Ubuntu 6685 Published by

Ubuntu Linux has received updates that include BlueZ, digiKam, and various kernel updates:

[USN-7265-1] BlueZ vulnerabilities
[USN-7266-1] digiKam vulnerabilities
[USN-7235-3] Linux kernel (AWS) vulnerabilities
[USN-7234-4] Linux kernel (AWS) vulnerabilities
[USN-7238-4] Linux kernel (AWS) vulnerabilities
[USN-7236-3] Linux kernel (Azure) vulnerabilities




[USN-7265-1] BlueZ vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7265-1
February 12, 2025

bluez vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

BlueZ could be made to crash or run programs as your login if it received
specially crafted Bluetooth requests.

Software Description:
- bluez: Bluetooth tools and daemons

Details:

Julian Rauchberger discovered that BlueZ did not correctly handle certain
memory operations. An attacker could possibly use this issue to leak
sensitive information or execute arbitrary code.
(CVE-2019-8921, CVE-2019-8922)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS
  bluez                           5.37-0ubuntu5.3+esm5
                                  Available with Ubuntu Pro
  libbluetooth3                   5.37-0ubuntu5.3+esm5
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7265-1
  CVE-2019-8921, CVE-2019-8922



[USN-7266-1] digiKam vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7266-1
February 13, 2025

digikam vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in digiKam.

Software Description:
- digikam: digital photo management application for KDE

Details:

Zinuo Han and Ao Wang discovered that the Android DNG SDK, vendored in
digiKam, did not correctly parse certain files. An attacker could possibly
use this issue to execute arbitrary code. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2017-0691)

It was discovered that Platinum Upnp SDK, vendored in digiKam, was
vulnerable to a path traversal attack. An attacker could possibly use this
issue to leak sensitive information. This issue only affected
Ubuntu 20.04 LTS. (CVE-2020-19858)

It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to leak sensitive information. This issue only affected
Ubuntu 20.04 LTS. (CVE-2020-22628)

It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-35530,
CVE-2020-35531, CVE-2020-35532, CVE-2020-35533)

It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
This issue only affected Ubuntu 20.04 LTS. (CVE-2021-32142)

It was discovered that LibRaw, vendored in digiKam, did not correctly
handle certain memory operations. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2023-1729)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
  digikam                         4:7.5.0-3ubuntu0.1~esm1
                                  Available with Ubuntu Pro
  showfoto                        4:7.5.0-3ubuntu0.1~esm1
                                  Available with Ubuntu Pro

Ubuntu 20.04 LTS
  digikam                         4:6.4.0+dfsg-3ubuntu0.1~esm1
                                  Available with Ubuntu Pro
  showfoto                        4:6.4.0+dfsg-3ubuntu0.1~esm1
                                  Available with Ubuntu Pro

Ubuntu 18.04 LTS
  digikam                         4:5.6.0-0ubuntu10+esm1
                                  Available with Ubuntu Pro
  showfoto                        4:5.6.0-0ubuntu10+esm1
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  digikam                         4:4.12.0-0ubuntu7+esm1
                                  Available with Ubuntu Pro
  showfoto                        4:4.12.0-0ubuntu7+esm1
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7266-1
  CVE-2017-0691, CVE-2020-19858, CVE-2020-22628, CVE-2020-35530,
  CVE-2020-35531, CVE-2020-35532, CVE-2020-35533, CVE-2021-32142,
  CVE-2023-1729



[USN-7235-3] Linux kernel (AWS) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7235-3
February 12, 2025

linux-aws-5.15 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Netfilter;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53164, CVE-2024-53103, CVE-2024-53141)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.15.0-1077-aws 5.15.0-1077.84~20.04.1
linux-image-aws 5.15.0.1077.84~20.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7235-3
https://ubuntu.com/security/notices/USN-7235-2
https://ubuntu.com/security/notices/USN-7235-1
CVE-2024-53103, CVE-2024-53141, CVE-2024-53164

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-5.15/5.15.0-1077.84~20.04.1



[USN-7234-4] Linux kernel (AWS) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7234-4
February 12, 2025

linux-aws vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems

Details:

Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux
kernel did not properly handle locking for rings with IOPOLL, leading to a
double-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-21400)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- TTY drivers;
- Netfilter;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53141, CVE-2024-53103, CVE-2024-40967, CVE-2024-53164)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1139-aws 5.4.0-1139.149
linux-image-aws-lts-20.04 5.4.0.1139.136

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7234-4
https://ubuntu.com/security/notices/USN-7234-3
https://ubuntu.com/security/notices/USN-7234-2
https://ubuntu.com/security/notices/USN-7234-1
CVE-2023-21400, CVE-2024-40967, CVE-2024-53103, CVE-2024-53141,
CVE-2024-53164

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1139.149



[USN-7238-4] Linux kernel (AWS) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7238-4
February 12, 2025

linux-aws vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53103, CVE-2024-53164)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
linux-image-6.11.0-1008-aws 6.11.0-1008.8
linux-image-aws 6.11.0-1008.8

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7238-4
https://ubuntu.com/security/notices/USN-7238-3
https://ubuntu.com/security/notices/USN-7238-2
https://ubuntu.com/security/notices/USN-7238-1
CVE-2024-53103, CVE-2024-53164

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws/6.11.0-1008.8



[USN-7236-3] Linux kernel (Azure) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7236-3
February 12, 2025

linux-azure-6.8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure-6.8: Linux kernel for Microsoft Azure cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Netfilter;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-53164, CVE-2024-53103, CVE-2024-53141)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-6.8.0-1021-azure 6.8.0-1021.25~22.04.1
linux-image-6.8.0-1021-azure-fde 6.8.0-1021.25~22.04.1
linux-image-azure 6.8.0-1021.25~22.04.1
linux-image-azure-fde 6.8.0-1021.25~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7236-3
https://ubuntu.com/security/notices/USN-7236-2
https://ubuntu.com/security/notices/USN-7236-1
CVE-2024-53103, CVE-2024-53141, CVE-2024-53164

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure-6.8/6.8.0-1021.25~22.04.1