* Incorrectly allows external connections to the monit service
* Incorrectly allows external connections to the NATS service

Metadata:

BOSH Agent Version: 2.234.35

USNs:


Title: USN-5147-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5147-1
Priorities: low,medium
Description:
It was discovered that Vim incorrectly handled permissions on the .swp
file. A local attacker could possibly use this issue to obtain sensitive
information. This issue only affected Ubuntu 14.04 ESM. (CVE-2017-17087)

It was discovered that Vim incorrectly handled restricted mode. A local
attacker could possibly use this issue to bypass restricted mode and
execute arbitrary commands. Note: This update only makes executing shell
commands more difficult. Restricted mode should not be considered a
complete security measure. This issue only affected Ubuntu 14.04 ESM.
(CVE-2019-20807)

Brian Carpenter discovered that vim incorrectly handled memory
when opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. This issue only affected
Ubuntu 20.04 LTS, Ubuntu 21.04 and Ubuntu 21.10. (CVE-2021-3872)

It was discovered that vim incorrectly handled memory when
opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. (CVE-2021-3903)

It was discovered that vim incorrectly handled memory when
opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. (CVE-2021-3927)

It was discovered that vim incorrectly handled memory when
opening certain files. If a user was tricked into opening
a specially crafted file, a remote attacker could crash the
application, leading to a denial of service, or possible execute
arbitrary code with user privileges. (CVE-2021-3928)
CVEs:
- https://ubuntu.com/security/CVE-2017-17087
- https://ubuntu.com/security/CVE-2019-20807
- https://ubuntu.com/security/CVE-2021-3872
- https://ubuntu.com/security/CVE-2021-3903
- https://ubuntu.com/security/CVE-2021-3927
- https://ubuntu.com/security/CVE-2021-3928
- https://ubuntu.com/security/CVE-2021-3928
- https://ubuntu.com/security/CVE-2021-3927
- https://ubuntu.com/security/CVE-2017-17087
- https://ubuntu.com/security/CVE-2019-20807
- https://ubuntu.com/security/CVE-2021-3903
- https://ubuntu.com/security/CVE-2021-3872

Title: USN-5158-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5158-1
Priorities: low
Description:
It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service. (CVE-2021-20244)

It was discovered that ImageMagick incorrectly handled certain values
when performing resampling operations. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. (CVE-2021-20246)

It was discovered that ImageMagick incorrectly handled certain values
when processing visual effects based image files. By tricking a user into
opening a specially crafted image file, an attacker could crash the
application causing a denial of service (CVE-2021-20309)

It was discovered that ImageMagick incorrectly handled certain values
when processing thumbnail image data. By tricking a user into opening
a specially crafted image file, an attacker could crash the application
causing a denial of service. (CVE-2021-20312)

It was discovered that ImageMagick incorrectly handled memory cleanup
when performing certain cryptographic operations. Under certain conditions
sensitive cryptographic information could be disclosed. (CVE-2021-20313)
CVEs:
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2021-20313
- https://ubuntu.com/security/CVE-2021-20244
- https://ubuntu.com/security/CVE-2021-20246
- https://ubuntu.com/security/CVE-2021-20309
- https://ubuntu.com/security/CVE-2021-20312
- https://ubuntu.com/security/CVE-2021-20313

Title: USN-5144-1: OpenEXR vulnerability
URL: https://ubuntu.com/security/notices/USN-5144-1
Priorities: medium
Description:
It was discovered that OpenEXR incorrectly handled certain EXR
image files. An attacker could possibly use this issue to cause a crash
or execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-3933

Title: USN-5150-1: OpenEXR vulnerability
URL: https://ubuntu.com/security/notices/USN-5150-1
Priorities: medium
Description:
It was discovered that OpenEXR incorrectly handled certain EXR image files.
An attacker could possibly use this issue to cause a crash.
CVEs:
- https://ubuntu.com/security/CVE-2021-3941

Title: USN-5168-3: NSS vulnerability
URL: https://ubuntu.com/security/notices/USN-5168-3
Priorities: high
Description:
USN-5168-1 fixed a vulnerability in NSS. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Tavis Ormandy discovered that NSS incorrectly handled verifying DSA/RSA-PSS
signatures. A remote attacker could use this issue to cause NSS to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-43527

456.207

Available in the Broadcom Support portal

Release Date: November 11, 2021

Metadata:

BOSH Agent Version: 2.234.31

USNs:


Title: USN-5114-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5114-1
Priorities: medium,low
Description:
It was discovered that a race condition existed in the Atheros Ath9k WiFi
driver in the Linux kernel. An attacker could possibly use this to expose
sensitive information (WiFi network traffic). (CVE-2020-3702)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly compute the access permissions for shadow pages in
some situations. A local attacker could use this to cause a denial of
service. (CVE-2021-38198)

It was discovered that the ext4 file system in the Linux kernel contained a
race condition when writing xattrs to an inode. A local attacker could use
this to cause a denial of service or possibly gain administrative
privileges. (CVE-2021-40490)

It was discovered that the 6pack network protocol driver in the Linux
kernel did not properly perform validation checks. A privileged attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2021-42008)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3702
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-40490
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-38198
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-42008

Title: USN-5119-1: libcaca vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5119-1
Priorities: medium
Description:
It was discovered that libcaca incorrectly handled certain images. An attacker
could possibly use this issue to cause a crash. (CVE-2021-30498, CVE-2021-30499)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-30498
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-30499

Title: USN-5136-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5136-1
Priorities: low,medium
Description:
It was discovered that the f2fs file system in the Linux kernel did not
properly validate metadata in some situations. An attacker could use this
to construct a malicious f2fs image that, when mounted and operated on,
could cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2019-19449)

It was discovered that the FUSE user space file system implementation in
the Linux kernel did not properly handle bad inodes in some situations. A
local attacker could possibly use this to cause a denial of service.
(CVE-2020-36322)

It was discovered that the Infiniband RDMA userspace connection manager
implementation in the Linux kernel contained a race condition leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possible execute arbitrary code.
(CVE-2020-36385)

Ilja Van Sprundel discovered that the SCTP implementation in the Linux
kernel did not properly perform size validations on incoming packets in
some situations. An attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2021-3655)

It was discovered that the Qualcomm IPC Router protocol implementation in
the Linux kernel did not properly validate metadata in some situations. A
local attacker could use this to cause a denial of service (system crash)
or expose sensitive information. (CVE-2021-3743)

It was discovered that the virtual terminal (vt) device implementation in
the Linux kernel contained a race condition in its ioctl handling that led
to an out-of-bounds read vulnerability. A local attacker could possibly use
this to expose sensitive information. (CVE-2021-3753)

It was discovered that the Linux kernel did not properly account for the
memory usage of certain IPC objects. A local attacker could use this to
cause a denial of service (memory exhaustion). (CVE-2021-3759)

Michael Wakabayashi discovered that the NFSv4 client implementation in the
Linux kernel did not properly order connection setup operations. An
attacker controlling a remote NFS server could use this to cause a denial
of service on the client. (CVE-2021-38199)

It was discovered that the Aspeed Low Pin Count (LPC) Bus Controller
implementation in the Linux kernel did not properly perform boundary checks
in some situations, allowing out-of-bounds write access. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. In Ubuntu, this issue only affected systems running
armhf kernels. (CVE-2021-42252)
CVEs:
- https://ubuntu.com/security/CVE-2019-19449
- https://ubuntu.com/security/CVE-2020-36322
- https://ubuntu.com/security/CVE-2020-36385
- https://ubuntu.com/security/CVE-2021-3655
- https://ubuntu.com/security/CVE-2021-3743
- https://ubuntu.com/security/CVE-2021-3753
- https://ubuntu.com/security/CVE-2021-3759
- https://ubuntu.com/security/CVE-2021-38199
- https://ubuntu.com/security/CVE-2021-42252
- https://ubuntu.com/security/CVE-2021-38199
- https://ubuntu.com/security/CVE-2020-36322
- https://ubuntu.com/security/CVE-2021-3759
- https://ubuntu.com/security/CVE-2021-3753
- https://ubuntu.com/security/CVE-2020-36385
- https://ubuntu.com/security/CVE-2019-19449
- https://ubuntu.com/security/CVE-2021-3743
- https://ubuntu.com/security/CVE-2021-42252
- https://ubuntu.com/security/CVE-2021-3655

Title: USN-5133-1: ICU vulnerability
URL: https://ubuntu.com/security/notices/USN-5133-1
Priorities: low
Description:
It was discovered that ICU contains a use after free issue.
An attacker could use this issue to cause a denial of service with crafted input.
CVEs:
- https://ubuntu.com/security/CVE-2020-21913

Title: LSN-0082-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0082-1
Priorities: medium,high
Description:
Jann Horn discovered that the tty subsystem of the Linux kernel did not use
consistent locking in some situations, leading to a read-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information (kernel memory).(CVE-2020-29660)

Jann Horn discovered a race condition in the tty subsystem of the Linux
kernel in the locking for the TIOCSPGRP ioctl(), leading to a use-after-
free vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.(CVE-2020-29661)

De4dCr0w of 360 Alpha Lab discovered that the BPF verifier in the Linux
kernel did not properly handle mod32 destination register truncation when
the source register was known to be 0. A local attacker could use this to
expose sensitive information (kernel memory) or possibly execute arbitrary
code.(CVE-2021-3444)

kernel: use-after-free in route4_change() in
net/sched/cls_route.c(CVE-2021-3715)
CVEs:
- https://ubuntu.com/security/CVE-2020-29660
- https://ubuntu.com/security/CVE-2020-29661
- https://ubuntu.com/security/CVE-2021-3444
- https://ubuntu.com/security/CVE-2021-3715
- https://ubuntu.com/security/CVE-2020-29660
- https://ubuntu.com/security/CVE-2020-29661
- https://ubuntu.com/security/CVE-2021-3715
- https://ubuntu.com/security/CVE-2021-3444

Title: USN-5125-1: PHP vulnerability
URL: https://ubuntu.com/security/notices/USN-5125-1
Priorities: high
Description:
It was discovered that PHP-FPM in PHP incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code.
CVEs:
- https://ubuntu.com/security/CVE-2021-21703

Title: USN-5126-2: Bind vulnerability
URL: https://ubuntu.com/security/notices/USN-5126-2
Priorities: medium
Description:
USN-5126-1 fixed a vulnerability in Bind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Kishore Kumar Kothapalli discovered that Bind incorrectly handled the lame
cache when processing responses. A remote attacker could possibly use this
issue to cause Bind to consume resources, resulting in a denial of service.
CVEs:
- https://ubuntu.com/security/CVE-2021-25219

Title: USN-5123-2: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5123-2
Priorities: medium
Description:
USN-5123-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.27 in Ubuntu 20.04 LTS, Ubuntu 21.04, and
Ubuntu 21.10. Ubuntu 18.04 LTS has been updated to MySQL 5.7.36.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-36.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-27.html
https://www.oracle.com/security-alerts/cpuoct2021.html
CVEs:
- https://ubuntu.com/security/CVE-2021-35624
- https://ubuntu.com/security/CVE-2021-35604

456.202

Available in the Broadcom Support portal

Release Date: October 25, 2021

Metadata:

BOSH Agent Version: 2.234.25
Bosh-agent is now build with Go 1.17

USNs:


Title: USN-5109-1: nginx vulnerability
URL: https://ubuntu.com/security/notices/USN-5109-1
Priorities: medium
Description:
It was discovered that nginx incorrectly handled files with
certain modification dates. A remote attacker could possibly
use this issue to cause a denial of service or other unspecified
impact.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-20005

Title: USN-5022-3: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5022-3
Priorities: medium
Description:
USN-5022-1 fixed several vulnerabilities in MySQL. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to MySQL 5.7.35 on Ubuntu 16.04 ESM.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-35.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-26.html
https://www.oracle.com/security-alerts/cpujul2021.html
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2179
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2162
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2389
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2390
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2194
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2146
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2372
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2342
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2169
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2171
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2180
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2154
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2166
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2226
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2307
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2385

Title: USN-5103-1: docker.io vulnerability
URL: https://ubuntu.com/security/notices/USN-5103-1
Priorities: medium
Description:
Lei Wang and Ruizhi Xiao discovered that the Moby Docker engine in
Docker incorrectly allowed the docker cp command to make permissions
changes in the host filesystem in some situations. A local attacker
could possibly use to this to expose sensitive information or gain
administrative privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-41089

Title: USN-5111-2: strongSwan vulnerability
URL: https://ubuntu.com/security/notices/USN-5111-2
Priorities: medium
Description:
USN-5111-1 fixed a vulnerability in strongSwan. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that strongSwan incorrectly handled replacing
certificates in the cache. A remote attacker could use this issue to cause
strongSwan to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-41991)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-41991

Title: USN-5121-1: Mailman vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5121-1
Priorities: high
Description:
Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman
did not properly associate cross-site request forgery (CSRF) tokens
to specific accounts. A remote attacker could use this to perform a
CSRF attack to gain access to another account. (CVE-2021-42097)

Andre Protas, Richard Cloke, and Andy Nuttall discovered that Mailman’s
cross-site request forgery (CSRF) tokens for the options page are
derived from the admin password. A remote attacker could possibly use
this to assist in performing a brute force attack against the admin
password. (CVE-2021-42096)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-42096
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-42097

456.194

Available in the Broadcom Support portal

Release Date: October 01, 2021

Fixes

Fixes an issue that caused frequent udev events and high CPU usage on Azure VMs.

Metadata:

BOSH Agent Version: 2.234.20

456.188

Available in the Broadcom Support portal

Release Date: September 16, 2021

Fixes

  • Fixes an issue introduced in v456.186 that caused persistent disks to frequently fail to mount.

Metadata:

BOSH Agent Version: 2.234.18

USNs:


Title: USN-5077-2: Apport vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5077-2
Priorities: medium
Description:
USN-5077-1 fixed several vulnerabilities in Apport. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Maik Münch and Stephen Röttger discovered that Apport incorrectly handled
certain information gathering operations. A local attacker could use this
issue to gain read access to arbitrary files, possibly containing sensitive
information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3709
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3710

Title: USN-5076-1: Git vulnerability
URL: https://ubuntu.com/security/notices/USN-5076-1
Priorities: medium
Description:
It was discovered that Git allowed newline characters in
certain repository paths. An attacker could potentially use this issue to perform
cross-protocol requests.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-40330

456.186

Available in the Broadcom Support portal

Release Date: September 14, 2021

Fixes

  • Updates the /var/vcap/bosh/bin/monit wrapper script to refer to monit-actual by absolute path, rather than relative path. This allows folks who reset or clear the PATH environment variable to actually be able to use the monit CLI. Prior to this fix, folks who cleared their PATH environment variable would see an error like: /var/vcap/bosh/bin/monit: line 9: exec: monit-actual: not found.
  • Fixes the “incorrect used memory reporting” issue introduced in stemcell version 456.176. The Bosh Agent will now report the correct amount of memory used by all processes in the VM that it manages, rather than just the processes in its cgroup.

Known issues

  • We’ve seen failures with this version of the stemcell in vSphere when attempting to attach a persistent disk to a running VM. We are currently planning to address this issue with an update to the vSphere CPI. It should be fixed in vSphere CPI release >= v69. We have pulled the vSphere version of this stemcell.

    NOTE: This is resolved in stemcell version v456.188.

Metadata:

BOSH Agent Version: 2.234.18

USNs:


Title: USN-5066-2: PySAML2 vulnerability
URL: https://ubuntu.com/security/notices/USN-5066-2
Priorities: medium
Description:
USN-5066-1 fixed a vulnerability in PySAML2. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Brian Wolff discovered that PySAML2 incorrectly validated cryptographic
signatures. A remote attacker could possibly use this issue to alter SAML
documents.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-21239

Title: USN-5073-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5073-1
Priorities: medium,low,high
Description:
Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor
implementation for AMD processors in the Linux kernel allowed a guest VM to
disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a
guest VM could use this to read or write portions of the host’s physical
memory. (CVE-2021-3656)

Maxim Levitsky discovered that the KVM hypervisor implementation for AMD
processors in the Linux kernel did not properly prevent a guest VM from
enabling AVIC in nested guest VMs. An attacker in a guest VM could use this
to write to portions of the host’s physical memory. (CVE-2021-3653)

Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol
implementation in the Linux kernel did not properly initialize memory in
some situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2021-34693)

Murray McAllister discovered that the joystick device interface in the
Linux kernel did not properly validate data passed via an ioctl(). A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code on systems with a joystick device
registered. (CVE-2021-3612)

It was discovered that the Virtio console implementation in the Linux
kernel did not properly validate input lengths in some situations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2021-38160)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3612
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-34693
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-38160
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3653

Title: USN-5062-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5062-1
Priorities: high
Description:
Maxim Levitsky discovered that the KVM hypervisor implementation for AMD
processors in the Linux kernel did not properly prevent a guest VM from
enabling AVIC in nested guest VMs. An attacker in a guest VM could use this
to write to portions of the host’s physical memory.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3653

Title: LSN-0081-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0081-1
Priorities: high
Description:
Maxim Levitsky discovered that the KVM hypervisor implementation for AMD
processors in the Linux kernel did not properly prevent a guest VM from
enabling AVIC in nested guest VMs. An attacker in a guest VM could use this
to write to portions of the host’s physical memory.(CVE-2021-3653)

Maxim Levitsky and Paolo Bonzini discovered that the KVM hypervisor
implementation for AMD processors in the Linux kernel allowed a guest VM to
disable restrictions on VMLOAD/VMSAVE in a nested guest. An attacker in a
guest VM could use this to read or write portions of the host’s physical
memory.(CVE-2021-3656)

Andy Nguyen discovered that the netfilter subsystem in the Linux kernel
contained an out-of-bounds write in its setsockopt() implementation. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-22555)

It was discovered that the virtual file system implementation in the Linux
kernel contained an unsigned to signed integer conversion error. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code.(CVE-2021-33909)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3653
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22555
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33909

Title: USN-5051-2: OpenSSL vulnerability
URL: https://ubuntu.com/security/notices/USN-5051-2
Priorities: medium
Description:
USN-5051-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Ingo Schwarze discovered that OpenSSL incorrectly handled certain ASN.1
strings. A remote attacker could use this issue to cause OpenSSL to crash,
resulting in a denial of service, or possibly obtain sensitive information.
(CVE-2021-3712)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3712

Title: USN-5055-1: GNOME grilo vulnerability
URL: https://ubuntu.com/security/notices/USN-5055-1
Priorities: medium
Description:
Michael Catanzaro discovered that grilo incorrectly handled certain TLS
certificate verification. An attacker could possibly use this issue to
MITM attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-39365

Title: USN-5068-1: GD library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5068-1
Priorities: medium,low
Description:
It was discovered that GD Graphics Library incorrectly handled certain GD and GD2 files.
An attacker could possibly use this issue to cause a crash or expose sensitive information.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 ESM, and Ubuntu 14.04 ESM.
(CVE-2017-6363)

It was discovered that GD Graphics Library incorrectly handled certain TGA files.
An attacker could possibly use this issue to cause a denial of service or
expose sensitive information. (CVE-2021-381)

It was discovered that GD Graphics Library incorrectly handled certain files.
An attacker could possibly use this issue to cause a crash.
(CVE-2021-40145)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-40145
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-38115
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6363

456.176

Available in the Broadcom Support portal

Release Date: August 30, 2021

Enhancements

  • Added firewall rules to restrict Monit API access to the Monit CLI and BOSH Agent. To see how to grant your program access to the Monit API, examine the new monit wrapper script, found at /var/vcap/bosh/bin/monit.

Known issues

  • The memory used by the VM that a Bosh Agent manages is incorrectly reported. The Agent will report very significantly smaller amounts of memory used by the VM than are actually used. This means that the “memory used” information in the output of bosh vms --vitals and related commands is incorrect. For now, avoid using this stemcell version, if you rely on the VM memory usage information reported by the Bosh Agent, Director, or the bosh CLI.
    NOTE: This issue has been resolved in Stemcell version 456.186.

Metadata:

BOSH Agent Version: 2.234.14

USNs:


Title: USN-5039-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5039-1
Priorities: high
Description:
Andy Nguyen discovered that the netfilter subsystem in the Linux kernel
contained an out-of-bounds write in its setsockopt() implementation. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22555

Title: LSN-0080-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0080-1
Priorities: high
Description:
Andy Nguyen discovered that the netfilter subsystem in the Linux kernel
contained an out-of-bounds write in its setsockopt() implementation. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code.(CVE-2021-22555)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22555

Title: USN-5025-2: libsndfile vulnerability
URL: https://ubuntu.com/security/notices/USN-5025-2
Priorities: medium
Description:
USN-5025-1 fixed a vulnerability in libsndfile. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that libsndfile incorrectly handled certain malformed
files. A remote attacker could use this issue to cause libsndfile to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3246

Title: USN-5027-2: PEAR vulnerability
URL: https://ubuntu.com/security/notices/USN-5027-2
Priorities: medium
Description:
USN-5027-1 fixed a vulnerability in PEAR. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that PEAR incorrectly handled symbolic links in archives.
A remote attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32610

Title: USN-5044-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5044-1
Priorities: medium
Description:
It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device initialization failure, leading to a double-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3564)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device detach events, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3573)

It was discovered that the NFC implementation in the Linux kernel did not
properly handle failed connect events leading to a NULL pointer
dereference. A local attacker could use this to cause a denial of service.
(CVE-2021-3587)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3573
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3587
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3564

Title: USN-5034-2: c-ares vulnerability
URL: https://ubuntu.com/security/notices/USN-5034-2
Priorities: medium
Description:
USN-5034-1 fixed a vulnerability in c-ares. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Philipp Jeitner and Haya Shulman discovered that c-ares incorrectly
validated certain hostnames returned by DNS servers. A remote attacker
could possibly use this issue to perform Domain Hijacking attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3672

Title: USN-5026-2: QPDF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5026-2
Priorities: medium,low
Description:
USN-5026-1 fixed several vulnerabilities in QPDF. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:

It was discovered that QPDF incorrectly handled certain malformed PDF
files. A remote attacker could use this issue to cause QPDF to consume
resources, resulting in a denial of service. (CVE-2018-18020)

It was discovered that QPDF incorrectly handled certain malformed PDF
files. A remote attacker could use this issue to cause QPDF to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2021-36978)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-36978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18020

Title: USN-5043-1: Exiv2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5043-1
Priorities: medium
Description:
It was discovered that Exiv2 incorrectly handled certain image files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2021-32815, CVE-2021-34334, CVE-2021-37620, CVE-2021-37622)

It was discovered that Exiv2 incorrectly handled certain image files.
An attacker could possibly use this issue to cause a denial of service.
These issues only affected Ubuntu 20.04 LTS and Ubuntu 21.04.
(CVE-2021-34335, CVE-2021-37615, CVE-2021-37616, CVE-2021-37618,
CVE-2021-37619, CVE-2021-37621, CVE-2021-37623)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37622
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32815
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37623
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37621
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37620
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37618
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-34335
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37615
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37619
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-37616
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-34334

456.171

Available in the Broadcom Support portal

Release Date: July 26, 2021

Metadata:

BOSH Agent Version: 2.234.12

USNs:


Title: USN-4336-2: GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4336-2
Priorities: low,medium
Description:
USN-4336-1 fixed several vulnerabilities in GNU binutils. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that GNU binutils contained a large number of security
issues. If a user or automated system were tricked into processing a
specially-crafted file, a remote attacker could cause GNU binutils to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19932
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9074
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18309
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12451
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16828
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7302
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9751
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17080
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12700
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14130
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18483
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7568
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14128
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9749
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12458
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9070
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9755
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10534
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9746
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12972
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7300
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-9138
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7299
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4488
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15020
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9742
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17125
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14939
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14250
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14129
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12967
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17124
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12934
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7210
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8395
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7227
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12459
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9754
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20002
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4489
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9073
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-8945
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12448
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4491
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17794
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13710
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14333
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15021
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14940
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14930
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7225
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7223
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12452
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6965
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18701
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15024
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10372
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18484
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16832
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9748
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15225
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7569
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16831
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17358
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6543
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7224
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4493
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17121
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9041
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9071
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19931
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9756
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18700
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10373
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17451
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12697
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18606
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12641
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17123
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4492
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16826
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9753
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6323
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8394
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16827
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12450
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6131
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14529
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9038
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-2226
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9747
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4490
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12456
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20671
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10535
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-4487
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15939
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7643
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-13033
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9039
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8393
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20623
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9744
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7642
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9752
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12698
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12699
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15996
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9044
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6759
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9745
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7208
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6969
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12449
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14932
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7614
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12454
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-1000876
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8396
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8397
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12455
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9954
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17360
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14444
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9075
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17985
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8398
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18607
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8421
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17450
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12799
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15938
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7301
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9750
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7226
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15025
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18605
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9042
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12457
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12453
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17359
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9040
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7209
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9077
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6966
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14938

Title: USN-5020-1: Ruby vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5020-1
Priorities: medium,low
Description:
It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-31799)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to conduct
port scans and service banner extractions. This issue only affected
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-31810)

It was discovered that Ruby incorrectly handled certain inputs.
An attacker could possibly use this issue to perform
man-in-the-middle attackers to bypass the TLS protection.
(CVE-2021-32066)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31799
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32066
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31810

Title: LSN-0079-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0079-1
Priorities: high
Description:
It was discovered that the eBPF implementation in the Linux kernel did not
properly track bounds information for 32 bit registers when performing div
and mod operations. A local attacker could use this to possibly execute
arbitrary code.(CVE-2021-3600)

It was discovered that the virtual file system implementation in the Linux
kernel contained an unsigned to signed integer conversion error. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code.(CVE-2021-33909)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3600
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33909

456.169

Available in the Broadcom Support portal

Release Date: July 21, 2021

Metadata:

BOSH Agent Version: 2.234.11

USNs:


Title: USN-5013-2: systemd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5013-2
Priorities: low,high
Description:
USN-5013-1 fixed several vulnerabilities in systemd. This update provides
the corresponding update for Ubuntu 16.04 ESM.


Original advisory details:

It was discovered that systemd incorrectly handled certain mount paths. A
local attacker could possibly use this issue to cause systemd to crash,
resulting in a denial of service. (CVE-2021-33910)

Mitchell Frank discovered that systemd incorrectly handled DHCP FORCERENEW
packets. A remote attacker could possibly use this issue to reconfigure
servers. (CVE-2020-13529)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13529
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33910

Title: USN-5018-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5018-1
Priorities: medium,high
Description:
It was discovered that the virtual file system implementation in the Linux
kernel contained an unsigned to signed integer conversion error. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code. (CVE-2021-33909)

Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly enforce limits for pointer operations. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-33200)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did
not properly clear received fragments from memory in some situations. A
physically proximate attacker could possibly use this issue to inject
packets or expose sensitive information. (CVE-2020-24586)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled encrypted fragments. A physically proximate attacker
could possibly use this issue to decrypt fragments. (CVE-2020-24587)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation
incorrectly handled EAPOL frames from unauthenticated senders. A physically
proximate attacker could inject malicious packets to cause a denial of
service (system crash). (CVE-2020-26139)

Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could
reassemble mixed encrypted and plaintext fragments. A physically proximate
attacker could possibly use this issue to inject packets or exfiltrate
selected fragments. (CVE-2020-26147)

It was discovered that the bluetooth subsystem in the Linux kernel did not
properly perform access control. An authenticated attacker could possibly
use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)

Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the
nfc implementation in the Linux kernel. A privileged local attacker could
use this issue to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-23134)

Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel
did not properly prevent speculative loads in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-31829)

It was discovered that a race condition in the kernel Bluetooth subsystem
could lead to use-after-free of slab objects. An attacker could use this
issue to possibly execute arbitrary code. (CVE-2021-32399)

It was discovered that a use-after-free existed in the Bluetooth HCI driver
of the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33034)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-0129
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24586
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33909
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23134
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33200
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33034
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26139
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26147
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24587
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31829
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26558
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32399

Title: USN-5014-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-5014-1
Priorities: high
Description:
It was discovered that the virtual file system implementation in the Linux
kernel contained an unsigned to signed integer conversion error. A local
attacker could use this to cause a denial of service (system crash) or
execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33909

456.168

Available in the Broadcom Support portal

Release Date: July 19, 2021

Metadata:

BOSH Agent Version: 2.234.11

USNs:


Title: LSN-0078-1: Kernel Live Patch Security Notice
URL: https://ubuntu.com/security/notices/LSN-0078-1
Priorities: high
Description:
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code.(CVE-2021-3609)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3609

456.167

Available in the Broadcom Support portal

Release Date: July 15, 2021

Metadata:

BOSH Agent Version: 2.234.11

USNs:


Title: USN-5006-2: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5006-2
Priorities: low,medium
Description:
USN-5006-1 fixed several vulnerabilities in PHP. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that PHP incorrectly handled certain PHAR files. A remote
attacker could possibly use this issue to cause PHP to crash, resulting in
a denial of service, or possibly obtain sensitive information. (CVE-2020-7068)

It was discovered that PHP incorrectly handled parsing URLs with passwords.
A remote attacker could possibly use this issue to cause PHP to mis-parse
the URL and produce wrong data. (CVE-2020-7071)

It was discovered that PHP incorrectly handled certain malformed XML data
when being parsed by the SOAP extension. A remote attacker could possibly
use this issue to cause PHP to crash, resulting in a denial of service.
(CVE-2021-21702)

It was discovered that PHP incorrectly handled the pdo_firebase module. A
remote attacker could possibly use this issue to cause PHP to crash,
resulting in a denial of service. (CVE-2021-21704)

It was discovered that PHP incorrectly handled the FILTER_VALIDATE_URL
check. A remote attacker could possibly use this issue to perform a server-
side request forgery attack. (CVE-2021-21705)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-21702
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7071
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-21705
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7068
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-21704

Title: USN-5004-1: RabbitMQ vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5004-1
Priorities: medium,low
Description:
It was discovered that RabbitMQ incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. (CVE-2019-11287)

Jonathan Knudsen discovered RabbitMQ incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2021-22116)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22116
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11287

Title: USN-5008-2: Avahi vulnerability
URL: https://ubuntu.com/security/notices/USN-5008-2
Priorities: medium
Description:
USN-5008-1 fixed a vulnerability in avahi. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Thomas Kremer discovered that Avahi incorrectly handled termination signals
on the Unix socket. A local attacker could possibly use this issue to cause
Avahi to hang, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3468

Title: USN-5005-1: DjVuLibre vulnerability
URL: https://ubuntu.com/security/notices/USN-5005-1
Priorities: medium
Description:
It was discovered that DjVuLibre incorrectly handled certain djvu files.
An attacker could possibly use this issue to execute arbitrary code or
cause a crash.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3630

456.166

Available in the Broadcom Support portal

Release Date: June 23, 2021

Metadata:

BOSH Agent Version: 2.234.11

USNs:


Title: USN-4986-2: rpcbind vulnerability
URL: https://ubuntu.com/security/notices/USN-4986-2
Priorities: low
Description:
USN-4986-1 fixed a vulnerability in rpcbind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that rpcbind incorrectly handled certain large data
sizes. A remote attacker could use this issue to cause rpcbind to consume
resources, leading to a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8779

Title: USN-4989-2: BlueZ vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4989-2
Priorities: medium,low
Description:
USN-4989-1 fixed several vulnerabilities in BlueZ. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that BlueZ incorrectly checked certain permissions when
pairing. A local attacker could possibly use this issue to impersonate
devices. (CVE-2020-26558)

Jay LV discovered that BlueZ incorrectly handled redundant disconnect MGMT
events. A local attacker could use this issue to cause BlueZ to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-27153)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26558
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27153

Title: USN-4971-2: libwebp vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4971-2
Priorities: medium
Description:
USN-4971-1 fixed several vulnerabilities in libwebp. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that libwebp incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image file, a remote attacker could use this issue to cause libwebp
to crash, resulting in a denial of service, or possibly execute arbitrary
code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36331
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25014
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36328
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25012
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25009
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25013
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25011
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-25010
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36330
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36329

Title: USN-5003-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-5003-1
Priorities: medium,high
Description:
Norbert Slusarek discovered a race condition in the CAN BCM networking
protocol of the Linux kernel leading to multiple use-after-free
vulnerabilities. A local attacker could use this issue to execute arbitrary
code. (CVE-2021-3609)

It was discovered that the eBPF implementation in the Linux kernel did not
properly track bounds information for 32 bit registers when performing div
and mod operations. A local attacker could use this to possibly execute
arbitrary code. (CVE-2021-3600)

Or Cohen discovered that the SCTP implementation in the Linux kernel
contained a race condition in some situations, leading to a use-after-free
condition. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2021-23133)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23133
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3609
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3600

Title: USN-4994-2: Apache HTTP Server vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4994-2
Priorities: medium,low
Description:
USN-4994-1 fixed several vulnerabilities in Apache. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Antonio Morales discovered that the Apache mod_auth_digest module
incorrectly handled certain Digest nonces. A remote attacker could possibly
use this issue to cause Apache to crash, resulting in a denial of service.
(CVE-2020-35452)

Antonio Morales discovered that the Apache mod_session module incorrectly
handled certain Cookie headers. A remote attacker could possibly use this
issue to cause Apache to crash, resulting in a denial of service.
(CVE-2021-26690)

Christophe Jaillet discovered that the Apache mod_session module
incorrectly handled certain SessionHeader values. A remote attacker could
use this issue to cause Apache to crash, resulting in a denial of service,
or possibly execute arbitrary code. (CVE-2021-26691)

Christoph Anton Mitterer discovered that the new MergeSlashes configuration
option resulted in unexpected behaviour in certain situations.
(CVE-2021-30641)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26691
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35452
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-30641
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26690

Title: USN-4991-1: libxml2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4991-1
Priorities: medium,low
Description:
Yunho Kim discovered that libxml2 incorrectly handled certain error
conditions. A remote attacker could exploit this with a crafted XML file to
cause a denial of service, or possibly cause libxml2 to expose sensitive
information. This issue only affected Ubuntu 14.04 ESM, and Ubuntu 16.04
ESM. (CVE-2017-8872)

Zhipeng Xie discovered that libxml2 incorrectly handled certain XML
schemas. A remote attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM,
and Ubuntu 18.04 LTS. (CVE-2019-20388)

It was discovered that libxml2 incorrectly handled invalid UTF-8 input. A
remote attacker could possibly exploit this with a crafted XML file to
cause libxml2 to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS and Ubuntu 20.10. (CVE-2020-24977)

It was discovered that libxml2 incorrectly handled invalid UTF-8 input. A
remote attacker could possibly exploit this with a crafted XML file to
cause libxml2 to crash, resulting in a denial of service. (CVE-2021-3517)

It was discovered that libxml2 did not properly handle certain crafted XML
files. A local attacker could exploit this with a crafted input to cause
libxml2 to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-3516, CVE-2021-3518)

It was discovered that libxml2 incorrectly handled error states. A remote
attacker could exploit this with a crafted XML file to cause libxml2 to
crash, resulting in a denial of service. (CVE-2021-3537)

Sebastian Pipping discovered that libxml2 did not properly handle certain
crafted XML files. A remote attacker could exploit this with a crafted XML
file to cause libxml2 to crash, resulting in a denial of service. This
issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04.
(CVE-2021-3541)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3516
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-8872
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24977
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3541
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3537
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3517
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3518
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20388

Title: USN-4996-2: OpenEXR vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4996-2
Priorities: medium,low
Description:
USN-4996-1 fixed several vulnerabilities in OpenEXR. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image file,
a remote attacker could cause a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3605
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26260
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20296
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23215
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3598

456.165

Available in the Broadcom Support portal

Release Date: June 09, 2021

Metadata:

BOSH Agent Version: 2.234.11

USNs:


Title: USN-4985-1: Intel Microcode vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4985-1
Priorities: medium,high
Description:
It was discovered that some Intel processors may not properly invalidate
cache entries used by Intel Virtualization Technology for Directed I/O
(VT-d). This may allow a local user to perform a privilege escalation
attack. (CVE-2021-24489)

Joseph Nuzman discovered that some Intel processors may not properly apply
EIBRS mitigations (originally developed for CVE-2017-5715) and hence may
allow unauthorized memory reads via sidechannel attacks. A local attacker
could use this to expose sensitive information, including kernel
memory. (CVE-2020-24511)

Travis Downs discovered that some Intel processors did not properly flush
cache-lines for trivial-data values. This may allow an unauthorized user to
infer the presence of these trivial-data-cache-lines via timing sidechannel
attacks. A local attacker could use this to expose sensitive
information. (CVE-2020-24512)

It was discovered that certain Intel Atom processors could expose memory
contents stored in microarchitectural buffers. A local attacker could use
this to expose sensitive information. (CVE-2020-24513)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24512
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-24489
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24513
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24511

Title: USN-4967-2: nginx vulnerability
URL: https://ubuntu.com/security/notices/USN-4967-2
Priorities: medium
Description:
USN-4967-1 fixed a vulnerability in nginx. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.

Original advisory details:

Luis Merino, Markus Vervier, and Eric Sesterhenn discovered that nginx
incorrectly handled responses to the DNS resolver. A remote attacker could
use this issue to cause nginx to crash, resulting in a denial of service,
or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23017

Title: USN-4969-2: DHCP vulnerability
URL: https://ubuntu.com/security/notices/USN-4969-2
Priorities: medium
Description:
USN-4969-1 fixed a vulnerability in DHCP. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.


Original advisory details:

Jon Franklin and Pawel Wieczorkiewicz discovered that DHCP incorrectly
handled lease file parsing. A remote attacker could possibly use this issue
to cause DHCP to crash, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25217

Title: USN-4966-2: libx11 vulnerability
URL: https://ubuntu.com/security/notices/USN-4966-2
Priorities: medium
Description:
USN-4966-1 fixed a vulnerability in libx11. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that libx11 incorrectly validated certain parameter
lengths. A remote attacker could possibly use this issue to trick libx11
into emitting extra X protocol requests.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31535

Title: USN-4979-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4979-1
Priorities: medium,low
Description:
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel contained a reference counting error. A local attacker could
use this to cause a denial of service (system crash). (CVE-2020-25670)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly deallocate memory in certain error
situations. A local attacker could use this to cause a denial of service
(memory exhaustion). (CVE-2020-25671, CVE-2020-25672)

Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the
Linux kernel did not properly handle error conditions in some situations,
leading to an infinite loop. A local attacker could use this to cause a
denial of service. (CVE-2020-25673)

It was discovered that the Realtek RTL8188EU Wireless device driver in the
Linux kernel did not properly validate ssid lengths in some situations. An
attacker could use this to cause a denial of service (system crash).
(CVE-2021-28660)

Zygo Blaxell discovered that the btrfs file system implementation in the
Linux kernel contained a race condition during certain cloning operations.
A local attacker could possibly use this to cause a denial of service
(system crash). (CVE-2021-28964)

Vince Weaver discovered that the perf subsystem in the Linux kernel did not
properly handle certain PEBS records properly for some Intel Haswell
processors. A local attacker could use this to cause a denial of service
(system crash). (CVE-2021-28971)

It was discovered that the RPA PCI Hotplug driver implementation in the
Linux kernel did not properly handle device name writes via sysfs, leading
to a buffer overflow. A privileged attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2021-28972)

It was discovered that the Qualcomm IPC router implementation in the Linux
kernel did not properly initialize memory passed to user space. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2021-29647)

Dan Carpenter discovered that the block device manager (dm) implementation
in the Linux kernel contained a buffer overflow in the ioctl for listing
devices. A privileged local attacker could use this to cause a denial of
service (system crash). (CVE-2021-31916)

It was discovered that the CIPSO implementation in the Linux kernel did not
properly perform reference counting in some situations, leading to use-
after-free vulnerabilities. An attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-33033)

Wolfgang Frisch discovered that the ext4 file system implementation in the
Linux kernel contained an integer overflow when handling metadata inode
extents. An attacker could use this to construct a malicious ext4 file
system image that, when mounted, could cause a denial of service (system
crash). (CVE-2021-3428)

马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2021-3483)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31916
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3428
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25670
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25673
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25672
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28971
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28964
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29647
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3483
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33033
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25671
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28972

Title: USN-4975-2: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-4975-2
Priorities: low
Description:
USN-4975-1 fixed a vulnerability in Django. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Rasmus Lerchedahl Petersen and Rasmus Wriedt Larsen discovered that Django
incorrectly handled path sanitation in admindocs. A remote attacker could
possibly use this issue to determine the existence of arbitrary files and
in certain configurations obtain their contents. (CVE-2021-33203)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-33203

456.164

Available in the Broadcom Support portal

Release Date: May 26, 2021

Metadata:

BOSH Agent Version: 2.234.11

USNs:


Title: USN-4954-1: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4954-1
Priorities: negligible,low
Description:
Jason Royes and Samuel Dytrych discovered that the memcpy()
implementation for 32 bit ARM processors in the GNU C Library contained
an integer underflow vulnerability. An attacker could possibly use
this to cause a denial of service (application crash) or execute
arbitrary code. (CVE-2020-6096)

It was discovered that the POSIX regex implementation in the GNU C
Library did not properly parse alternatives. An attacker could use this
to cause a denial of service. (CVE-2009-5155)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2009-5155
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6096

Title: USN-4934-2: Exim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4934-2
Priorities: medium
Description:
USN-4934-1 fixed several vulnerabilities in Exim. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
CVE-2020-28026 only affected Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Exim contained multiple security issues. An attacker
could use these issues to cause a denial of service, execute arbitrary
code remotely, obtain sensitive information, or escalate local privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28011
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28009
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27216
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28025
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28026
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28024
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28014
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28007
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28016
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28020
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28013
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28008
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28015
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28017
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28012

Title: USN-4953-1: AWStats vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4953-1
Priorities: low,medium
Description:
Sean Boran discovered that AWStats incorrectly filtered certain parameters.
A remote attacker could possibly use this issue to execute arbitrary code.
(CVE-2020-29600)

It was discovered that AWStats incorrectly filtered certain parameters. A
remote attacker could possibly use this issue to access sensitive
information. (CVE-2020-35176)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35176
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-1000501
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29600

Title: USN-4962-1: Babel vulnerability
URL: https://ubuntu.com/security/notices/USN-4962-1
Priorities: medium
Description:
It was discovered that Babel incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20095

Title: USN-4930-1: Samba vulnerability
URL: https://ubuntu.com/security/notices/USN-4930-1
Priorities: medium
Description:
Peter Eriksson discovered that Samba incorrectly handled certain negative
idmap cache entries. This issue could result in certain users gaining
unauthorized access to files, contrary to expected behaviour.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20254

Title: USN-4946-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4946-1
Priorities: low,medium
Description:
It was discovered that the DRM subsystem in the Linux kernel contained
double-free vulnerabilities. A privileged attacker could possibly use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2021-20292)

Olivier Benjamin, Norbert Manthey, Martin Mazein, and Jan H. Schönherr
discovered that the Xen paravirtualization backend in the Linux kernel did
not properly propagate errors to frontend drivers in some situations. An
attacker in a guest VM could possibly use this to cause a denial of service
(host domain crash). (CVE-2021-26930)

Jan Beulich discovered that multiple Xen backends in the Linux kernel did
not properly handle certain error conditions under paravirtualization. An
attacker in a guest VM could possibly use this to cause a denial of service
(host domain crash). (CVE-2021-26931)

Jan Beulich discovered that the Xen netback backend in the Linux kernel did
not properly handle certain error conditions under paravirtualization. An
attacker in a guest VM could possibly use this to cause a denial of service
(host domain crash). (CVE-2021-28038)

It was discovered that the Xen paravirtualization backend in the Linux
kernel did not properly deallocate memory in some situations. A local
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2021-28688)

It was discovered that the Freescale Gianfar Ethernet driver for the Linux
kernel did not properly handle receive queue overrun when jumbo frames were
enabled in some situations. An attacker could use this to cause a denial of
service (system crash). (CVE-2021-29264)

It was discovered that the USB/IP driver in the Linux kernel contained race
conditions during the update of local and shared status. An attacker could
use this to cause a denial of service (system crash). (CVE-2021-29265)

It was discovered that a race condition existed in the netfilter subsystem
of the Linux kernel when replacing tables. A local attacker could use this
to cause a denial of service (system crash). (CVE-2021-29650)

Arnd Bergmann discovered that the video4linux subsystem in the Linux kernel
did not properly deallocate memory in some situations. A local attacker
could use this to cause a denial of service (memory exhaustion).
(CVE-2021-30002)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20292
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26930
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29264
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29265
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29650
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28688
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26931
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28038
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-30002

Title: USN-4941-1: Exiv2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4941-1
Priorities: medium
Description:
It was discovered that Exiv2 incorrectly handled certain images.
An attacker could possibly use this issue to execute arbitrary code or cause
a crash. (CVE-2021-29457)

It was discovered that Exiv2 incorrectly handled certain images.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2021-29458, CVE-2021-29470)

It was discovered that Exiv2 incorrectly handled certain images.
An attacker could possibly use this issue to execute arbitrary code or
cause a crash. (CVE-2021-3482)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29458
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3482
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29470
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29457

Title: USN-4964-1: Exiv2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4964-1
Priorities: low,medium
Description:
It was discovered that Exiv2 incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10 and Ubuntu 21.04.
(CVE-2021-29463)

It was discovered that Exiv2 incorrectly handled certain files.
An attacker could possibly use this issue to execute arbitrary code.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10 and Ubuntu 21.04.
(CVE-2021-29464)

It was discovered that Exiv2 incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2021-29473, CVE-2021-32617)

It was discovered that Exiv2 incorrectly handled certain files.
An attacker could possibly use this issue to expose sensitive information.
This issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10 and Ubuntu 21.04.
(CVE-2021-29623)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29464
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29463
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32617
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29623
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29473

Title: USN-4932-2: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-4932-2
Priorities: medium
Description:
USN-4932-1 fixed a vulnerability in Django. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that Django incorrectly handled certain
filenames. A remote attacker could possibly use this issue to create or
overwrite files in unexpected directories.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-31542

Title: USN-4957-2: DjVuLibre vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4957-2
Priorities: medium,low
Description:
USN-4957-1 fixed several vulnerabilities in DjVuLibre. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that DjVuLibre incorrectly handled certain memory
operations. If a user or automated system were tricked into processing a
specially crafted DjVu file, a remote attacker could cause applications
to hang or crash, resulting in a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32491
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32492
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32493
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32490
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3500

Title: USN-4965-2: Apport vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4965-2
Priorities: medium
Description:
USN-4965-1 fixed several vulnerabilities in Apport. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:

Maik Münch discovered that Apport incorrectly handled certain information
gathering operations. A local attacker could use these issues to read and
write arbitrary files as an administrator, and possibly escalate
privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32549
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32555
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32551
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32548
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32550
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32554
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32553
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32557
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32552
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32547
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-32556

456.160

Available in the Broadcom Support portal

Release Date: April 30, 2021

Metadata:

BOSH Agent Version: 2.234.11

USNs:


Title: USN-4924-1: Dnsmasq vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4924-1
Priorities: low
Description:
It was discovered that Dnsmasq incorrectly handled certain wildcard
synthesized NSEC records. A remote attacker could possibly use this issue
to prove the non-existence of hostnames that actually exist.
(CVE-2017-15107)

It was discovered that Dnsmasq incorrectly handled certain large DNS
packets. A remote attacker could possibly use this issue to cause Dnsmasq
to crash, resulting in a denial of service. (CVE-2019-14513)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14513
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15107

Title: USN-4919-1: OpenSLP vulnerability
URL: https://ubuntu.com/security/notices/USN-4919-1
Priorities: medium
Description:
It was discovered that OpenSLP did not properly validate URLs. A remote
attacker could use this issue to cause OpenSLP to crash or possibly execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5544

Title: USN-4927-1: File Roller vulnerability
URL: https://ubuntu.com/security/notices/USN-4927-1
Priorities: medium
Description:
It was discovered that File Roller incorrectly handled symlinks.
An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36314

Title: USN-4918-1: ClamAV vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4918-1
Priorities: medium
Description:
It was discovered that ClamAV incorrectly handled parsing Excel documents.
A remote attacker could possibly use this issue to cause ClamAV to hang,
resulting in a denial of service. (CVE-2021-1252)

It was discovered that ClamAV incorrectly handled parsing PDF documents. A
remote attacker could possibly use this issue to cause ClamAV to crash,
resulting in a denial of service. (CVE-2021-1404)

It was discovered that ClamAV incorrectly handled parsing email. A remote
attacker could possibly use this issue to cause ClamAV to crash, resulting
in a denial of service. (CVE-2021-1405)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-1405
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-1404
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-1252

Title: USN-4892-1: OpenJDK vulnerability
URL: https://ubuntu.com/security/notices/USN-4892-1
Priorities: medium
Description:
It was discovered that OpenJDK incorrectly verified Jar signatures. An
attacker could possibly use this issue to bypass intended security
restrictions when using Jar files signed with a disabled algorithm.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2163

Title: USN-4913-1: Underscore vulnerability
URL: https://ubuntu.com/security/notices/USN-4913-1
Priorities: medium
Description:
It was discovered that Underscore incorrectly handled certain inputs.
An attacker could possibly use this issue to inject arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23358

Title: USN-4926-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4926-1
Priorities: medium
Description:
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, spoof the
browser UI, bypass security restrictions, trick the user into disclosing
confidential information, or execute arbitrary code. (CVE-2021-23994,
CVE-2021-23996, CVE-2021-23997, CVE-2021-23998, CVE-2021-23999,
CVE-2021-24000, CVE-2021-24001, CVE-2021-29945, CVE-2021-29946,
CVE-2021-29947)

A use-after-free was discovered when Responsive Design Mode was
enabled. If a user were tricked into opening a specially crafted
website with Responsive Design Mode enabled, an attacker could
potentially exploit this to cause a denial of service, or execute
arbitrary code. (CVE-2021-23995)

It was discovered that Firefox mishandled ftp URLs with encoded newline
characters. If a user were tricked into clicking on a specially crafted
link, an attacker could potentially exploit this to send arbitrary
FTP commands. (CVE-2021-24002)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-24000
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23996
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23997
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23995
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29946
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23999
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23994
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23998
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29945
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-24001
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-24002
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29947

Title: USN-4922-1: Ruby vulnerability
URL: https://ubuntu.com/security/notices/USN-4922-1
Priorities: medium
Description:
Juho Nurminen discovered that the REXML gem bundled with Ruby incorrectly
parsed and serialized XML documents. A remote attacker could possibly use
this issue to perform an XML round-trip attack.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28965

Title: USN-4921-1: libcaca vulnerability
URL: https://ubuntu.com/security/notices/USN-4921-1
Priorities: medium
Description:
It was discovered that libcaca incorrectly handled certain images.
An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3410

Title: USN-4916-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4916-1
Priorities: high
Description:
It was discovered that the overlayfs implementation in the Linux kernel did
not properly validate the application of file system capabilities with
respect to user namespaces. A local attacker could use this to gain
elevated privileges. (CVE-2021-3493)

Piotr Krysiuk discovered that the BPF JIT compiler for x86 in the Linux
kernel did not properly validate computation of branch displacements in
some situations. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-29154)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3493
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29154

Title: USN-4928-1: GStreamer Good Plugins vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4928-1
Priorities: medium
Description:
It was discovered that GStreamer Good Plugins incorrectly handled certain files.
An attacker could possibly use this issue to cause access sensitive information
or cause a crash. (CVE-2021-3497)

It was discovered that GStreamer Good Plugins incorrectly handled certain files.
An attacker could possibly use this issue to execute arbitrary code or cause
a crash. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu
20.10. (CVE-2021-3498)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3498
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3497

456.158

Available in the Broadcom Support portal

Release Date: April 19, 2021

Metadata:

BOSH Agent Version: 2.234.11

USNs:


Title: USN-4899-1: SpamAssassin vulnerability
URL: https://ubuntu.com/security/notices/USN-4899-1
Priorities: medium
Description:
Damian Lukowski discovered that SpamAssassin incorrectly handled certain CF
files. If a user or automated system were tricked into using a specially-
crafted CF file, a remote attacker could possibly run arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1946

Title: USN-4895-1: Squid vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4895-1
Priorities: medium,low
Description:
Alex Rousskov and Amit Klein discovered that Squid incorrectly handled
certain Content-Length headers. A remote attacker could possibly use this
issue to perform an HTTP request smuggling attack, resulting in cache
poisoning. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-15049)

Jianjun Chen discovered that Squid incorrectly validated certain input. A
remote attacker could use this issue to perform HTTP Request Smuggling and
possibly access services forbidden by the security controls.
(CVE-2020-25097)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25097
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15049

Title: USN-4561-2: Rack vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4561-2
Priorities: low,medium
Description:
USN-4561-1 fixed vulnerabilities in Rack. This update provides the
corresponding update for Ubuntu 16.04 LTS, Ubuntu 20.04 LTS and Ubuntu 20.10.

Original advisory details:

It was discovered that Rack incorrectly handled certain paths. An attacker
could possibly use this issue to obtain sensitive information. This issue
only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2020-8161)

It was discovered that Rack incorrectly validated cookies. An attacker
could possibly use this issue to forge a secure cookie. (CVE-2020-8184)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8161
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8184

Title: USN-4885-1: Pygments vulnerability
URL: https://ubuntu.com/security/notices/USN-4885-1
Priorities: medium
Description:
It was discovered that Pygments incorrectly handled parsing SML files. If a
user or automated system were tricked into parsing a specially crafted SML
file, a remote attacker could cause Pygments to hang, resulting in a denial
of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20270

Title: USN-4898-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4898-1
Priorities: medium
Description:
Viktor Szakats discovered that curl did not strip off user credentials
from referrer header fields. A remote attacker could possibly use this
issue to obtain sensitive information. (CVE-2021-22876)

Mingtao Yang discovered that curl incorrectly handled session tickets when
using an HTTPS proxy. A remote attacker in control of an HTTPS proxy could
use this issue to bypass certificate checks and intercept communications.
This issue only affected Ubuntu 20.04 LTS and Ubuntu 20.10.
(CVE-2021-22890)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22890
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-22876

Title: USN-4893-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4893-1
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information, or execute arbitrary code. (CVE-2021-23981, CVE-2021-23982,
CVE-2021-23983, CVE-2021-23987, CVE-2021-23988)

It was discovered that extensions could open popup windows with control
of the window title in some circumstances. If a user were tricked into
installing a specially crafted extension, an attacker could potentially
exploit this to spook a website and trick the user into providing
credentials. (CVE-2021-23984)

It was discovered that the DevTools remote debugging feature could be
enabled without an indication to the user. If a local attacker could
modify the browser configuration, a remote attacker could potentially
exploit this to obtain sensitive information. (CVE-2021-23985)

It was discovered that extensions could read the response of cross
origin requests in some circumstances. If a user were tricked into
installing a specially crafted extension, an attacker could potentially
exploit this to obtain sensitive information. (CVE-2021-23986)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23987
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23986
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23985
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23988
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23984
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23981
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23982
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23983

Title: USN-4897-1: Pygments vulnerability
URL: https://ubuntu.com/security/notices/USN-4897-1
Priorities: medium
Description:
Ben Caller discovered that Pygments incorrectly handled parsing certain
files. If a user or automated system were tricked into parsing a specially
crafted file, a remote attacker could cause Pygments to hang or consume
resources, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27291

Title: USN-4883-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4883-1
Priorities: high,medium
Description:
Adam Nichols discovered that heap overflows existed in the iSCSI subsystem
in the Linux kernel. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-27365)

Adam Nichols discovered that the iSCSI subsystem in the Linux kernel did
not properly restrict access to iSCSI transport handles. A local attacker
could use this to cause a denial of service or expose sensitive information
(kernel pointer addresses). (CVE-2021-27363)

Adam Nichols discovered that an out-of-bounds read existed in the iSCSI
subsystem in the Linux kernel. A local attacker could use this to cause a
denial of service (system crash) or expose sensitive information (kernel
memory). (CVE-2021-27364)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27365
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27363
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27364

Title: USN-4902-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-4902-1
Priorities: low
Description:
Dennis Brinkrolf discovered that Django incorrectly handled certain
filenames. A remote attacker could possibly use this issue to create or
overwrite files in unexpected directories.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28658

Title: USN-4896-1: lxml vulnerability
URL: https://ubuntu.com/security/notices/USN-4896-1
Priorities: medium
Description:
It was discovered that lxml incorrectly handled certain HTML attributes. A
remote attacker could possibly use this issue to perform cross-site
scripting (XSS) attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-28957

Title: USN-4905-1: X.Org X Server vulnerability
URL: https://ubuntu.com/security/notices/USN-4905-1
Priorities: medium
Description:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain lengths of XInput extension ChangeFeedbackControl requests. An
attacker could use this issue to cause the server to crash, resulting in a
denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3472

Title: USN-4900-1: OpenEXR vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4900-1
Priorities: medium,low
Description:
It was discovered that OpenEXR incorrectly handled certain malformed EXR
image files. If a user were tricked into opening a crafted EXR image file,
a remote attacker could cause a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3476
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3475
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3474
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3477
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3478
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3479

Title: USN-4916-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4916-1
Priorities: high
Description:
It was discovered that the overlayfs implementation in the Linux kernel did
not properly validate the application of file system capabilities with
respect to user namespaces. A local attacker could use this to gain
elevated privileges. (CVE-2021-3493)

Piotr Krysiuk discovered that the BPF JIT compiler for x86 in the Linux
kernel did not properly validate computation of branch displacements in
some situations. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2021-29154)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3493
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-29154

456.154

Available in the Broadcom Support portal

Release Date: March 25, 2021

Metadata:

BOSH Agent Version: 2.234.11

USNs:


Title: USN-4888-1: ldb vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4888-1
Priorities: high
Description:
Douglas Bagnall discovered that ldb, when used with Samba, incorrectly
handled certain LDAP attributes. A remote attacker could possibly use this
issue to cause the LDAP server to crash, resulting in a denial of service.
(CVE-2021-20277)

Douglas Bagnall discovered that ldb, when used with Samba, incorrectly
handled certain DN strings. A remote attacker could use this issue to
cause the LDAP server to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2020-27840)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-20277
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27840

Title: USN-4890-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4890-1
Priorities: high
Description:
Piotr Krysiuk discovered that the BPF subsystem in the Linux kernel did not
properly compute a speculative execution limit on pointer arithmetic in
some situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2020-27171)

Piotr Krysiuk discovered that the BPF subsystem in the Linux kernel did not
properly apply speculative execution limits on some pointer types. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-27170)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27170
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27171

456.152

Available in the Broadcom Support portal

Release Date: March 22, 2021

Metadata:

BOSH Agent Version: 2.234.11

USNs:


Title: USN-4758-1: Go vulnerability
URL: https://ubuntu.com/security/notices/USN-4758-1
Priorities: low
Description:
It was discovered that Go applications incorrectly handled uploaded content. If
a user were tricked into visiting a malicious page, a remote attacker could
exploit this with a crafted file to conduct cross-site scripting (XSS) attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24553

Title: USN-4761-1: Git vulnerability
URL: https://ubuntu.com/security/notices/USN-4761-1
Priorities: medium
Description:
Matheus Tavares discovered that Git incorrectly handled delay-capable
clean/smudge filters when being used on case-insensitive filesystems. A
remote attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-21300

Title: USN-4759-1: GLib vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4759-1
Priorities: medium
Description:
Krzesimir Nowak discovered that GLib incorrectly handled certain large
buffers. A remote attacker could use this issue to cause applications
linked to GLib to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-27218)

Kevin Backhouse discovered that GLib incorrectly handled certain memory
allocations. A remote attacker could use this issue to cause applications
linked to GLib to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-27219)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27218
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27219

Title: USN-4763-1: Pillow vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4763-1
Priorities: medium
Description:
It was discovered that Pillow incorrectly handled certain Tiff image files.
If a user or automated system were tricked into opening a specially-crafted
Tiff file, a remote attacker could cause Pillow to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 20.04 LTS and Ubuntu 20.10. (CVE-2021-25289,
CVE-2021-25291)

It was discovered that Pillow incorrectly handled certain Tiff image files.
If a user or automated system were tricked into opening a specially-crafted
Tiff file, a remote attacker could cause Pillow to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2021-25290)

It was discovered that Pillow incorrectly handled certain PDF files. If a
user or automated system were tricked into opening a specially-crafted
PDF file, a remote attacker could cause Pillow to hang, resulting in a
denial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, and Ubuntu 20.10. (CVE-2021-25292)

It was discovered that Pillow incorrectly handled certain SGI image files.
If a user or automated system were tricked into opening a specially-crafted
SGI file, a remote attacker could possibly cause Pillow to crash,
resulting in a denial of service. This issue only affected Ubuntu 18.04
LTS, Ubuntu 20.04 LTS, and Ubuntu 20.10. (CVE-2021-25293)

Jiayi Lin, Luke Shaffer, Xinran Xie, and Akshay Ajayan discovered that
Pillow incorrectly handled certain BLP files. If a user or automated system
were tricked into opening a specially-crafted BLP file, a remote attacker
could possibly cause Pillow to consume resources, resulting in a denial of
service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 20.10. (CVE-2021-27921)

Jiayi Lin, Luke Shaffer, Xinran Xie, and Akshay Ajayan discovered that
Pillow incorrectly handled certain ICNS files. If a user or automated
system were tricked into opening a specially-crafted ICNS file, a remote
attacker could possibly cause Pillow to consume resources, resulting in a
denial of service. (CVE-2021-27922)

Jiayi Lin, Luke Shaffer, Xinran Xie, and Akshay Ajayan discovered that
Pillow incorrectly handled certain ICO files. If a user or automated
system were tricked into opening a specially-crafted ICO file, a remote
attacker could possibly cause Pillow to consume resources, resulting in a
denial of service. (CVE-2021-27922)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27922
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25291
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27921
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25293
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27923
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25290
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25292
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25289

456.150

Available in the Broadcom Support portal

Release Date: March 15, 2021

Metadata:

BOSH Agent Version: 2.234.10

USNs:


Title: USN-4755-1: LibTIFF vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4755-1
Priorities: medium
Description:
It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image, a remote attacker could crash the application, leading to a
denial of service, or possibly execute arbitrary code with user privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35524
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35523

Title: USN-4756-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4756-1
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information, conduct cross-site scripting (XSS) attacks, bypass HTTP auth
phishing warnings, or execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23971
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23973
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23970
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23972
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23969
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23968
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23975
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23979

Title: USN-4757-1: wpa_supplicant and hostapd vulnerability
URL: https://ubuntu.com/security/notices/USN-4757-1
Priorities: medium
Description:
It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) provision discovery requests in some situations. A
physically proximate attacker could use this to cause a denial of service
or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27803

Title: USN-4754-4: Python 2.7 vulnerability
URL: https://ubuntu.com/security/notices/USN-4754-4
Priorities: medium
Description:
USN-4754-1 fixed vulnerabilities in Python. Because of a regression, a
subsequent update removed the fix for CVE-2021-3177. This update reinstates
the security fix for CVE-2021-3177.

We apologize for the inconvenience.

Original advisory details:

It was discovered that Python incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code
or cause a denial of service. (CVE-2020-27619, CVE-2021-3177)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3177

456.146

Available in the Broadcom Support portal

Release Date: March 05, 2021

Fixes Issues:


GCP rsyslog behavior is fixed - cf ssh and rsyslog should be working as expected

Important Notice:


As of this release, on all IAASs, rsyslog will not start until /var/log is mounted. When used with a Bosh Agent, /var/log will automatically be mounted, and no further action is required.

If you use this stemcell without a Bosh Agent and do not mount /var/log, then you need to do one of these two actions:

* Remove the ExecStartPre= line from /etc/systemd/system/rsyslog.service
* Blank out the contents of /usr/local/bin/wait_for_var_log_to_be_mounted

Either action will cause rsyslog to no longer wait for /var/log to be mounted before starting.

Metadata:

BOSH Agent Version: 2.234.9

USNs:


Title: USN-4754-1: Python vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4754-1
Priorities: medium,low
Description:
It was discovered that Python incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code
or cause a denial of service. (CVE-2020-27619, CVE-2021-3177)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3177
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27619

456.145

Available in the Broadcom Support portal

Release Date: March 01, 2021

Known Issues:

This version of the stemcell has the following issues when used on GCP:
* Attempts to use cf ssh timeout.
* The iptables-logger job fails to deploy

This is because rsyslog is started before /var/log is mounted. This causes it to log to the root filesystem rather than the mounted persistent disk.

This issue is fixed in stemcell version 456.146.

Metadata:

BOSH Agent Version: 2.234.9

USNs:


Title: USN-4741-1: Jackson vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4741-1
Priorities: medium
Description:
It was discovered that Jackson Databind incorrectly handled
deserialization. An attacker could possibly use this issue to execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15095
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7525
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-10172

Title: USN-4749-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4749-1
Priorities: medium,low
Description:
Bodong Zhao discovered a use-after-free in the Sun keyboard driver
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service or possibly execute arbitrary code.
(CVE-2020-25669)

It was discovered that the jfs file system implementation in the Linux
kernel contained an out-of-bounds read vulnerability. A local attacker
could use this to possibly cause a denial of service (system crash).
(CVE-2020-27815)

Shisong Qin and Bodong Zhao discovered that Speakup screen reader driver in
the Linux kernel did not correctly handle setting line discipline in some
situations. A local attacker could use this to cause a denial of service
(system crash). (CVE-2020-27830, CVE-2020-28941)

It was discovered that the memory management subsystem in the Linux kernel
did not properly handle copy-on-write operations in some situations. A
local attacker could possibly use this to gain unintended write access to
read-only memory pages. (CVE-2020-29374)

Michael Kurth and Pawel Wieczorkiewicz discovered that the Xen event
processing backend in the Linux kernel did not properly limit the number of
events queued. An attacker in a guest VM could use this to cause a denial
of service in the host OS. (CVE-2020-29568)

Olivier Benjamin and Pawel Wieczorkiewicz discovered a race condition the
Xen paravirt block backend in the Linux kernel, leading to a use-after-free
vulnerability. An attacker in a guest VM could use this to cause a denial
of service in the host OS. (CVE-2020-29569)

Jann Horn discovered that the tty subsystem of the Linux kernel did not use
consistent locking in some situations, leading to a read-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information (kernel memory).
(CVE-2020-29660)

Jann Horn discovered a race condition in the tty subsystem of the Linux
kernel in the locking for the TIOCSPGRP ioctl(), leading to a use-after-
free vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2020-29661)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27815
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27830
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29568
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29374
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29569
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29661
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25669
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28941

Title: USN-4748-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4748-1
Priorities: medium,low
Description:
It was discovered that the jfs file system implementation in the Linux
kernel contained an out-of-bounds read vulnerability. A local attacker
could use this to possibly cause a denial of service (system crash).
(CVE-2020-27815)

It was discovered that the memory management subsystem in the Linux kernel
did not properly handle copy-on-write operations in some situations. A
local attacker could possibly use this to gain unintended write access to
read-only memory pages. (CVE-2020-29374)

Michael Kurth and Pawel Wieczorkiewicz discovered that the Xen event
processing backend in the Linux kernel did not properly limit the number of
events queued. An attacker in a guest VM could use this to cause a denial
of service in the host OS. (CVE-2020-29568)

Jann Horn discovered that the tty subsystem of the Linux kernel did not use
consistent locking in some situations, leading to a read-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information (kernel memory).
(CVE-2020-29660)

Jann Horn discovered a race condition in the tty subsystem of the Linux
kernel in the locking for the TIOCSPGRP ioctl(), leading to a use-after-
free vulnerability. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2020-29661)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29374
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29661
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-29568
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27815

Title: USN-4747-1: GNU Screen vulnerability
URL: https://ubuntu.com/security/notices/USN-4747-1
Priorities: medium
Description:
Felix Weinmann discovered that GNU Screen incorrectly handled certain
character sequences. A remote attacker could use this issue to cause GNU
Screen to crash, resulting in a denial of service, or possibly execute
arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-26937

Title: USN-4746-1: xterm vulnerability
URL: https://ubuntu.com/security/notices/USN-4746-1
Priorities: medium
Description:
Tavis Ormandy discovered that xterm incorrectly handled certain character
sequences. A remote attacker could use this issue to cause xterm to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-27135 Known Issues: When used on GCP, rsyslog is started before /var/log is mounted. This causes it to log to the root filesystem rather than the mounted persistent disk.

456.144

Available in the Broadcom Support portal

Release Date: February 24, 2021

Known Issues:

This version of the stemcell has the following issues when used on GCP:
* Attempts to use cf ssh timeout.
* The iptables-logger job fails to deploy

This is because rsyslog is started before /var/log is mounted. This causes it to log to the root filesystem rather than the mounted persistent disk.

This issue is fixed in stemcell version 456.146.

Metadata:

BOSH Agent Version: 2.234.9

USNs:


Title: USN-4728-1: snapd vulnerability
URL: https://ubuntu.com/security/notices/USN-4728-1
Priorities: high
Description:
Gilad Reti discovered that snapd did not correctly specify cgroup
delegation when generating systemd service units for various container
management snaps. This could allow a local attacker to escalate privileges
via access to arbitrary devices of the container host from within a
compromised or malicious container.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27352

Title: USN-4718-1: fastd vulnerability
URL: https://ubuntu.com/security/notices/USN-4718-1
Priorities: medium
Description:
It was discovered that fastd incorrectly handled certain packets.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27638

Title: USN-4729-1: Open vSwitch vulnerability
URL: https://ubuntu.com/security/notices/USN-4729-1
Priorities: medium
Description:
Joakim Hindersson discovered that Open vSwitch incorrectly parsed certain
network packets. A remote attacker could use this issue to cause a denial
of service, or possibly alter packet classification.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35498

Title: USN-4724-1: OpenLDAP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4724-1
Priorities: medium
Description:
It was discovered that OpenLDAP incorrectly handled Certificate Exact
Assertion processing. A remote attacker could possibly use this issue to
cause OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36221)

It was discovered that OpenLDAP incorrectly handled saslAuthzTo processing.
A remote attacker could use this issue to cause OpenLDAP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2020-36222, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226)

It was discovered that OpenLDAP incorrectly handled Return Filter control
handling. A remote attacker could use this issue to cause OpenLDAP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2020-36223)

It was discovered that OpenLDAP incorrectly handled certain cancel
operations. A remote attacker could possibly use this issue to cause
OpenLDAP to crash, resulting in a denial of service. (CVE-2020-36227)

It was discovered that OpenLDAP incorrectly handled Certificate List
Extract Assertion processing. A remote attacker could possibly use this
issue to cause OpenLDAP to crash, resulting in a denial of service.
(CVE-2020-36228)

It was discovered that OpenLDAP incorrectly handled X.509 DN parsing. A
remote attacker could possibly use this issue to cause OpenLDAP to crash,
resulting in a denial of service. (CVE-2020-36229, CVE-2020-36230)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36223
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36226
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36227
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36230
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36221
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36229
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36224
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36225
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36228
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-36222

Title: USN-4737-1: Bind vulnerability
URL: https://ubuntu.com/security/notices/USN-4737-1
Priorities: medium
Description:
It was discovered that Bind incorrectly handled GSSAPI security policy
negotiation. A remote attacker could use this issue to cause Bind to crash,
resulting in a denial of service, or possibly execute arbitrary code. In
the default installation, attackers would be isolated by the Bind AppArmor
profile.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8625

Title: USN-4734-1: wpa_supplicant and hostapd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4734-1
Priorities: high,medium
Description:
It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) group information in some situations, leading to a
heap overflow. A physically proximate attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2021-0326)

It was discovered that hostapd did not properly handle UPnP subscribe
messages in some circumstances. An attacker could use this to cause a
denial of service. (CVE-2020-12695)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-0326
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12695

Title: USN-4720-1: Apport vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4720-1
Priorities: medium
Description:
Itai Greenhut discovered that Apport incorrectly parsed certain files in
the /proc filesystem. A local attacker could use this issue to escalate
privileges and run arbitrary code. (CVE-2021-25682, CVE-2021-25683)

Itai Greenhut discovered that Apport incorrectly handled opening certain
special files. A local attacker could possibly use this issue to cause
Apport to hang, resulting in a denial of service. (CVE-2021-25684)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25683
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25682
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-25684 Known Issues: When used on GCP, rsyslog is started before /var/log is mounted. This causes it to log to the root filesystem rather than the mounted persistent disk.

456.137

Available in the Broadcom Support portal

Release Date: February 03, 2021

Metadata:

BOSH Agent Version: 2.234.8

USNs:


Title: USN-4708-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4708-1
Priorities: medium,low
Description:
Wen Xu discovered that the XFS filesystem implementation in the Linux
kernel did not properly track inode validations. An attacker could use this
to construct a malicious XFS image that, when mounted, could cause a denial
of service (system crash). (CVE-2018-13093)

It was discovered that the btrfs file system implementation in the Linux
kernel did not properly validate file system metadata in some situations.
An attacker could use this to construct a malicious btrfs image that, when
mounted, could cause a denial of service (system crash). (CVE-2019-19813,
CVE-2019-19816)

Bodong Zhao discovered a use-after-free in the Sun keyboard driver
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service or possibly execute arbitrary code.
(CVE-2020-25669)

Daniel Axtens discovered that PowerPC RTAS implementation in the Linux
kernel did not properly restrict memory accesses in some situations. A
privileged local attacker could use this to arbitrarily modify kernel
memory, potentially bypassing kernel lockdown restrictions.
(CVE-2020-27777)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27777
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-13093
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19816
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25669
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19813

Title: USN-4709-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4709-1
Priorities: high,low
Description:
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data. (CVE-2020-28374)

Wen Xu discovered that the XFS filesystem implementation in the Linux
kernel did not properly track inode validations. An attacker could use this
to construct a malicious XFS image that, when mounted, could cause a denial
of service (system crash). (CVE-2018-13093)

It was discovered that the btrfs file system implementation in the Linux
kernel did not properly validate file system metadata in some situations.
An attacker could use this to construct a malicious btrfs image that, when
mounted, could cause a denial of service (system crash). (CVE-2019-19813,
CVE-2019-19816)

Bodong Zhao discovered a use-after-free in the Sun keyboard driver
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service or possibly execute arbitrary code.
(CVE-2020-25669)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28374
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19816
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25669
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19813
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-13093

Title: USN-4711-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4711-1
Priorities: high,medium
Description:
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data. (CVE-2020-28374)

Kiyin (尹亮) discovered that the perf subsystem in the Linux kernel did
not properly deallocate memory in some situations. A privileged attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2020-25704)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28374
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25704

Title: USN-4716-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4716-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.23 in Ubuntu 20.04 LTS and Ubuntu 20.10.
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.33.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-33.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-23.html
https://www.oracle.com/security-alerts/cpujan2021.html
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2088
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2076
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2061
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2081
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2065
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2070
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2002
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2072
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2122
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2046
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2048
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2038
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2031
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2056
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2087
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2010
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2036
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2060
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2021
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2024
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2014
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2032
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2058
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-2011

Title: USN-4717-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4717-1
Priorities: medium
Description:
Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information, conduct clickjacking attacks, or execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23954
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23964
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23958
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23960
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23963
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23955
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23961
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23962
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23953
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23956
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-23965

Title: USN-4703-1: Mutt vulnerability
URL: https://ubuntu.com/security/notices/USN-4703-1
Priorities: medium
Description:
It was discovered that Mutt incorrectly handled certain email messages.
An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3181

Title: USN-4715-1: Django vulnerability
URL: https://ubuntu.com/security/notices/USN-4715-1
Priorities: medium
Description:
Wang Baohua discovered that Django incorrectly extracted archive files. A
remote attacker could possibly use this issue to extract files outside of
their expected location.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2021-3281

456.135

Available in the Broadcom Support portal

Release Date: January 27, 2021

Metadata:

BOSH Agent Version: 2.234.7

USNs:


USN: 4705-1
URL: https://ubuntu.com/security/notices/USN-4705-1

USN: 4704-1
URL: https://ubuntu.com/security/notices/USN-4704-1

USN: 4703-1
URL: https://ubuntu.com/security/notices/USN-4703-1

USN: 4702-1
URL: https://ubuntu.com/security/notices/USN-4702-1

USN: 4700-1
URL: https://ubuntu.com/security/notices/USN-4700-1

USN: 4699-1
URL: https://ubuntu.com/security/notices/USN-4699-1

USN: 4698-1
URL: https://ubuntu.com/security/notices/USN-4698-1

USN: 4697-1
URL: https://ubuntu.com/security/notices/USN-4697-1

USN: 4696-1
URL: https://ubuntu.com/security/notices/USN-4696-1

USN: 4695-1
URL: https://ubuntu.com/security/notices/USN-4695-1

USN: 4694-1
URL: https://ubuntu.com/security/notices/USN-4694-1

456.133

Available in the Broadcom Support portal

Release Date: January 15, 2021

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4688-1: JasPer vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4688-1
Priorities: negligible,low,medium
Description:
It was discovered that Jasper incorrectly certain files.
An attacker could possibly use this issue to cause a crash.
(CVE-2018-18873)

It was discovered that Jasper incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2018-19542)

It was discovered that Jasper incorrectly handled certain JPC encoders.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2020-27828)

It was discovered that Jasper incorrectly handled certain images.
An attacker could possibly use this issue to expose sensitive information
or cause a crash.
(CVE-2017-9782)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9782
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18873
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19542
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27828

Title: USN-4672-1: unzip vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4672-1
Priorities: low,negligible
Description:
Rene Freingruber discovered that unzip incorrectly handled certain
specially crafted password protected ZIP archives. If a user or automated
system using unzip were tricked into opening a specially crafted zip file,
an attacker could exploit this to cause a crash, resulting in a denial of
service. (CVE-2018-1000035)

Antonio Carista discovered that unzip incorrectly handled certain
specially crafted ZIP archives. If a user or automated system using unzip
were tricked into opening a specially crafted zip file, an attacker could
exploit this to cause a crash, resulting in a denial of service. This
issue only affected Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
(CVE-2018-18384)

It was discovered that unzip incorrectly handled certain specially crafted
ZIP archives. If a user or automated system using unzip were tricked into
opening a specially crafted zip file, an attacker could exploit this to
cause resource consumption, resulting in a denial of service.
(CVE-2019-13232)

Martin Carpenter discovered that unzip incorrectly handled certain
specially crafted ZIP archives. If a user or automated system using unzip
were tricked into opening a specially crafted zip file, an attacker could
exploit this to cause a crash, resulting in a denial of service. This
issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04
LTS. (CVE-2014-9913)

Alexis Vanden Eijnde discovered that unzip incorrectly handled certain
specially crafted ZIP archives. If a user or automated system using unzip
were tricked into opening a specially crafted zip file, an attacker could
exploit this to cause a crash, resulting in a denial of service. This
issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04
LTS. (CVE-2016-9844)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-1000035
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18384
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-9913
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9844
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13232

Title: USN-4684-1: EDK II vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4684-1
Priorities: low
Description:
Laszlo Ersek discovered that EDK II incorrectly validated certain signed
images. An attacker could possibly use this issue with a specially crafted
image to cause EDK II to hang, resulting in a denial of service. This issue
only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS.
(CVE-2019-14562)

It was discovered that EDK II incorrectly parsed signed PKCS #7 data. An
attacker could use this issue to cause EDK II to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2019-14584)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14584
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14562

Title: USN-4670-1: ImageMagick vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4670-1
Priorities: low,negligible
Description:
It was discovered that ImageMagick incorrectly handled certain specially
crafted image files. If a user or automated system using ImageMagick were
tricked into opening a specially crafted image, an attacker could exploit
this to cause a denial of service or other unspecified impact. This issue
only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.10.
(CVE-2019-19948, CVE-2019-19949)

It was discovered that ImageMagick incorrectly handled certain specially
crafted image files. If a user or automated system using ImageMagick were
tricked into opening a specially crafted image, an attacker could exploit
this to cause a denial of service. (CVE-2020-27560)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19949
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27560
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19948

Title: USN-4680-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4680-1
Priorities: low,medium
Description:
It was discovered that debugfs in the Linux kernel as used by blktrace
contained a use-after-free in some situations. A privileged local attacker
could possibly use this to cause a denial of service (system crash).
(CVE-2019-19770)

It was discovered that a race condition existed in the binder IPC
implementation in the Linux kernel, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-0423)

Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered
that legacy pairing and secure-connections pairing authentication in the
Bluetooth protocol could allow an unauthenticated user to complete
authentication without pairing credentials via adjacent access. A
physically proximate attacker could use this to impersonate a previously
paired Bluetooth device. (CVE-2020-10135)

It was discovered that the console keyboard driver in the Linux kernel
contained a race condition. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2020-25656)

Minh Yuan discovered that the tty driver in the Linux kernel contained race
conditions when handling fonts. A local attacker could possibly use this to
expose sensitive information (kernel memory). (CVE-2020-25668)

Keyu Man discovered that the ICMP global rate limiter in the Linux kernel
could be used to assist in scanning open UDP ports. A remote attacker could
use to facilitate attacks on UDP based services that depend on source port
randomization. (CVE-2020-25705)

Jinoh Kang discovered that the Xen event channel infrastructure in the
Linux kernel contained a race condition. An attacker in guest could
possibly use this to cause a denial of service (dom0 crash).
(CVE-2020-27675)

Daniel Axtens discovered that PowerPC RTAS implementation in the Linux
kernel did not properly restrict memory accesses in some situations. A
privileged local attacker could use this to arbitrarily modify kernel
memory, potentially bypassing kernel lockdown restrictions.
(CVE-2020-27777)

Minh Yuan discovered that the framebuffer console driver in the Linux
kernel did not properly handle fonts in some conditions. A local attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information (kernel memory). (CVE-2020-28974)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0423
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27675
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27777
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25705
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19770
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25668

Title: USN-4687-1: Firefox vulnerability
URL: https://ubuntu.com/security/notices/USN-4687-1
Priorities: medium
Description:
A use-after-free was discovered in Firefox when handling SCTP packets.
An attacker could potentially exploit this to cause a denial of service,
or execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16044

Title: USN-4674-1: Dovecot vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4674-1
Priorities: medium
Description:
It was discovered that Dovecot incorrectly handled certain imap hibernation
commands. A remote authenticated attacker could possibly use this issue to
access other users’ email. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, and Ubuntu 20.10. (CVE-2020-24386)

Innokentii Sennovskiy discovered that Dovecot incorrectly handled MIME
parsing. A remote attacker could possibly use this issue to cause Dovecot
to crash, resulting in a denial of service. (CVE-2020-25275)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24386
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25275

Title: USN-4681-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4681-1
Priorities: medium,low
Description:
Ryan Hall discovered that the Intel 700 Series Ethernet Controllers driver
in the Linux kernel did not properly deallocate memory in some conditions.
A local attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2019-0148)

It was discovered that the console keyboard driver in the Linux kernel
contained a race condition. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2020-25656)

Minh Yuan discovered that the tty driver in the Linux kernel contained race
conditions when handling fonts. A local attacker could possibly use this to
expose sensitive information (kernel memory). (CVE-2020-25668)

Jinoh Kang discovered that the Xen event channel infrastructure in the
Linux kernel contained a race condition. An attacker in guest could
possibly use this to cause a denial of service (dom0 crash).
(CVE-2020-27675)

Minh Yuan discovered that the framebuffer console driver in the Linux
kernel did not properly handle fonts in some conditions. A local attacker
could use this to cause a denial of service (system crash) or possibly
expose sensitive information (kernel memory). (CVE-2020-28974)

It was discovered that Power 9 processors could be coerced to expose
information from the L1 cache in certain situations. A local attacker could
use this to expose sensitive information. (CVE-2020-4788)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25668
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-4788
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0148
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27675
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25656

Title: USN-4671-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4671-1
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information, bypass the CSS sanitizer, bypass security restrictions,
spoof the URL bar, or execute arbitrary code. (CVE-2020-16042,
CVE-2020-26971, CVE-2020-26972, CVE-2020-26793, CVE-2020-26974,
CVE-2020-26976, CVE-2020-26978, CVE-2020-26979,
CVE-2020-35113, CVE-2020-35114)

It was discovered that the proxy.onRequest API did not catch
view-source URLs. If a user were tricked in to installing an
extension with the proxy permission and opening View Source, an
attacker could potentially exploit this to obtain sensitive
information. (CVE-2020-35111)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26971
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26973
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26979
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35111
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26972
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26976
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35113
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-35114
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16042

Title: USN-4666-2: lxml vulnerability
URL: https://ubuntu.com/security/notices/USN-4666-2
Priorities: medium
Description:
USN-4666-1 partially fixed a vulnerability in lxml, but an additional patch was needed. This update provides
the corresponding additional patch in order to properly fix the vulnerability.

Original advisory details:

It was discovered that lxml incorrectly handled certain HTML.
An attacker could possibly use this issue to cross-site scripting (XSS) attacks.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27783

Title: USN-4686-1: Ghostscript vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4686-1
Priorities: medium,low,negligible
Description:
It was discovered that Ghostscript incorrectly handled certain image
files. If a user or automated system were tricked into processing a
specially crafted file, a remote attacker could use this issue to cause
Ghostscript to crash, resulting in a denial of service, or possibly
execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27842
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27845
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27814
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27841
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6851
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27824
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27843
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8112
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-5727

Title: USN-4694-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-4694-1
Priorities: high
Description:
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28374

456.131

Release Date: December 21, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4669-1: SquirrelMail vulnerability
URL: https://ubuntu.com/security/notices/USN-4669-1
Priorities: medium
Description:
It was discovered that a cross-site scripting (XSS) vulnerability in
SquirrelMail allows remote attackers to use malicious script content from
HTML e-mail to execute code and/or provoke a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12970

Title: USN-4657-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4657-1
Priorities: low,medium
Description:
Elena Petrova discovered that the pin controller device tree implementation
in the Linux kernel did not properly handle string references. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-0427)

Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered
that legacy pairing and secure-connections pairing authentication in the
Bluetooth protocol could allow an unauthenticated user to complete
authentication without pairing credentials via adjacent access. A
physically proximate attacker could use this to impersonate a previously
paired Bluetooth device. (CVE-2020-10135)

Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux
kernel did not properly initialize memory in some situations. A physically
proximate remote attacker could use this to expose sensitive information
(kernel memory). (CVE-2020-12352)

It was discovered that a race condition existed in the perf subsystem of
the Linux kernel, leading to a use-after-free vulnerability. An attacker
with access to the perf subsystem could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2020-14351)

It was discovered that the frame buffer implementation in the Linux kernel
did not properly handle some edge cases in software scrollback. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-14390)

It was discovered that the netfilter connection tracker for netlink in the
Linux kernel did not properly perform bounds checking in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2020-25211)

It was discovered that the Rados block device (rbd) driver in the Linux
kernel did not properly perform privilege checks for access to rbd devices
in some situations. A local attacker could use this to map or unmap rbd
block devices. (CVE-2020-25284)

It was discovered that the HDLC PPP implementation in the Linux kernel did
not properly validate input in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2020-25643)

It was discovered that the GENEVE tunnel implementation in the Linux kernel
when combined with IPSec did not properly select IP routes in some
situations. An attacker could use this to expose sensitive information
(unencrypted network traffic). (CVE-2020-25645)

Keyu Man discovered that the ICMP global rate limiter in the Linux kernel
could be used to assist in scanning open UDP ports. A remote attacker could
use to facilitate attacks on UDP based services that depend on source port
randomization. (CVE-2020-25705)

It was discovered that the framebuffer implementation in the Linux kernel
did not properly perform range checks in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-28915)

It was discovered that Power 9 processors could be coerced to expose
information from the L1 cache in certain situations. A local attacker could
use this to expose sensitive information. (CVE-2020-4788)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14351
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25284
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25211
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25705
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0427
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25645
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28915
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-4788
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12352
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25643
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14390

Title: USN-4660-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4660-1
Priorities: low,medium
Description:
It was discovered that a race condition existed in the perf subsystem of
the Linux kernel, leading to a use-after-free vulnerability. An attacker
with access to the perf subsystem could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2020-14351)

It was discovered that the frame buffer implementation in the Linux kernel
did not properly handle some edge cases in software scrollback. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-14390)

It was discovered that the netfilter connection tracker for netlink in the
Linux kernel did not properly perform bounds checking in some situations. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2020-25211)

It was discovered that the Rados block device (rbd) driver in the Linux
kernel did not properly perform privilege checks for access to rbd devices
in some situations. A local attacker could use this to map or unmap rbd
block devices. (CVE-2020-25284)

It was discovered that a race condition existed in the hugetlb sysctl
implementation in the Linux kernel. A privileged attacker could use this to
cause a denial of service (system crash). (CVE-2020-25285)

It was discovered that the block layer subsystem in the Linux kernel did
not properly handle zero-length requests. A local attacker could use this
to cause a denial of service. (CVE-2020-25641)

It was discovered that the HDLC PPP implementation in the Linux kernel did
not properly validate input in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2020-25643)

It was discovered that the GENEVE tunnel implementation in the Linux kernel
when combined with IPSec did not properly select IP routes in some
situations. An attacker could use this to expose sensitive information
(unencrypted network traffic). (CVE-2020-25645)

It was discovered that the framebuffer implementation in the Linux kernel
did not properly perform range checks in certain situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-28915)

It was discovered that Power 9 processors could be coerced to expose
information from the L1 cache in certain situations. A local attacker could
use this to expose sensitive information. (CVE-2020-4788)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14351
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25643
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25284
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25285
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25645
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-28915
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-4788
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25211
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14390
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25641

Title: USN-4661-1: Snapcraft vulnerability
URL: https://ubuntu.com/security/notices/USN-4661-1
Priorities: medium
Description:
It was discovered that Snapcraft includes the current directory when
configuring LD_LIBRARY_PATH for application commands. If a user were
tricked into installing a malicious snap or downloading a malicious
library, under certain circumstances an attacker could exploit this to
affect strict mode snaps that have access to the library and when
launched from the directory containing the library.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27348

Title: USN-4664-1: Aptdaemon vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4664-1
Priorities: medium
Description:
Kevin Backhouse discovered that Aptdaemon incorrectly handled certain
properties. A local attacker could use this issue to test for the presence
of local files. (CVE-2020-16128)

Kevin Backhouse discovered that Aptdaemon incorrectly handled permission
checks. A local attacker could possibly use this issue to cause a denial of
service. (CVE-2020-27349)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27349
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16128

Title: USN-4667-1: APT vulnerability
URL: https://ubuntu.com/security/notices/USN-4667-1
Priorities: medium
Description:
Kevin Backhouse discovered that APT incorrectly handled certain packages.
A local attacker could possibly use this issue to cause APT to crash or
stop responding, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27350

Title: USN-4668-1: python-apt vulnerability
URL: https://ubuntu.com/security/notices/USN-4668-1
Priorities: medium
Description:
Kevin Backhouse discovered that python-apt incorrectly handled resources. A
local attacker could possibly use this issue to cause python-apt to consume
resources, leading to a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-27351

Title: USN-4665-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4665-1
Priorities: medium,low
Description:
Marc Aldorasi discovered that curl incorrectly handled the libcurl
CURLOPT_CONNECT_ONLY option. This could result in data being sent to the
wrong destination, possibly exposing sensitive information. This issue only
affected Ubuntu 20.10. (CVE-2020-8231)

Varnavas Papaioannou discovered that curl incorrectly handled FTP PASV
responses. An attacker could possibly use this issue to trick curl into
connecting to an arbitrary IP address and be used to perform port scanner
and other information gathering. (CVE-2020-8284)

It was discovered that curl incorrectly handled FTP wildcard matchins. A
remote attacker could possibly use this issue to cause curl to consume
resources and crash, resulting in a denial of service. (CVE-2020-8285)

It was discovered that curl incorrectly handled OCSP response verification.
A remote attacker could possibly use this issue to provide a fraudulent
OCSP response. (CVE-2020-8286)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8286
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8285
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8231
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8284

456.130

Release Date: December 17, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4652-1: SniffIt vulnerability
URL: https://ubuntu.com/security/notices/USN-4652-1
Priorities: medium
Description:
It was discovered that SniffIt incorrectly handled certain configuration
files. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-5439

Title: USN-4662-1: OpenSSL vulnerability
URL: https://ubuntu.com/security/notices/USN-4662-1
Priorities: high
Description:
David Benjamin discovered that OpenSSL incorrectly handled comparing
certificates containing a EDIPartyName name type. A remote attacker could
possibly use this issue to cause OpenSSL to crash, resulting in a denial of
service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1971

456.129

Release Date: December 01, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:

456.128

Release Date: November 16, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4587-1: iTALC vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4587-1
Priorities: medium,low
Description:
Nicolas Ruff discovered that iTALC had buffer overflows, divide-by-zero errors and didn’t check malloc return values. A remote attacker could use these issues to cause a denial of service or possibly execute arbitrary code. (CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054, CVE-2014-6055)
Josef Gajdusek discovered that iTALC had…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6051
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6053
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6054
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6055
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9941
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9942
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-15127
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20019
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20020
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20021
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20023
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20024
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20748
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20749
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20750
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7225
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15681

Title: USN-4552-2: Pam-python vulnerability
URL: https://ubuntu.com/security/notices/USN-4552-2
Priorities: medium
Description:
Malte Kraus discovered that Pam-python mishandled certain environment variables. A local attacker could potentially use this vulnerability to execute programs as root.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16729

456.126

Release Date: October 23, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4593-1: FreeType vulnerability
URL: https://ubuntu.com/security/notices/USN-4593-1
Priorities: high
Description:
Sergei Glazunov discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15999

456.125

Release Date: October 20, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4582-1: Vim vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4582-1
Priorities: low
Description:
It was discovered that Vim incorrectly handled permissions on the .swp file. A local attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-17087)
It was discovered that Vim incorrectly handled restricted mode. A local attacker could possibly use this issue to bypass restricted…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17087
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20807

Title: USN-4579-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4579-1
Priorities: low,medium,high
Description:
Hador Manor discovered that the DCCP protocol implementation in the Linux kernel improperly handled socket reuse, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-16119)
Wen Xu discovered that the XFS file system in the Linux kernel…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10322
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14314
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16119
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25285

Title: USN-4591-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4591-1
Priorities: high,medium
Description:
Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux kernel contained a type-confusion error. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12351)
Andy Nguyen discovered that the Bluetooth A2MP implementation in the…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12351
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12352

Title: USN-4589-1: containerd vulnerability
URL: https://ubuntu.com/security/notices/USN-4589-1
Priorities: medium
Description:
It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user’s registry credentials.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15157

Title: USN-4589-2: Docker vulnerability
URL: https://ubuntu.com/security/notices/USN-4589-2
Priorities: medium
Description:
USN-4589-1 fixed a vulnerability in containerd. This update provides the corresponding update for docker.io.
Original advisory details:
It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user’s…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15157

Title: USN-4581-1: Python vulnerability
URL: https://ubuntu.com/security/notices/USN-4581-1
Priorities: medium
Description:
It was discovered that Python incorrectly handled certain character sequences. A remote attacker could possibly use this issue to perform CRLF injection.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26116

Title: USN-4584-1: HtmlUnit vulnerability
URL: https://ubuntu.com/security/notices/USN-4584-1
Priorities: medium
Description:
It was discovered that HtmlUnit incorrectly initialized Rhino engine. An Attacker could possibly use this issue to execute arbitrary Java code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5529

Title: USN-4583-1: PHP vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4583-1
Priorities: medium
Description:
It was discovered that PHP incorrectly handled certain encrypt ciphers. An attacker could possibly use this issue to decrease security or cause incorrect encryption data. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-7069)
It was discorevered that PHP incorrectly handled certain HTTP cookies. An attacker could…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7069
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7070

456.123

Release Date: October 14, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4573-1: Vino vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4573-1
Priorities: medium,low
Description:
Nicolas Ruff discovered that Vino incorrectly handled large ClientCutText messages. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2014-6053)
It was discovered that Vino incorrectly handled certain packet lengths. A remote attacker could possibly use this issue to obtain…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-6053
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-7225
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15681
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14397
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14402
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14403
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14404

Title: USN-4554-1: libPGF vulnerability
URL: https://ubuntu.com/security/notices/USN-4554-1
Priorities: medium
Description:
It was discovered that libPGF lacked proper validation when opening a specially crafted PGF file. An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2015-6673

Title: USN-4557-1: Tomcat vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4557-1
Priorities: low,medium
Description:
It was discovered that the Tomcat realm implementations incorrectly handled passwords when a username didn’t exist. A remote attacker could possibly use this issue to enumerate usernames. (CVE-2016-0762)
Alvaro Munoz and Alexander Mirosh discovered that Tomcat incorrectly limited use of a certain utility method. A malicious application…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-0762
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-5018
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6794
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6796
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6797
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6816
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-8735

Title: USN-4578-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4578-1
Priorities: low,medium,high
Description:
Hador Manor discovered that the DCCP protocol implementation in the Linux kernel improperly handled socket reuse, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-16119)
Wen Xu discovered that the XFS file system in the Linux kernel…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10322
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19448
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14314
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16119
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16120
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25212
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26088

Title: USN-4547-2: SSVNC vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4547-2
Priorities: medium
Description:
It was discovered that the LibVNCClient vendored in SSVNC incorrectly handled certain packet lengths. A remote attacker could possibly use this issue to obtain sensitive information, cause a denial of service, or execute arbitrary code. (CVE-2018-20020, CVE-2018-20021, CVE-2018-20022, CVE-2018-2024)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20020
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20021
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20024

Title: USN-4571-1: rack-cors vulnerability
URL: https://ubuntu.com/security/notices/USN-4571-1
Priorities: medium
Description:
It was discovered that rack-cors did not properly handle relative file paths. An attacker could use this vulnerability to access arbitrary files.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18978

Title: USN-4572-1: Spice vulnerability
URL: https://ubuntu.com/security/notices/USN-4572-1
Priorities: medium
Description:
Frediano Ziglio discovered that Spice incorrectly handled QUIC image decoding. A remote attacker could use this to cause Spice to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14355

Title: USN-4559-1: Samba update
URL: https://ubuntu.com/security/notices/USN-4559-1
Priorities: medium
Description:
Tom Tervoort discovered that the Netlogon protocol implemented by Samba incorrectly handled the authentication scheme. A remote attacker could use this issue to forge an authentication token and steal the credentials of the domain admin.
While a previous security update fixed the issue by changing the "server schannel" setting to default to…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1472

Title: USN-4551-1: Squid vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4551-1
Priorities: low,medium
Description:
Alex Rousskov and Amit Klein discovered that Squid incorrectly handled certain Content-Length headers. A remote attacker could possibly use this issue to perform an HTTP request smuggling attack, resulting in cache poisoning. (CVE-2020-15049)
Amit Klein discovered that Squid incorrectly validated certain data. A remote attacker could possibly use…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15049
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15810
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15811
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24606

Title: USN-4564-1: Apache Tika vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4564-1
Priorities: medium,low
Description:
It was discovered that Apache Tika can have an excessive memory usage by using a crafted or corrupt PSD file. An attacker could use it to cause a denial of service (crash). (CVE-2020-1950, CVE-2020-1951)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1950
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1951

Title: USN-4570-1: urllib3 vulnerability
URL: https://ubuntu.com/security/notices/USN-4570-1
Priorities: medium
Description:
It was discovered that urllib3 incorrectly handled certain character sequences. A remote attacker could possibly use this issue to perform CRLF injection.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-26137

Title: USN-4568-1: Brotli vulnerability
URL: https://ubuntu.com/security/notices/USN-4568-1
Priorities: medium
Description:
It was discovered that Brotli incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8927

456.121

Release Date: September 28, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4500-1: bsdiff vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4500-1
Priorities: medium
Description:
It was discovered that bsdiff mishandled certain input. If a user were tricked into opening a malicious file, an attacker could cause bsdiff to crash or potentially execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2014-9862

Title: USN-4506-1: MCabber vulnerability
URL: https://ubuntu.com/security/notices/USN-4506-1
Priorities: medium
Description:
It was discovered that MCabber does not properly manage roster pushes. An attacker could possibly use this issue to remotely perform man-in-the-middle attacks. (CVE-2016-9928).
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9928

Title: USN-4513-1: apng2gif vulnerability
URL: https://ubuntu.com/security/notices/USN-4513-1
Priorities: medium
Description:
Dileep Kumar Jallepalli discovered that apng2gif incorrectly handled loading APNG files. An attacker could exploit this with a crafted APNG file to access sensitive information. (CVE-2017-6960)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6960

Title: USN-4517-1: Email-Address-List vulnerability
URL: https://ubuntu.com/security/notices/USN-4517-1
Priorities: medium
Description:
It was discovered that Email-Address-List does not properly parse email addresses during email-ingestion. A remote attacker could use this issue to cause an algorithmic complexity attack, resulting in a denial of service. (CVE-2018-18898)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18898

Title: USN-4507-1: ncmpc vulnerability
URL: https://ubuntu.com/security/notices/USN-4507-1
Priorities: medium
Description:
It was discovered that ncmpc incorrectly handled long chat messages. A remote attacker could possibly exploit this with a crafted chat message, causing ncmpc to crash, resulting in a denial of service. (CVE-2018-9240)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-9240

Title: USN-4499-1: MilkyTracker vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4499-1
Priorities: medium
Description:
It was discovered that MilkyTracker did not properly handle certain input. If a user were tricked into opening a malicious file, an attacker could cause MilkyTracker to crash or potentially execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14464
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14496
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14497

Title: USN-4504-1: OpenSSL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4504-1
Priorities: low
Description:
Robert Merget, Marcus Brinkmann, Nimrod Aviram, and Juraj Somorovsky discovered that certain Diffie-Hellman ciphersuites in the TLS specification and implemented by OpenSSL contained a flaw. A remote attacker could possibly use this issue to eavesdrop on encrypted communications. This was fixed in this update by removing the insecure ciphersuites…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1547
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1551
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1563
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1968

Title: USN-4498-1: Loofah vulnerability
URL: https://ubuntu.com/security/notices/USN-4498-1
Priorities: medium
Description:
It was discovered that Loofah does not properly sanitize JavaScript in sanitized output. An attacker could possibly use this issue to perform XSS attacks. (CVE-2019-15587)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15587

Title: USN-4496-1: Apache XML-RPC vulnerability
URL: https://ubuntu.com/security/notices/USN-4496-1
Priorities: medium
Description:
It was discovered that Apache XML-RPC (aka ws-xmlrpc) does not properly deserialize untrusted data. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-17570)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17570

Title: USN-4526-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4526-1
Priorities: low,medium
Description:
It was discovered that the AMD Cryptographic Coprocessor device driver in the Linux kernel did not properly deallocate memory in some situations. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-18808)
It was discovered that the Conexant 23885 TV card device driver for the Linux kernel did not properly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18808
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19054
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19061
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19067
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19073
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19074
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9445
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12888
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14356
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16166

Title: USN-4527-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4527-1
Priorities: low,medium
Description:
It was discovered that the Conexant 23885 TV card device driver for the Linux kernel did not properly deallocate memory in some error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19054)
It was discovered that the Atheros HTC based wireless driver in the Linux kernel did not properly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19054
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19073
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19074
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20811
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9445
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9453
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0067
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25212

Title: USN-4520-1: Exim SpamAssassin vulnerability
URL: https://ubuntu.com/security/notices/USN-4520-1
Priorities: medium
Description:
It was discovered that Exim SpamAssassin does not properly handle configuration strings. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-19920)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19920

Title: USN-4534-1: Perl DBI module vulnerability
URL: https://ubuntu.com/security/notices/USN-4534-1
Priorities: medium
Description:
It was discovered that Perl DBI module incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20919

Title: USN-4535-1: RDFLib vulnerability
URL: https://ubuntu.com/security/notices/USN-4535-1
Priorities: medium
Description:
Gabriel Corona discovered that RDFLib did not properly load modules on the command-line. An attacker could possibly use this issue to cause RDFLib to execute arbitrary code. (CVE-2019-7653)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7653

Title: USN-4528-1: Ceph vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4528-1
Priorities: medium
Description:
Adam Mohammed discovered that Ceph incorrectly handled certain CORS ExposeHeader tags. A remote attacker could possibly use this issue to preform an HTTP header injection attack. (CVE-2020-10753)
Lei Cao discovered that Ceph incorrectly handled certain POST requests with invalid tagging XML. A remote attacker could possibly use this issue…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10753
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12059
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1760

Title: USN-4518-1: xawtv vulnerability
URL: https://ubuntu.com/security/notices/USN-4518-1
Priorities: low
Description:
Matthias Gerstner discovered that xawtv incorrectly handled opening files. A local attacker could possibly use this issue to open and write to arbitrary files and escalate privileges. (CVE-2020-13696)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13696

Title: USN-4521-1: pam_tacplus vulnerability
URL: https://ubuntu.com/security/notices/USN-4521-1
Priorities: low
Description:
It was discovered that pam_tacplus did not properly manage shared secrets if DEBUG loglevel and journald are used. A remote attacker could use this issue to expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13881

Title: USN-4511-1: QEMU vulnerability
URL: https://ubuntu.com/security/notices/USN-4511-1
Priorities: medium
Description:
Ziming Zhang, Xiao Wei, Gonglei Arei, and Yanyu Zhang discovered that QEMU incorrectly handled certain USB packets. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code on the host. In the default installation, when QEMU is used with libvirt, attackers would…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14364

Title: USN-4503-1: Perl DBI module vulnerability
URL: https://ubuntu.com/security/notices/USN-4503-1
Priorities: medium
Description:
It was discovered that Perl DBI module incorrectly handled certain calls. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14392

Title: USN-4537-1: Aptdaemon vulnerability
URL: https://ubuntu.com/security/notices/USN-4537-1
Priorities: medium
Description:
Vaisha Bernard discovered that Aptdaemon incorrectly handled the Locale property. A local attacker could use this issue to test for the presence of local files.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15703

Title: USN-4519-1: PulseAudio vulnerability
URL: https://ubuntu.com/security/notices/USN-4519-1
Priorities: medium
Description:
Ratchanan Srirattanamet discovered that an Ubuntu-specific patch caused PulseAudio to incorrectly handle memory under certain error conditions in the Bluez 5 module. An attacker could use this issue to cause PulseAudio to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-15710)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15710

Title: USN-4501-1: LuaJIT vulnerability
URL: https://ubuntu.com/security/notices/USN-4501-1
Priorities: low
Description:
It was discovered that an out-of-bounds read existed in LuaJIT. An attacker could use this to cause a denial of service (application crash) or possibly expose sensitive information. (CVE-2020-15890)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15890

Title: USN-4538-1: PackageKit vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4538-1
Priorities: low,medium
Description:
Vaisha Bernard discovered that PackageKit incorrectly handled certain methods. A local attacker could use this issue to learn the MIME type of any file on the system. (CVE-2020-16121)
Sami Niemimäki discovered that PackageKit incorrectly handled local deb packages. A local user could possibly use this issue to install untrusted packages, contrary…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16121
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16122

Title: USN-4514-1: libproxy vulnerability
URL: https://ubuntu.com/security/notices/USN-4514-1
Priorities: medium
Description:
It was discovered that libproxy incorrectly handled certain PAC files. An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25219

Title: USN-4508-1: StoreBackup vulnerability
URL: https://ubuntu.com/security/notices/USN-4508-1
Priorities: medium
Description:
It was discovered that StoreBackup did not properly manage lock files. A local attacker could use this issue to cause a denial of service or escalate privileges and run arbitrary code. (CVE-2020-7040)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7040

Title: USN-4515-1: Pure-FTPd vulnerability
URL: https://ubuntu.com/security/notices/USN-4515-1
Priorities: low
Description:
Antonio Norales discovered that Pure-FTPd incorrectly handled directory aliases. An attacker could possibly use this issue to access sensitive information. (CVE-2020-9274)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9274

456.120

Release Date: September 09, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4485-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4485-1
Priorities: low,medium,negligible
Description:
Timothy Michaud discovered that the i915 graphics driver in the Linux kernel did not properly validate user memory locations for the i915_gem_execbuffer2_ioctl. A local attacker could possibly use this to cause a denial of service or execute arbitrary code. (CVE-2018-20669)
It was discovered that the Kvaser CAN/USB driver in the Linux kernel…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20669
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19947
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20810
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10732
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10766
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10767
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10768
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10781
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12655
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12771
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15393
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24394

Title: USN-4476-1: NSS vulnerability
URL: https://ubuntu.com/security/notices/USN-4476-1
Priorities: medium
Description:
It was discovered that NSS incorrectly handled some inputs. An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12403

Title: USN-4490-1: X.Org X Server vulnerability
URL: https://ubuntu.com/security/notices/USN-4490-1
Priorities: medium
Description:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled the XkbSetNames function. A local attacker could possibly use this issue to escalate privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14345

Title: USN-4489-1: Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-4489-1
Priorities: high
Description:
Or Cohen discovered that the AF_PACKET implementation in the Linux kernel did not properly perform bounds checking in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14386

Title: USN-4482-1: Ark vulnerability
URL: https://ubuntu.com/security/notices/USN-4482-1
Priorities: medium
Description:
Fabian Vogt discovered that Ark incorrectly handled symbolic links in tar archive files. An attacker could use this to construct a malicious tar archive that, when opened, would create files outside the extraction directory.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-24654

456.119

Release Date: August 27, 2020

Metadata:

BOSH Agent Version: 2.234.7
This release changes the way the Linux Google light stemcell works to reference a source image. It will lead to a decrease in the time it takes to upload the light stemcell. This change will also help mitigate the impact of the new GCP image creation rate limit which any user uploading more than 6 GCP stemcells an hour would hit.

USNs:


Title: USN-4459-1: Salt vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4459-1
Priorities: medium
Description:
It was discovered that Salt allows remote attackers to determine which files exist on the server. An attacker could use that to extract sensitive information. (CVE-2018-15750)
It was discovered that Salt has a vulnerability that allows an user to bypass authentication. An attacker could use that to extract sensitive information, execute abritrary…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-15750
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-15751
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17361
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11651
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11652

Title: USN-4467-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4467-1
Priorities: medium,low
Description:
Ziming Zhang and VictorV discovered that the QEMU SLiRP networking implementation incorrectly handled replying to certain ICMP echo requests. An attacker inside a guest could possibly use this issue to leak host memory to obtain sensitive information. This issue only affected Ubuntu 18.04 LTS. (CVE-2020-10756)
Eric Blake and Xueqiang Wei…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10756
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10761
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12829
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13253
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13361
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13362
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13659
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13754
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13765
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13800
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14415
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15863
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16092

Title: USN-4463-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4463-1
Priorities: low
Description:
It was discovered that the bcache subsystem in the Linux kernel did not properly release a lock in some error conditions. A local attacker could possibly use this to cause a denial of service. (CVE-2020-12771)
Kyungtae Kim discovered that the USB testing driver in the Linux kernel did not properly deallocate memory on disconnect events. A…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12771
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15393

Title: USN-4469-1: Ghostscript vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4469-1
Priorities: medium
Description:
It was discovered that Ghostscript incorrectly handled certain document files. If a user or automated system were tricked into processing a specially crafted file, a remote attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16287
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16288
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16289
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16290
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16291
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16292
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16293
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16294
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16295
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16296
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16297
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16298
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16299
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16300
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16301
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16302
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16303
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16304
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16305
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16306
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16307
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16308
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16309
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16310
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-17538

Title: USN-4466-1: curl vulnerability
URL: https://ubuntu.com/security/notices/USN-4466-1
Priorities: low
Description:
Marc Aldorasi discovered that curl incorrectly handled the libcurl CURLOPT_CONNECT_ONLY option. This could result in data being sent to the wrong destination, possibly exposing sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8231

Title: USN-4468-1: Bind vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4468-1
Priorities: medium,low
Description:
Emanuel Almeida discovered that Bind incorrectly handled certain TCP payloads. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-8620)
Joseph Gullo discovered that Bind incorrectly handled QNAME minimization when used in certain…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8620
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8621
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8622
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8623
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8624

456.118

Release Date: August 18, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4427-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4427-1
Priorities: negligible,low,medium
Description:
It was discovered that the Kvaser CAN/USB driver in the Linux kernel did not properly initialize memory in certain situations. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2019-19947)
Chuhong Yuan discovered that go7007 USB audio device driver in the Linux kernel did not properly deallocate memory…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12380
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19947
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20810
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20908
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10732
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10766
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10767
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10768
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13974

Title: USN-4446-1: Squid vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4446-1
Priorities: medium
Description:
Jeriko One discovered that Squid incorrectly handled caching certain requests. A remote attacker could possibly use this issue to perform cache-injection attacks or gain access to reverse proxy features such as ESI. (CVE-2019-12520)
Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly handled certain URN requests. A remote…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12520
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12523
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12524
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18676

Title: USN-4426-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4426-1
Priorities: medium
Description:
Jason A. Donenfeld discovered that the ACPI implementation in the Linux kernel did not properly restrict loading SSDT code from an EFI variable. A privileged attacker could use this to bypass Secure Boot lockdown restrictions and execute arbitrary code in the kernel. (CVE-2019-20908)
Fan Yang discovered that the mremap implementation in the Linux…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20908
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10757
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15780

Title: USN-4432-1: GRUB 2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4432-1
Priorities: high,medium
Description:
Jesse Michael and Mickey Shkatov discovered that the configuration parser in GRUB2 did not properly exit when errors were discovered, resulting in heap-based buffer overflows. A local attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. (CVE-2020-10713)
Chris Coulson discovered that the GRUB2 function…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10713
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14308
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14309
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14310
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14311
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15705
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15706
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15707

Title: USN-4449-1: Apport vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4449-1
Priorities: medium
Description:
Ryota Shiga discovered that Apport incorrectly dropped privileges when making certain D-Bus calls. A local attacker could use this issue to read arbitrary files. (CVE-2020-11936)
Seong-Joong Kim discovered that Apport incorrectly parsed configuration files. A local attacker could use this issue to cause Apport to crash, resulting in a denial of…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11936
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15701
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15702

Title: USN-4455-1: NSS vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4455-1
Priorities: medium
Description:
It was discovered that NSS incorrectly handled certain signatures. An attacker could possibly use this issue to expose sensitive information. (CVE-2020-12400, CVE-2020-12401, CVE-2020-6829)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12400
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12401
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6829

Title: USN-4448-1: Tomcat vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4448-1
Priorities: medium,low
Description:
It was discovered that Tomcat incorrectly validated the payload length in a WebSocket frame. A remote attacker could possibly use this issue to cause Tomcat to hang, resulting in a denial of service. (CVE-2020-13935)
It was discovered that Tomcat incorrectly handled HTTP header parsing. In certain environments where Tomcat is located behind a…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9484

Title: USN-4454-1: Samba vulnerability
URL: https://ubuntu.com/security/notices/USN-4454-1
Priorities: medium
Description:
Martin von Wittich and Wilko Meyer discovered that Samba incorrectly handled certain empty UDP packets when being used as a AD DC NBT server. A remote attacker could possibly use this issue to cause Samba to crash, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14303

Title: USN-4441-1: MySQL vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4441-1
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.21 in Ubuntu 20.04 LTS. Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.31.
In addition to security fixes, the updated packages contain bug fixes, new features, and…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14539
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14540
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14547
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14550
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14553
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14559
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14568
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14575
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14576
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14586
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14591
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14597
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14619
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14620
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14623
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14624
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14631
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14632
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14633
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14634
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14641
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14643
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14651
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14654
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14663
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14678
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14680
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14697
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14702

Title: USN-4453-1: OpenJDK 8 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4453-1
Priorities: medium
Description:
Johannes Kuhn discovered that OpenJDK 8 incorrectly handled access control contexts. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-14556)
Philippe Arteau discovered that OpenJDK 8 incorrectly verified names in TLS server’s X.509 certificates. An attacker could possibly use this issue to obtain sensitive…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14556
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14577
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14578
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14579
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14581
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14583
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14593
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14621

Title: USN-4443-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4443-1
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass iframe sandbox restrictions, confuse the user, or execute arbitrary code. (CVE-2020-6463, CVE-2020-6514,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15652
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15653
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15654
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15655
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15656
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15658
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15659
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6463
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6514

Title: USN-4451-1: ppp vulnerability
URL: https://ubuntu.com/security/notices/USN-4451-1
Priorities: medium
Description:
Thomas Chauchefoin working with Trend Micro´s Zero Day Initiative, discovered that ppp incorrectly handled module loading. A local attacker could use this issue to load arbitrary kernel modules and possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15704

Title: USN-4447-1: libssh vulnerability
URL: https://ubuntu.com/security/notices/USN-4447-1
Priorities: medium
Description:
It was discovered that libssh incorrectly handled certain requests. An attacker could possibly use this issue to cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-16135

456.116

Release Date: July 30, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4427-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4427-1
Priorities: low,medium,negligible
Description:
It was discovered that the Kvaser CAN/USB driver in the Linux kernel did not properly initialize memory in certain situations. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2019-19947)
Chuhong Yuan discovered that go7007 USB audio device driver in the Linux kernel did not properly deallocate memory…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12380
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19947
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20810
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20908
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10732
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10766
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10767
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10768
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13974

Title: USN-4426-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4426-1
Priorities: medium
Description:
Jason A. Donenfeld discovered that the ACPI implementation in the Linux kernel did not properly restrict loading SSDT code from an EFI variable. A privileged attacker could use this to bypass Secure Boot lockdown restrictions and execute arbitrary code in the kernel. (CVE-2019-20908)
Fan Yang discovered that the mremap implementation in the Linux…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20908
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10757
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-15780

Title: USN-4436-1: librsvg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4436-1
Priorities: low
Description:
It was discovered that librsvg incorrectly handled parsing certain SVG files. A remote attacker could possibly use this issue to cause librsvg to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-11464)
It was discovered that librsvg incorrectly handled parsing certain SVG files with nested patterns. A…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-11464
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20446

Title: USN-4435-1: ClamAV vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4435-1
Priorities: medium
Description:
It was discovered that ClamAV incorrectly handled parsing ARJ archives. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. (CVE-2020-3327)
It was discovered that ClamAV incorrectly handled scanning malicious files. A local attacker could possibly use this issue to delete arbitrary…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3327
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3350
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3481

Title: USN-4434-1: LibVNCServer vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4434-1
Priorities: medium
Description:
Ramin Farajpour Cami discovered that LibVNCServer incorrectly handled certain malformed unix socket names. A remote attacker could exploit this with a crafted socket name, leading to a denial of service, or possibly execute arbitrary code. (CVE-2019-20839)
It was discovered that LibVNCServer did not properly access byte-aligned data. A remote…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20839
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20840
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14396
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14397
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14398
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14399
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14400
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14401
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14402
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14403
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14404
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14405

Title: USN-4431-1: FFmpeg vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4431-1
Priorities: low,medium
Description:
It was discovered that FFmpeg incorrectly verified empty audio packets or HEVC data. An attacker could possibly use this issue to cause a denial of service via a crafted file. This issue only affected Ubuntu 16.04 LTS, as it was already fixed in Ubuntu 18.04 LTS. For more information see: https://usn.ubuntu.com/usn/usn-3967-1 (CVE-2018-15822,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-15822
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11338
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12730
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13312
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13390
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17539
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17542
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12284
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13904

Title: USN-4428-1: Python vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4428-1
Priorities: low,medium
Description:
It was discovered that Python documentation had a misleading information. A security issue could be possibly caused by wrong assumptions of this information. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-17514)
It was discovered that Python incorrectly handled certain TAR…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17514
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20907
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9674
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14422

Title: USN-4424-1: snapd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4424-1
Priorities: medium
Description:
It was discovered that cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices ran on every boot without restrictions. A physical attacker could exploit this to craft cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption….
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11933
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11934

Title: USN-4421-1: Thunderbird vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4421-1
Priorities: medium
Description:
Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, or execute arbtirary code. (CVE-2020-12405, CVE-2020-12406, CVE-2020-12410, CVE-2020-12417,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12398
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12399
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12405
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12406
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12410
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12417
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12418
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12419
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12420
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12421

Title: USN-4419-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4419-1
Priorities: low,medium
Description:
It was discovered that a race condition existed in the Precision Time Protocol (PTP) implementation in the Linux kernel, leading to a use-after- free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-10690)
Matthew Sheets discovered that the SELinux…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10690
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10711
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12770
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13143
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8992

Title: USN-4414-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4414-1
Priorities: low,medium,negligible
Description:
It was discovered that the network block device (nbd) implementation in the Linux kernel did not properly check for error conditions in some situations. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-16089)
It was discovered that the btrfs file system implementation in the Linux kernel did not properly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12380
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16089
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19036
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19039
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19318
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19377
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19462
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19813
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19816
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10711
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12770
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13143

Title: USN-4416-1: GNU C Library vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4416-1
Priorities: low,medium
Description:
Florian Weimer discovered that the GNU C Library incorrectly handled certain memory operations. A remote attacker could use this issue to cause the GNU C Library to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-12133)
It was discovered that the GNU C Library…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12133
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-18269
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-11236
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-11237
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19591
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6485
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19126
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9169
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10029
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1751
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1752

Title: USN-4415-1: coTURN vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4415-1
Priorities: medium
Description:
Felix Dörre discovered that coTURN response buffer is not initialized properly. An attacker could possibly use this issue to obtain sensitive information. (CVE-2020-4067)
It was discovered that coTURN web server incorrectly handled HTTP POST requests. An attacker could possibly use this issue to cause a denial of service, obtain sensitive…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-4067
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6061
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6062

Title: USN-4408-1: Firefox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4408-1
Priorities: medium
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass permission prompts, or execute arbitrary code. (CVE-2020-12415, CVE-2020-12416, CVE-2020-12417,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12415
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12416
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12417
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12418
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12419
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12420
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12421
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12422
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12424
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12425
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12426

Title: USN-4409-1: Samba vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4409-1
Priorities: medium
Description:
Andrew Bartlett discovered that Samba incorrectly handled certain LDAP queries. A remote attacker could use this issue to cause Samba to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-10730)
Douglas Bagnall discovered that Samba…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10730
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10745
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10760

Title: USN-4407-1: LibVNCServer vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4407-1
Priorities: low,medium
Description:
It was discovered that LibVNCServer incorrectly handled decompressing data. An attacker could possibly use this issue to cause LibVNCServer to crash, resulting in a denial of service. (CVE-2019-15680)
It was discovered that an information disclosure vulnerability existed in LibVNCServer when sending a ServerCutText message. An attacker could…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-18922
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15680
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15681
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15690
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20788

Title: USN-4403-1: Mutt vulnerability and regression
URL: https://ubuntu.com/security/notices/USN-4403-1
Priorities: medium
Description:
It was discovered that Mutt incorrectly handled certain requests. An attacker could possibly use this issue to enable MITM attacks. (CVE-2020-14954)
This update also address a regression caused in the last update USN-4401-1. It only affected Ubuntu 12.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 19.10.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14954

Title: USN-4402-1: curl vulnerabilities
URL: https://ubuntu.com/security/notices/USN-4402-1
Priorities: medium
Description:
Marek Szlagor, Gregory Jefferis and Jeroen Ooms discovered that curl incorrectly handled certain credentials. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-8169)
It was discovered that curl incorrectly handled certain parameters. An attacker could…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8169
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8177

456.115

Release Date: July 20, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4397-1: NSS vulnerabilities
URL: https://usn.ubuntu.com/4397-1/
Priorities: low,medium
Description:
It was discovered that NSS incorrectly handled the TLS State Machine. A remote attacker could possibly use this issue to cause NSS to hang, resulting in a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 19.10. (CVE-2019-17023)
Cesar Pereida Garcia discovered that NSS incorrectly handled DSA key generation. A local attacker…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17023
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12399

Title: USN-4400-1: nfs-utils vulnerability
URL: https://usn.ubuntu.com/4400-1/
Priorities: low
Description:
It was discovered that the nfs-utils package set incorrect permissions on the /var/lib/nfs directory. An attacker could possibly use this issue to escalate privileges.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-3689

Title: USN-4396-1: libexif vulnerabilities
URL: https://usn.ubuntu.com/4396-1/
Priorities: low,medium
Description:
It was discovered that libexif incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information. (CVE-2020-0093, CVE-2020-0182)
It was discovered that libexif incorrectly handled certain inputs. An attacker could possibly use this issue to cause a remote denial of service. (CVE-2020-0198)
It was…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0093
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0182
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0198
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13112
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13113
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13114

Title: USN-4395-1: fwupd vulnerability
URL: https://usn.ubuntu.com/4395-1/
Priorities: medium
Description:
Justin Steven discovered that fwupd incorrectly handled certain signature verification. An attacker could possibly use this issue to install an unsigned firmware.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10759

Title: USN-4398-1: DBus vulnerability
URL: https://usn.ubuntu.com/4398-1/
Priorities: medium
Description:
Kevin Backhouse discovered that DBus incorrectly handled file descriptors. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12049

Title: USN-4401-1: Mutt vulnerabilities
URL: https://usn.ubuntu.com/4401-1/
Priorities: medium,low
Description:
It was discovered that Mutt incorrectly handled certain requests. An attacker could possibly use this issue to enable MITM attacks. (CVE-2020-14093)
It was discovered that Mutt incorrectly handled certain requests. An attacker could possibly use this issue to proceeds with a connection even if the user rejects an expired intermediate…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14093
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-14154

456.114

Release Date: June 17, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4385-1: Intel Microcode vulnerabilities
URL: https://usn.ubuntu.com/4385-1/
Priorities: medium
Description:
It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information….
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0543
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0548
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0549

Title: LSN-0068-1: Kernel Live Patch Security Notice
URL: https://usn.ubuntu.com/lsn/0068-1/
Priorities: medium
Description:
Several security issues were fixed in the kernel.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0543
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8647
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8648
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8649
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11494
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12114

Title: USN-4386-1: libjpeg-turbo vulnerability
URL: https://usn.ubuntu.com/4386-1/
Priorities: medium
Description:
It was discovered that libjpeg-turbo incorrectly handled certain PPM files. An attacker could possibly use this issue to access sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-13790

456.113

Release Date: June 10, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4358-1: libexif vulnerabilities
URL: https://usn.ubuntu.com/4358-1/
Priorities: low,medium
Description:
It was discovered that libexif incorrectly handled certain tags. An attacker could possibly use this issue to cause a denial of service. (CVE-2018-20030)
It was discovered that libexif incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash. (CVE-2020-12767)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20030
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12767

Title: USN-4351-1: Linux firmware vulnerability
URL: https://usn.ubuntu.com/4351-1/
Priorities: medium
Description:
Eli Biham and Lior Neumann discovered that certain Bluetooth devices incorrectly validated key exchange parameters. An attacker could possibly use this issue to obtain sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-5383

Title: USN-4364-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4364-1/
Priorities: low,medium
Description:
It was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19060)
It was discovered that the vhost net driver in the Linux kernel contained a stack buffer overflow. A local…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19060
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10942
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11494
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11565
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11608
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11609
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11668

Title: USN-4354-1: Mailman vulnerability
URL: https://usn.ubuntu.com/4354-1/
Priorities: medium
Description:
It was discovered that Mailman incorrectly handled certain inputs. An attacker could possibly use this issue to inject arbitrary content in the login page.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12108

Title: USN-4352-1: OpenLDAP vulnerability
URL: https://usn.ubuntu.com/4352-1/
Priorities: medium
Description:
It was discovered that OpenLDAP incorrectly handled certain queries. A remote attacker could possibly use this issue to cause OpenLDAP to consume resources, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12243

Title: USN-4353-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4353-1/
Priorities: medium
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, bypass security restrictions, spoof the URL bar, or execute arbitrary code. (CVE-2020-6831, CVE-2020-12387, CVE-2020-12390, CVE-2020-12391, CVE-2020-12394,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12387
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12390
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12391
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12392
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12394
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12395
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12396
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6831

Title: USN-4360-1: json-c vulnerability
URL: https://usn.ubuntu.com/4360-1/
Priorities: medium
Description:
It was discovered that json-c incorrectly handled certain JSON files. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12762

Title: USN-4350-1: MySQL vulnerabilities
URL: https://usn.ubuntu.com/4350-1/
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.80 in Ubuntu 19.10 and Ubuntu 20.04 LTS. Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.30.
In addition to security fixes, the updated packages contain bug fixes,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2759
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2760
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2762
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2763
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2765
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2780
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2804
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2812
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2892
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2893
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2895
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2896
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2897
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2898
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2901
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2903
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2904
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2921
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2922
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2923
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2924
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2925
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2926
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2928
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2930

Title: USN-4359-1: APT vulnerability
URL: https://usn.ubuntu.com/4359-1/
Priorities: medium
Description:
It was discovered that APT incorrectly handled certain filenames during package installation. If an attacker could provide a specially crafted package to be installed by the system administrator, this could cause APT to crash.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3810

Title: USN-4365-1: Bind vulnerabilities
URL: https://usn.ubuntu.com/4365-1/
Priorities: medium
Description:
Lior Shafir, Yehuda Afek, and Anat Bremler-Barr discovered that Bind incorrectly limited certain fetches. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service, or possibly use Bind to perform a reflection attack. (CVE-2020-8616)
Tobias Klein discovered that Bind incorrectly handled…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8616
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8617

Title: LSN-0066-1: Kernel Live Patch Security Notice
URL: https://usn.ubuntu.com/lsn/0066-1/
Priorities: medium
Description:
Several security issues were fixed in the Linux kernel.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8647
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8648
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8649

456.112

Release Date: May 12, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4339-1: OpenEXR vulnerabilities
URL: https://usn.ubuntu.com/4339-1/
Priorities: low,medium
Description:
Brandon Perry discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker could cause a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 20.04 LTS. (CVE-2017-9111, CVE-2017-9113, CVE-2017-9115)
Tan Jie…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9111
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9113
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-9115
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18444
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11758
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11759
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11760
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11761
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11762
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11763
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11764
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11765

Title: USN-4348-1: Mailman vulnerabilities
URL: https://usn.ubuntu.com/4348-1/
Priorities: low,medium
Description:
It was discovered that Mailman incorrectly handled certain inputs. An attacker could possibly use this to issue execute arbitrary scripts or HTML. (CVE-2018-0618)
It was discovered that Mailman incorrectly handled certain inputs. An attacker could possibly use this issue to display arbitrary text on a web page. (CVE-2018-13796)
It was discovered…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-0618
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-13796
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-12137

Title: USN-4349-1: EDK II vulnerabilities
URL: https://usn.ubuntu.com/4349-1/
Priorities: medium,low
Description:
A buffer overflow was discovered in the network stack. An unprivileged user could potentially enable escalation of privilege and/or denial of service. This issue was already fixed in a previous release for 18.04 LTS and 19.10. (CVE-2018-12178)
A buffer overflow was discovered in BlockIo service. An unauthenticated user could potentially enable…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12178
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12180
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12181
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14558
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14559
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14563
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14575
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14586
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14587

Title: USN-4346-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4346-1/
Priorities: low,medium
Description:
It was discovered that the QLogic Fibre Channel driver in the Linux kernel did not properly check for error, leading to a NULL pointer dereference. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-16233)
It was discovered that the Intel Wi-Fi driver in the Linux kernel did not properly check for…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16233
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16234
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19768
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8648
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9383

Title: USN-4345-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4345-1/
Priorities: low,medium,high
Description:
Al Viro discovered that the Linux kernel for s390x systems did not properly perform page table upgrades for kernel sections that use secondary address mode. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2020-11884)
It was discovered that the Intel Wi-Fi driver in the Linux kernel did…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16234
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19768
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10942
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11608
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11609
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11668
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11884
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8648
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9383

Title: USN-4340-1: CUPS vulnerabilities
URL: https://usn.ubuntu.com/4340-1/
Priorities: low,medium
Description:
It was discovered that CUPS incorrectly handled certain language values. A local attacker could possibly use this issue to cause CUPS to crash, leading to a denial of service, or possibly obtain sensitive information. This issue only applied to Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 19.10. (CVE-2019-2228)
Stephan Zeisberg discovered that…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2228
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-3898

Title: USN-4341-1: Samba vulnerabilities
URL: https://usn.ubuntu.com/4341-1/
Priorities: medium
Description:
Andrei Popa discovered that Samba incorrectly handled certain LDAP queries. A remote attacker could use this issue to cause Samba to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-10700)
It was discovered that Samba incorrectly handled certain LDAP…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10700
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10704

456.110

Release Date: April 23, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4333-1: Python vulnerabilities
URL: https://usn.ubuntu.com/4333-1/
Priorities: medium,low
Description:
It was discovered that Python incorrectly stripped certain characters from requests. A remote attacker could use this issue to perform CRLF injection. (CVE-2019-18348)
It was discovered that Python incorrectly handled certain HTTP requests. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-8492)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18348
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8492

Title: USN-4334-1: Git vulnerability
URL: https://usn.ubuntu.com/4334-1/
Priorities: medium
Description:
Carlo Arenas discovered that Git incorrectly handled certain URLs containing newlines, empty hosts, or lacking a scheme. A remote attacker could possibly use this issue to trick Git into returning credential information for a wrong host.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11008

Title: USN-4332-1: File Roller vulnerability
URL: https://usn.ubuntu.com/4332-1/
Priorities: medium
Description:
It was discovered that File Roller incorrectly handled symlinks. An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-11736

456.108

Release Date: April 21, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4326-1: libiberty vulnerabilities
URL: https://usn.ubuntu.com/4326-1/
Priorities: low,medium
Description:
It was discovered that libiberty incorrectly handled parsing certain binaries. If a user or automated system were tricked into processing a specially crafted binary, a remote attacker could use this issue to cause libiberty to crash, resulting in a denial of service, or possibly execute arbitrary code
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12641
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12697
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12698
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12934
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17794
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-17985
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18483
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18484
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18700
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-18701
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-9138
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14250
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9070
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9071

Title: USN-4323-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4323-1/
Priorities: medium
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, or execute arbitrary code. (CVE-2020-6821, CVE-2020-6822, CVE-2020-6824, CVE-2020-6825, CVE-2020-6826)
It was discovered that…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6821
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6822
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6823
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6824
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6825
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6826

Title: USN-4320-1: Linux kernel vulnerability
URL: https://usn.ubuntu.com/4320-1/
Priorities: medium
Description:
Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory).
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8428

Title: USN-4318-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4318-1/
Priorities: medium,low
Description:
Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2020-8428)
Gustavo Romero and Paul Mackerras discovered that the KVM implementation in the Linux kernel for…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8428
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8834
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8992

Title: USN-4324-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4324-1/
Priorities: medium,low
Description:
Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2020-8428)
Shijie Luo discovered that the ext4 file system implementation in the Linux kernel did not…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8428
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8992

456.104

Release Date: April 06, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4311-1: BlueZ vulnerabilities
URL: https://usn.ubuntu.com/4311-1/
Priorities: low,medium
Description:
It was discovered that BlueZ incorrectly handled bonding HID and HOGP devices. A local attacker could possibly use this issue to impersonate non-bonded devices. (CVE-2020-0556)
It was discovered that BlueZ incorrectly handled certain commands. A local attacker could use this issue to cause BlueZ to crash, resulting in a denial of service, or…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-7837
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0556

Title: USN-4316-1: GD Graphics Library vulnerabilities
URL: https://usn.ubuntu.com/4316-1/
Priorities: low
Description:
It was discovered that GD Graphics Library incorrectly handled cloning an image. An attacker could possibly use this issue to cause GD Graphics Library to crash, resulting in a denial of service. (CVE-2018-14553)
It was discovered that GD Graphics Library incorrectly handled loading images from X bitmap format files. An attacker could possibly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14553
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11038

Title: USN-4314-1: pam-krb5 vulnerability
URL: https://usn.ubuntu.com/4314-1/
Priorities: medium
Description:
Russ Allbery discovered that pam-krb5 incorrectly handled some responses. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-10595

Title: USN-4317-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4317-1/
Priorities: high
Description:
Two use-after-free bugs were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could exploit these to cause a denial of service or execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6819
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6820

Title: USN-4315-1: Apport vulnerabilities
URL: https://usn.ubuntu.com/4315-1/
Priorities: high,medium
Description:
Maximilien Bourgeteau discovered that the Apport lock file was created with insecure permissions. This could allow a local attacker to escalate their privileges via a symlink attack. (CVE-2020-8831)
Maximilien Bourgeteau discovered a race condition in Apport when setting crash report permissions. This could allow a local attacker to…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8831
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8833

456.103

Release Date: March 24, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4298-1: SQLite vulnerabilities
URL: https://usn.ubuntu.com/4298-1/
Priorities: medium,low
Description:
It was discovered that SQLite incorrectly handled certain shadow tables. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2019-13734, CVE-2019-13750, CVE-2019-13753)
It was discovered that SQLite incorrectly handled certain corrupt records. An attacker could use…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13734
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13750
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13751
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13752
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13753
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19880
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19923
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19924
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19925
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19926
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19959
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20218
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9327

Title: USN-4299-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4299-1/
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the URL or other browser chrome, obtain sensitive information, bypass Content Security Policy (CSP) protections, or execute arbitrary…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20503
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6805
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6806
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6807
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6808
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6809
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6810
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6811
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6812
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6813
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6814
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6815

Title: USN-4296-1: Django vulnerability
URL: https://usn.ubuntu.com/4296-1/
Priorities: medium
Description:
Norbert Szetei discovered that Django incorrectly handled the GIS functions and aggregates on Oracle. A remote attacker could possibly use this issue to perform an SQL injection attack.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9402

456.100

Release Date: March 03, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4279-2: PHP regression
URL: https://usn.ubuntu.com/4279-2/
Priorities: low
Description:
USN-4279-1 fixed vulnerabilities in PHP. The updated packages caused a regression. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that PHP incorrectly handled certain scripts. An attacker could possibly use this issue to cause a denial of service. This issue only affected…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2015-9253

Title: USN-4290-1: libpam-radius-auth vulnerability
URL: https://usn.ubuntu.com/4290-1/
Priorities: medium
Description:
It was discovered that libpam-radius-auth incorrectly handled certain long passwords. A remote attacker could possibly use this issue to cause libpam-radius-auth to crash, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2015-9542

Title: USN-4292-1: rsync vulnerabilities
URL: https://usn.ubuntu.com/4292-1/
Priorities: low
Description:
It was discovered that rsync incorrectly handled pointer arithmetic in zlib. An attacker could use this issue to cause rsync to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841)
It was discovered that rsync incorrectly handled vectors involving left shifts of negative integers in zlib. An…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9840
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9841
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9842
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9843

Title: USN-4289-1: Squid vulnerabilities
URL: https://usn.ubuntu.com/4289-1/
Priorities: medium
Description:
Jeriko One discovered that Squid incorrectly handled memory when connected to an FTP server. A remote attacker could possibly use this issue to obtain sensitive information from Squid memory. (CVE-2019-12528)
Regis Leroy discovered that Squid incorrectly handled certain HTTP requests. A remote attacker could possibly use this issue to access…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12528
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8449
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8450
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8517

Title: USN-4287-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4287-1/
Priorities: medium,negligible,low
Description:
It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors. A local attacker could use this to expose sensitive information. (CVE-2019-14615)
It was discovered that the Atheros 802.11ac wireless USB device driver in the Linux kernel did not properly validate device…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14615
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15099
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15291
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16229
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16232
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18683
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18786
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18809
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18885
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19057
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19062
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19063
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19071
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19078
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19082
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19227
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19332
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19767
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19965
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20096
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5108
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7053

Title: USN-4286-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4286-1/
Priorities: medium,negligible,low
Description:
It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors. A local attacker could use this to expose sensitive information. (CVE-2019-14615)
It was discovered that a race condition existed in the Softmac USB Prism54 device driver in the Linux kernel. A physically…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14615
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15217
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15220
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15221
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17351
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19051
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19056
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19066
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19068
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19965
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20096
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5108

Title: USN-4293-1: libarchive vulnerabilities
URL: https://usn.ubuntu.com/4293-1/
Priorities: low,medium
Description:
It was discovered that libarchive incorrectly handled certain archive files. An attacker could possibly use this issue to access sensitive information. (CVE-2019-19221)
It was discovered that libarchive incorrectly handled certain archive files. An attacker could possibly use this issue to cause a crash resulting in a denial of service or…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19221
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-9308

Title: USN-4278-2: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4278-2/
Priorities: medium
Description:
USN-4278-1 fixed vulnerabilities in Firefox. This update provides the corresponding update for Ubuntu 16.04 LTS.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, conduct…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6796
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6798
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6800
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-6801

Title: USN-4288-1: ppp vulnerability
URL: https://usn.ubuntu.com/4288-1/
Priorities: medium
Description:
It was discovered that ppp incorrectly handled certain rhostname values. A remote attacker could use this issue to cause ppp to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-8597

456.98

Release Date: February 18, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4277-1: libexif vulnerabilities
URL: https://usn.ubuntu.com/4277-1/
Priorities: low,medium
Description:
Liu Bingchang discovered that libexif incorrectly handled certain files. An attacker could possibly use this issue to access sensitive information or cause a denial of service. This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS. (CVE-2016-6328)
Lili Xu and Bingchang Liu discovered that libexif incorrectly handled…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6328
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-7544
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9278

Title: USN-4275-1: Qt vulnerabilities
URL: https://usn.ubuntu.com/4275-1/
Priorities: low,medium
Description:
It was discovered that Qt incorrectly handled certain PPM images. If a user or automated system were tricked into opening a specially crafted PPM file, a remote attacker could cause Qt to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-19872)
It was discovered that Qt incorrectly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19872
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18281
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0569
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-0570

Title: USN-4272-1: Pillow vulnerabilities
URL: https://usn.ubuntu.com/4272-1/
Priorities: low,medium
Description:
It was discovered that Pillow incorrectly handled certain images. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-16865, CVE-2019-19911)
It was discovered that Pillow incorrectly handled certain images. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-5312)
It was discovered that…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16865
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19911
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5310
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5311
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5312
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5313

Title: USN-4273-1: ReportLab vulnerability
URL: https://usn.ubuntu.com/4273-1/
Priorities: medium
Description:
It was discovered that ReportLab incorrectly handled certain XML documents. If a user or automated system were tricked into processing a specially crafted document, a remote attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17626

Title: USN-4274-1: libxml2 vulnerabilities
URL: https://usn.ubuntu.com/4274-1/
Priorities: low,medium
Description:
It was discovered that libxml2 incorrectly handled certain XML files. An attacker could possibly use this issue to cause a denial of service. (CVE-2019-19956, CVE-2020-7595)
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19956
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7595

456.96

Release Date: February 06, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4246-1: zlib vulnerabilities
URL: https://usn.ubuntu.com/4246-1/
Priorities: low
Description:
It was discovered that zlib incorrectly handled pointer arithmetic. An attacker could use this issue to cause zlib to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841)
It was discovered that zlib incorrectly handled vectors involving left shifts of negative integers. An attacker could use…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9840
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9841
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9842
- https://people.canonical.com/~ubuntu-security/cve/CVE-2016-9843

Title: USN-4259-1: Apache Solr vulnerability
URL: https://usn.ubuntu.com/4259-1/
Priorities: high
Description:
Michael Stepankin and Olga Barinova discovered that Apache Solr was vulnerable to an XXE attack. An attacker could use this vulnerability to remotely execute code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12629

Title: USN-4248-1: GraphicsMagick vulnerabilities
URL: https://usn.ubuntu.com/4248-1/
Priorities: medium
Description:
It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16545
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16547
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16669
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17498
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17500
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17501
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17502
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17503
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17782
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-17783

Title: USN-4252-1: tcpdump vulnerabilities
URL: https://usn.ubuntu.com/4252-1/
Priorities: low,medium
Description:
Multiple security issues were discovered in tcpdump. A remote attacker could use these issues to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16808
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10103
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-10105
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14461
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14462
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14463
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14464
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14465
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14466
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14467
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14468
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14469
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14470
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14879
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14880
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14881
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14882
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16227
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16228
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16229
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16230
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16300
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16451
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-16452
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19519
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1010220
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15166
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15167

Title: USN-4254-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4254-1/
Priorities: medium,negligible,low
Description:
It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors. A local attacker could use this to expose sensitive information. (CVE-2019-14615)
It was discovered that a race condition existed in the Virtual Video Test Driver in the Linux kernel. An attacker with write…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14615
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15291
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18683
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18885
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19057
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19062
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19063
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19227
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19332

Title: USN-4255-2: Linux kernel (HWE) vulnerabilities
URL: https://usn.ubuntu.com/4255-2/
Priorities: medium
Description:
USN-4255-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu 16.04 LTS.
It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14615
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-7053

Title: USN-4244-1: Samba vulnerabilities
URL: https://usn.ubuntu.com/4244-1/
Priorities: low,medium
Description:
It was discovered that Samba did not automatically replicate ACLs set to inherit down a subtree on AD Directory, contrary to expectations. This issue was only addressed in Ubuntu 18.04 LTS, Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-14902)
Robert Święcki discovered that Samba incorrectly handled certain character conversions when the log level is…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14902
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14907
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19344

Title: USN-4247-1: python-apt vulnerabilities
URL: https://usn.ubuntu.com/4247-1/
Priorities: medium
Description:
It was discovered that python-apt would still use MD5 hashes to validate certain downloaded packages. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered packages. (CVE-2019-15795)
It was discovered that python-apt could install packages from untrusted repositories, contrary…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15795
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15796

Title: USN-4263-1: Sudo vulnerability
URL: https://usn.ubuntu.com/4263-1/
Priorities: low
Description:
Joe Vennix discovered that Sudo incorrectly handled memory operations when the pwfeedback option is enabled. A local attacker could possibly use this issue to obtain unintended access to the administrator account.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18634

Title: USN-4256-1: Cyrus SASL vulnerability
URL: https://usn.ubuntu.com/4256-1/
Priorities: medium
Description:
It was discovered that Cyrus SASL incorrectly handled certain LDAP packets. An attacker could possibly use this issue to execute arbitrary code or cause a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19906

Title: USN-4249-1: e2fsprogs vulnerability
URL: https://usn.ubuntu.com/4249-1/
Priorities: medium
Description:
It was discovered that e2fsprogs incorrectly handled certain ext4 partitions. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5188

Title: USN-4265-1: SpamAssassin vulnerabilities
URL: https://usn.ubuntu.com/4265-1/
Priorities: medium
Description:
It was discovered that SpamAssassin incorrectly handled certain CF files. If a user or automated system were tricked into using a specially-crafted CF file, a remote attacker could possibly run arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1930
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-1931

Title: USN-4250-1: MySQL vulnerabilities
URL: https://usn.ubuntu.com/4250-1/
Priorities: medium
Description:
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.19 in Ubuntu 19.10. Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.29.
In addition to security fixes, the updated packages contain bug fixes, new features, and possibly…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2570
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2572
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2573
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2574
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2577
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2579
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2584
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2588
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2589
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2627
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2679
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2686
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2694

Title: USN-4257-1: OpenJDK vulnerabilities
URL: https://usn.ubuntu.com/4257-1/
Priorities: low,medium
Description:
It was discovered that OpenJDK incorrectly handled exceptions during deserialization in BeanContextSupport. An attacker could possibly use this issue to cause a denial of service or other unspecified impact. (CVE-2020-2583)
It was discovered that OpenJDK incorrectly validated properties of SASL messages included in Kerberos GSSAPI. An…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2583
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2590
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2593
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2601
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2604
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2654
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2655
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-2659

Title: USN-4245-1: PySAML2 vulnerability
URL: https://usn.ubuntu.com/4245-1/
Priorities: medium
Description:
It was discovered that PySAML2 incorrectly handled certain SAML files. An attacker could possibly use this issue to bypass signature verification with arbitrary data.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-5390

456.93

Release Date: January 21, 2020

Metadata:

BOSH Agent Version: 2.234.7

USNs:


Title: USN-4232-1: GraphicsMagick vulnerabilities
URL: https://usn.ubuntu.com/4232-1/
Priorities: medium,low
Description:
It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14165
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14314
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14504
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14649
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14733
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14994
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-14997
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15277
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-15930
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16352
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-16353

Title: USN-4237-1: SpamAssassin vulnerabilities
URL: https://usn.ubuntu.com/4237-1/
Priorities: medium
Description:
It was discovered that SpamAssassin incorrectly handled certain CF files. If a user or automated system were tricked into using a specially-crafted CF file, a remote attacker could possibly run arbitrary code. (CVE-2018-11805)
It was discovered that SpamAssassin incorrectly handled certain messages. A remote attacker could possibly use this issue…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-11805
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12420

Title: USN-4238-1: SDL_image vulnerabilities
URL: https://usn.ubuntu.com/4238-1/
Priorities: medium,low
Description:
It was discovered that SDL_image incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-3977
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12216
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12217
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12218
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12219
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12220
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12221
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12222
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13616
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5051
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7635

Title: USN-4240-1: Kamailio vulnerability
URL: https://usn.ubuntu.com/4240-1/
Priorities: high
Description:
It was discovered that Kamailio can be exploited by using a specially crafted message that can cause a buffer overflow issue.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-8828

Title: USN-4239-1: PHP vulnerabilities
URL: https://usn.ubuntu.com/4239-1/
Priorities: low
Description:
It was discovered that PHP incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 ESM, 16.04 LTS, 18.04 LTS, 19.04 and 19.10. (CVE-2019-11045)
It was discovered that PHP incorrectly handled certain inputs. An attacker could possibly use this issue to expose…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11045
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11046
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11047
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11050

Title: USN-4236-2: Libgcrypt vulnerability
URL: https://usn.ubuntu.com/4236-2/
Priorities: medium
Description:
USN-4236-1 fixed a vulnerability in Libgcrypt. This update provides the corresponding fix for Ubuntu 16.04 LTS.
Original advisory details:
It was discovered that Libgcrypt was susceptible to a ECDSA timing attack. An attacker could possibly use this attack to recover sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13627

Title: USN-4227-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4227-1/
Priorities: medium,low
Description:
It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-14895, CVE-2019-14901)
It was discovered that a heap-based buffer overflow existed in the…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14895
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14896
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14897
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14901
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16231
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16233
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19045
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19083
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19524
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19529
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19534
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19807

Title: USN-4228-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4228-1/
Priorities: medium,low
Description:
It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-14895, CVE-2019-14901)
It was discovered that a heap-based buffer overflow existed in the…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14895
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14896
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14897
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14901
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18660
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19524
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19534

Title: USN-4230-1: ClamAV vulnerability
URL: https://usn.ubuntu.com/4230-1/
Priorities: medium
Description:
It was discovered that ClamAV incorrectly handled certain MIME messages. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15961

Title: USN-4231-1: NSS vulnerability
URL: https://usn.ubuntu.com/4231-1/
Priorities: medium
Description:
It was discovered that NSS incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17006

Title: USN-4234-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4234-1/
Priorities: medium,low
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass Content Security Policy (CSP) restrictions, conduct cross-site scripting (XSS) attacks, or execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17016
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17017
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17020
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17022
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17023
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17024
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17025
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17026

Title: USN-4235-1: nginx vulnerability
URL: https://usn.ubuntu.com/4235-1/
Priorities: medium
Description:
Bert JW Regeer and Francisco Oca Gonzalez discovered that nginx incorrectly handled certain error_page configurations. A remote attacker could possibly use this issue to perform HTTP request smuggling attacks and access resources contrary to expectations.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-20372

456.84

Release Date: February 04, 2020

BOSH Agent version: 2.234.7
USNs:

Title: USN-4222-1: GraphicsMagick vulnerabilities
URL: https://usn.ubuntu.com/4222-1/
Priorities: medium,low
Description:
It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-11638
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-11641
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-11642
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-11643
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12935
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12936
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-12937
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13063
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13064
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13065
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13134
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13737
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13775
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13776
- https://people.canonical.com/~ubuntu-security/cve/CVE-2017-13777

Title: USN-4216-2: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4216-2/
Priorities: medium
Description:
USN-4216-1 fixed vulnerabilities in Firefox. This update provides the corresponding update for Ubuntu 16.04 LTS.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11745
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11756
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17005
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17008
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17010
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17011
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17012
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17013
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17014

Title: USN-4220-1: Git vulnerabilities
URL: https://usn.ubuntu.com/4220-1/
Priorities: medium,low
Description:
Joern Schneeweisz and Nicolas Joly discovered that Git contained various security flaws. An attacker could possibly use these issues to overwrite arbitrary paths, execute arbitrary code, and overwrite files in the .git directory.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1348
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1349
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1350
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1351
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1352
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1353
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1354
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-1387
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19604

Title: USN-4217-1: Samba vulnerabilities
URL: https://usn.ubuntu.com/4217-1/
Priorities: medium
Description:
Andreas Oster discovered that the Samba DNS management server incorrectly handled certain records. An authenticated attacker could possibly use this issue to crash Samba, resulting in a denial of service. (CVE-2019-14861)
Isaac Boukris discovered that Samba did not enforce the Kerberos DelegationNotAllowed feature restriction, contrary to…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14861
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14870

Title: USN-4219-1: libssh vulnerability
URL: https://usn.ubuntu.com/4219-1/
Priorities: medium
Description:
It was discovered that libssh incorrectly handled certain scp commands. If a user or automated system were tricked into using a specially-crafted scp command, a remote attacker could execute arbitrary commands on the server.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14889

Title: USN-4221-1: libpcap vulnerability
URL: https://usn.ubuntu.com/4221-1/
Priorities: medium
Description:
It was discovered that libpcap did not properly validate PHB headers in some situations. An attacker could use this to cause a denial of service (memory exhaustion).
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15165

Title: USN-4214-2: RabbitMQ vulnerability
URL: https://usn.ubuntu.com/4214-2/
Priorities: medium
Description:
USN-4214-1 fixed a vulnerability in RabbitMQ. This update provides the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that RabbitMQ incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18609

Title: USN-4224-1: Django vulnerability
URL: https://usn.ubuntu.com/4224-1/
Priorities: high
Description:
Simon Charette discovered that the password reset functionality in Django used a Unicode case insensitive query to retrieve accounts associated with an email address. An attacker could possibly use this to obtain password reset tokens and hijack accounts.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19844

Title: USN-4223-1: OpenJDK vulnerabilities
URL: https://usn.ubuntu.com/4223-1/
Priorities: medium
Description:
Jan Jancar, Petr Svenda, and Vladimir Sedlacek discovered that a side- channel vulnerability existed in the ECDSA implementation in OpenJDK. An Attacker could use this to expose sensitive information. (CVE-2019-2894)
It was discovered that the Socket implementation in OpenJDK did not properly restrict the creation of subclasses with a custom…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2894
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2945
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2949
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2962
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2964
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2973
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2975
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2977
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2981
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2983
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2987
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2988
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2989
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2992
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2999

456.77

Release Date: December 10, 2019

BOSH Agent version: 2.234.7
USNs:

Title: USN-4211-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4211-1/
Priorities: medium,negligible
Description:
Zhipeng Xie discovered that an infinite loop could be triggered in the CFS Linux kernel process scheduler. A local attacker could possibly use this to cause a denial of service. (CVE-2018-20784)
Nicolas Waisman discovered that the WiFi driver stack in the Linux kernel did not properly validate SSID lengths. A physically proximate attacker could…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20784
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17075
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17133

Title: USN-4205-1: SQLite vulnerabilities
URL: https://usn.ubuntu.com/4205-1/
Priorities: low,medium
Description:
It was discovered that SQLite incorrectly handled certain schemas. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 ESM. (CVE-2018-8740)
It was discovered that SQLite incorrectly handled certain schemas. An attacker could possibly use this issue to cause a denial of service. This issue…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-8740
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16168
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19242
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19244
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5018
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5827

Title: USN-4203-1: NSS vulnerability
URL: https://usn.ubuntu.com/4203-1/
Priorities: medium
Description:
It was discovered that NSS incorrectly handled certain memory operations. A remote attacker could use this issue to cause NSS to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11745

Title: USN-4213-1: Squid vulnerabilities
URL: https://usn.ubuntu.com/4213-1/
Priorities: medium,low
Description:
Jeriko One and Kristoffer Danielsson discovered that Squid incorrectly handled certain URN requests. A remote attacker could possibly use this issue to bypass access checks and access restricted servers. This issue was only addressed in Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-12523)
Jeriko One discovered that Squid incorrectly handed URN…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12523
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12526
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12854
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18676
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18677
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18678
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18679

Title: USN-4210-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4210-1/
Priorities: medium,negligible,low
Description:
It was discovered that a buffer overflow existed in the 802.11 Wi-Fi configuration interface for the Linux kernel when handling beacon settings. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-16746)
Nicolas Waisman discovered that the WiFi driver stack in the Linux…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16746
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17075
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17133
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19060
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19065
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-19075

Title: USN-4204-1: psutil vulnerability
URL: https://usn.ubuntu.com/4204-1/
Priorities: medium
Description:
Riccardo Schirone discovered that psutil incorrectly handled certain reference counting operations. An attacker could use this issue to cause psutil to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18874

456.74

Release Date: November 26, 2019

BOSH Agent version: 2.234.7
USNs:

Title: USN-4198-1: DjVuLibre vulnerabilities
URL: https://usn.ubuntu.com/4198-1/
Priorities: low
Description:
It was discovered that DjVuLibre incorrectly handled certain memory operations. If a user or automated system were tricked into processing a specially crafted DjVu file, a remote attacker could cause applications to hang or crash, resulting in a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15142
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15143
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15144
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15145
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18804

456.69

Release Date: November 18, 2019

BOSH Agent version: 2.234.6
USNs:

Title: USN-4186-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4186-1/
Priorities: high,medium
Description:
Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12207
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0154
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0155
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15098
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16746
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17053
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17054
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17055
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17056
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17666
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2215

Title: USN-4185-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4185-1/
Priorities: high,medium
Description:
Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-12207
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0154
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0155
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15098
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17052
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17053
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17054
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17055
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17056
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17666

Title: USN-4190-1: libjpeg-turbo vulnerabilities
URL: https://usn.ubuntu.com/4190-1/
Priorities: low,medium
Description:
It was discovered that libjpeg-turbo incorrectly handled certain BMP images. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-14498)
It was discovered that libjpeg-turbo incorrectly handled certain JPEG images. An attacker could possibly use this…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-14498
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-19664
- https://people.canonical.com/~ubuntu-security/cve/CVE-2018-20330
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-2201

Title: USN-4185-3: Linux kernel vulnerability and regression
URL: https://usn.ubuntu.com/4185-3/
Priorities: high
Description:
USN-4185-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 (i915 missing Blitter Command Streamer check) was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables (EPT) are disabled or not supported. This update…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0155

Title: USN-4186-3: Linux kernel vulnerability
URL: https://usn.ubuntu.com/4186-3/
Priorities: high
Description:
USN-4186-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 (i915 missing Blitter Command Streamer check) was incomplete on 64-bit Intel x86 systems. This update addresses the issue.
We apologize for the inconvenience.
Original advisory details:
Stephan van Schaik, Alyssa Milburn, Sebastian…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0155

Title: USN-4182-1: Intel Microcode update
URL: https://usn.ubuntu.com/4182-1/
Priorities: high,medium
Description:
Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11139

Title: USN-4191-1: QEMU vulnerabilities
URL: https://usn.ubuntu.com/4191-1/
Priorities: low
Description:
It was discovered that the LSI SCSI adapter emulator implementation in QEMU did not properly validate executed scripts. A local attacker could use this to cause a denial of service. (CVE-2019-12068)
Sergej Schumilo, Cornelius Aschermann and Simon Wörner discovered that the qxl paravirtual graphics driver implementation in QEMU contained a…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12068
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12155
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13164
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14378
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15890

Title: USN-4192-1: ImageMagick vulnerabilities
URL: https://usn.ubuntu.com/4192-1/
Priorities: low,negligible,medium
Description:
It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12974
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12975
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12976
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12977
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12978
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12979
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13135
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13137
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13295
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13297
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13300
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13301
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13304
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13305
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13306
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13307
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13308
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13309
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13310
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13311
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13391
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13454
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14981
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15139
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15140
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16708
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16709
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16710
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16711
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16713

456.58

Release Date: November 12, 2019

BOSH Agent version: 2.234.6
USNs:

Title: USN-4171-1: Apport vulnerabilities
URL: https://usn.ubuntu.com/4171-1/
Priorities: low,medium
Description:
Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local attacker to possibly crash Apport or have other unspecified consequences. (CVE-2019-11481)
Sander Bos discovered a race-condition in Apport during core dump creation. This could be used by a local attacker to generate a…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11481
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11482
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11483
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11485
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15790

Title: USN-4170-1: Whoopsie vulnerability
URL: https://usn.ubuntu.com/4170-1/
Priorities: medium
Description:
Kevin Backhouse discovered Whoopsie incorrectly handled very large crash reports. A local attacker could possibly use this issue to cause a denial of service, expose sensitive information or execute code as the whoopsie user.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11484

Title: USN-4176-1: GNU cpio vulnerability
URL: https://usn.ubuntu.com/4176-1/
Priorities: medium
Description:
Thomas Habets discovered that GNU cpio incorrectly handled certain inputs. An attacker could possibly use this issue to access sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14866

Title: USN-4172-1: file vulnerability
URL: https://usn.ubuntu.com/4172-1/
Priorities: medium
Description:
It was discovered that file incorrectly handled certain malformed files. An attacker could use this issue to cause a denial of service, or possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18218

Title: USN-4174-1: HAproxy vulnerability
URL: https://usn.ubuntu.com/4174-1/
Priorities: medium
Description:
It was discovered that HAproxy incorrectly handled certain HTTP requests. An attacker could possibly use this issue to a privilege escalation (Request Smuggling).
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18277

Title: USN-4169-1: libarchive vulnerability
URL: https://usn.ubuntu.com/4169-1/
Priorities: medium
Description:
It was discovered that libarchive incorrectly handled certain archive files. An attacker could possibly execute arbitrary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-18408

Title: USN-4175-1: Nokogiri vulnerability
URL: https://usn.ubuntu.com/4175-1/
Priorities: medium
Description:
It was discovered that Nokogiri incorrectly handled inputs. A remote attacker could possibly use this issue to execute arbitrary OS commands.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5477

456.51

Release Date: October 29, 2019

BOSH Agent version: 2.234.5

Addresses CVE-2019-17596

456.40

Release Date: October 24, 2019

BOSH Agent version: 2.234.3
USNs:

Title: USN-4150-1: Thunderbird vulnerabilities
URL: https://usn.ubuntu.com/4150-1/
Priorities: medium
Description:
It was discovered that encrypted S/MIME parts in a multipart message can leak plaintext contents when included in a HTML reply or forward in some circumstances. If a user were tricked in to replying to or forwarding a specially crafted message, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11739)
Multiple…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11739

Title: USN-4150-1: Thunderbird vulnerabilities
URL: https://usn.ubuntu.com/4150-1/
Priorities: medium
Description:
It was discovered that encrypted S/MIME parts in a multipart message can leak plaintext contents when included in a HTML reply or forward in some circumstances. If a user were tricked in to replying to or forwarding a specially crafted message, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11739)
Multiple…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11740

Title: USN-4150-1: Thunderbird vulnerabilities
URL: https://usn.ubuntu.com/4150-1/
Priorities: medium
Description:
It was discovered that encrypted S/MIME parts in a multipart message can leak plaintext contents when included in a HTML reply or forward in some circumstances. If a user were tricked in to replying to or forwarding a specially crafted message, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11739)
Multiple…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11742

Title: USN-4150-1: Thunderbird vulnerabilities
URL: https://usn.ubuntu.com/4150-1/
Priorities: medium
Description:
It was discovered that encrypted S/MIME parts in a multipart message can leak plaintext contents when included in a HTML reply or forward in some circumstances. If a user were tricked in to replying to or forwarding a specially crafted message, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11739)
Multiple…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11743

Title: USN-4150-1: Thunderbird vulnerabilities
URL: https://usn.ubuntu.com/4150-1/
Priorities: medium
Description:
It was discovered that encrypted S/MIME parts in a multipart message can leak plaintext contents when included in a HTML reply or forward in some circumstances. If a user were tricked in to replying to or forwarding a specially crafted message, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11739)
Multiple…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11744

Title: USN-4150-1: Thunderbird vulnerabilities
URL: https://usn.ubuntu.com/4150-1/
Priorities: medium
Description:
It was discovered that encrypted S/MIME parts in a multipart message can leak plaintext contents when included in a HTML reply or forward in some circumstances. If a user were tricked in to replying to or forwarding a specially crafted message, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11739)
Multiple…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11746

Title: USN-4150-1: Thunderbird vulnerabilities
URL: https://usn.ubuntu.com/4150-1/
Priorities: medium
Description:
It was discovered that encrypted S/MIME parts in a multipart message can leak plaintext contents when included in a HTML reply or forward in some circumstances. If a user were tricked in to replying to or forwarding a specially crafted message, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11739)
Multiple…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11752

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13616

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7572

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7573

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7574

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7575

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7576

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7577

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7578

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7635

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7636

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7637

Title: USN-4156-1: SDL vulnerabilities
URL: https://usn.ubuntu.com/4156-1/
Priorities: low,medium
Description:
It was discovered that SDL incorrectly handled certain images. If a user were tricked into opening a crafted image file, a remote attacker could use this issue to cause SDL to crash, resulting in a denial of service, or possibly execute arbitary code.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-7638

Title: USN-4154-1: Sudo vulnerability
URL: https://usn.ubuntu.com/4154-1/
Priorities: medium
Description:
Joe Vennix discovered that Sudo incorrectly handled certain user IDs. An attacker could potentially exploit this to execute arbitrary commands as the root user.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14287

Title: USN-4151-1: Python vulnerabilities
URL: https://usn.ubuntu.com/4151-1/
Priorities: medium,low
Description:
It was discovered that Python incorrectly parsed certain email addresses. A remote attacker could possibly use this issue to trick Python applications into accepting email addresses that should be denied. (CVE-2019-16056)
It was discovered that the Python documentation XML-RPC server incorrectly handled certain fields. A remote attacker could use…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16056

Title: USN-4151-1: Python vulnerabilities
URL: https://usn.ubuntu.com/4151-1/
Priorities: medium,low
Description:
It was discovered that Python incorrectly parsed certain email addresses. A remote attacker could possibly use this issue to trick Python applications into accepting email addresses that should be denied. (CVE-2019-16056)
It was discovered that the Python documentation XML-RPC server incorrectly handled certain fields. A remote attacker could use…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-16935

Title: USN-4155-1: Aspell vulnerability
URL: https://usn.ubuntu.com/4155-1/
Priorities: medium
Description:
It was discovered that Aspell incorrectly handled certain inputs. An attacker could potentially access sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-17544

456.30

Release Date: October 08, 2019

BOSH Agent version: 2.234.2
USNs:

456.27

Release Date: September 24, 2019

BOSH Agent version: 2.234.2
USNs:

456.25

Release Date: September 19, 2019

BOSH Agent version: 2.117.13
USNs:

Title: USN-4128-1: Tomcat vulnerabilities
URL: https://usn.ubuntu.com/4128-1/
Priorities: low,medium
Description:
It was discovered that the Tomcat 8 SSI printenv command echoed user provided data without escaping it. An attacker could possibly use this issue to perform an XSS attack. (CVE-2019-0221)
It was discovered that Tomcat 8 did not address HTTP/2 connection window exhaustion on write while addressing CVE-2019-0199. An attacker could possibly use…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-0221
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-10072

Title: USN-4133-1: Wireshark vulnerabilities
URL: https://usn.ubuntu.com/4133-1/
Priorities: low,medium
Description:
It was discovered that Wireshark improperly handled certain input. A remote or local attacker could cause Wireshark to crash by injecting malformed packets onto the wire or convincing someone to read a malformed packet trace file.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12295
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-13619

Title: USN-4134-1: IBus vulnerability
URL: https://usn.ubuntu.com/4134-1/
Priorities: medium
Description:
Simon McVittie discovered that IBus did not enforce appropriate access controls on its private D-Bus socket. A local unprivileged user who discovers the IBus socket address of another user could exploit this to capture the key strokes of the other user.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14822

Title: USN-4115-2: Linux kernel regression
URL: https://usn.ubuntu.com/4115-2
Description:
USN 4115-1 introduced a regression in the Linux kernel
CVEs:

Title: USN-4135-1: Linux kernel vulnerabilities
URL: https://usn.ubuntu.com/4135-1/
Priorities: high,medium
Description:
Peter Pi discovered a buffer overflow in the virtio network backend (vhost_net) implementation in the Linux kernel. An attacker in a guest may be able to use this to cause a denial of service (host OS crash) or possibly execute arbitrary code in the host OS. (CVE-2019-14835)
It was discovered that the Linux kernel on PowerPC architectures did…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-14835
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15030
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15031

Title: USN-4132-1: Expat vulnerability
URL: https://usn.ubuntu.com/4132-1/
Priorities: medium
Description:
It was discovered that Expat incorrectly handled certain XML files. An attacker could possibly use this issue to expose sensitive information.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15903

Title: USN-4129-1: curl vulnerabilities
URL: https://usn.ubuntu.com/4129-1/
Priorities: medium
Description:
Thomas Vegas discovered that curl incorrectly handled memory when using Kerberos over FTP. A remote attacker could use this issue to crash curl, resulting in a denial of service. (CVE-2019-5481)
Thomas Vegas discovered that curl incorrectly handled memory during TFTP transfers. A remote attacker could use this issue to crash curl, resulting in a…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5481
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-5482

456.22

Release Date: September 10, 2019

BOSH Agent version: 2.234.2
USNs:

Title: USN-4122-1: Firefox vulnerabilities
URL: https://usn.ubuntu.com/4122-1/
Priorities: medium,low,negligible
Description:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to obtain sensitive information, bypass Content Security Policy (CSP) protections, bypass same-origin restrictions, conduct cross-site scripting (XSS) attacks, cause a denial of service,…
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-9812

Title: USN-4124-1: Exim vulnerability
URL: https://usn.ubuntu.com/4124-1/
Priorities: high
Description:
It was discovered that Exim incorrectly handled certain decoding operations. A remote attacker could possibly use this issue to execute arbitrary commands.
CVEs:
- https://people.canonical.com/~ubuntu-security/cve/CVE-2019-15846

456.16

Release Date: September 03, 2019

Updating golang to versions that fixed CVEs disclosed here:
https://github.com/golang/go/issues/33606

For more details, please read:
https://kb.cert.org/vuls/id/605641/ which describes all the CVEs that cause the HTTP/2 implementations vulnerable to DDOS.
and
https://vuls.cert.org/confluence/pages/viewpage.action?pageId=56393752 which shows a matrix of what http/2 implementations are affected by which vulnerabilities.

Because stemcells are implemented in golang, the vulnerabilities fixed in this patch are:
CVE-2019-9512, also known as Ping Flood
CVE-2019-9514, also known as Reset Flood

456.14

Release Date: August 27, 2019

BOSH Agent version: 2.234.0
Bi-weekly stemcell release

456.12

Release Date: August 16, 2019

BOSH Agent version: 2.234.0
Bi-weekly stemcell bump

456.3

Release Date: August 01, 2019

BOSH Agent version: 2.234.0
Bi-weekly update

456.1

Release Date: August 01, 2019

BOSH Agent version: 2.234.0
First release for 456 major line

check-circle-line exclamation-circle-line close-line
Scroll to top icon