Skip to content

ubuntu jammy v1.529

Compare
Choose a tag to compare
@cf-bosh-ci-bot cf-bosh-ci-bot released this 21 Aug 18:43
· 341 commits to ubuntu-jammy since this release

Metadata:

BOSH Agent Version: 2.679.0
Kernel Version: 5.15.0.118.118

USNs:

Title: USN-6895-4: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6895-4
Priorities: medium,low,high
Description:
It was discovered that the ATA over Ethernet (AoE) driver in the Linux
kernel contained a race condition, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6270)

It was discovered that the HugeTLB file system component of the Linux
Kernel contained a NULL pointer dereference vulnerability. A privileged
attacker could possibly use this to to cause a denial of service.
(CVE-2024-0841)

It was discovered that the Open vSwitch implementation in the Linux kernel
could overflow its stack during recursive action operations under certain
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-1151)

Gui-Dong Han discovered that the software RAID driver in the Linux kernel
contained a race condition, leading to an integer overflow vulnerability. A
privileged attacker could possibly use this to cause a denial of service
(system crash). (CVE-2024-23307)

Bai Jiaju discovered that the Xceive XC4000 silicon tuner device driver in
the Linux kernel contained a race condition, leading to an integer overflow
vulnerability. An attacker could possibly use this to cause a denial of
service (system crash). (CVE-2024-24861)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

Title: USN-6922-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6922-2
Priorities: low,medium
Description:
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)

Chenyuan Yang discovered that the Unsorted Block Images (UBI) flash device
volume management subsystem did not properly validate logical eraseblock
sizes in certain situations. An attacker could possibly use this to cause a
denial of service (system crash). (CVE-2024-25739)
CVEs:

Title: USN-6940-1: snapd vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6940-1
Priorities: medium
Description:
Neil McPhail discovered that snapd did not properly restrict writes to the
$HOME/bin path in the AppArmor profile for snaps using the home plug. An
attacker who could convince a user to install a malicious snap could use this
vulnerability to escape the snap sandbox. (CVE-2024-1724)

Zeyad Gouda discovered that snapd failed to properly check the file type when
extracting a snap. An attacker who could convince a user to install a malicious
snap containing non-regular files could then cause snapd to block indefinitely
while trying to read from such files and cause a denial of
service. (CVE-2024-29068)

Zeyad Gouda discovered that snapd failed to properly check the destination of
symbolic links when extracting a snap. An attacker who could convince a user to
install a malicious snap containing crafted symbolic links could then cause
snapd to write out the contents of the symbolic link destination into a
world-readable directory. This in-turn could allow a local unprivileged user to
gain access to privileged information. (CVE-2024-29069)
CVEs:

Title: USN-6942-1: Gross vulnerability
URL: https://ubuntu.com/security/notices/USN-6942-1
Priorities: medium
Description:
It was discovered that Gross incorrectly handled memory when composing log
entries. An attacker could possibly use this issue to cause Gross to crash,
resulting in a denial of service, or possibly execute arbitrary code.
CVEs:

Title: USN-6943-1: Tomcat vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6943-1
Priorities: low,medium
Description:
It was discovered that Tomcat incorrectly handled certain uncommon
PersistenceManager with FileStore configurations. A remote attacker could
possibly use this issue to execute arbitrary code. This issue only affected
tomcat8 for Ubuntu 18.04 LTS (CVE-2020-9484)

It was discovered that Tomcat incorrectly handled certain HTTP/2 connection
requests. A remote attacker could use this issue to obtain wrong responses
possibly containing sensitive information. This issue only affected tomcat8
for Ubuntu 18.04 LTS (CVE-2021-25122)

Thomas Wozenilek discovered that Tomcat incorrectly handled certain TLS
packets. A remote attacker could possibly use this issue to cause a denial
of service. This issue only affected tomcat8 for Ubuntu 18.04 LTS
(CVE-2021-41079)

