[USN-6790-1] amavisd-new vulnerability
[USN-6788-1] WebKitGTK vulnerabilities
[USN-6791-1] Unbound vulnerability
[USN-6789-1] LibreOffice vulnerability
[USN-6786-1] Netatalk vulnerabilities
[USN-6790-1] amavisd-new vulnerability
==========================================================================
Ubuntu Security Notice USN-6790-1
May 28, 2024
amavisd-new vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
amavisd-new could be made to bypass security measures.
Software Description:
- amavisd-new: Interface between MTA and virus scanner/content filters
Details:
It was discovered that amavisd-new incorrectly handled certain MIME email
messages with multiple boundary parameters. A remote attacker could
possibly use this issue to bypass checks for banned files or malware.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
amavisd-new 1:2.13.0-3ubuntu2
Ubuntu 23.10
amavisd-new 1:2.13.0-3ubuntu1.1
Ubuntu 22.04 LTS
amavisd-new 1:2.12.2-1ubuntu1.1
Ubuntu 20.04 LTS
amavisd-new 1:2.11.0-6.1ubuntu1.1
After a standard system update you need to reboot your computer to make all
the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6790-1
CVE-2024-28054
Package Information:
https://launchpad.net/ubuntu/+source/amavisd-new/1:2.13.0-3ubuntu2
https://launchpad.net/ubuntu/+source/amavisd-new/1:2.13.0-3ubuntu1.1
https://launchpad.net/ubuntu/+source/amavisd-new/1:2.12.2-1ubuntu1.1
https://launchpad.net/ubuntu/+source/amavisd-new/1:2.11.0-6.1ubuntu1.1
[USN-6788-1] WebKitGTK vulnerabilities
==========================================================================
Ubuntu Security Notice USN-6788-1
May 28, 2024
webkit2gtk vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in WebKitGTK.
Software Description:
- webkit2gtk: Web content engine library for GTK+
Details:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
libjavascriptcoregtk-4.1-0 2.44.2-0ubuntu0.24.04.1
libjavascriptcoregtk-6.0-1 2.44.2-0ubuntu0.24.04.1
libwebkit2gtk-4.1-0 2.44.2-0ubuntu0.24.04.1
libwebkitgtk-6.0-4 2.44.2-0ubuntu0.24.04.1
Ubuntu 23.10
libjavascriptcoregtk-4.0-18 2.44.2-0ubuntu0.23.10.1
libjavascriptcoregtk-4.1-0 2.44.2-0ubuntu0.23.10.1
libjavascriptcoregtk-6.0-1 2.44.2-0ubuntu0.23.10.1
libwebkit2gtk-4.0-37 2.44.2-0ubuntu0.23.10.1
libwebkit2gtk-4.1-0 2.44.2-0ubuntu0.23.10.1
libwebkitgtk-6.0-4 2.44.2-0ubuntu0.23.10.1
Ubuntu 22.04 LTS
libjavascriptcoregtk-4.0-18 2.44.2-0ubuntu0.22.04.1
libjavascriptcoregtk-4.1-0 2.44.2-0ubuntu0.22.04.1
libjavascriptcoregtk-6.0-1 2.44.2-0ubuntu0.22.04.1
libwebkit2gtk-4.0-37 2.44.2-0ubuntu0.22.04.1
libwebkit2gtk-4.1-0 2.44.2-0ubuntu0.22.04.1
libwebkitgtk-6.0-4 2.44.2-0ubuntu0.22.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK, such as Epiphany, to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6788-1
CVE-2024-27834
Package Information:
https://launchpad.net/ubuntu/+source/webkit2gtk/2.44.2-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/webkit2gtk/2.44.2-0ubuntu0.23.10.1
https://launchpad.net/ubuntu/+source/webkit2gtk/2.44.2-0ubuntu0.22.04.1
[USN-6791-1] Unbound vulnerability
==========================================================================
Ubuntu Security Notice USN-6791-1
May 28, 2024
unbound vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Unbound could be made to take part in a denial of service attack.
Software Description:
- unbound: validating, recursive, caching DNS resolver
Details:
It was discovered that Unbound could take part in a denial of service
amplification attack known as DNSBomb. This update introduces certain
resource limits to make the impact from Unbound significantly lower.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
libunbound8 1.19.2-1ubuntu3.1
unbound 1.19.2-1ubuntu3.1
Ubuntu 23.10
libunbound8 1.17.1-2ubuntu0.2
unbound 1.17.1-2ubuntu0.2
Ubuntu 22.04 LTS
libunbound8 1.13.1-1ubuntu5.5
unbound 1.13.1-1ubuntu5.5
Ubuntu 20.04 LTS
libunbound8 1.9.4-2ubuntu1.6
unbound 1.9.4-2ubuntu1.6
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6791-1
CVE-2024-33655
Package Information:
https://launchpad.net/ubuntu/+source/unbound/1.19.2-1ubuntu3.1
https://launchpad.net/ubuntu/+source/unbound/1.17.1-2ubuntu0.2
https://launchpad.net/ubuntu/+source/unbound/1.13.1-1ubuntu5.5
https://launchpad.net/ubuntu/+source/unbound/1.9.4-2ubuntu1.6
[USN-6789-1] LibreOffice vulnerability
==========================================================================
Ubuntu Security Notice USN-6789-1
May 28, 2024
libreoffice vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
LibreOffice could be made to run programs when clicking a graphic.
Software Description:
- libreoffice: Office productivity suite
Details:
Amel Bouziane-Leblond discovered that LibreOffice incorrectly handled
graphic on-click bindings. If a user were tricked into clicking a graphic
in a specially crafted document, a remote attacker could possibly run
arbitrary script.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
libreoffice 4:24.2.3-0ubuntu0.24.04.2
Ubuntu 23.10
libreoffice 4:7.6.7-0ubuntu0.23.10.2
Ubuntu 22.04 LTS
libreoffice 1:7.3.7-0ubuntu0.22.04.5
Ubuntu 20.04 LTS
libreoffice 1:6.4.7-0ubuntu0.20.04.10
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6789-1
CVE-2024-3044
Package Information:
https://launchpad.net/ubuntu/+source/libreoffice/4:24.2.3-0ubuntu0.24.04.2
https://launchpad.net/ubuntu/+source/libreoffice/4:7.6.7-0ubuntu0.23.10.2
https://launchpad.net/ubuntu/+source/libreoffice/1:7.3.7-0ubuntu0.22.04.5
https://launchpad.net/ubuntu/+source/libreoffice/1:6.4.7-0ubuntu0.20.04.10
[USN-6786-1] Netatalk vulnerabilities
==========================================================================
Ubuntu Security Notice USN-6786-1
May 28, 2024
netatalk vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Netatalk could allow arbitrary code execution if it receives a specially
crafted input.
Software Description:
- netatalk: Apple Filing Protocol service
Details:
It was discovered that Netatalk did not properly protect an SMB and AFP
default configuration. A remote attacker could possibly use this issue to
execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
netatalk 3.1.12~ds-9ubuntu0.22.04.3+esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
netatalk 3.1.12~ds-4ubuntu0.20.04.3+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6786-1
CVE-2022-22995