Ubuntu 6588 Published by

The following security updates are available for Ubuntu Linux:

[USN-6846-1] Ansible vulnerabilities
[USN-6844-1] CUPS vulnerability
[USN-6849-1] Salt vulnerabilities
[USN-6746-2] Google Guest Agent and Google OS Config Agent vulnerability




[USN-6846-1] Ansible vulnerabilities


==========================================================================
Ubuntu Security Notice USN-6846-1
June 25, 2024

ansible vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Ansible.

Software Description:
- ansible: Configuration management, deployment, and task execution system

Details:

It was discovered that Ansible incorrectly handled certain inputs when using
tower_callback parameter. If a user or an automated system were tricked into
opening a specially crafted input file, a remote attacker could possibly use
this issue to obtain sensitive information. This issue only affected Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-3697)

It was discovered that Ansible incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file, a
remote attacker could possibly use this issue to perform a Template Injection.
(CVE-2023-5764)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
ansible 2.10.7+merged+base+2.10.8+dfsg-1ubuntu0.1~esm4
Available with Ubuntu Pro

Ubuntu 20.04 LTS
ansible 2.9.6+dfsg-1ubuntu0.1~esm2
Available with Ubuntu Pro

Ubuntu 18.04 LTS
ansible 2.5.1+dfsg-1ubuntu0.1+esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
ansible 2.0.0.2-2ubuntu1.3+esm2
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6846-1
CVE-2022-3697, CVE-2023-5764



[USN-6844-1] CUPS vulnerability


==========================================================================
Ubuntu Security Notice USN-6844-1
June 24, 2024

cups vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

CUPS could be made to arbitrary chmod paths with specially
crafted configuration file.

Software Description:
- cups: Common UNIX Printing System(tm)

Details:

Rory McNamara discovered that when starting the cupsd server with a
Listen configuration item, the cupsd process fails to validate if
bind call passed. An attacker could possibly trick cupsd to perform
an arbitrary chmod of the provided argument, providing world-writable
access to the target.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
cups 2.4.7-1.2ubuntu7.1

Ubuntu 23.10
cups 2.4.6-0ubuntu3.1

Ubuntu 22.04 LTS
cups 2.4.1op1-1ubuntu4.9

Ubuntu 20.04 LTS
cups 2.3.1-9ubuntu1.7

Ubuntu 18.04 LTS
cups 2.2.7-1ubuntu2.10+esm4
Available with Ubuntu Pro

Ubuntu 16.04 LTS
cups 2.1.3-4ubuntu0.11+esm6
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6844-1
CVE-2024-35235

Package Information:
https://launchpad.net/ubuntu/+source/cups/2.4.7-1.2ubuntu7.1
https://launchpad.net/ubuntu/+source/cups/2.4.6-0ubuntu3.1
https://launchpad.net/ubuntu/+source/cups/2.4.1op1-1ubuntu4.9
https://launchpad.net/ubuntu/+source/cups/2.3.1-9ubuntu1.7



[USN-6849-1] Salt vulnerabilities


==========================================================================
Ubuntu Security Notice USN-6849-1
June 25, 2024

salt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Salt.

Software Description:
- salt: Infrastructure management built on a dynamic communication bus

Details:

It was discovered that Salt incorrectly validated method calls and
sanitized paths. A remote attacker could possibly use this issue to access
some methods without authentication. (CVE-2020-11651, CVE-2020-11652)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS
  salt-common                     0.17.5+ds-1ubuntu0.1~esm2
                                  Available with Ubuntu Pro
  salt-master                     0.17.5+ds-1ubuntu0.1~esm2
                                  Available with Ubuntu Pro
  salt-minion                     0.17.5+ds-1ubuntu0.1~esm2
                                  Available with Ubuntu Pro

After a standard system update you need to restart Salt to make all the
necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6849-1
  CVE-2020-11651, CVE-2020-11652



[USN-6746-2] Google Guest Agent and Google OS Config Agent vulnerability


==========================================================================
Ubuntu Security Notice USN-6746-2
June 25, 2024

google-guest-agent, google-osconfig-agent vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Google Guest Agent and OS Config Agent could be made to crash
if it open a specially crafted JSON.

Software Description:
- google-guest-agent: Google Compute Engine Guest Agent
- google-osconfig-agent: Google OS Config Agent

Details:

USN-6746-1 fixed vulnerabilities in Google Guest Agent and Google
OS Config Agent. This update provides the corresponding update for
Ubuntu 24.04 LTS.

Original advisory details:

It was discovered that Google Guest Agent and Google OS Config Agent incorrectly
handled certain JSON files. An attacker could possibly use this issue to
cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
google-guest-agent 20240213.00-0ubuntu3.1
google-osconfig-agent 20240320.00-0ubuntu1~24.04.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6746-2
https://ubuntu.com/security/notices/USN-6746-1
CVE-2024-24786

Package Information:
https://launchpad.net/ubuntu/+source/google-guest-agent/20240213.00-0ubuntu3.1
https://launchpad.net/ubuntu/+source/google-osconfig-agent/20240320.00-0ubuntu1~24.04.1