[USN-7265-1] BlueZ vulnerabilities
[USN-7266-1] digiKam vulnerabilities
[USN-7235-3] Linux kernel (AWS) vulnerabilities
[USN-7234-4] Linux kernel (AWS) vulnerabilities
[USN-7238-4] Linux kernel (AWS) vulnerabilities
[USN-7236-3] Linux kernel (Azure) vulnerabilities
[USN-7265-1] BlueZ vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7265-1
February 12, 2025
bluez vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
BlueZ could be made to crash or run programs as your login if it received
specially crafted Bluetooth requests.
Software Description:
- bluez: Bluetooth tools and daemons
Details:
Julian Rauchberger discovered that BlueZ did not correctly handle certain
memory operations. An attacker could possibly use this issue to leak
sensitive information or execute arbitrary code.
(CVE-2019-8921, CVE-2019-8922)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS
bluez 5.37-0ubuntu5.3+esm5
Available with Ubuntu Pro
libbluetooth3 5.37-0ubuntu5.3+esm5
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7265-1
CVE-2019-8921, CVE-2019-8922
[USN-7266-1] digiKam vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7266-1
February 13, 2025
digikam vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in digiKam.
Software Description:
- digikam: digital photo management application for KDE
Details:
Zinuo Han and Ao Wang discovered that the Android DNG SDK, vendored in
digiKam, did not correctly parse certain files. An attacker could possibly
use this issue to execute arbitrary code. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2017-0691)
It was discovered that Platinum Upnp SDK, vendored in digiKam, was
vulnerable to a path traversal attack. An attacker could possibly use this
issue to leak sensitive information. This issue only affected
Ubuntu 20.04 LTS. (CVE-2020-19858)
It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to leak sensitive information. This issue only affected
Ubuntu 20.04 LTS. (CVE-2020-22628)
It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-35530,
CVE-2020-35531, CVE-2020-35532, CVE-2020-35533)
It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
This issue only affected Ubuntu 20.04 LTS. (CVE-2021-32142)
It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-1729)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
digikam 4:7.5.0-3ubuntu0.1~esm1
Available with Ubuntu Pro
showfoto 4:7.5.0-3ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
digikam 4:6.4.0+dfsg-3ubuntu0.1~esm1
Available with Ubuntu Pro
showfoto 4:6.4.0+dfsg-3ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
digikam 4:5.6.0-0ubuntu10+esm1
Available with Ubuntu Pro
showfoto 4:5.6.0-0ubuntu10+esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
digikam 4:4.12.0-0ubuntu7+esm1
Available with Ubuntu Pro
showfoto 4:4.12.0-0ubuntu7+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7266-1
CVE-2017-0691, CVE-2020-19858, CVE-2020-22628, CVE-2020-35530,
CVE-2020-35531, CVE-2020-35532, CVE-2020-35533, CVE-2021-32142,
CVE-2023-1729
[USN-7235-3] Linux kernel (AWS) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7235-3
February 12, 2025
linux-aws-5.15 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Netfilter;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53164, CVE-2024-53103, CVE-2024-53141)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
linux-image-5.15.0-1077-aws 5.15.0-1077.84~20.04.1
linux-image-aws 5.15.0.1077.84~20.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7235-3
https://ubuntu.com/security/notices/USN-7235-2
https://ubuntu.com/security/notices/USN-7235-1
CVE-2024-53103, CVE-2024-53141, CVE-2024-53164
Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-5.15/5.15.0-1077.84~20.04.1
[USN-7234-4] Linux kernel (AWS) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7234-4
February 12, 2025
linux-aws vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
Details:
Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- TTY drivers;
- Netfilter;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53141, CVE-2024-53103, CVE-2024-40967, CVE-2024-53164)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
linux-image-5.4.0-1139-aws 5.4.0-1139.149
linux-image-aws-lts-20.04 5.4.0.1139.136
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7234-4
https://ubuntu.com/security/notices/USN-7234-3
https://ubuntu.com/security/notices/USN-7234-2
https://ubuntu.com/security/notices/USN-7234-1
CVE-2023-21400, CVE-2024-40967, CVE-2024-53103, CVE-2024-53141,
CVE-2024-53164
Package Information:
https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1139.149
[USN-7238-4] Linux kernel (AWS) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7238-4
February 12, 2025
linux-aws vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53103, CVE-2024-53164)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.10
linux-image-6.11.0-1008-aws 6.11.0-1008.8
linux-image-aws 6.11.0-1008.8
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7238-4
https://ubuntu.com/security/notices/USN-7238-3
https://ubuntu.com/security/notices/USN-7238-2
https://ubuntu.com/security/notices/USN-7238-1
CVE-2024-53103, CVE-2024-53164
Package Information:
https://launchpad.net/ubuntu/+source/linux-aws/6.11.0-1008.8
[USN-7236-3] Linux kernel (Azure) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7236-3
February 12, 2025
linux-azure-6.8 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-azure-6.8: Linux kernel for Microsoft Azure cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Netfilter;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53164, CVE-2024-53103, CVE-2024-53141)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-6.8.0-1021-azure 6.8.0-1021.25~22.04.1
linux-image-6.8.0-1021-azure-fde 6.8.0-1021.25~22.04.1
linux-image-azure 6.8.0-1021.25~22.04.1
linux-image-azure-fde 6.8.0-1021.25~22.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7236-3
https://ubuntu.com/security/notices/USN-7236-2
https://ubuntu.com/security/notices/USN-7236-1
CVE-2024-53103, CVE-2024-53141, CVE-2024-53164
Package Information:
https://launchpad.net/ubuntu/+source/linux-azure-6.8/6.8.0-1021.25~22.04.1