Trung Pham discovered that a race condition existed in Tomcat when handling
session files with FileStore. A remote attacker could possibly use this
issue to execute arbitrary code. This issue affected tomcat8 for Ubuntu
16.04 LTS and Ubuntu 18.04 LTS, and tomcat9 for Ubuntu 18.04 LTS and Ubuntu
20.04 LTS (CVE-2022-23181)

It was discovered that Tomcat's documentation incorrectly stated that
EncryptInterceptor provided availability protection when running over an
untrusted network. A remote attacker could possibly use this issue to cause
a denial of service even if EncryptInterceptor was being used. This issue
affected tomcat8 for Ubuntu 18.04 LTS, and tomcat9 for Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS (CVE-2022-29885)
CVEs:

Title: USN-6945-1: wpa_supplicant and hostapd vulnerability
URL: https://ubuntu.com/security/notices/USN-6945-1
Priorities: medium
Description:
Rory McNamara discovered that wpa_supplicant could be made to load
arbitrary shared objects by unprivileged users that have access to
the control interface. An attacker could use this to escalate privileges
to root.
CVEs:

Title: USN-6949-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6949-1
Priorities: medium,high
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

Title: USN-6950-1: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6950-1
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

Title: USN-6950-2: Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6950-2
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

Title: USN-6950-3: Linux kernel (Oracle) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6950-3
Priorities: medium
Description:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

Title: USN-6954-1: QEMU vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6954-1
Priorities: medium
Description:
Markus Frank and Fiona Ebner discovered that QEMU did not properly
handle certain memory operations, leading to a NULL pointer dereference.
An authenticated user could potentially use this issue to cause a denial
of service. (CVE-2023-6683)

Xiao Lei discovered that QEMU did not properly handle certain memory
operations when specific features were enabled, which could lead to a
stack overflow. An attacker could potentially use this issue to leak
sensitive information. (CVE-2023-6693)

It was discovered that QEMU had an integer underflow vulnerability in
the TI command, which would result in a buffer overflow. An attacker
could potentially use this issue to cause a denial of service.
(CVE-2024-24474)
CVEs:

Title: USN-6956-1: Linux kernel (Azure) vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6956-1
Priorities: medium,high
Description:
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde
discovered that an untrusted hypervisor could inject malicious #VC
interrupts and compromise the security guarantees of AMD SEV-SNP. This flaw
is known as WeSee. A local attacker in control of the hypervisor could use
this to expose sensitive information or possibly execute arbitrary code in
the trusted execution environment. (CVE-2024-25742)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:

Title: USN-6959-1: .NET vulnerability
URL: https://ubuntu.com/security/notices/USN-6959-1
Priorities: medium
Description:
It was discovered that .NET suffered from an information disclosure
vulnerability. An attacker could potentially use this issue to
read targeted email messages.
CVEs:

Title: USN-6960-1: RMagick vulnerability
URL: https://ubuntu.com/security/notices/USN-6960-1
Priorities: medium
Description:
Nick Browning discovered that RMagick incorrectly handled memory under
certain operations. An attacker could possibly use this issue to cause
a denial of service through memory exhaustion.
CVEs:

Title: USN-6961-1: BusyBox vulnerabilities
URL: https://ubuntu.com/security/notices/USN-6961-1
Priorities: low,medium
Description:
It was discovered that BusyBox did not properly validate user input when
performing certain arithmetic operations. If a user or automated system
were tricked into processing a specially crafted file, an attacker could
possibly use this issue to cause a denial of service, or execute arbitrary
code. (CVE-2022-48174)

It was discovered that BusyBox incorrectly managed memory when evaluating
certain awk expressions. An attacker could possibly use this issue to cause
a denial of service, or execute arbitrary code. This issue only affected
Ubuntu 24.04 LTS. (CVE-2023-42363, CVE-2023-42364, CVE-2023-42365)
CVEs: