[USN-7082-1] libheif vulnerability
[USN-7081-1] Go vulnerabilities
[USN-7082-1] libheif vulnerability
==========================================================================
Ubuntu Security Notice USN-7082-1
October 23, 2024
libheif vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
libheif could be made to crash or read sensitive data if it opened a
specially crafted file
Software Description:
- libheif: an ISO/IEC 23008-12:2017 HEIF and AVIF file format decoder and
encoder
Details:
Gerrard Tai discovered that libheif did not properly validate certain
images, leading to out-of-bounds read and write vulnerability. If a user
or automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service or to
obtain sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
libheif1 1.17.6-1ubuntu4.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7082-1
CVE-2024-41311
Package Information:
https://launchpad.net/ubuntu/+source/libheif/1.17.6-1ubuntu4.1
[USN-7081-1] Go vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7081-1
October 23, 2024
golang-1.22 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Go.
Software Description:
- golang-1.22: Go programming language compiler
Details:
It was discovered that the Go net/http module did not properly handle
responses to requests with an "Expect: 100-continue" header under certain
circumstances. An attacker could possibly use this issue to cause a denial
of service. (CVE-2024-24791)
It was discovered that the Go parser module did not properly handle deeply
nested literal values. An attacker could possibly use this issue to cause
a panic resulting in a denial of service. (CVE-2024-34155)
It was discovered that the Go encoding/gob module did not properly handle
message decoding under certain circumstances. An attacker could possibly
use this issue to cause a panic resulting in a denial of service.
(CVE-2024-34156)
It was discovered that the Go build module did not properly handle certain
build tag lines with deeply nested expressions. An attacker could possibly
use this issue to cause a panic resulting in a denial of service.
(CVE-2024-34158)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
golang-1.22 1.22.2-2ubuntu0.3
golang-1.22-go 1.22.2-2ubuntu0.3
golang-1.22-src 1.22.2-2ubuntu0.3
Ubuntu 22.04 LTS
golang-1.22 1.22.2-2~22.04.2
golang-1.22-go 1.22.2-2~22.04.2
golang-1.22-src 1.22.2-2~22.04.2
Ubuntu 20.04 LTS
golang-1.22 1.22.2-2~20.04.2
golang-1.22-go 1.22.2-2~20.04.2
golang-1.22-src 1.22.2-2~20.04.2
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7081-1
CVE-2024-24791, CVE-2024-34155, CVE-2024-34156, CVE-2024-34158
Package Information:
https://launchpad.net/ubuntu/+source/golang-1.22/1.22.2-2ubuntu0.3
https://launchpad.net/ubuntu/+source/golang-1.22/1.22.2-2~22.04.2
https://launchpad.net/ubuntu/+source/golang-1.22/1.22.2-2~20.04.2