Ubuntu 6586 Published by

Ubuntu Linux has received security updates addressing two vulnerabilities: libheif and Go:

[USN-7082-1] libheif vulnerability
[USN-7081-1] Go vulnerabilities




[USN-7082-1] libheif vulnerability


==========================================================================
Ubuntu Security Notice USN-7082-1
October 23, 2024

libheif vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

libheif could be made to crash or read sensitive data if it opened a
specially crafted file

Software Description:
- libheif: an ISO/IEC 23008-12:2017 HEIF and AVIF file format decoder and
encoder

Details:

Gerrard Tai discovered that libheif did not properly validate certain
images, leading to out-of-bounds read and write vulnerability. If a user
or automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service or to
obtain sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  libheif1                        1.17.6-1ubuntu4.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7082-1
  CVE-2024-41311

Package Information:
  https://launchpad.net/ubuntu/+source/libheif/1.17.6-1ubuntu4.1



[USN-7081-1] Go vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7081-1
October 23, 2024

golang-1.22 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Go.

Software Description:
- golang-1.22: Go programming language compiler

Details:

It was discovered that the Go net/http module did not properly handle
responses to requests with an "Expect: 100-continue" header under certain
circumstances. An attacker could possibly use this issue to cause a denial
of service. (CVE-2024-24791)

It was discovered that the Go parser module did not properly handle deeply
nested literal values. An attacker could possibly use this issue to cause
a panic resulting in a denial of service. (CVE-2024-34155)

It was discovered that the Go encoding/gob module did not properly handle
message decoding under certain circumstances. An attacker could possibly
use this issue to cause a panic resulting in a denial of service.
(CVE-2024-34156)

It was discovered that the Go build module did not properly handle certain
build tag lines with deeply nested expressions. An attacker could possibly
use this issue to cause a panic resulting in a denial of service.
(CVE-2024-34158)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
golang-1.22 1.22.2-2ubuntu0.3
golang-1.22-go 1.22.2-2ubuntu0.3
golang-1.22-src 1.22.2-2ubuntu0.3

Ubuntu 22.04 LTS
golang-1.22 1.22.2-2~22.04.2
golang-1.22-go 1.22.2-2~22.04.2
golang-1.22-src 1.22.2-2~22.04.2

Ubuntu 20.04 LTS
golang-1.22 1.22.2-2~20.04.2
golang-1.22-go 1.22.2-2~20.04.2
golang-1.22-src 1.22.2-2~20.04.2

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7081-1
CVE-2024-24791, CVE-2024-34155, CVE-2024-34156, CVE-2024-34158

Package Information:
https://launchpad.net/ubuntu/+source/golang-1.22/1.22.2-2ubuntu0.3
https://launchpad.net/ubuntu/+source/golang-1.22/1.22.2-2~22.04.2
https://launchpad.net/ubuntu/+source/golang-1.22/1.22.2-2~20.04.2