Ubuntu 6586 Published by

The following security updates are available for Ubuntu Linux:

[USN-6734-1] libvirt vulnerabilities
[USN-6732-1] WebKitGTK vulnerabilities
[USN-6733-1] GnuTLS vulnerabilities




[USN-6734-1] libvirt vulnerabilities


==========================================================================
Ubuntu Security Notice USN-6734-1
April 15, 2024

libvirt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in libvirt.

Software Description:
- libvirt: Libvirt virtualization toolkit

Details:

Alexander Kuznetsov discovered that libvirt incorrectly handled certain API
calls. An attacker could possibly use this issue to cause libvirt to crash,
resulting in a denial of service. (CVE-2024-1441)

It was discovered that libvirt incorrectly handled certain RPC library API
calls. An attacker could possibly use this issue to cause libvirt to crash,
resulting in a denial of service. (CVE-2024-2494)

It was discovered that libvirt incorrectly handled detaching certain host
interfaces. An attacker could possibly use this issue to cause libvirt to
crash, resulting in a denial of service. (CVE-2024-2496)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
libvirt-daemon 9.6.0-1ubuntu1.1
libvirt-daemon-system 9.6.0-1ubuntu1.1
libvirt0 9.6.0-1ubuntu1.1

Ubuntu 22.04 LTS:
libvirt-daemon 8.0.0-1ubuntu7.10
libvirt-daemon-system 8.0.0-1ubuntu7.10
libvirt0 8.0.0-1ubuntu7.10

Ubuntu 20.04 LTS:
libvirt-daemon 6.0.0-0ubuntu8.19
libvirt-daemon-system 6.0.0-0ubuntu8.19
libvirt0 6.0.0-0ubuntu8.19

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6734-1
CVE-2024-1441, CVE-2024-2494, CVE-2024-2496

Package Information:
https://launchpad.net/ubuntu/+source/libvirt/9.6.0-1ubuntu1.1
https://launchpad.net/ubuntu/+source/libvirt/8.0.0-1ubuntu7.10
https://launchpad.net/ubuntu/+source/libvirt/6.0.0-0ubuntu8.19



[USN-6732-1] WebKitGTK vulnerabilities


==========================================================================
Ubuntu Security Notice USN-6732-1
April 15, 2024

webkit2gtk vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in WebKitGTK.

Software Description:
- webkit2gtk: Web content engine library for GTK+

Details:

Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
libjavascriptcoregtk-4.0-18 2.44.0-0ubuntu0.23.10.1
libjavascriptcoregtk-4.1-0 2.44.0-0ubuntu0.23.10.1
libjavascriptcoregtk-6.0-1 2.44.0-0ubuntu0.23.10.1
libwebkit2gtk-4.0-37 2.44.0-0ubuntu0.23.10.1
libwebkit2gtk-4.1-0 2.44.0-0ubuntu0.23.10.1
libwebkitgtk-6.0-4 2.44.0-0ubuntu0.23.10.1

Ubuntu 22.04 LTS:
libjavascriptcoregtk-4.0-18 2.44.0-0ubuntu0.22.04.1
libjavascriptcoregtk-4.1-0 2.44.0-0ubuntu0.22.04.1
libjavascriptcoregtk-6.0-1 2.44.0-0ubuntu0.22.04.1
libwebkit2gtk-4.0-37 2.44.0-0ubuntu0.22.04.1
libwebkit2gtk-4.1-0 2.44.0-0ubuntu0.22.04.1
libwebkitgtk-6.0-4 2.44.0-0ubuntu0.22.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK, such as Epiphany, to make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6732-1
CVE-2023-42843, CVE-2023-42950, CVE-2023-42956, CVE-2024-23252,
CVE-2024-23254, CVE-2024-23263, CVE-2024-23280, CVE-2024-23284

Package Information:
https://launchpad.net/ubuntu/+source/webkit2gtk/2.44.0-0ubuntu0.23.10.1
https://launchpad.net/ubuntu/+source/webkit2gtk/2.44.0-0ubuntu0.22.04.1



[USN-6733-1] GnuTLS vulnerabilities


==========================================================================
Ubuntu Security Notice USN-6733-1
April 15, 2024

gnutls28 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in GnuTLS.

Software Description:
- gnutls28: GNU TLS library

Details:

It was discovered that GnuTLS had a timing side-channel when performing
certain ECDSA operations. A remote attacker could possibly use this issue
to recover sensitive information. (CVE-2024-28834)

It was discovered that GnuTLS incorrectly handled verifying certain PEM
bundles. A remote attacker could possibly use this issue to cause GnuTLS to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS and Ubuntu 23.10. (CVE-2024-28835)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
libgnutls30 3.8.1-4ubuntu1.3

Ubuntu 22.04 LTS:
libgnutls30 3.7.3-4ubuntu1.5

Ubuntu 20.04 LTS:
libgnutls30 3.6.13-2ubuntu1.11

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6733-1
CVE-2024-28834, CVE-2024-28835

Package Information:
https://launchpad.net/ubuntu/+source/gnutls28/3.8.1-4ubuntu1.3
https://launchpad.net/ubuntu/+source/gnutls28/3.7.3-4ubuntu1.5
https://launchpad.net/ubuntu/+source/gnutls28/3.6.13-2ubuntu1.11