[USN-7042-3] cups-browsed vulnerability
[USN-7062-2] libgsf vulnerabilities
[USN-7072-2] Linux kernel (GKE) vulnerabilities
[USN-7042-3] cups-browsed vulnerability
==========================================================================
Ubuntu Security Notice USN-7042-3
October 21, 2024
cups-browsed vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10
Summary:
cups-browsed could be made to run programs if it received specially crafted
network traffic.
Software Description:
- cups-browsed: OpenPrinting cups-browsed
Details:
USN-7042-2 released an improved fix for cups-browsed. This update provides
the corresponding update for Ubuntu 24.10.
Original advisory details:
Simone Margaritelli discovered that cups-browsed could be used to create
arbitrary printers from outside the local network. In combination with
issues in other printing components, a remote attacker could possibly use
this issue to connect to a system, created manipulated PPD files, and
execute arbitrary code when a printer is used. This update disables
support for the legacy CUPS printer discovery protocol.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.10
cups-browsed 2.0.1-0ubuntu2.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7042-3
https://ubuntu.com/security/notices/USN-7042-2
https://ubuntu.com/security/notices/USN-7042-1
CVE-2024-47176
Package Information:
https://launchpad.net/ubuntu/+source/cups-browsed/2.0.1-0ubuntu2.1
[USN-7062-2] libgsf vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7062-2
October 21, 2024
libgsf vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10
Summary:
libgsf could be made to run programs as your login if it opened a specially
crafted file.
Software Description:
- libgsf: GObject introspection data for the Structured File Library
Details:
USN-7062-1 fixed vulnerabilities in libgsf. This update provides the
corresponding updates for Ubuntu 24.10.
Original advisory details:
It was discovered that libgsf incorrectly handled certain Compound
Document Binary files. If a user or automated system were tricked into
opening a specially crafted file, a remote attacker could possibly use
this issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.10
libgsf-1-114 1.14.52-1ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7062-2
https://ubuntu.com/security/notices/USN-7062-1
CVE-2024-36474, CVE-2024-42415
Package Information:
https://launchpad.net/ubuntu/+source/libgsf/1.14.52-1ubuntu0.1
[USN-7072-2] Linux kernel (GKE) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7072-2
October 21, 2024
linux-gke vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Watchdog drivers;
- Netfilter;
- Network traffic control;
(CVE-2024-38630, CVE-2024-27397, CVE-2024-45016)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1068-gke 5.15.0-1068.74
linux-image-gke 5.15.0.1068.67
linux-image-gke-5.15 5.15.0.1068.67
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7072-2
https://ubuntu.com/security/notices/USN-7072-1
CVE-2024-27397, CVE-2024-38630, CVE-2024-45016
Package Information:
https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1068.74