Skip to content

ubuntu jammy v1.785

Compare
Choose a tag to compare
@bosh-admin-bot bosh-admin-bot released this 05 Mar 23:29
· 152 commits to ubuntu-jammy since this release

Metadata:

BOSH Agent Version: 2.736.0
Kernel Version: 5.15.0.134.133

USNs:

Title: USN-7306-1 -- GNU binutils vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7306-1
Priorities: medium
Description:
It was discovered that GNU binutils in nm tool is affected by an incorrect access control. An attacker could possibly use this issue to cause a crash. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2024-57360) It was discovered that GNU binutils incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2025-0840) Update Instructions: Run sudo pro fix USN-7306-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: binutils - 2.38-4ubuntu2.7 binutils-aarch64-linux-gnu - 2.38-4ubuntu2.7 binutils-alpha-linux-gnu - 2.38-4ubuntu2.7 binutils-arm-linux-gnueabi - 2.38-4ubuntu2.7 binutils-arm-linux-gnueabihf - 2.38-4ubuntu2.7 binutils-common - 2.38-4ubuntu2.7 binutils-dev - 2.38-4ubuntu2.7 binutils-doc - 2.38-4ubuntu2.7 binutils-for-build - 2.38-4ubuntu2.7 binutils-for-host - 2.38-4ubuntu2.7 binutils-hppa-linux-gnu - 2.38-4ubuntu2.7 binutils-hppa64-linux-gnu - 2.38-4ubuntu2.7 binutils-i686-gnu - 2.38-4ubuntu2.7 binutils-i686-kfreebsd-gnu - 2.38-4ubuntu2.7 binutils-i686-linux-gnu - 2.38-4ubuntu2.7 binutils-ia64-linux-gnu - 2.38-4ubuntu2.7 binutils-m68k-linux-gnu - 2.38-4ubuntu2.7 binutils-multiarch - 2.38-4ubuntu2.7 binutils-multiarch-dev - 2.38-4ubuntu2.7 binutils-powerpc-linux-gnu - 2.38-4ubuntu2.7 binutils-powerpc64-linux-gnu - 2.38-4ubuntu2.7 binutils-powerpc64le-linux-gnu - 2.38-4ubuntu2.7 binutils-riscv64-linux-gnu - 2.38-4ubuntu2.7 binutils-s390x-linux-gnu - 2.38-4ubuntu2.7 binutils-sh4-linux-gnu - 2.38-4ubuntu2.7 binutils-source - 2.38-4ubuntu2.7 binutils-sparc64-linux-gnu - 2.38-4ubuntu2.7 binutils-x86-64-kfreebsd-gnu - 2.38-4ubuntu2.7 binutils-x86-64-linux-gnu - 2.38-4ubuntu2.7 binutils-x86-64-linux-gnux32 - 2.38-4ubuntu2.7 libbinutils - 2.38-4ubuntu2.7 libctf-nobfd0 - 2.38-4ubuntu2.7 libctf0 - 2.38-4ubuntu2.7 No subscription required
CVEs:

Title: USN-7314-1 -- Kerberos vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7314-1
Priorities: medium,negligible,low
Description:
It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. (CVE-2024-26458, CVE-2024-26461) It was discovered that Kerberos incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause Kerberos to consume memory,leading to a denial of service. This issue only affected Ubuntu 24.04 LTS. (CVE-2024-26462) It was discovered that the Kerberos kadmind daemon incorrectly handled log files when incremental propagation was enabled. An authenticated attacker could use this issue to cause kadmind to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-24528) Update Instructions: Run sudo pro fix USN-7314-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: krb5-admin-server - 1.19.2-2ubuntu0.6 krb5-doc - 1.19.2-2ubuntu0.6 krb5-gss-samples - 1.19.2-2ubuntu0.6 krb5-k5tls - 1.19.2-2ubuntu0.6 krb5-kdc - 1.19.2-2ubuntu0.6 krb5-kdc-ldap - 1.19.2-2ubuntu0.6 krb5-kpropd - 1.19.2-2ubuntu0.6 krb5-locales - 1.19.2-2ubuntu0.6 krb5-multidev - 1.19.2-2ubuntu0.6 krb5-otp - 1.19.2-2ubuntu0.6 krb5-pkinit - 1.19.2-2ubuntu0.6 krb5-user - 1.19.2-2ubuntu0.6 libgssapi-krb5-2 - 1.19.2-2ubuntu0.6 libgssrpc4 - 1.19.2-2ubuntu0.6 libk5crypto3 - 1.19.2-2ubuntu0.6 libkadm5clnt-mit12 - 1.19.2-2ubuntu0.6 libkadm5srv-mit12 - 1.19.2-2ubuntu0.6 libkdb5-10 - 1.19.2-2ubuntu0.6 libkrad-dev - 1.19.2-2ubuntu0.6 libkrad0 - 1.19.2-2ubuntu0.6 libkrb5-3 - 1.19.2-2ubuntu0.6 libkrb5-dev - 1.19.2-2ubuntu0.6 libkrb5support0 - 1.19.2-2ubuntu0.6 No subscription required
CVEs:

Title: USN-7327-1 -- Linux kernel vulnerability
URL: https://ubuntu.com/security/notices/USN-7327-1
Priorities: high
Description:
A security issues was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; (CVE-2024-56672) Update Instructions: Run sudo pro fix USN-7327-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-134-generic - 5.15.0-134.145 linux-buildinfo-5.15.0-134-generic-64k - 5.15.0-134.145 linux-buildinfo-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-buildinfo-5.15.0-134-lowlatency - 5.15.0-134.145 linux-buildinfo-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-cloud-tools-5.15.0-134 - 5.15.0-134.145 linux-cloud-tools-5.15.0-134-generic - 5.15.0-134.145 linux-cloud-tools-5.15.0-134-lowlatency - 5.15.0-134.145 linux-cloud-tools-common - 5.15.0-134.145 linux-doc - 5.15.0-134.145 linux-headers-5.15.0-134 - 5.15.0-134.145 linux-headers-5.15.0-134-generic - 5.15.0-134.145 linux-headers-5.15.0-134-generic-64k - 5.15.0-134.145 linux-headers-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-headers-5.15.0-134-lowlatency - 5.15.0-134.145 linux-headers-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-image-5.15.0-134-generic - 5.15.0-134.145 linux-image-5.15.0-134-generic-64k - 5.15.0-134.145 linux-image-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-image-5.15.0-134-lowlatency - 5.15.0-134.145 linux-image-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-generic - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-generic-64k - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-lowlatency - 5.15.0-134.145 linux-image-unsigned-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-libc-dev - 5.15.0-134.145 linux-lowlatency-cloud-tools-5.15.0-134 - 5.15.0-134.145 linux-lowlatency-headers-5.15.0-134 - 5.15.0-134.145 linux-lowlatency-tools-5.15.0-134 - 5.15.0-134.145 linux-modules-5.15.0-134-generic - 5.15.0-134.145 linux-modules-5.15.0-134-generic-64k - 5.15.0-134.145 linux-modules-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-modules-5.15.0-134-lowlatency - 5.15.0-134.145 linux-modules-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-modules-extra-5.15.0-134-generic - 5.15.0-134.145 linux-modules-iwlwifi-5.15.0-134-generic - 5.15.0-134.145 linux-modules-iwlwifi-5.15.0-134-lowlatency - 5.15.0-134.145 linux-source-5.15.0 - 5.15.0-134.145 linux-tools-5.15.0-134 - 5.15.0-134.145 linux-tools-5.15.0-134-generic - 5.15.0-134.145 linux-tools-5.15.0-134-generic-64k - 5.15.0-134.145 linux-tools-5.15.0-134-generic-lpae - 5.15.0-134.145 linux-tools-5.15.0-134-lowlatency - 5.15.0-134.145 linux-tools-5.15.0-134-lowlatency-64k - 5.15.0-134.145 linux-tools-common - 5.15.0-134.145 linux-tools-host - 5.15.0-134.145 No subscription required linux-cloud-tools-lowlatency - 5.15.0.134.121 linux-cloud-tools-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-cloud-tools-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-headers-lowlatency - 5.15.0.134.121 linux-headers-lowlatency-64k - 5.15.0.134.121 linux-headers-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-headers-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-headers-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-headers-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-image-lowlatency - 5.15.0.134.121 linux-image-lowlatency-64k - 5.15.0.134.121 linux-image-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-image-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-image-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-image-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-lowlatency - 5.15.0.134.121 linux-lowlatency-64k - 5.15.0.134.121 linux-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-lowlatency-hwe-20.04-edge - 5.15.0.134.121 linux-tools-lowlatency - 5.15.0.134.121 linux-tools-lowlatency-64k - 5.15.0.134.121 linux-tools-lowlatency-64k-hwe-20.04 - 5.15.0.134.121 linux-tools-lowlatency-64k-hwe-20.04-edge - 5.15.0.134.121 linux-tools-lowlatency-hwe-20.04 - 5.15.0.134.121 linux-tools-lowlatency-hwe-20.04-edge - 5.15.0.134.121 No subscription required linux-cloud-tools-generic - 5.15.0.134.133 linux-cloud-tools-generic-hwe-20.04 - 5.15.0.134.133 linux-cloud-tools-generic-hwe-20.04-edge - 5.15.0.134.133 linux-cloud-tools-virtual - 5.15.0.134.133 linux-cloud-tools-virtual-hwe-20.04 - 5.15.0.134.133 linux-cloud-tools-virtual-hwe-20.04-edge - 5.15.0.134.133 linux-crashdump - 5.15.0.134.133 linux-generic - 5.15.0.134.133 linux-generic-64k - 5.15.0.134.133 linux-generic-64k-hwe-20.04 - 5.15.0.134.133 linux-generic-64k-hwe-20.04-edge - 5.15.0.134.133 linux-generic-hwe-20.04 - 5.15.0.134.133 linux-generic-hwe-20.04-edge - 5.15.0.134.133 linux-generic-lpae - 5.15.0.134.133 linux-generic-lpae-hwe-20.04 - 5.15.0.134.133 linux-generic-lpae-hwe-20.04-edge - 5.15.0.134.133 linux-headers-generic - 5.15.0.134.133 linux-headers-generic-64k - 5.15.0.134.133 linux-headers-generic-64k-hwe-20.04 - 5.15.0.134.133 linux-headers-generic-64k-hwe-20.04-edge - 5.15.0.134.133 linux-headers-generic-hwe-20.04 - 5.15.0.134.133 linux-headers-generic-hwe-20.04-edge - 5.15.0.134.133 linux-headers-generic-lpae - 5.15.0.134.133 linux-headers-generic-lpae-hwe-20.04 - 5.15.0.134.133 linux-headers-generic-lpae-hwe-20.04-edge - 5.15.0.134.133 linux-headers-oem-20.04 - 5.15.0.134.133 linux-headers-virtual - 5.15.0.134.133 linux-headers-virtual-hwe-20.04 - 5.15.0.134.133 linux-headers-virtual-hwe-20.04-edge - 5.15.0.134.133 linux-image-extra-virtual - 5.15.0.134.133 linux-image-extra-virtual-hwe-20.04 - 5.15.0.134.133 linux-image-extra-virtual-hwe-20.04-edge - 5.15.0.134.133 linux-image-generic - 5.15.0.134.133 linux-image-generic-64k - 5.15.0.134.133 linux-image-generic-64k-hwe-20.04 - 5.15.0.134.133 linux-image-generic-64k-hwe-20.04-edge - 5.15.0.134.133 linux-image-generic-hwe-20.04 - 5.15.0.134.133 linux-image-generic-hwe-20.04-edge - 5.15.0.134.133 linux-image-generic-lpae - 5.15.0.134.133 linux-image-generic-lpae-hwe-20.04 - 5.15.0.134.133 linux-image-generic-lpae-hwe-20.04-edge - 5.15.0.134.133 linux-image-oem-20.04 - 5.15.0.134.133 linux-image-virtual - 5.15.0.134.133 linux-image-virtual-hwe-20.04 - 5.15.0.134.133 linux-image-virtual-hwe-20.04-edge - 5.15.0.134.133 linux-modules-iwlwifi-generic - 5.15.0.134.133 linux-oem-20.04 - 5.15.0.134.133 linux-source - 5.15.0.134.133 linux-tools-generic - 5.15.0.134.133 linux-tools-generic-64k - 5.15.0.134.133 linux-tools-generic-64k-hwe-20.04 - 5.15.0.134.133 linux-tools-generic-64k-hwe-20.04-edge - 5.15.0.134.133 linux-tools-generic-hwe-20.04 - 5.15.0.134.133 linux-tools-generic-hwe-20.04-edge - 5.15.0.134.133 linux-tools-generic-lpae - 5.15.0.134.133 linux-tools-generic-lpae-hwe-20.04 - 5.15.0.134.133 linux-tools-generic-lpae-hwe-20.04-edge - 5.15.0.134.133 linux-tools-oem-20.04 - 5.15.0.134.133 linux-tools-virtual - 5.15.0.134.133 linux-tools-virtual-hwe-20.04 - 5.15.0.134.133 linux-tools-virtual-hwe-20.04-edge - 5.15.0.134.133 linux-virtual - 5.15.0.134.133 linux-virtual-hwe-20.04 - 5.15.0.134.133 linux-virtual-hwe-20.04-edge - 5.15.0.134.133 No subscription required
CVEs: