[USN-6983-1] FFmpeg vulnerability
[USN-6984-1] WebOb vulnerability
[USN-6973-4] Linux kernel (Raspberry Pi) vulnerabilities
[USN-6983-1] FFmpeg vulnerability
==========================================================================
Ubuntu Security Notice USN-6983-1
September 02, 2024
ffmpeg vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
FFmpeg could be made to crash or run programs as your login if it
opened a specially crafted file.
Software Description:
- ffmpeg: Tools for transcoding, streaming and playing of multimedia files
Details:
Zeng Yunxiang discovered that FFmpeg incorrectly handled memory during
video encoding. An attacker could possibly use this issue to perform a
denial of service, or execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
ffmpeg 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libavcodec-dev 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libavcodec-extra60 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libavcodec60 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libavdevice60 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libavfilter-extra9 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libavfilter9 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libavformat-extra60 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libavformat60 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libavutil58 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libpostproc57 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libswresample4 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
libswscale7 7:6.1.1-3ubuntu5+esm2
Available with Ubuntu Pro
Ubuntu 22.04 LTS
ffmpeg 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libavcodec-dev 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libavcodec-extra58 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libavcodec58 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libavdevice58 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libavfilter-extra7 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libavfilter7 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libavformat-extra58 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libavformat58 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libavutil56 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libpostproc55 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libswresample3 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
libswscale5 7:4.4.2-0ubuntu0.22.04.1+esm5
Available with Ubuntu Pro
Ubuntu 20.04 LTS
ffmpeg 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavcodec-dev 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavcodec-extra58 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavcodec58 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavdevice58 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavfilter-extra7 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavfilter7 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavformat58 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavresample4 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavutil56 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libpostproc55 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libswresample3 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
libswscale5 7:4.2.7-0ubuntu0.1+esm6
Available with Ubuntu Pro
Ubuntu 18.04 LTS
ffmpeg 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavcodec-dev 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavcodec-extra57 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavcodec57 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavdevice57 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavfilter-extra6 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavfilter6 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavformat57 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavresample3 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libavutil55 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libpostproc54 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libswresample2 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
libswscale4 7:3.4.11-0ubuntu0.1+esm6
Available with Ubuntu Pro
Ubuntu 16.04 LTS
ffmpeg 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libav-tools 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libavcodec-dev 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libavcodec-ffmpeg-extra56 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libavcodec-ffmpeg56 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libavdevice-ffmpeg56 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libavfilter-ffmpeg5 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libavformat-ffmpeg56 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libavresample-ffmpeg2 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libavutil-ffmpeg54 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libpostproc-ffmpeg53 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libswresample-ffmpeg1 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
libswscale-ffmpeg3 7:2.8.17-0ubuntu0.1+esm8
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6983-1
CVE-2024-32230
[USN-6984-1] WebOb vulnerability
==========================================================================
Ubuntu Security Notice USN-6984-1
September 02, 2024
python-webob vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
WebOb could be made to redirect of forward to undesired URLs.
Software Description:
- python-webob: Python module providing WSGI request and response objects
Details:
It was discovered that WebOb incorrectly handled certain URLs.
An attacker could possibly use this issue to control a redirect or
forward to another URL.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
python3-webob 1:1.8.7-1ubuntu0.1.24.04.1
Ubuntu 22.04 LTS
python3-webob 1:1.8.6-1.1ubuntu0.1
Ubuntu 20.04 LTS
python3-webob 1:1.8.5-2ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6984-1
CVE-2024-42353
Package Information:
https://launchpad.net/ubuntu/+source/python-webob/1:1.8.7-1ubuntu0.1.24.04.1
https://launchpad.net/ubuntu/+source/python-webob/1:1.8.6-1.1ubuntu0.1
https://launchpad.net/ubuntu/+source/python-webob/1:1.8.5-2ubuntu0.1
[USN-6973-4] Linux kernel (Raspberry Pi) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-6973-4
September 02, 2024
linux-raspi-5.4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi-5.4: Linux kernel for Raspberry Pi systems
Details:
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel, leading to a null pointer dereference vulnerability. A
privileged local attacker could use this to possibly cause a denial of
service (system crash). (CVE-2024-24860)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SuperH RISC architecture;
- MMC subsystem;
- Network drivers;
- SCSI drivers;
- GFS2 file system;
- IPv4 networking;
- IPv6 networking;
- HD-audio driver;
(CVE-2024-26830, CVE-2024-39484, CVE-2024-36901, CVE-2024-26929,
CVE-2024-26921, CVE-2021-46926, CVE-2023-52629, CVE-2023-52760)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
linux-image-5.4.0-1115-raspi 5.4.0-1115.127~18.04.1
Available with Ubuntu Pro
linux-image-raspi-hwe-18.04 5.4.0.1115.127~18.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-6973-4
https://ubuntu.com/security/notices/USN-6973-3
https://ubuntu.com/security/notices/USN-6973-2
https://ubuntu.com/security/notices/USN-6973-1
CVE-2021-46926, CVE-2023-52629, CVE-2023-52760, CVE-2024-24860,
CVE-2024-26830, CVE-2024-26921, CVE-2024-26929, CVE-2024-36901,
CVE-2024-39484