AusCERT - Security Bulletins

Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 59 perc 1 másodperc
ESB-2023.3086 - [Win][Linux][Virtual] VMware Products: CVSS (Max): 6.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3086
VMware Workspace ONE Access and Identity Manager update
addresses an Insecure Redirect Vulnerability
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: VMware Workspace ONE Access (Access)
VMware Identity Manager (vIDM)
VMware Cloud Foundation (Cloud Foundation)
Publisher: VMware
Operating System: Windows
Linux variants
Virtualisation
VMware ESX Server
Resolution: Patch/Upgrade
CVE Names: CVE-2023-20884
Original Bulletin:
https://www.vmware.com/security/advisories/VMSA-2023-0011.html
Comment: CVSS (Max): 6.1 CVE-2023-20884 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
CVSS Source: VMware
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- --------------------------BEGIN INCLUDED TEXT--------------------
1. Impacted Products
VMware Workspace ONE Access (Access)
VMware Identity Manager (vIDM)
VMware Cloud Foundation (Cloud Foundation)
2. Introduction
An insecure redirect vulnerability in Workspace ONE Access and Identity Manager
was privately reported to VMware. Updates are available to address this
vulnerability in affected VMware products.
3a. Insecure Redirect Vulnerability (CVE-2023-20884)
Description
VMware Workspace ONE Access and VMware Identity Manager contain an insecure
redirect vulnerability. VMware has evaluated the severity of this issue to be
in the Moderate severity range with a maximum CVSSv3 base score of 6.1.
Known Attack Vectors
An unauthenticated malicious actor may be able to redirect a victim to an
attacker controlled domain due to improper path handling leading to sensitive
information disclosure.
Resolution
To remediate CVE-2023-20884 apply the patches listed in the 'Fixed Version'
column of the 'Response Matrix' below.
Workarounds
None.
Additional Documentation
None.
Notes
None.
Acknowledgements
VMware would like to thank Hari Namburi of Wells Fargo for reporting this
vulnerability to us.
Response Matrix
Product Version Running CVE Identifier CVSSv3 Severity Fixed Workarounds Additional
On Version Documentation
Workspace 22.09.1.0 Linux CVE-2023-20884 6.1 moderate KB92512 None None
ONE Access
Workspace 22.09.0.0 Linux CVE-2023-20884 6.1 moderate 22.09.1.0 None None
ONE Access
Workspace 21.08.x Linux CVE-2023-20884 6.1 moderate 22.09.1.0 None None
ONE Access
Workspace
ONE Access All Windows CVE-2023-20884 N/A N/A Unaffected N/A N/A
Connector
VMware
Identity 3.3.7 Linux CVE-2023-20884 6.1 moderate KB92512 None None
Manager
(vIDM)
VMware
Identity 3.3.6 Linux CVE-2023-20884 6.1 moderate 3.3.7 None None
Manager
(vIDM)
VMware
Identity
Manager All Windows CVE-2023-20884 N/A N/A Unaffected N/A N/A
(vIDM)
Connector
VMware
Cloud Any Any CVE-2023-20884 6.1 moderate KB92512 None None
Foundation
(vIDM)
4. References
VMware Workspace ONE Access 22.09.1.0 KB92512
VMware Identity Manager (vIDM) KB92512
VMware Cloud Foundation (vIDM) KB92512
Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20884
FIRST CVSSv3 Calculator:
CVE-2023-20884: 6.1 https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/
AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5. Change Log
2023-05-30: VMSA-2023-0011
Initial security advisory.
6. Contact
E-mail: security@vmware.com
PGP key at:
https://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Twitter
https://twitter.com/VMwareSRC
Copyright 2023 VMware Inc. All rights reserved.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=i8/5
-----END PGP SIGNATURE-----
ESB-2023.3085 - [Debian] kamailio: CVSS (Max): 9.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3085
kamailio security update
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: kamailio
Publisher: Debian
Operating System: Debian GNU/Linux
Resolution: Patch/Upgrade
CVE Names: CVE-2020-27507
Original Bulletin:
https://lists.debian.org/debian-lts-announce/2023/05/msg00030.html
Comment: CVSS (Max): 9.8 CVE-2020-27507 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-3438-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Chris Lamb
May 30, 2023 https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------
Package : kamailio
Version : 5.2.1-1+deb10u1
CVE ID : CVE-2020-27507
It was discovered that there was a potential denial-of-service (DoS)
attack in the Kamailio SIP telephony server. This was caused by the
Kamailio server mishandling INVITE requests with duplicated fields.
For Debian 10 buster, this problem has been fixed in version
5.2.1-1+deb10u1.
We recommend that you upgrade your kamailio packages.
For the detailed security status of kamailio please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/kamailio
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----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=E+nI
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
iQIVAwUBZHaHsskNZI30y1K9AQivBxAArLUTsAhLDttD6LaflDH4s4n+k5iLmcvA
0+WPZzmE0a2U1Zsi6KHHqDl55oCkgF71bwO/qhtDBS344p0vnAhaBr+2pSeC5XJ6
2OXHXC7DUp0N1K67yKPJwFyau0j8C28xZ0FzC/uS8ElvIA+b+mZK//lRCss+9Edj
OW351j1m9lIsA7BXKWK2qMAwB9AHU/Kh/cZJoM3zrH5/TpzppWs5afG0ffQ1qZjY
b1cfOX0quueWYy8OnQ0wwmnNUYysGo6gf0ZZKIGG1SxmWICsdN1Wce4/pw5ByVXf
ds3b0ncdV10Uaq6bPpE835Mzhr7dkHVn7gy432doz0n0KKIvFrI+0iE5vhYJGudW
mQyZZUwtokRYuSB7y9m9RT27AtDKStRKUS6TQGdGO3AM8UYPRhIRQLf7Sxx/sCvf
+/zfOUa7k2KSU8qzqlDZAXiQdA++A998pA/4f8JkoYJUCVLIgYRP6xnuHiboQvZT
0Lvi9PBOSuLu7HSLatAbbx9ALXbs4hnkQ+5gKBGwWQuFdllUtv5UlY0wa4YC9CI6
azKF1BLIrPiskLIbbSnU8nh2lAP+nRtQti33FgjYANt+6evQNBiKRFYIUoy0Fuyl
sUCYB8f+Zusx3DV/8OUKtzCmevvZ3DGtH1oZPpHX2evBbu/mYddu0a0FZFnV0Yi9
Q/raw55j7/o=
=Ci+I
-----END PGP SIGNATURE-----
ESB-2023.3084 - [Debian] connman: CVSS (Max): 6.5
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3084
connman security update
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: connman
Publisher: Debian
Operating System: Debian GNU/Linux
Resolution: Patch/Upgrade
CVE Names: CVE-2023-28488
Original Bulletin:
https://lists.debian.org/debian-security-announce/2023/msg00107.html
Comment: CVSS (Max): 6.5 CVE-2023-28488 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5416-1 security@debian.org
https://www.debian.org/security/ Aron Xu
May 31, 2023 https://www.debian.org/security/faq
- - -------------------------------------------------------------------------
Package : connman
CVE ID : CVE-2023-28488
Debian Bug : 1034393
It was discovered that there was a potential buffer overflow and denial
of service vulnerabilty in the gdhcp client implementation of connman, a
command-line network manager designed for use on embedded devices.
For the stable distribution (bullseye), this problem has been fixed in
version 1.36-2.2+deb11u2.
We recommend that you upgrade your connman packages.
For the detailed security status of connman please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/connman
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEhhz+aYQl/Bp4OTA7O1LKKgqv2VQFAmR2MiEACgkQO1LKKgqv
2VQR/QgApr1QeIQIfrW7WfJYD0C0xVXhLuO2X1D2yxgUjHIEChpaWu7ogcOh3dBN
QkZAWmsWqFs/TnCdrltt8txJHfBz/PYkzPjwBN/CHZjW2t7HxCZqmA3tnuHGtzot
JRQD5G2d1W5ycJUL88ZWar0GKn98nwdsxTCRy8mi157Gy588pTrQbS+P9HtTK0I0
eUysoupKoEb2HGgn6nlpQJoRWqJnqkv7FmB6jOecP4ivAnmjwiciwMztIvggsJ+y
jYns6BXLzNQyU5T0ch2a2Mduddm4iR9Ax7KV8fv8+UIEEzwp+2tCKctV/yAmQodg
K3LJsgIkoFMJBMjevuozcp8o6QNbZw==
=e5Qs
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=s4b+
-----END PGP SIGNATURE-----
ESB-2023.3083 - [Appliance] Advantech WebAccess/SCADA: CVSS (Max): 7.3
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3083
ICS Advisory | ICSA-23-150-01 Advantech WebAccess/SCADA
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Advantech WebAccess/SCADA
Publisher: ICS-CERT
Operating System: Network Appliance
Resolution: Patch/Upgrade
CVE Names: CVE-2023-2866
Original Bulletin:
https://www.cisa.gov/news-events/ics-advisories/icsa-23-150-01
Comment: CVSS (Max): 7.3 CVE-2023-2866 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)
CVSS Source: ICS-CERT
Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
ICS Advisory (ICSA-23-150-01)
Advantech WebAccess/SCADA
Release Date
May 30, 2023
1. EXECUTIVE SUMMARY
o CVSS v3 7.3
o ATTENTION: Low attack complexity
o Vendor: Advantech
o Equipment: WebAccess/SCADA
o Vulnerabilities: Insufficient Type Distinction
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker full
control over the supervisory control and data acquisition (SCADA) server.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Advantech reports this vulnerability affect the following WebAccess/SCADA
product:
o WebAccess/SCADA: version 8.4.5
3.2 VULNERABILITY OVERVIEW
3.2.1 INSUFFICIENT TYPE DISTINCTION CWE-351
If an attacker can trick an authenticated user into loading a maliciously
crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be
used to give the attacker full control of the SCADA server.
CVE-2023-2866 has been assigned to this vulnerability. A CVSS v3 base score of
7.3 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:L/UI:R/S:U/
C:H/I:H/A:H ).
3.3 BACKGROUND
o CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing, Energy, Water and
Wastewater Systems
o COUNTRIES/AREAS DEPLOYED: East Asia, Europe, United States
o COMPANY HEADQUARTERS LOCATION: Taiwan
3.4 RESEARCHER
Marlon Luis Petry reported this vulnerability to CISA.
4. MITIGATIONS
Advantech recommends users locate and delete the "WADashboardSetup.msi" file to
avoid this issue.
If users wish to remedy this problem in version 8.4.5, they can uninstall
"WebAccess Dashboard" from the control panel. Delete all the files:
1. \Inetpub\wwwroot\broadweb\WADashboard
2. \WebAccess\Node\WADashboardSetup.msi
Advantech released a new version V9.1.4 to address the problem by not including
these files.
CISA recommends users take the following measures to protect themselves from
social engineering attacks:
o Do not click web links or open attachments in unsolicited email messages.
o Refer to Recognizing and Avoiding Email Scams for more information on
avoiding email scams.
o Refer to Avoiding Social Engineering and Phishing Attacks for more
information on social engineering attacks.
CISA reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices
on the ICS webpage at cisa.gov/ics . Several CISA products detailing cyber
defense best practices are available for reading and download, including
Improving Industrial Control Systems Cybersecurity with Defense-in-Depth
Strategies .
Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage at cisa.gov/ics in the technical information paper,
ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation
Strategies .
Organizations observing suspected malicious activity should follow established
internal procedures and report findings to CISA for tracking and correlation
against other incidents.
No known public exploits specifically target this vulnerability. This
vulnerability is not exploitable remotely.
Related Advisories
May 25, 2023
ICS Advisory | ICSA-23-145-01
Moxa MXsecurity Series
May 23, 2023
ICS Advisory | ICSA-23-143-02
Hitachi Energy's RTU500 Series Product
May 23, 2023
ICS Advisory | ICSA-23-143-03
Mitsubishi Electric MELSEC Series CPU module
May 23, 2023
ICS Advisory | ICSA-23-143-01
Hitachi Energy's AFS65x, AFS67x, AFR67x and AFF66x Products
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
iQIVAwUBZHaHgMkNZI30y1K9AQibWBAAtgim9kK0IYn7VKkBdCCWIilHPNWB1IG3
KGfGy2+30yf2JkxPQcqkxYwssGjMykGSXkGu+R+QjAn3ccXQs7VXDt+Nm+IUHEyE
wMnkZ7dhi5zllUxUXK2l3orVZF+HuQNcRTNd8X3ZzWpwQM7NK/vP6OuvqhNUGifO
NbBe9ZSsWtsdUK6I/4v+YOuRUamTaoncRkjXhQkrf1iTY5OmOu6zsRrFeNPFfI7t
l2a/VDuHZwZlF1TLJ/LttkDxzpxep+iiXBm9BwroyyS/KP6rtvJ/vkLpL06s7Mjt
iS2sXn+e71FbtdR+vRXtuM7xIA1sVmp4v2Ra38ZHjLbJkkfOW6/EikQyjyxHU0t/
xju2s3giWosUMWxztmJkRPUjBEHskA6EfwkCzKMLFUfxXiyOFJJMsJ8aJimGvwvh
eFssA6XK/HZ5yTxbA2/+riFzI5JNLxQvMUQPYCW43h7zr2CjFnwn8occtNZLoF6J
2jl8GVfBX31JNK+tWEUJuRnmoGbOzKqzg+vzBAjjD+iLiqKmvurzPaD8So6a891s
o16hIB6OMfmK4d/WGvDahsSxW5Ro6UpLd+Bem9YWEVuDivS9/9iULPyH6btly1vs
wEx4A3/bnUXFNVdbdTSNUKYlH+6yu1W1rPWNyv7AF4y5dwj/uT6Zx8uths4mkRoR
/cML6J6UWUY=
=NiXc
-----END PGP SIGNATURE-----
ESB-2023.3082 - [Ubuntu] Linux kernel (OEM): CVSS (Max): 7.8*
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3082
USN-6124-1: Linux kernel (OEM) vulnerabilities
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Linux kernel (OEM)
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2023-32233 CVE-2023-30456 CVE-2023-2612
CVE-2023-1670 CVE-2022-4139 CVE-2022-3586
Original Bulletin:
https://ubuntu.com/security/notices/USN-6124-1
Comment: CVSS (Max): 7.8* CVE-2023-32233 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* Not all CVSS available when published
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6124-1: Linux kernel (OEM) vulnerabilities
30 May 2023
Several security issues were fixed in the Linux kernel.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 22.04 LTS
Packages
o linux-oem-5.17 - Linux kernel for OEM systems
Details
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. ( CVE-2023-32233 )
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). ( CVE-2023-30456 )
Gwnaun Jung discovered that the SFB packet scheduling implementation in the
Linux kernel contained a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. ( CVE-2022-3586 )
It was discovered that the Intel i915 graphics driver in the Linux kernel
did not perform a GPU TLB flush in some situations. A local attacker could
use this to cause a denial of service or possibly execute arbitrary code.
( CVE-2022-4139 )
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). ( CVE-2023-1670 )
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). ( CVE-2023-2612 )
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 22.04
o linux-image-oem-22.04 - 5.17.0.1032.30
o linux-image-oem-22.04a - 5.17.0.1032.30
o linux-image-5.17.0-1032-oem - 5.17.0-1032.33
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
o CVE-2023-30456
o CVE-2023-32233
o CVE-2023-2612
o CVE-2022-4139
o CVE-2022-3586
o CVE-2023-1670
Related notices
o USN-6033-1 : linux-image-oem-22.04c, linux-image-unsigned-6.1.0-1009-oem,
linux-modules-ivsc-oem-22.04c, linux-oem-22.04c, linux-headers-oem-22.04c,
linux-modules-6.1.0-1009-oem, linux-oem-6.1, linux-image-6.1.0-1009-oem,
linux-oem-6.1-tools-6.1.0-1009, linux-modules-ipu6-oem-22.04c,
linux-modules-ivsc-6.1.0-1009-oem, linux-tools-6.1.0-1009-oem,
linux-oem-6.1-headers-6.1.0-1009, linux-headers-6.1.0-1009-oem,
linux-modules-ipu6-6.1.0-1009-oem, linux-tools-oem-22.04c,
linux-buildinfo-6.1.0-1009-oem, linux-oem-6.1-tools-host
o USN-6123-1 : linux-modules-ivsc-6.0.0-1017-oem,
linux-modules-iwlwifi-6.0.0-1017-oem, linux-headers-6.0.0-1017-oem,
linux-oem-22.04b, linux-oem-6.0, linux-oem-6.0-tools-6.0.0-1017,
linux-image-oem-22.04b, linux-modules-iwlwifi-oem-22.04b,
linux-oem-6.0-headers-6.0.0-1017, linux-tools-6.0.0-1017-oem,
linux-modules-6.0.0-1017-oem, linux-image-6.0.0-1017-oem,
linux-modules-ipu6-6.0.0-1017-oem, linux-modules-ipu6-oem-22.04b,
linux-image-unsigned-6.0.0-1017-oem, linux-buildinfo-6.0.0-1017-oem,
linux-headers-oem-22.04b, linux-tools-oem-22.04b, linux-oem-6.0-tools-host,
linux-modules-ivsc-oem-22.04b
o USN-6122-1 : linux-tools-6.1.0-1013-oem, linux-headers-6.1.0-1013-oem,
linux-image-unsigned-6.1.0-1013-oem, linux-oem-6.1,
linux-headers-oem-22.04c, linux-oem-6.1-tools-6.1.0-1013,
linux-image-6.1.0-1013-oem, linux-oem-6.1-tools-host,
linux-modules-iwlwifi-6.1.0-1013-oem, linux-modules-iwlwifi-oem-22.04c,
linux-tools-oem-22.04c, linux-image-oem-22.04c, linux-oem-22.04c,
linux-modules-ipu6-6.1.0-1013-oem, linux-modules-ivsc-oem-22.04c,
linux-modules-ipu6-oem-22.04c, linux-buildinfo-6.1.0-1013-oem,
linux-modules-ivsc-6.1.0-1013-oem, linux-modules-6.1.0-1013-oem,
linux-oem-6.1-headers-6.1.0-1013
o USN-5859-1 : linux-modules-iwlwifi-oem-20.04d, linux-image-oem-20.04d,
linux-headers-5.14.0-1057-oem, linux-oem-20.04b, linux-headers-oem-20.04c,
linux-oem-5.14-tools-5.14.0-1057, linux-modules-iwlwifi-5.14.0-1057-oem,
linux-oem-20.04c, linux-tools-oem-20.04b, linux-image-oem-20.04b,
linux-oem-5.14-tools-host, linux-tools-oem-20.04,
linux-image-unsigned-5.14.0-1057-oem, linux-tools-oem-20.04c,
linux-image-oem-20.04c, linux-tools-5.14.0-1057-oem,
linux-modules-iwlwifi-oem-20.04, linux-oem-5.14-headers-5.14.0-1057,
linux-buildinfo-5.14.0-1057-oem, linux-tools-oem-20.04d,
linux-modules-5.14.0-1057-oem, linux-headers-oem-20.04d, linux-oem-20.04,
linux-headers-oem-20.04b, linux-oem-20.04d, linux-oem-5.14,
linux-headers-oem-20.04, linux-image-5.14.0-1057-oem, linux-image-oem-20.04
o USN-5912-1 : linux-azure-5.15, linux-buildinfo-5.15.0-67-lowlatency,
linux-image-unsigned-5.15.0-67-generic, linux-azure-fde-edge,
linux-lowlatency-hwe-5.15-headers-5.15.0-67, linux-tools-generic,
linux-headers-5.15.0-67-lowlatency-64k, linux-gke-5.15-headers-5.15.0-1028,
linux-modules-5.15.0-1028-gke, linux-modules-extra-gcp, linux-virtual,
linux-cloud-tools-5.15.0-1031-aws, linux-generic-lpae-hwe-20.04-edge,
linux-image-azure, linux-gcp-5.15-tools-5.15.0-1030,
linux-tools-lowlatency-64k, linux-cloud-tools-virtual, linux-azure,
linux-image-lowlatency-hwe-20.04, linux-image-unsigned-5.15.0-1034-azure,
linux-modules-extra-5.15.0-1034-azure,
linux-image-extra-virtual-hwe-20.04-edge,
linux-modules-extra-aws-lts-22.04, linux-oracle-5.15-headers-5.15.0-1030,
linux-tools-aws-lts-22.04, linux-gke-5.15, linux-image-generic-hwe-20.04,
linux-tools-azure-edge, linux-headers-aws-lts-22.04, linux-gcp-edge,
linux-image-virtual-hwe-20.04-edge, linux-source,
linux-image-5.15.0-67-generic-lpae, linux-tools-generic-lpae-hwe-20.04,
linux-buildinfo-5.15.0-1034-azure, linux-image-lowlatency,
linux-buildinfo-5.15.0-67-lowlatency-64k, linux-tools-aws,
linux-gcp-5.15-headers-5.15.0-1030, linux-headers-virtual,
linux-aws-5.15-tools-5.15.0-1031, linux-headers-azure-fde-edge,
linux-tools-gcp-edge, linux-gcp, linux-lowlatency-tools-common,
linux-modules-extra-5.15.0-1031-aws, linux-headers-aws,
linux-cloud-tools-generic, linux-headers-azure,
linux-tools-lowlatency-hwe-20.04, linux-modules-extra-5.15.0-67-generic,
linux-headers-5.15.0-1030-gcp, linux-image-aws-lts-22.04,
linux-lowlatency-hwe-20.04, linux-azure-edge,
linux-hwe-5.15-cloud-tools-common, linux-modules-iwlwifi-5.15.0-1030-gcp,
linux-image-5.15.0-1034-azure, linux-tools-host,
linux-gke-headers-5.15.0-1028, linux-azure-5.15-headers-5.15.0-1034,
linux-generic-64k, linux-image-gke, linux-image-oracle,
linux-virtual-hwe-20.04-edge, linux-oem-20.04,
linux-modules-extra-5.15.0-1030-oracle, linux-hwe-5.15-tools-host,
linux-image-unsigned-5.15.0-1028-gke, linux-tools-5.15.0-1034-azure,
linux-aws-edge, linux-image-aws, linux-tools-common,
linux-gke-5.15-tools-5.15.0-1028, linux-image-azure-edge,
linux-tools-generic-64k, linux-headers-5.15.0-1028-gke,
linux-headers-5.15.0-1034-azure, linux-tools-azure-lts-22.04,
linux-image-oem-20.04, linux-modules-extra-azure-fde, linux-gke,
linux-image-generic-hwe-20.04-edge, linux-tools-azure,
linux-hwe-5.15-headers-5.15.0-67, linux-lowlatency-headers-5.15.0-67,
linux-azure-fde, linux-headers-generic-lpae-hwe-20.04-edge,
linux-headers-5.15.0-67-generic, linux-modules-extra-5.15.0-1030-gcp,
linux-modules-extra-aws-edge, linux-tools-5.15.0-1028-gke,
linux-generic-lpae, linux-aws-lts-22.04,
linux-image-unsigned-5.15.0-1030-gcp, linux-buildinfo-5.15.0-1031-aws,
linux-lowlatency-64k-hwe-20.04,
linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-67, linux-tools-gke,
linux-tools-azure-fde-edge, linux-generic-hwe-20.04, linux-gcp-5.15,
linux-tools-lowlatency-hwe-20.04-edge,
linux-tools-lowlatency-64k-hwe-20.04, linux-doc, linux-azure-lts-22.04,
linux-buildinfo-5.15.0-67-generic-64k, linux-azure-tools-5.15.0-1034,
linux-image-unsigned-5.15.0-1030-oracle, linux-image-aws-edge,
linux-headers-gcp-edge, linux-headers-lowlatency-64k-hwe-20.04,
linux-cloud-tools-5.15.0-67-lowlatency, linux-cloud-tools-azure-edge,
linux-oracle-tools-5.15.0-1030, linux-headers-gke,
linux-image-azure-lts-22.04, linux-headers-virtual-hwe-20.04,
linux-modules-extra-5.15.0-1028-gke, linux-cloud-tools-azure-fde,
linux-modules-extra-azure-fde-edge,
linux-image-unsigned-5.15.0-67-lowlatency-64k,
linux-aws-headers-5.15.0-1031, linux-hwe-5.15-source-5.15.0,
linux-tools-5.15.0-1030-gcp, linux-modules-iwlwifi-5.15.0-67-lowlatency,
linux-lowlatency-hwe-5.15, linux-headers-lowlatency-64k-hwe-20.04-edge,
linux-image-virtual, linux-buildinfo-5.15.0-1030-oracle,
linux-headers-lowlatency-hwe-20.04, linux-lowlatency-cloud-tools-common,
linux-azure-5.15-cloud-tools-5.15.0-1034, linux-image-generic-64k,
linux-aws-cloud-tools-5.15.0-1031, linux-cloud-tools-5.15.0-67-generic,
linux-headers-5.15.0-67-lowlatency, linux-headers-azure-lts-22.04,
linux-azure-headers-5.15.0-1034, linux-image-azure-fde,
linux-image-extra-virtual, linux-lowlatency-64k,
linux-lowlatency-cloud-tools-5.15.0-67,
linux-lowlatency-hwe-5.15-cloud-tools-common,
linux-headers-lowlatency-hwe-20.04-edge, linux-headers-oracle-edge,
linux-tools-aws-edge, linux-azure-cloud-tools-5.15.0-1034,
linux-image-unsigned-5.15.0-67-lowlatency, linux-gke-edge,
linux-lowlatency-hwe-20.04-edge, linux-oracle, linux-tools-oracle-edge,
linux-cloud-tools-common, linux-gcp-tools-5.15.0-1030,
linux-image-unsigned-5.15.0-67-generic-64k,
linux-modules-iwlwifi-generic-hwe-20.04-edge,
linux-lowlatency-tools-5.15.0-67, linux-headers-oem-20.04,
linux-generic-lpae-hwe-20.04, linux-headers-generic-hwe-20.04,
linux-modules-extra-azure, linux-image-generic-lpae-hwe-20.04-edge,
linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-hwe-5.15,
linux-image-generic-lpae-hwe-20.04, linux-image-unsigned-5.15.0-1031-aws,
linux-hwe-5.15-tools-common, linux-tools-virtual,
linux-modules-5.15.0-67-generic-64k, linux-headers-azure-edge,
linux-image-5.15.0-67-lowlatency, linux-modules-extra-gcp-edge,
linux-tools-5.15.0-67-lowlatency, linux-headers-5.15.0-1031-aws,
linux-tools-5.15.0-67-lowlatency-64k, linux-tools-5.15.0-1030-oracle,
linux-buildinfo-5.15.0-67-generic-lpae, linux-tools-azure-fde,
linux-tools-generic-hwe-20.04-edge, linux-tools-gcp,
linux-modules-5.15.0-67-lowlatency-64k, linux-tools-lowlatency,
linux-aws-tools-5.15.0-1031, linux-tools-5.15.0-1031-aws,
linux-tools-oem-20.04, linux-modules-5.15.0-1031-aws,
linux-cloud-tools-lowlatency, linux-generic-64k-hwe-20.04-edge,
linux-headers-generic-64k, linux-image-extra-virtual-hwe-20.04,
linux-modules-iwlwifi-5.15.0-67-generic,
linux-tools-generic-lpae-hwe-20.04-edge,
linux-aws-5.15-cloud-tools-5.15.0-1031, linux-oracle-5.15,
linux-tools-5.15.0-67-generic-lpae, linux-hwe-5.15-tools-5.15.0-67,
linux-modules-5.15.0-67-generic, linux-tools-lowlatency-64k-hwe-20.04-edge,
linux-headers-gke-5.15, linux-image-unsigned-5.15.0-1034-azure-fde,
linux-modules-iwlwifi-generic, linux-image-5.15.0-67-generic-64k,
linux-tools-oracle, linux-aws-5.15, linux-image-gcp-edge,
linux-cloud-tools-5.15.0-67, linux-oracle-headers-5.15.0-1030,
linux-source-5.15.0, linux-image-lowlatency-64k-hwe-20.04-edge,
linux-image-gke-edge, linux-generic, linux-tools-gke-edge,
linux-modules-extra-azure-lts-22.04, linux-headers-gke-edge,
linux-gcp-headers-5.15.0-1030, linux-modules-iwlwifi-generic-hwe-20.04,
linux-headers-gcp, linux-lowlatency, linux-image-generic,
linux-headers-generic-64k-hwe-20.04-edge, linux-cloud-tools-azure,
linux-headers-5.15.0-1030-oracle, linux, linux-image-5.15.0-67-generic,
linux-libc-dev, linux-cloud-tools-azure-lts-22.04, linux-headers-aws-edge,
linux-headers-generic, linux-image-5.15.0-1030-gcp,
linux-headers-5.15.0-67-generic-64k, linux-headers-lowlatency,
linux-hwe-5.15-cloud-tools-5.15.0-67, linux-lowlatency-hwe-5.15-tools-host,
linux-headers-5.15.0-67-generic-lpae, linux-headers-generic-hwe-20.04-edge,
linux-buildinfo-5.15.0-67-generic, linux-image-gcp,
linux-image-5.15.0-1034-azure-fde, linux-image-generic-64k-hwe-20.04,
linux-tools-virtual-hwe-20.04-edge, linux-headers-5.15.0-67,
linux-modules-5.15.0-67-generic-lpae, linux-image-5.15.0-67-lowlatency-64k,
linux-cloud-tools-5.15.0-1034-azure, linux-tools-gke-5.15,
linux-tools-virtual-hwe-20.04, linux-oracle-5.15-tools-5.15.0-1030,
linux-cloud-tools-lowlatency-hwe-20.04,
linux-image-lowlatency-hwe-20.04-edge, linux-headers-lowlatency-64k,
linux-oracle-edge, linux-tools-generic-hwe-20.04, linux-virtual-hwe-20.04,
linux-image-azure-fde-edge, linux-image-virtual-hwe-20.04,
linux-generic-64k-hwe-20.04, linux-aws-5.15-headers-5.15.0-1031,
linux-modules-5.15.0-67-lowlatency, linux-modules-5.15.0-1030-gcp,
linux-tools-generic-lpae, linux-tools-generic-64k-hwe-20.04,
linux-buildinfo-5.15.0-1030-gcp, linux-crashdump,
linux-headers-generic-64k-hwe-20.04, linux-azure-5.15-tools-5.15.0-1034,
linux-headers-azure-fde, linux-image-lowlatency-64k-hwe-20.04,
linux-image-oracle-edge, linux-lowlatency-64k-hwe-20.04-edge,
linux-modules-5.15.0-1030-oracle, linux-lowlatency-tools-host,
linux-image-gke-5.15, linux-modules-iwlwifi-5.15.0-1028-gke,
linux-headers-generic-lpae, linux-tools-5.15.0-67-generic,
linux-gke-tools-5.15.0-1028, linux-image-5.15.0-1030-oracle,
linux-cloud-tools-virtual-hwe-20.04-edge, linux-buildinfo-5.15.0-1028-gke,
linux-cloud-tools-azure-fde-edge, linux-headers-virtual-hwe-20.04-edge,
linux-cloud-tools-generic-hwe-20.04, linux-image-generic-lpae,
linux-modules-extra-azure-edge, linux-cloud-tools-virtual-hwe-20.04,
linux-tools-5.15.0-67, linux-tools-5.15.0-67-generic-64k,
linux-image-lowlatency-64k, linux-modules-5.15.0-1034-azure,
linux-lowlatency-hwe-5.15-tools-common, linux-image-5.15.0-1028-gke,
linux-generic-hwe-20.04-edge, linux-modules-extra-aws,
linux-cloud-tools-generic-hwe-20.04-edge,
linux-lowlatency-hwe-5.15-tools-5.15.0-67, linux-headers-oracle,
linux-image-generic-64k-hwe-20.04-edge,
linux-headers-generic-lpae-hwe-20.04,
linux-tools-generic-64k-hwe-20.04-edge, linux-image-5.15.0-1031-aws,
linux-aws
o USN-5917-1 : linux-gkeop-headers-5.4.0-1065, linux-tools-generic,
linux-modules-5.4.0-1087-kvm, linux-image-unsigned-5.4.0-1097-aws,
linux-tools-5.4.0-1087-kvm, linux-tools-virtual-hwe-18.04-edge,
linux-aws-headers-5.4.0-1097, linux-image-5.4.0-144-lowlatency,
linux-modules-extra-azure-lts-20.04, linux-virtual,
linux-generic-lpae-hwe-18.04-edge, linux-hwe-5.4-cloud-tools-5.4.0-144,
linux-image-5.4.0-144-generic, linux-image-azure,
linux-oem-osp1-tools-host, linux-cloud-tools-virtual, linux-azure,
linux-headers-5.4.0-1104-azure, linux-kvm-tools-5.4.0-1087,
linux-headers-5.4.0-1101-gcp, linux-oracle-5.4-tools-5.4.0-1094,
linux-modules-extra-gkeop-5.4, linux-image-oem-osp1,
linux-tools-azure-edge, linux-azure-5.4-cloud-tools-5.4.0-1104,
linux-source, linux-buildinfo-5.4.0-1097-aws, linux-image-lowlatency,
linux-buildinfo-5.4.0-1094-oracle, linux-oem-tools-host, linux-tools-aws,
linux-headers-virtual, linux-azure-lts-20.04, linux-image-aws-lts-20.04,
linux-gcp, linux-buildinfo-5.4.0-1095-gke, linux-headers-aws,
linux-cloud-tools-generic, linux-headers-5.4.0-1094-oracle,
linux-headers-5.4.0-1097-aws, linux-headers-azure,
linux-headers-gcp-lts-20.04, linux-image-unsigned-5.4.0-1104-azure,
linux-cloud-tools-5.4.0-144-generic, linux-azure-edge,
linux-headers-snapdragon-hwe-18.04-edge, linux-tools-5.4.0-144,
linux-tools-aws-lts-20.04, linux-tools-lowlatency-hwe-18.04-edge,
linux-aws-lts-20.04, linux-tools-host, linux-tools-oracle-lts-20.04,
linux-image-gke, linux-image-oracle, linux-tools-5.4.0-144-lowlatency,
linux-modules-5.4.0-1097-aws, linux-buildinfo-5.4.0-1101-gcp,
linux-virtual-hwe-18.04, linux-tools-oem-osp1, linux-cloud-tools-gkeop-5.4,
linux-aws-edge, linux-gke-tools-5.4.0-1095,
linux-hwe-5.4-cloud-tools-common, linux-buildinfo-5.4.0-1087-kvm,
linux-image-aws, linux-image-snapdragon-hwe-18.04, linux-tools-common,
linux-image-azure-edge, linux-image-snapdragon-hwe-18.04-edge,
linux-buildinfo-5.4.0-1104-azure, linux-modules-5.4.0-1101-gcp,
linux-image-generic-hwe-18.04, linux-image-unsigned-5.4.0-1094-oracle,
linux-headers-kvm, linux-gke, linux-modules-extra-5.4.0-1065-gkeop,
linux-image-5.4.0-1094-oracle, linux-image-virtual-hwe-18.04-edge,
linux-headers-5.4.0-144, linux-hwe-5.4-tools-5.4.0-144,
linux-image-5.4.0-1104-azure, linux-image-gke-5.4,
linux-modules-5.4.0-1104-azure, linux-modules-5.4.0-144-generic-lpae,
linux-oracle-5.4, linux-modules-extra-virtual-hwe-18.04,
linux-oracle-tools-5.4.0-1094, linux-image-unsigned-5.4.0-1101-gcp,
linux-tools-5.4.0-1104-azure, linux-generic-lpae,
linux-buildinfo-5.4.0-144-generic-lpae, linux-snapdragon-hwe-18.04-edge,
linux-tools-gke, linux-snapdragon-hwe-18.04,
linux-cloud-tools-5.4.0-1097-aws, linux-gcp-lts-20.04,
linux-image-5.4.0-1101-gcp, linux-image-virtual-hwe-18.04,
linux-modules-extra-gkeop, linux-cloud-tools-generic-hwe-18.04, linux-doc,
linux-headers-5.4.0-144-lowlatency, linux-headers-aws-lts-20.04,
linux-image-extra-virtual-hwe-18.04, linux-tools-5.4.0-1065-gkeop,
linux-azure-5.4-headers-5.4.0-1104, linux-tools-5.4.0-1101-gcp,
linux-tools-gke-5.4, linux-image-aws-edge,
linux-headers-generic-lpae-hwe-18.04,
linux-image-extra-virtual-hwe-18.04-edge, linux-modules-extra-oracle-edge,
linux-cloud-tools-azure-edge, linux-tools-5.4.0-1095-gke,
linux-image-gcp-lts-20.04, linux-headers-gke, linux-signed-image-azure,
linux-modules-extra-5.4.0-1101-gcp, linux-cloud-tools-azure-lts-20.04,
linux-image-5.4.0-144-generic-lpae, linux-modules-extra-5.4.0-144-generic,
linux-lowlatency-hwe-18.04-edge, linux-hwe-5.4, linux-image-virtual,
linux-generic-hwe-18.04-edge, linux-headers-oracle-lts-20.04,
linux-modules-5.4.0-144-lowlatency, linux-tools-5.4.0-1097-aws,
linux-headers-gke-5.4, linux-image-extra-virtual,
linux-modules-extra-5.4.0-1097-aws, linux-tools-5.4.0-144-generic,
linux-gkeop-cloud-tools-5.4.0-1065, linux-modules-extra-5.4.0-1094-oracle,
linux-aws-tools-5.4.0-1097, linux-aws-5.4-tools-5.4.0-1097,
linux-hwe-5.4-tools-common, linux-image-gkeop,
linux-image-generic-lpae-hwe-18.04-edge, linux-modules-5.4.0-144-generic,
linux-image-oem, linux-cloud-tools-virtual-hwe-18.04-edge,
linux-headers-oracle-edge, linux-tools-aws-edge, linux-oracle,
linux-tools-oracle-edge, linux-signed-image-azure-edge,
linux-cloud-tools-common, linux-tools-generic-hwe-18.04,
linux-headers-gkeop, linux-cloud-tools-lowlatency-hwe-18.04, linux-kvm,
linux-modules-extra-azure, linux-gcp-tools-5.4.0-1101,
linux-headers-virtual-hwe-18.04, linux-image-generic-lpae-hwe-18.04,
linux-modules-5.4.0-1065-gkeop, linux-modules-extra-gke,
linux-tools-generic-hwe-18.04-edge, linux-headers-generic-hwe-18.04,
linux-headers-azure-edge, linux-tools-virtual,
linux-modules-5.4.0-1095-gke, linux-tools-generic-lpae-hwe-18.04-edge,
linux-cloud-tools-gkeop, linux-aws-5.4-headers-5.4.0-1097,
linux-headers-5.4.0-144-generic-lpae, linux-image-5.4.0-1065-gkeop,
linux-headers-5.4.0-1087-kvm, linux-tools-lowlatency, linux-gkeop-5.4,
linux-image-lowlatency-hwe-18.04, linux-modules-extra-aws-lts-20.04,
linux-cloud-tools-5.4.0-144-lowlatency, linux-gke-headers-5.4.0-1095,
linux-cloud-tools-lowlatency, linux-cloud-tools-generic-hwe-18.04-edge,
linux-generic-hwe-18.04, linux-buildinfo-5.4.0-1065-gkeop,
linux-image-gkeop-5.4, linux-tools-gkeop-5.4, linux-aws-5.4,
linux-modules-extra-5.4.0-1104-azure,
linux-cloud-tools-lowlatency-hwe-18.04-edge, linux-image-oracle-lts-20.04,
linux-image-unsigned-5.4.0-144-lowlatency, linux-cloud-tools-5.4.0-144,
linux-tools-5.4.0-1094-oracle, linux-tools-oracle,
linux-image-5.4.0-1087-kvm, linux-headers-5.4.0-1065-gkeop,
linux-tools-generic-lpae-hwe-18.04, linux-headers-lowlatency-hwe-18.04,
linux-modules-extra-gke-5.4, linux-oem, linux-azure-5.4-tools-5.4.0-1104,
linux-gke-5.4, linux-headers-5.4.0-144-generic, linux-tools-kvm,
linux-generic, linux-azure-cloud-tools-5.4.0-1104,
linux-image-unsigned-5.4.0-1087-kvm, linux-hwe-5.4-headers-5.4.0-144,
linux-headers-lowlatency-hwe-18.04-edge, linux-headers-oem,
linux-aws-5.4-cloud-tools-5.4.0-1097, linux-image-generic,
linux-lowlatency, linux-oracle-5.4-headers-5.4.0-1094, linux-signed-oracle,
linux-cloud-tools-azure, linux-oem-osp1, linux, linux-libc-dev,
linux-image-lowlatency-hwe-18.04-edge, linux-headers-aws-edge,
linux-cloud-tools-5.4.0-1065-gkeop, linux-headers-azure-lts-20.04,
linux-headers-generic, linux-cloud-tools-virtual-hwe-18.04,
linux-headers-lowlatency, linux-modules-extra-aws-edge,
linux-modules-extra-oracle, linux-tools-5.4.0-144-generic-lpae,
linux-tools-azure, linux-tools-lowlatency-hwe-18.04,
linux-buildinfo-5.4.0-144-lowlatency, linux-azure-5.4,
linux-modules-extra-5.4.0-1095-gke, linux-headers-virtual-hwe-18.04-edge,
linux-signed-image-oracle-edge, linux-image-azure-lts-20.04,
linux-virtual-hwe-18.04-edge, linux-image-unsigned-5.4.0-144-generic,
linux-buildinfo-5.4.0-144-generic, linux-modules-5.4.0-1094-oracle,
linux-oracle-edge, linux-headers-oem-osp1,
linux-image-unsigned-5.4.0-1065-gkeop, linux-modules-extra-gcp-lts-20.04,
linux-tools-snapdragon-hwe-18.04, linux-azure-headers-5.4.0-1104,
linux-signed-oracle-edge, linux-headers-snapdragon-hwe-18.04,
linux-signed-azure-edge, linux-tools-generic-lpae,
linux-cloud-tools-5.4.0-1104-azure, linux-gkeop, linux-crashdump,
linux-image-oracle-edge, linux-tools-snapdragon-hwe-18.04-edge,
linux-gkeop-tools-5.4.0-1065, linux-tools-oem,
linux-image-unsigned-5.4.0-1095-gke, linux-azure-tools-5.4.0-1104,
linux-headers-generic-hwe-18.04-edge, linux-headers-generic-lpae,
linux-lowlatency-hwe-18.04, linux-image-generic-hwe-18.04-edge,
linux-headers-generic-lpae-hwe-18.04-edge, linux-tools-gkeop,
linux-tools-azure-lts-20.04, linux-signed-image-oracle,
linux-tools-gcp-lts-20.04, linux-headers-gkeop-5.4,
linux-image-generic-lpae, linux-modules-extra-azure-edge, linux-image-kvm,
linux-aws-cloud-tools-5.4.0-1097, linux-source-5.4.0,
linux-modules-extra-aws, linux-gkeop-source-5.4.0,
linux-modules-extra-virtual-hwe-18.04-edge, linux-headers-5.4.0-1095-gke,
linux-image-5.4.0-1095-gke, linux-image-5.4.0-1097-aws,
linux-gcp-headers-5.4.0-1101, linux-hwe-5.4-source-5.4.0,
linux-headers-oracle, linux-oracle-lts-20.04, linux-generic-lpae-hwe-18.04,
linux-signed-azure, linux-tools-virtual-hwe-18.04,
linux-oracle-headers-5.4.0-1094, linux-kvm-headers-5.4.0-1087, linux-aws
o USN-5929-1 : linux-raspi-headers-5.19.0-1014,
linux-modules-5.19.0-1014-raspi, linux-headers-raspi-nolpae,
linux-tools-5.19.0-1014-raspi-nolpae, linux-modules-extra-raspi,
linux-headers-raspi, linux-buildinfo-5.19.0-1014-raspi-nolpae,
linux-tools-5.19.0-1014-raspi, linux-modules-extra-raspi-nolpae,
linux-raspi-nolpae, linux-modules-5.19.0-1014-raspi-nolpae, linux-raspi,
linux-modules-extra-5.19.0-1014-raspi-nolpae,
linux-image-5.19.0-1014-raspi-nolpae,
linux-headers-5.19.0-1014-raspi-nolpae, linux-image-5.19.0-1014-raspi,
linux-modules-extra-5.19.0-1014-raspi, linux-headers-5.19.0-1014-raspi,
linux-image-raspi-nolpae, linux-raspi-tools-5.19.0-1014, linux-tools-raspi,
linux-image-raspi, linux-tools-raspi-nolpae,
linux-buildinfo-5.19.0-1014-raspi
o USN-5934-1 : linux-raspi-hwe-18.04-edge, linux-image-raspi2, linux-raspi2,
linux-buildinfo-5.4.0-1081-raspi, linux-headers-raspi2,
linux-tools-raspi2-hwe-18.04, linux-image-raspi-hwe-18.04-edge,
linux-headers-raspi-hwe-18.04, linux-headers-raspi, linux-raspi2-hwe-18.04,
linux-image-raspi2-hwe-18.04-edge, linux-image-5.4.0-1081-raspi,
linux-headers-raspi2-hwe-18.04-edge, linux-tools-raspi-hwe-18.04-edge,
linux-tools-raspi-hwe-18.04, linux-tools-raspi2,
linux-raspi-tools-5.4.0-1081, linux-tools-5.4.0-1081-raspi,
linux-headers-raspi2-hwe-18.04, linux-raspi, linux-raspi2-hwe-18.04-edge,
linux-headers-5.4.0-1081-raspi, linux-modules-5.4.0-1081-raspi,
linux-raspi-headers-5.4.0-1081, linux-raspi-hwe-18.04, linux-image-raspi,
linux-image-raspi-hwe-18.04, linux-tools-raspi,
linux-tools-raspi2-hwe-18.04-edge, linux-image-raspi2-hwe-18.04,
linux-headers-raspi-hwe-18.04-edge
o USN-5935-1 : linux-tools-5.15.0-1025-raspi-nolpae,
linux-ibm-headers-5.15.0-1026, linux-image-unsigned-5.15.0-1026-ibm,
linux-image-5.15.0-1026-ibm, linux-image-ibm,
linux-headers-5.15.0-1026-ibm, linux-headers-raspi-nolpae,
linux-modules-extra-raspi, linux-modules-extra-5.15.0-1025-raspi-nolpae,
linux-headers-raspi, linux-tools-5.15.0-1026-ibm, linux-headers-ibm,
linux-headers-5.15.0-1025-raspi, linux-modules-5.15.0-1025-raspi,
linux-tools-ibm, linux-modules-extra-raspi-nolpae, linux-raspi-nolpae,
linux-ibm-source-5.15.0, linux-modules-5.15.0-1026-ibm,
linux-tools-5.15.0-1025-raspi, linux-ibm-tools-common,
linux-buildinfo-5.15.0-1025-raspi-nolpae, linux-buildinfo-5.15.0-1026-ibm,
linux-ibm, linux-raspi, linux-modules-extra-5.15.0-1026-ibm,
linux-image-5.15.0-1025-raspi, linux-ibm-tools-5.15.0-1026,
linux-modules-extra-5.15.0-1025-raspi, linux-raspi-headers-5.15.0-1025,
linux-image-5.15.0-1025-raspi-nolpae, linux-buildinfo-5.15.0-1025-raspi,
linux-raspi-tools-5.15.0-1025, linux-image-raspi-nolpae,
linux-modules-5.15.0-1025-raspi-nolpae, linux-tools-raspi,
linux-image-raspi, linux-tools-raspi-nolpae, linux-ibm-cloud-tools-common,
linux-headers-5.15.0-1025-raspi-nolpae
o USN-5938-1 : linux-buildinfo-5.15.0-1016-gkeop,
linux-modules-extra-gkeop-5.15, linux-modules-extra-gkeop,
linux-cloud-tools-gkeop, linux-gkeop-headers-5.15.0-1016, linux-gkeop-5.15,
linux-image-5.15.0-1016-gkeop, linux-modules-5.15.0-1016-gkeop,
linux-tools-5.15.0-1016-gkeop, linux-gkeop, linux-cloud-tools-gkeop-5.15,
linux-image-gkeop-5.15, linux-tools-gkeop,
linux-gkeop-cloud-tools-5.15.0-1016, linux-modules-extra-5.15.0-1016-gkeop,
linux-tools-gkeop-5.15, linux-image-gkeop,
linux-cloud-tools-5.15.0-1016-gkeop, linux-gkeop-tools-5.15.0-1016,
linux-headers-gkeop-5.15, linux-headers-5.15.0-1016-gkeop,
linux-headers-gkeop, linux-image-unsigned-5.15.0-1016-gkeop
o USN-5939-1 : linux-modules-extra-gcp, linux-gcp-5.4-headers-5.4.0-1101,
linux-modules-extra-gcp-edge, linux-image-unsigned-5.4.0-1101-gcp,
linux-headers-5.4.0-1101-gcp, linux-image-5.4.0-1101-gcp, linux-tools-gcp,
linux-gcp-edge, linux-tools-5.4.0-1101-gcp, linux-headers-gcp-edge,
linux-tools-gcp-edge, linux-gcp, linux-modules-extra-5.4.0-1101-gcp,
linux-image-gcp-edge, linux-headers-gcp, linux-buildinfo-5.4.0-1101-gcp,
linux-gcp-5.4-tools-5.4.0-1101, linux-gcp-5.4,
linux-modules-5.4.0-1101-gcp, linux-image-gcp
o USN-5940-1 : linux-tools-raspi-hwe-18.04, linux-raspi-hwe-18.04-edge,
linux-tools-5.4.0-1081-raspi, linux-raspi-5.4,
linux-headers-5.4.0-1081-raspi, linux-modules-5.4.0-1081-raspi,
linux-buildinfo-5.4.0-1081-raspi, linux-image-5.4.0-1081-raspi,
linux-raspi-5.4-headers-5.4.0-1081, linux-tools-raspi-hwe-18.04-edge,
linux-raspi-hwe-18.04, linux-image-raspi-hwe-18.04,
linux-raspi-5.4-tools-5.4.0-1081, linux-image-raspi-hwe-18.04-edge,
linux-headers-raspi-hwe-18.04, linux-headers-raspi-hwe-18.04-edge
o USN-5941-1 : linux-image-kvm, linux-image-unsigned-5.15.0-1029-kvm,
linux-buildinfo-5.15.0-1029-kvm, linux-headers-5.15.0-1029-kvm,
linux-modules-5.15.0-1029-kvm, linux-image-5.15.0-1029-kvm,
linux-kvm-tools-5.15.0-1029, linux-tools-5.15.0-1029-kvm, linux-tools-kvm,
linux-kvm, linux-kvm-headers-5.15.0-1029, linux-headers-kvm
o USN-5950-1 : linux-kvm-headers-5.19.0-1019, linux-image-kvm,
linux-buildinfo-5.19.0-1019-kvm, linux-image-5.19.0-1019-kvm,
linux-tools-5.19.0-1019-kvm, linux-modules-5.19.0-1019-kvm,
linux-headers-5.19.0-1019-kvm, linux-tools-kvm,
linux-kvm-tools-5.19.0-1019, linux-kvm,
linux-image-unsigned-5.19.0-1019-kvm, linux-headers-kvm
o USN-5951-1 : linux-modules-5.4.0-1045-ibm, linux-ibm-lts-20.04,
linux-tools-ibm-edge, linux-headers-ibm-lts-20.04,
linux-image-5.4.0-1045-ibm, linux-ibm-headers-5.4.0-1045, linux-image-ibm,
linux-ibm-5.4-cloud-tools-common, linux-ibm-5.4-tools-5.4.0-1045,
linux-headers-ibm, linux-modules-extra-5.4.0-1045-ibm, linux-tools-ibm,
linux-buildinfo-5.4.0-1045-ibm, linux-ibm-5.4-tools-common,
linux-image-ibm-lts-20.04, linux-modules-extra-ibm-lts-20.04,
linux-tools-5.4.0-1045-ibm, linux-ibm-edge, linux-ibm-tools-common,
linux-ibm-tools-5.4.0-1045, linux-modules-extra-ibm,
linux-tools-ibm-lts-20.04, linux-ibm, linux-ibm-5.4-source-5.4.0,
linux-headers-ibm-edge, linux-modules-extra-ibm-edge,
linux-ibm-5.4-headers-5.4.0-1045, linux-image-unsigned-5.4.0-1045-ibm,
linux-image-ibm-edge, linux-ibm-cloud-tools-common, linux-ibm-5.4,
linux-ibm-source-5.4.0, linux-headers-5.4.0-1045-ibm
o USN-5911-1 : linux-headers-5.19.0-1020-aws,
linux-image-extra-virtual-hwe-22.04-edge, linux-tools-generic,
linux-modules-extra-gcp, linux-virtual,
linux-modules-extra-5.19.0-1021-azure, linux-tools-5.19.0-35-generic-lpae,
linux-headers-5.19.0-35-generic, linux-image-azure,
linux-tools-lowlatency-64k, linux-buildinfo-5.19.0-1020-aws,
linux-cloud-tools-virtual, linux-azure, linux-image-lowlatency-hwe-20.04,
linux-modules-5.19.0-1018-gcp, linux-headers-lowlatency-64k-hwe-22.04-edge,
linux-modules-iwlwifi-generic-hwe-22.04, linux-buildinfo-5.19.0-1021-azure,
linux-image-lowlatency-hwe-22.04, linux-cloud-tools-5.19.0-1021-azure,
linux-cloud-tools-generic-hwe-22.04-edge, linux-source,
linux-modules-ipu6-5.19.0-1018-lowlatency,
linux-tools-lowlatency-64k-hwe-22.04-edge, linux-image-lowlatency,
linux-headers-generic-lpae-hwe-22.04-edge, linux-tools-ibm,
linux-tools-aws, linux-headers-virtual, linux-headers-5.19.0-1018-gcp,
linux-modules-5.19.0-1020-aws, linux-gcp, linux-lowlatency-tools-common,
linux-headers-aws, linux-cloud-tools-generic, linux-headers-azure,
linux-tools-lowlatency-hwe-20.04, linux-ibm, linux-source-5.19.0,
linux-lowlatency-hwe-20.04, linux-generic-hwe-22.04-edge,
linux-tools-generic-64k-hwe-22.04, linux-headers-generic-hwe-22.04,
linux-image-generic-hwe-22.04, linux-image-virtual-hwe-22.04,
linux-cloud-tools-5.19.0-35-generic, linux-lowlatency-headers-5.19.0-1018,
linux-modules-extra-5.19.0-1018-oracle, linux-image-oem-22.04,
linux-tools-host, linux-image-oracle, linux-generic-64k,
linux-tools-generic-lpae-hwe-22.04-edge, linux-tools-oem-22.04,
linux-oracle-headers-5.19.0-1018, linux-buildinfo-5.19.0-35-generic-lpae,
linux-image-5.19.0-1018-lowlatency-64k,
linux-tools-lowlatency-64k-hwe-22.04, linux-image-aws,
linux-cloud-tools-lowlatency-hwe-22.04,
linux-image-lowlatency-hwe-22.04-edge, linux-tools-common,
linux-generic-64k-hwe-22.04-edge, linux-tools-generic-64k,
linux-image-generic-64k-hwe-22.04-edge, linux-lowlatency-hwe-22.04-edge,
linux-modules-ivsc-5.19.0-35-generic,
linux-modules-ivsc-5.19.0-1018-lowlatency,
linux-cloud-tools-5.19.0-1018-lowlatency,
linux-image-unsigned-5.19.0-1018-lowlatency,
linux-lowlatency-cloud-tools-5.19.0-1018, linux-modules-5.19.0-35-generic,
linux-modules-iwlwifi-generic-hwe-22.04-edge, linux-generic-lpae,
linux-image-5.19.0-35-generic-64k, linux-image-lowlatency-64k-hwe-22.04,
linux-tools-generic-hwe-22.04-edge, linux-image-ibm,
linux-buildinfo-5.19.0-35-generic, linux-image-5.19.0-1020-aws,
linux-lowlatency-64k-hwe-20.04, linux-modules-5.19.0-1018-lowlatency,
linux-image-extra-virtual-hwe-22.04, linux-tools-lowlatency-hwe-20.04-edge,
linux-azure-cloud-tools-5.19.0-1021, linux-ibm-tools-5.19.0-1018,
linux-tools-lowlatency-64k-hwe-20.04, linux-headers-generic-lpae-hwe-22.04,
linux-doc, linux-cloud-tools-lowlatency-hwe-22.04-edge,
linux-headers-lowlatency-hwe-22.04, linux-oem-22.04, linux-headers-ibm,
linux-image-unsigned-5.19.0-35-generic, linux-generic-hwe-22.04,
linux-image-generic-64k-hwe-22.04, linux-cloud-tools-5.19.0-1020-aws,
linux-headers-lowlatency-hwe-22.04-edge,
linux-headers-lowlatency-64k-hwe-20.04, linux-aws,
linux-modules-ivsc-generic, linux-modules-5.19.0-35-generic-lpae,
linux-tools-5.19.0-35, linux-lowlatency-hwe-22.04,
linux-tools-5.19.0-35-generic-64k,
linux-headers-lowlatency-64k-hwe-20.04-edge, linux-image-virtual,
linux-headers-lowlatency-hwe-20.04, linux-lowlatency-cloud-tools-common,
linux-modules-5.19.0-1018-lowlatency-64k, linux-image-generic-64k,
linux-lowlatency-64k, linux-image-extra-virtual,
linux-modules-ivsc-generic-hwe-22.04-edge,
linux-image-generic-lpae-hwe-22.04-edge,
linux-headers-5.19.0-35-generic-64k, linux-hwe-5.19-tools-5.19.0-35,
linux-headers-generic-hwe-22.04-edge,
linux-headers-lowlatency-hwe-20.04-edge, linux-image-5.19.0-1018-gcp,
linux-modules-extra-5.19.0-1018-gcp, linux-cloud-tools-virtual-hwe-22.04,
linux-generic-lpae-hwe-22.04-edge, linux-lowlatency-hwe-20.04-edge,
linux-oracle, linux-ibm-source-5.19.0, linux-cloud-tools-common,
linux-hwe-5.19-headers-5.19.0-35, linux-aws-cloud-tools-5.19.0-1020,
linux-tools-5.19.0-35-generic, linux-virtual-hwe-22.04-edge,
linux-modules-extra-azure, linux-cloud-tools-lowlatency-hwe-20.04-edge,
linux-image-virtual-hwe-22.04-edge, linux-headers-5.19.0-35,
linux-tools-lowlatency-hwe-22.04-edge, linux-azure-tools-5.19.0-1021,
linux-hwe-5.19-tools-host, linux-image-generic-lpae-hwe-22.04,
linux-image-lowlatency-64k-hwe-22.04-edge, linux-tools-virtual,
linux-ibm-cloud-tools-common, linux-virtual-hwe-22.04,
linux-headers-5.19.0-1018-lowlatency-64k,
linux-cloud-tools-virtual-hwe-22.04-edge,
linux-headers-generic-64k-hwe-22.04,
linux-image-unsigned-5.19.0-35-generic-64k, linux-tools-gcp,
linux-tools-lowlatency, linux-image-5.19.0-35-generic,
linux-tools-5.19.0-1018-lowlatency-64k,
linux-image-unsigned-5.19.0-1018-oracle, linux-cloud-tools-lowlatency,
linux-headers-generic-64k, linux-headers-virtual-hwe-22.04,
linux-image-5.19.0-1018-lowlatency, linux-modules-extra-5.19.0-35-generic,
linux-headers-virtual-hwe-22.04-edge, linux-buildinfo-5.19.0-1018-oracle,
linux-cloud-tools-5.19.0-35, linux-tools-lowlatency-64k-hwe-20.04-edge,
linux-ibm-tools-common, linux-modules-ipu6-generic-hwe-22.04,
linux-modules-iwlwifi-generic, linux-hwe-5.19,
linux-headers-lowlatency-64k-hwe-22.04, linux-image-5.19.0-1021-azure,
linux-tools-5.19.0-1018-lowlatency, linux-tools-oracle,
linux-tools-virtual-hwe-22.04-edge, linux-headers-oem-22.04,
linux-oracle-tools-5.19.0-1018, linux-image-lowlatency-64k-hwe-20.04-edge,
linux-tools-5.19.0-1020-aws, linux-tools-generic-lpae-hwe-22.04,
linux-generic, linux-modules-5.19.0-1021-azure,
linux-aws-headers-5.19.0-1020, linux-image-generic-hwe-22.04-edge,
linux-lowlatency-64k-hwe-22.04-edge, linux-headers-gcp,
linux-headers-5.19.0-1018-oracle, linux-image-generic, linux-lowlatency,
linux-cloud-tools-azure, linux-modules-5.19.0-35-generic-64k, linux,
linux-image-unsigned-5.19.0-1018-lowlatency-64k, linux-libc-dev,
linux-lowlatency-64k-hwe-22.04, linux-headers-5.19.0-1021-azure,
linux-headers-generic, linux-tools-azure, linux-headers-lowlatency,
linux-headers-5.19.0-35-generic-lpae, linux-tools-generic-hwe-22.04,
linux-hwe-5.19-cloud-tools-common, linux-image-gcp,
linux-buildinfo-5.19.0-1018-lowlatency,
linux-modules-ipu6-generic-hwe-22.04-edge, linux-ibm-headers-5.19.0-1018,
linux-modules-5.19.0-1018-ibm, linux-modules-ipu6-5.19.0-35-generic,
linux-image-5.19.0-1018-oracle, linux-modules-extra-5.19.0-1018-ibm,
linux-modules-extra-5.19.0-1020-aws,
linux-cloud-tools-lowlatency-hwe-20.04,
linux-image-lowlatency-hwe-20.04-edge, linux-headers-lowlatency-64k,
linux-gcp-tools-5.19.0-1018, linux-image-5.19.0-1018-ibm,
linux-gcp-headers-5.19.0-1018, linux-buildinfo-5.19.0-1018-lowlatency-64k,
linux-buildinfo-5.19.0-35-generic-64k, linux-tools-virtual-hwe-22.04,
linux-tools-5.19.0-1018-oracle, linux-image-unsigned-5.19.0-1021-azure,
linux-generic-64k-hwe-22.04, linux-tools-generic-lpae,
linux-tools-lowlatency-hwe-22.04, linux-crashdump,
linux-image-lowlatency-64k-hwe-20.04, linux-cloud-tools-generic-hwe-22.04,
linux-lowlatency-tools-5.19.0-1018, linux-lowlatency-64k-hwe-20.04-edge,
linux-modules-ivsc-generic-hwe-22.04, linux-headers-5.19.0-1018-lowlatency,
linux-generic-lpae-hwe-22.04, linux-lowlatency-tools-host,
linux-modules-iwlwifi-5.19.0-1018-lowlatency,
linux-image-unsigned-5.19.0-1018-gcp, linux-headers-generic-lpae,
linux-tools-5.19.0-1018-ibm, linux-image-unsigned-5.19.0-1020-aws,
linux-tools-generic-64k-hwe-22.04-edge, linux-image-5.19.0-35-generic-lpae,
linux-modules-iwlwifi-5.19.0-35-generic, linux-modules-5.19.0-1018-oracle,
linux-tools-5.19.0-1021-azure, linux-hwe-5.19-tools-common,
linux-image-generic-lpae, linux-image-unsigned-5.19.0-1018-ibm,
linux-buildinfo-5.19.0-1018-ibm, linux-image-lowlatency-64k,
linux-modules-extra-aws, linux-headers-generic-64k-hwe-22.04-edge,
linux-tools-5.19.0-1018-gcp, linux-headers-oracle,
linux-buildinfo-5.19.0-1018-gcp, linux-modules-ipu6-generic,
linux-headers-5.19.0-1018-ibm, linux-hwe-5.19-cloud-tools-5.19.0-35,
linux-azure-headers-5.19.0-1021, linux-aws-tools-5.19.0-1020
o USN-5962-1 : linux-intel-iotg-tools-host,
linux-modules-5.15.0-1026-intel-iotg, linux-tools-intel-iotg,
linux-headers-5.15.0-1026-intel-iotg,
linux-modules-iwlwifi-5.15.0-1026-intel-iotg, linux-headers-intel-iotg,
linux-intel-iotg-headers-5.15.0-1026,
linux-image-unsigned-5.15.0-1026-intel-iotg,
linux-modules-extra-5.15.0-1026-intel-iotg,
linux-image-5.15.0-1026-intel-iotg, linux-buildinfo-5.15.0-1026-intel-iotg,
linux-intel-iotg-cloud-tools-5.15.0-1026,
linux-intel-iotg-tools-5.15.0-1026, linux-image-intel-iotg,
linux-tools-5.15.0-1026-intel-iotg,
linux-cloud-tools-5.15.0-1026-intel-iotg, linux-intel-iotg,
linux-intel-iotg-cloud-tools-common, linux-intel-iotg-tools-common
o USN-6000-1 : linux-headers-5.4.0-1059-bluefield,
linux-image-5.4.0-1059-bluefield, linux-tools-bluefield,
linux-tools-5.4.0-1059-bluefield,
linux-image-unsigned-5.4.0-1059-bluefield,
linux-bluefield-tools-5.4.0-1059, linux-modules-5.4.0-1059-bluefield,
linux-bluefield, linux-bluefield-headers-5.4.0-1059,
linux-headers-bluefield, linux-buildinfo-5.4.0-1059-bluefield,
linux-image-bluefield
o USN-6089-1 : linux-oem-6.0-tools-6.0.0-1016,
linux-modules-iwlwifi-6.0.0-1016-oem, linux-tools-6.0.0-1016-oem,
linux-oem-22.04b, linux-oem-6.0, linux-image-oem-22.04b,
linux-modules-iwlwifi-oem-22.04b, linux-buildinfo-6.0.0-1016-oem,
linux-image-unsigned-6.0.0-1016-oem, linux-headers-6.0.0-1016-oem,
linux-image-6.0.0-1016-oem, linux-modules-ipu6-6.0.0-1016-oem,
linux-modules-ipu6-oem-22.04b, linux-oem-6.0-headers-6.0.0-1016,
linux-headers-oem-22.04b, linux-tools-oem-22.04b,
linux-modules-ivsc-6.0.0-1016-oem, linux-modules-6.0.0-1016-oem,
linux-oem-6.0-tools-host, linux-modules-ivsc-oem-22.04b
o USN-5790-1 : linux-snapdragon, linux-tools-generic,
linux-modules-extra-gcp, linux-tools-4.15.0-1147-aws,
linux-tools-4.15.0-201-generic-lpae, linux-virtual,
linux-headers-4.15.0-1133-kvm, linux-signed-generic-hwe-16.04,
linux-headers-generic-lpae-hwe-16.04, linux-modules-4.15.0-1133-kvm,
linux-gcp-lts-18.04, linux-headers-gcp-lts-18.04, linux-image-azure,
linux-signed-image-generic-hwe-16.04, linux-cloud-tools-virtual,
linux-azure, linux-aws-tools-4.15.0-1147, linux-virtual-hwe-16.04,
linux-headers-4.15.0-1058-dell300x,
linux-azure-4.15-cloud-tools-4.15.0-1158,
linux-cloud-tools-4.15.0-1158-azure, linux-cloud-tools-virtual-hwe-16.04,
linux-modules-extra-gcp-lts-18.04, linux-signed-oracle-lts-18.04,
linux-modules-extra-4.15.0-1112-oracle, linux-generic-hwe-16.04,
linux-signed-generic, linux-lowlatency-hwe-16.04, linux-source,
linux-tools-gcp-lts-18.04, linux-image-4.15.0-1112-oracle,
linux-tools-aws-hwe, linux-image-unsigned-4.15.0-1147-aws,
linux-headers-lowlatency-hwe-16.04-edge, linux-image-lowlatency,
linux-hwe-cloud-tools-4.15.0-201, linux-image-generic-hwe-16.04-edge,
linux-signed-image-lowlatency-hwe-16.04-edge, linux-headers-virtual,
linux-gcp, linux-tools-4.15.0-1112-oracle, linux-source-4.15.0,
linux-signed-image-oracle-lts-18.04, linux-tools-4.15.0-201,
linux-cloud-tools-generic, linux-headers-azure,
linux-buildinfo-4.15.0-1143-snapdragon, linux-headers-aws-lts-18.04,
linux-signed-image-lowlatency, linux-image-extra-virtual-hwe-16.04,
linux-image-extra-virtual-hwe-16.04-edge,
linux-image-unsigned-4.15.0-1158-azure, linux-image-virtual-hwe-16.04,
linux-signed-image-lowlatency-hwe-16.04,
linux-signed-lowlatency-hwe-16.04-edge, linux-oracle-lts-18.04,
linux-image-gcp-lts-18.04, linux-image-snapdragon,
linux-image-unsigned-4.15.0-1112-oracle, linux-tools-4.15.0-201-lowlatency,
linux-image-aws-hwe, linux-tools-generic-lpae-hwe-16.04-edge,
linux-tools-host, linux-cloud-tools-azure-lts-18.04,
linux-azure-4.15-headers-4.15.0-1158, linux-image-gke,
linux-headers-4.15.0-201-generic-lpae, linux-image-oracle,
linux-modules-4.15.0-1142-gcp, linux-tools-lowlatency-hwe-16.04,
linux-tools-virtual-hwe-16.04, linux-raspi2-headers-4.15.0-1125,
linux-headers-4.15.0-1142-gcp, linux-signed-image-oem, linux-aws-edge,
linux-buildinfo-4.15.0-1125-raspi2, linux-modules-extra-4.15.0-1147-aws,
linux-cloud-tools-4.15.0-201-lowlatency, linux-image-4.15.0-201-lowlatency,
linux-lowlatency-hwe-16.04-edge, linux-tools-4.15.0-201-generic,
linux-headers-azure-lts-18.04, linux-modules-4.15.0-1112-oracle,
linux-image-lowlatency-hwe-16.04, linux-modules-4.15.0-1125-raspi2,
linux-tools-common, linux-headers-virtual-hwe-16.04,
linux-oracle-tools-4.15.0-1112, linux-headers-kvm, linux-dell300x,
linux-gke, linux-image-dell300x, linux-image-unsigned-4.15.0-1142-gcp,
linux-cloud-tools-generic-hwe-16.04-edge, linux-modules-4.15.0-201-generic,
linux-tools-oracle-lts-18.04, linux-buildinfo-4.15.0-1112-oracle,
linux-image-raspi2, linux-cloud-tools-virtual-hwe-16.04-edge,
linux-aws-hwe-tools-4.15.0-1147, linux-gcp-4.15,
linux-gcp-4.15-tools-4.15.0-1142, linux-tools-generic-lpae-hwe-16.04,
linux-generic-lpae, linux-modules-extra-azure-lts-18.04,
linux-cloud-tools-4.15.0-1147-aws, linux-tools-gke,
linux-cloud-tools-lowlatency-hwe-16.04,
linux-signed-image-generic-hwe-16.04-edge, linux-doc,
linux-headers-4.15.0-1125-raspi2, linux-kvm-headers-4.15.0-1133,
linux-buildinfo-4.15.0-1142-gcp, linux-tools-4.15.0-1133-kvm,
linux-oracle-headers-4.15.0-1112, linux-image-4.15.0-201-generic,
linux-headers-4.15.0-1147-aws, linux-buildinfo-4.15.0-1058-dell300x,
linux-modules-extra-4.15.0-201-generic, linux-headers-gke,
linux-signed-image-generic, linux-signed-image-azure, linux-tools-raspi2,
linux-aws-hwe, linux-image-virtual, linux-gcp-tools-4.15.0-1142,
linux-image-azure-lts-18.04, linux-image-4.15.0-1142-gcp,
linux-image-extra-virtual, linux-tools-aws-lts-18.04,
linux-image-4.15.0-1133-kvm, linux-image-oem,
linux-modules-4.15.0-201-generic-lpae,
linux-buildinfo-4.15.0-201-lowlatency, linux-gcp-headers-4.15.0-1142,
linux-tools-generic-hwe-16.04, linux-modules-4.15.0-201-lowlatency,
linux-headers-4.15.0-201-lowlatency, linux-oracle,
linux-signed-image-azure-lts-18.04, linux-cloud-tools-common,
linux-tools-4.15.0-1142-gcp, linux-modules-4.15.0-1058-dell300x,
linux-generic-lpae-hwe-16.04, linux-kvm, linux-modules-extra-azure,
linux-tools-snapdragon, linux-image-oracle-lts-18.04,
linux-tools-4.15.0-1158-azure, linux-azure-headers-4.15.0-1158,
linux-image-lowlatency-hwe-16.04-edge, linux-buildinfo-4.15.0-201-generic,
linux-modules-extra-gke, linux-snapdragon-headers-4.15.0-1143,
linux-tools-virtual, linux-image-aws-lts-18.04, linux-headers-raspi2,
linux-cloud-tools-4.15.0-201-generic, linux-aws-lts-18.04,
linux-image-4.15.0-1125-raspi2, linux-tools-gcp,
linux-signed-generic-hwe-16.04-edge, linux-tools-lowlatency,
linux-image-generic-hwe-16.04, linux-cloud-tools-lowlatency,
linux-azure-cloud-tools-4.15.0-1158,
linux-cloud-tools-lowlatency-hwe-16.04-edge,
linux-modules-extra-4.15.0-1142-gcp, linux-dell300x-tools-4.15.0-1058,
linux-aws-cloud-tools-4.15.0-1147, linux-tools-oracle,
linux-signed-lowlatency-hwe-16.04, linux-oem,
linux-headers-4.15.0-201-generic, linux-tools-4.15.0-1058-dell300x,
linux-cloud-tools-4.15.0-201, linux-aws-hwe-cloud-tools-4.15.0-1147,
linux-tools-kvm, linux-generic, linux-tools-4.15.0-1125-raspi2,
linux-generic-hwe-16.04-edge, linux-headers-gcp, linux-headers-oem,
linux-image-generic, linux-lowlatency, linux-signed-oracle, linux-hwe,
linux-cloud-tools-generic-hwe-16.04, linux-buildinfo-4.15.0-1147-aws,
linux-cloud-tools-azure, linux-headers-lowlatency-hwe-16.04,
linux-image-4.15.0-1147-aws, linux, linux-kvm-tools-4.15.0-1133,
linux-tools-azure-lts-18.04, linux-libc-dev,
linux-modules-4.15.0-1143-snapdragon, linux-signed-lowlatency,
linux-headers-generic, linux-snapdragon-tools-4.15.0-1143,
linux-tools-azure, linux-headers-lowlatency,
linux-headers-generic-hwe-16.04-edge, linux-modules-extra-aws-hwe,
linux-image-unsigned-4.15.0-201-generic,
linux-tools-lowlatency-hwe-16.04-edge, linux-image-gcp,
linux-modules-4.15.0-1147-aws, linux-azure-tools-4.15.0-1158,
linux-buildinfo-4.15.0-1133-kvm, linux-hwe-tools-4.15.0-201, linux-raspi2,
linux-tools-4.15.0-1143-snapdragon, linux-buildinfo-4.15.0-1158-azure,
linux-image-unsigned-4.15.0-201-lowlatency, linux-virtual-hwe-16.04-edge,
linux-image-4.15.0-201-generic-lpae, linux-image-generic-lpae-hwe-16.04,
linux-azure-lts-18.04, linux-gcp-4.15-headers-4.15.0-1142,
linux-image-virtual-hwe-16.04-edge, linux-image-4.15.0-1158-azure,
linux-modules-extra-aws-lts-18.04, linux-headers-4.15.0-1143-snapdragon,
linux-tools-virtual-hwe-16.04-edge, linux-image-4.15.0-1143-snapdragon,
linux-headers-4.15.0-1112-oracle, linux-headers-oracle-lts-18.04,
linux-tools-generic-hwe-16.04-edge, linux-headers-aws-hwe,
linux-tools-generic-lpae, linux-headers-generic-hwe-16.04, linux-crashdump,
linux-image-4.15.0-1147-aws-hwe, linux-dell300x-headers-4.15.0-1058,
linux-image-generic-lpae-hwe-16.04-edge, linux-headers-4.15.0-201,
linux-tools-oem, linux-tools-dell300x, linux-headers-generic-lpae,
linux-headers-virtual-hwe-16.04-edge, linux-generic-lpae-hwe-16.04-edge,
linux-headers-4.15.0-1158-azure, linux-headers-dell300x,
linux-signed-image-oracle, linux-headers-generic-lpae-hwe-16.04-edge,
linux-modules-extra-4.15.0-1158-azure, linux-image-generic-lpae,
linux-signed-oem, linux-image-kvm, linux-headers-snapdragon,
linux-azure-4.15-tools-4.15.0-1158, linux-modules-4.15.0-1158-azure,
linux-azure-4.15, linux-image-4.15.0-1058-dell300x, linux-headers-oracle,
linux-raspi2-tools-4.15.0-1125, linux-aws-headers-4.15.0-1147,
linux-buildinfo-4.15.0-201-generic-lpae,
linux-image-unsigned-4.15.0-1058-dell300x, linux-signed-azure,
linux-signed-azure-lts-18.04, linux-aws
o USN-5791-1 : linux-tools-generic, linux-image-5.4.0-1097-gcp,
linux-modules-extra-gcp, linux-tools-virtual-hwe-18.04-edge,
linux-cloud-tools-5.4.0-136-lowlatency, linux-oracle-5.4-tools-5.4.0-1091,
linux-gcp-edge, linux-gcp-tools-5.4.0-1097, linux-image-lowlatency,
linux-oem-tools-host, linux-aws-5.4-tools-5.4.0-1093,
linux-cloud-tools-generic, linux-aws-lts-20.04, linux-tools-host,
linux-virtual-hwe-18.04, linux-tools-oem-osp1, linux-gcp-5.4,
linux-image-aws, linux-image-snapdragon-hwe-18.04, linux-tools-common,
linux-ibm-5.4, linux-tools-5.4.0-136-generic-lpae,
linux-aws-5.4-headers-5.4.0-1093, linux-hwe-5.4-tools-5.4.0-136,
linux-tools-5.4.0-136-lowlatency, linux-ibm-5.4-headers-5.4.0-1041,
linux-oracle-5.4, linux-snapdragon-hwe-18.04-edge, linux-tools-gke,
linux-image-virtual-hwe-18.04, linux-headers-ibm,
linux-image-unsigned-5.4.0-1093-aws, linux-image-extra-virtual-hwe-18.04,
linux-cloud-tools-5.4.0-136-generic, linux-modules-extra-oracle-edge,
linux-headers-gke, linux-tools-raspi2, linux-aws-cloud-tools-5.4.0-1093,
linux-headers-5.4.0-136, linux-image-virtual, linux-headers-gke-5.4,
linux-cloud-tools-virtual-hwe-18.04-edge, linux-tools-oracle-edge,
linux-tools-generic-hwe-18.04, linux-headers-5.4.0-136-lowlatency,
linux-modules-5.4.0-1083-kvm, linux-gke-tools-5.4.0-1091,
linux-cloud-tools-lowlatency-hwe-18.04, linux-kvm,
linux-headers-5.4.0-1083-kvm, linux-image-unsigned-5.4.0-136-generic,
linux-ibm-lts-20.04, linux-tools-virtual, linux-headers-generic-hwe-18.04,
linux-tools-raspi2-hwe-18.04, linux-headers-raspi-hwe-18.04,
linux-headers-raspi, linux-gkeop-5.4, linux-raspi2-hwe-18.04,
linux-tools-5.4.0-1097-gcp, linux-cloud-tools-lowlatency,
linux-image-unsigned-5.4.0-1097-gcp, linux-tools-gkeop-5.4,
linux-modules-extra-5.4.0-1093-aws, linux-image-5.4.0-136-generic-lpae,
linux-gke-headers-5.4.0-1091, linux-tools-oracle,
linux-buildinfo-5.4.0-1091-gke, linux-headers-gcp,
linux-image-5.4.0-1041-ibm, linux-oem-osp1, linux-headers-aws-edge,
linux-gcp-headers-5.4.0-1097, linux-headers-virtual-hwe-18.04-edge,
linux-virtual-hwe-18.04-edge, linux-modules-5.4.0-1093-aws,
linux-image-unsigned-5.4.0-1083-kvm, linux-modules-5.4.0-1091-gke,
linux-signed-oracle-edge, linux-modules-5.4.0-1097-gcp,
linux-tools-generic-lpae, linux-gkeop, linux-crashdump,
linux-headers-generic-lpae, linux-modules-extra-5.4.0-1041-ibm,
linux-image-generic-hwe-18.04-edge,
linux-headers-generic-lpae-hwe-18.04-edge, linux-tools-gkeop,
linux-tools-gcp-lts-20.04, linux-image-unsigned-5.4.0-1091-oracle,
linux-image-generic-lpae, linux-image-kvm, linux-tools-5.4.0-1091-gke,
linux-gkeop-source-5.4.0, linux-cloud-tools-5.4.0-1061-gkeop,
linux-oracle-lts-20.04, linux-headers-oracle,
linux-oracle-tools-5.4.0-1091, linux-tools-raspi,
linux-tools-virtual-hwe-18.04, linux-aws,
linux-image-unsigned-5.4.0-136-lowlatency, linux-tools-ibm-edge,
linux-image-raspi2-hwe-18.04-edge, linux-tools-ibm, linux-tools-aws,
linux-ibm-tools-5.4.0-1041, linux-tools-gcp-edge,
linux-image-unsigned-5.4.0-1061-gkeop,
linux-aws-5.4-cloud-tools-5.4.0-1093, linux-raspi,
linux-headers-5.4.0-136-generic, linux-headers-snapdragon-hwe-18.04-edge,
linux-headers-5.4.0-1091-gke, linux-tools-oracle-lts-20.04,
linux-modules-extra-5.4.0-1091-oracle, linux-aws-edge,
linux-tools-raspi2-hwe-18.04-edge, linux-modules-extra-5.4.0-1097-gcp,
linux-oracle-headers-5.4.0-1091, linux-image-gke-5.4, linux-image-raspi2,
linux-headers-ibm-lts-20.04, linux-buildinfo-5.4.0-136-lowlatency,
linux-cloud-tools-generic-hwe-18.04, linux-headers-5.4.0-1061-gkeop,
linux-headers-aws-lts-20.04, linux-tools-gke-5.4, linux-image-aws-edge,
linux-image-extra-virtual-hwe-18.04-edge, linux-image-gcp-lts-20.04,
linux-kvm-tools-5.4.0-1083, linux-headers-oracle-lts-20.04,
linux-image-extra-virtual, linux-image-oem, linux-headers-oracle-edge,
linux-tools-aws-edge, linux-image-generic-lpae-hwe-18.04,
linux-modules-extra-gcp-edge, linux-tools-5.4.0-1041-ibm,
linux-ibm-5.4-cloud-tools-common, linux-tools-gcp,
linux-modules-extra-aws-lts-20.04, linux-ibm-5.4-tools-common,
linux-aws-5.4, linux-modules-5.4.0-1091-oracle,
linux-cloud-tools-lowlatency-hwe-18.04-edge, linux-tools-raspi-hwe-18.04,
linux-tools-ibm-lts-20.04, linux-tools-5.4.0-1091-oracle,
linux-aws-tools-5.4.0-1093, linux-buildinfo-5.4.0-136-generic-lpae,
linux-cloud-tools-5.4.0-136, linux-lowlatency, linux,
linux-modules-extra-aws-edge, linux-image-lowlatency-hwe-18.04-edge,
linux-headers-generic, linux-headers-lowlatency,
linux-modules-extra-oracle, linux-image-gcp, linux-image-5.4.0-1078-raspi,
linux-raspi2, linux-headers-5.4.0-1093-aws,
linux-modules-extra-gcp-lts-20.04, linux-modules-extra-ibm-lts-20.04,
linux-headers-5.4.0-1041-ibm, linux-tools-oem, linux-signed-image-oracle,
linux-modules-extra-aws, linux-modules-extra-virtual-hwe-18.04-edge,
linux-generic-lpae-hwe-18.04, linux-raspi-hwe-18.04, linux-virtual,
linux-generic-lpae-hwe-18.04-edge, linux-cloud-tools-virtual,
linux-buildinfo-5.4.0-1083-kvm, linux-tools-raspi-hwe-18.04-edge,
linux-headers-virtual, linux-image-aws-lts-20.04, linux-gcp,
linux-ibm-edge, linux-ibm, linux-tools-aws-lts-20.04,
linux-ibm-5.4-source-5.4.0, linux-raspi-5.4-tools-5.4.0-1078,
linux-hwe-5.4-cloud-tools-common, linux-image-ibm-edge,
linux-tools-5.4.0-136, linux-generic-lpae, linux-image-ibm,
linux-headers-generic-lpae-hwe-18.04, linux-headers-gcp-edge,
linux-buildinfo-5.4.0-1097-gcp, linux-oracle-5.4-headers-5.4.0-1091,
linux-image-unsigned-5.4.0-1091-gke, linux-tools-5.4.0-136-generic,
linux-hwe-5.4-headers-5.4.0-136, linux-tools-5.4.0-1083-kvm,
linux-modules-extra-ibm-edge, linux-image-gkeop,
linux-hwe-5.4-tools-common, linux-image-generic-lpae-hwe-18.04-edge,
linux-oracle, linux-headers-gkeop, linux-image-raspi-hwe-18.04,
linux-image-raspi2-hwe-18.04, linux-headers-raspi-hwe-18.04-edge,
linux-headers-raspi2, linux-buildinfo-5.4.0-136-generic,
linux-tools-generic-lpae-hwe-18.04-edge, linux-cloud-tools-gkeop,
linux-generic-hwe-18.04, linux-image-gkeop-5.4,
linux-tools-5.4.0-1061-gkeop, linux-image-5.4.0-1091-gke,
linux-tools-generic-lpae-hwe-18.04, linux-headers-lowlatency-hwe-18.04,
linux-modules-extra-gke-5.4, linux-raspi2-hwe-18.04-edge, linux-tools-kvm,
linux-headers-lowlatency-hwe-18.04-edge, linux-image-generic,
linux-signed-oracle, linux-libc-dev, linux-tools-lowlatency-hwe-18.04,
linux-cloud-tools-virtual-hwe-18.04, linux-ibm-source-5.4.0,
linux-aws-headers-5.4.0-1093, linux-image-5.4.0-136-generic,
linux-gkeop-headers-5.4.0-1061, linux-image-5.4.0-1093-aws,
linux-tools-snapdragon-hwe-18.04, linux-headers-snapdragon-hwe-18.04,
linux-raspi-tools-5.4.0-1078, linux-modules-extra-5.4.0-136-generic,
linux-image-oracle-edge, linux-lowlatency-hwe-18.04,
linux-gkeop-tools-5.4.0-1061, linux-source-5.4.0,
linux-hwe-5.4-source-5.4.0, linux-ibm-cloud-tools-common,
linux-modules-extra-gkeop-5.4, linux-tools-5.4.0-1078-raspi,
linux-ibm-5.4-tools-5.4.0-1041, linux-modules-extra-5.4.0-1061-gkeop,
linux-oem-osp1-tools-host, linux-modules-5.4.0-1078-raspi,
linux-image-oem-osp1, linux-modules-5.4.0-1041-ibm, linux-source,
linux-hwe-5.4-cloud-tools-5.4.0-136, linux-tools-5.4.0-1093-aws,
linux-modules-extra-ibm, linux-headers-aws, linux-headers-gcp-lts-20.04,
linux-modules-extra-5.4.0-1091-gke, linux-tools-lowlatency-hwe-18.04-edge,
linux-image-5.4.0-136-lowlatency, linux-gcp-5.4-headers-5.4.0-1097,
linux-image-gke, linux-image-oracle, linux-cloud-tools-gkeop-5.4,
linux-image-snapdragon-hwe-18.04-edge, linux-image-generic-hwe-18.04,
linux-headers-5.4.0-1091-oracle, linux-headers-kvm, linux-gke,
linux-image-virtual-hwe-18.04-edge, linux-modules-extra-virtual-hwe-18.04,
linux-image-5.4.0-1061-gkeop, linux-cloud-tools-5.4.0-1093-aws,
linux-image-raspi-hwe-18.04-edge, linux-snapdragon-hwe-18.04,
linux-modules-extra-gkeop, linux-gcp-lts-20.04, linux-doc,
linux-buildinfo-5.4.0-1093-aws, linux-gcp-5.4-tools-5.4.0-1097,
linux-image-ibm-lts-20.04, linux-image-5.4.0-1091-oracle,
linux-headers-raspi2-hwe-18.04, linux-lowlatency-hwe-18.04-edge,
linux-buildinfo-5.4.0-1091-oracle, linux-hwe-5.4,
linux-generic-hwe-18.04-edge, linux-modules-5.4.0-136-generic-lpae,
linux-image-5.4.0-1083-kvm, linux-cloud-tools-common, linux-image-raspi,
linux-headers-virtual-hwe-18.04, linux-raspi-hwe-18.04-edge,
linux-modules-extra-gke, linux-tools-generic-hwe-18.04-edge,
linux-kvm-headers-5.4.0-1083, linux-buildinfo-5.4.0-1041-ibm,
linux-tools-lowlatency, linux-image-lowlatency-hwe-18.04, linux-raspi-5.4,
linux-modules-5.4.0-1061-gkeop, linux-cloud-tools-generic-hwe-18.04-edge,
linux-modules-5.4.0-136-lowlatency, linux-ibm-tools-common,
linux-image-oracle-lts-20.04, linux-gkeop-cloud-tools-5.4.0-1061,
linux-headers-5.4.0-1097-gcp, linux-image-gcp-edge,
linux-modules-5.4.0-136-generic, linux-oem, linux-gke-5.4,
linux-buildinfo-5.4.0-1078-raspi, linux-generic, linux-headers-oem,
linux-raspi-headers-5.4.0-1078, linux-ibm-headers-5.4.0-1041,
linux-raspi-5.4-headers-5.4.0-1078, linux-headers-5.4.0-136-generic-lpae,
linux-signed-image-oracle-edge, linux-oracle-edge, linux-headers-oem-osp1,
linux-buildinfo-5.4.0-1061-gkeop, linux-headers-raspi2-hwe-18.04-edge,
linux-tools-snapdragon-hwe-18.04-edge,
linux-headers-generic-hwe-18.04-edge, linux-headers-gkeop-5.4,
linux-headers-5.4.0-1078-raspi, linux-headers-ibm-edge,
linux-image-unsigned-5.4.0-1041-ibm
o USN-5792-1 : linux-tools-generic, linux-modules-extra-gcp, linux-virtual,
linux-image-unsigned-5.15.0-57-generic,
linux-image-5.15.0-57-lowlatency-64k, linux-generic-lpae-hwe-20.04-edge,
linux-hwe-5.15-cloud-tools-5.15.0-57, linux-tools-lowlatency-64k,
linux-cloud-tools-virtual, linux-image-lowlatency-hwe-20.04,
linux-buildinfo-5.15.0-57-lowlatency,
linux-image-extra-virtual-hwe-20.04-edge, linux-gke-5.15,
linux-image-generic-hwe-20.04, linux-modules-5.15.0-1025-kvm,
linux-modules-iwlwifi-generic-hwe-22.04, linux-image-lowlatency-hwe-22.04,
linux-headers-5.15.0-57, linux-image-virtual-hwe-20.04-edge,
linux-tools-5.15.0-1012-gkeop, linux-source,
linux-tools-generic-lpae-hwe-20.04, linux-image-lowlatency,
linux-headers-5.15.0-1022-raspi-nolpae, linux-tools-ibm,
linux-raspi-nolpae, linux-cloud-tools-gkeop-5.15, linux-headers-virtual,
linux-tools-5.15.0-1025-kvm, linux-tools-5.15.0-1026-gcp,
linux-tools-5.15.0-57-lowlatency-64k, linux-gcp,
linux-lowlatency-tools-common, linux-headers-5.15.0-57-generic,
linux-image-gkeop-5.15, linux-cloud-tools-generic,
linux-tools-lowlatency-hwe-20.04, linux-ibm, linux-raspi,
linux-lowlatency-hwe-20.04, linux-buildinfo-5.15.0-1026-gcp,
linux-image-5.15.0-57-generic, linux-hwe-5.15-cloud-tools-common,
linux-headers-generic-hwe-22.04, linux-image-generic-hwe-22.04,
linux-modules-5.15.0-1022-raspi-nolpae, linux-image-virtual-hwe-22.04,
linux-modules-extra-5.15.0-1012-gkeop, linux-oracle-headers-5.15.0-1026,
linux-tools-generic-64k-hwe-22.04, linux-buildinfo-5.15.0-1012-gkeop,
linux-gkeop-cloud-tools-5.15.0-1012, linux-tools-host,
linux-headers-5.15.0-1022-ibm, linux-modules-extra-5.15.0-1022-raspi,
linux-image-gke, linux-generic-64k, linux-image-oracle,
linux-virtual-hwe-20.04-edge, linux-oem-20.04, linux-hwe-5.15-tools-host,
linux-image-raspi-nolpae, linux-tools-lowlatency-64k-hwe-22.04,
linux-cloud-tools-lowlatency-hwe-22.04,
linux-image-unsigned-5.15.0-1026-oracle, linux-tools-common,
linux-buildinfo-5.15.0-1025-kvm, linux-tools-generic-64k,
linux-image-oem-20.04, linux-headers-kvm, linux-gke,
linux-headers-5.15.0-57-generic-lpae, linux-image-generic-hwe-20.04-edge,
linux-image-unsigned-5.15.0-1012-gkeop, linux-headers-5.15.0-1024-gke,
linux-headers-generic-lpae-hwe-20.04-edge,
linux-image-unsigned-5.15.0-57-lowlatency,
linux-buildinfo-5.15.0-57-generic, linux-image-5.15.0-1022-raspi,
linux-generic-lpae, linux-image-lowlatency-64k-hwe-22.04,
linux-image-5.15.0-1026-oracle, linux-image-ibm,
linux-lowlatency-64k-hwe-20.04, linux-headers-raspi-nolpae,
linux-tools-gke, linux-modules-5.15.0-1026-oracle,
linux-image-extra-virtual-hwe-22.04, linux-generic-hwe-20.04,
linux-image-unsigned-5.15.0-1022-ibm, linux-modules-extra-gkeop,
linux-modules-extra-raspi, linux-gkeop-5.15,
linux-headers-generic-lpae-hwe-22.04, linux-hwe-5.15-headers-5.15.0-57,
linux-doc, linux-modules-extra-5.15.0-1026-oracle,
linux-tools-generic-64k-hwe-20.04-edge, linux-headers-lowlatency-hwe-22.04,
linux-tools-lowlatency-64k-hwe-20.04, linux-headers-ibm,
linux-modules-5.15.0-1024-gke, linux-generic-hwe-22.04,
linux-image-generic-64k-hwe-22.04, linux-image-5.15.0-1025-kvm,
linux-image-5.15.0-57-generic-lpae, linux-modules-extra-raspi-nolpae,
linux-headers-lowlatency-64k-hwe-20.04, linux-buildinfo-5.15.0-1022-ibm,
linux-image-5.15.0-1012-gkeop, linux-modules-iwlwifi-5.15.0-1024-gke,
linux-headers-gke, linux-raspi-tools-5.15.0-1022,
linux-headers-virtual-hwe-20.04, linux-cloud-tools-5.15.0-57,
linux-modules-5.15.0-1022-raspi, linux-headers-5.15.0-1012-gkeop,
linux-gkeop-tools-5.15.0-1012, linux-hwe-5.15-source-5.15.0,
linux-image-5.15.0-1022-raspi-nolpae, linux-lowlatency-hwe-22.04,
linux-lowlatency-tools-5.15.0-57, linux-headers-5.15.0-57-lowlatency-64k,
linux-headers-lowlatency-64k-hwe-20.04-edge, linux-image-virtual,
linux-headers-lowlatency-hwe-20.04, linux-lowlatency-cloud-tools-common,
linux-image-generic-64k, linux-cloud-tools-5.15.0-57-generic,
linux-image-extra-virtual, linux-lowlatency-64k,
linux-modules-iwlwifi-5.15.0-57-generic, linux-image-5.15.0-1024-gke,
linux-tools-5.15.0-57-generic, linux-image-unsigned-5.15.0-57-generic-64k,
linux-tools-5.15.0-1022-raspi-nolpae, linux-image-gkeop,
linux-modules-iwlwifi-5.15.0-1026-gcp,
linux-headers-lowlatency-hwe-20.04-edge, linux-image-5.15.0-57-lowlatency,
linux-cloud-tools-virtual-hwe-22.04, linux-gkeop-headers-5.15.0-1012,
linux-lowlatency-hwe-20.04-edge, linux-oracle, linux-cloud-tools-common,
linux-modules-iwlwifi-generic-hwe-20.04-edge, linux-headers-gkeop,
linux-image-raspi, linux-image-unsigned-5.15.0-1026-gcp,
linux-buildinfo-5.15.0-1026-oracle, linux-headers-oem-20.04,
linux-modules-5.15.0-1012-gkeop, linux-generic-lpae-hwe-20.04,
linux-headers-generic-hwe-20.04, linux-kvm,
linux-image-generic-lpae-hwe-20.04-edge,
linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-tools-5.15.0-57,
linux-hwe-5.15, linux-image-generic-lpae-hwe-20.04,
linux-hwe-5.15-tools-common, linux-image-generic-lpae-hwe-22.04,
linux-cloud-tools-5.15.0-57-lowlatency, linux-tools-virtual,
linux-virtual-hwe-22.04, linux-modules-5.15.0-57-generic-64k,
linux-raspi-headers-5.15.0-1022, linux-cloud-tools-gkeop,
linux-headers-generic-64k-hwe-22.04, linux-tools-generic-hwe-20.04-edge,
linux-tools-gcp, linux-tools-lowlatency, linux-headers-raspi,
linux-tools-oem-20.04, linux-headers-5.15.0-1022-raspi,
linux-tools-5.15.0-57-generic-64k, linux-cloud-tools-lowlatency,
linux-generic-64k-hwe-20.04-edge, linux-headers-generic-64k,
linux-headers-virtual-hwe-22.04, linux-image-extra-virtual-hwe-20.04,
linux-tools-generic-lpae-hwe-20.04-edge,
linux-image-unsigned-5.15.0-1025-kvm, linux-modules-5.15.0-57-generic-lpae,
linux-kvm-tools-5.15.0-1025, linux-tools-lowlatency-64k-hwe-20.04-edge,
linux-headers-gke-5.15, linux-ibm-tools-common,
linux-buildinfo-5.15.0-1024-gke, linux-modules-iwlwifi-generic,
linux-tools-oracle, linux-headers-lowlatency-64k-hwe-22.04,
linux-source-5.15.0, linux-image-5.15.0-57-generic-64k,
linux-tools-generic-lpae-hwe-22.04,
linux-image-lowlatency-64k-hwe-20.04-edge, linux-modules-5.15.0-57-generic,
linux-headers-5.15.0-57-generic-64k, linux-gcp-headers-5.15.0-1026,
linux-generic, linux-hwe-5.15-tools-5.15.0-57,
linux-tools-5.15.0-1022-raspi, linux-tools-gkeop-5.15,
linux-modules-extra-5.15.0-57-generic, linux-tools-5.15.0-1022-ibm,
linux-modules-iwlwifi-generic-hwe-20.04, linux-tools-kvm,
linux-headers-gcp, linux-lowlatency, linux-image-generic,
linux-modules-extra-5.15.0-1024-gke, linux-tools-5.15.0-1026-oracle,
linux-headers-generic-64k-hwe-20.04-edge, linux-headers-gkeop-5.15,
linux-buildinfo-5.15.0-57-lowlatency-64k, linux,
linux-modules-5.15.0-1026-gcp, linux-libc-dev,
linux-buildinfo-5.15.0-57-generic-64k, linux-lowlatency-64k-hwe-22.04,
linux-headers-generic, linux-tools-5.15.0-1024-gke,
linux-tools-raspi-nolpae, linux-headers-lowlatency,
linux-modules-5.15.0-57-lowlatency-64k,
linux-headers-generic-hwe-20.04-edge, linux-image-gcp,
linux-tools-generic-hwe-22.04, linux-headers-5.15.0-1026-gcp,
linux-headers-5.15.0-57-lowlatency, linux-image-generic-64k-hwe-20.04,
linux-tools-virtual-hwe-20.04-edge, linux-tools-5.15.0-57-generic-lpae,
linux-tools-5.15.0-57-lowlatency, linux-ibm-headers-5.15.0-1022,
linux-ibm-tools-5.15.0-1022, linux-lowlatency-cloud-tools-5.15.0-57,
linux-tools-gke-5.15, linux-tools-lowlatency-hwe-20.04-edge,
linux-modules-extra-gkeop-5.15, linux-tools-virtual-hwe-20.04,
linux-cloud-tools-lowlatency-hwe-20.04,
linux-image-lowlatency-hwe-20.04-edge, linux-headers-lowlatency-64k,
linux-tools-generic-hwe-20.04, linux-virtual-hwe-20.04,
linux-image-virtual-hwe-20.04, linux-generic-64k-hwe-20.04,
linux-headers-5.15.0-1025-kvm, linux-tools-virtual-hwe-22.04,
linux-generic-64k-hwe-22.04, linux-modules-extra-5.15.0-1022-ibm,
linux-tools-generic-lpae, linux-tools-lowlatency-hwe-22.04, linux-gkeop,
linux-crashdump, linux-headers-generic-64k-hwe-20.04,
linux-cloud-tools-generic-hwe-22.04, linux-image-lowlatency-64k-hwe-20.04,
linux-lowlatency-64k-hwe-20.04-edge, linux-tools-generic-64k-hwe-20.04,
linux-generic-lpae-hwe-22.04, linux-ibm-source-5.15.0,
linux-cloud-tools-5.15.0-1012-gkeop, linux-lowlatency-tools-host,
linux-image-gke-5.15, linux-lowlatency-headers-5.15.0-57,
linux-modules-iwlwifi-5.15.0-1022-ibm, linux-headers-generic-lpae,
linux-image-5.15.0-1026-gcp, linux-cloud-tools-virtual-hwe-20.04-edge,
linux-gcp-tools-5.15.0-1026, linux-modules-extra-5.15.0-1026-gcp,
linux-image-unsigned-5.15.0-57-lowlatency-64k,
linux-oracle-tools-5.15.0-1026, linux-tools-gkeop,
linux-buildinfo-5.15.0-1022-raspi-nolpae, linux-modules-5.15.0-1022-ibm,
linux-kvm-headers-5.15.0-1025, linux-headers-virtual-hwe-20.04-edge,
linux-buildinfo-5.15.0-1022-raspi, linux-cloud-tools-generic-hwe-20.04,
linux-image-generic-lpae, linux-cloud-tools-virtual-hwe-20.04,
linux-image-unsigned-5.15.0-1024-gke, linux-headers-5.15.0-1026-oracle,
linux-image-kvm, linux-image-lowlatency-64k,
linux-buildinfo-5.15.0-57-generic-lpae, linux-generic-hwe-20.04-edge,
linux-cloud-tools-generic-hwe-20.04-edge, linux-gke-headers-5.15.0-1024,
linux-image-5.15.0-1022-ibm, linux-headers-oracle,
linux-image-generic-64k-hwe-20.04-edge, linux-tools-raspi,
linux-gke-tools-5.15.0-1024, linux-headers-generic-lpae-hwe-20.04,
linux-modules-iwlwifi-5.15.0-57-lowlatency, linux-ibm-cloud-tools-common,
linux-modules-5.15.0-57-lowlatency,
linux-modules-extra-5.15.0-1022-raspi-nolpae
o USN-5793-1 : linux-tools-generic, linux-image-extra-virtual-hwe-22.04-edge,
linux-headers-5.19.0-1014-lowlatency, linux-modules-5.19.0-28-generic,
linux-virtual, linux-buildinfo-5.19.0-28-generic-64k,
linux-tools-lowlatency-64k, linux-cloud-tools-virtual,
linux-image-lowlatency-hwe-20.04, linux-headers-5.19.0-1011-raspi-nolpae,
linux-headers-lowlatency-64k-hwe-22.04-edge,
linux-modules-iwlwifi-5.19.0-1014-lowlatency,
linux-modules-iwlwifi-generic-hwe-22.04, linux-image-lowlatency-hwe-22.04,
linux-cloud-tools-generic-hwe-22.04-edge, linux-source,
linux-modules-5.19.0-1011-raspi-nolpae,
linux-tools-lowlatency-64k-hwe-22.04-edge, linux-image-lowlatency,
linux-headers-generic-lpae-hwe-22.04-edge, linux-raspi-nolpae,
linux-raspi-tools-5.19.0-1011, linux-tools-aws, linux-headers-virtual,
linux-modules-extra-5.19.0-1011-raspi, linux-lowlatency-tools-common,
linux-buildinfo-5.19.0-1014-lowlatency, linux-headers-aws,
linux-cloud-tools-generic, linux-tools-5.19.0-28-generic-64k,
linux-buildinfo-5.19.0-1011-raspi, linux-tools-lowlatency-hwe-20.04,
linux-lowlatency-headers-5.19.0-1014, linux-raspi,
linux-lowlatency-hwe-20.04, linux-source-5.19.0,
linux-generic-hwe-22.04-edge, linux-tools-generic-64k-hwe-22.04,
linux-headers-generic-hwe-22.04, linux-image-generic-hwe-22.04,
linux-image-virtual-hwe-22.04, linux-aws-cloud-tools-5.19.0-1016,
linux-image-oem-22.04, linux-tools-host, linux-cloud-tools-5.19.0-28,
linux-generic-64k, linux-tools-generic-lpae-hwe-22.04-edge,
linux-tools-oem-22.04, linux-image-unsigned-5.19.0-1016-aws,
linux-image-raspi-nolpae, linux-tools-lowlatency-64k-hwe-22.04,
linux-image-aws, linux-cloud-tools-lowlatency-hwe-22.04,
linux-image-lowlatency-hwe-22.04-edge, linux-tools-common,
linux-generic-64k-hwe-22.04-edge, linux-tools-generic-64k,
linux-image-5.19.0-1011-raspi, linux-headers-kvm,
linux-image-generic-64k-hwe-22.04-edge, linux-lowlatency-hwe-22.04-edge,
linux-modules-iwlwifi-generic-hwe-22.04-edge, linux-generic-lpae,
linux-image-lowlatency-64k-hwe-22.04, linux-tools-generic-hwe-22.04-edge,
linux-lowlatency-64k-hwe-20.04, linux-headers-raspi-nolpae,
linux-modules-extra-raspi, linux-image-extra-virtual-hwe-22.04,
linux-tools-lowlatency-hwe-20.04-edge,
linux-tools-lowlatency-64k-hwe-20.04, linux-headers-generic-lpae-hwe-22.04,
linux-doc, linux-cloud-tools-lowlatency-hwe-22.04-edge,
linux-headers-lowlatency-hwe-22.04, linux-oem-22.04,
linux-generic-hwe-22.04, linux-image-generic-64k-hwe-22.04,
linux-kvm-tools-5.19.0-1015, linux-headers-lowlatency-hwe-22.04-edge,
linux-modules-extra-raspi-nolpae, linux-headers-lowlatency-64k-hwe-20.04,
linux-image-5.19.0-1014-lowlatency-64k, linux-lowlatency-hwe-22.04,
linux-image-5.19.0-1015-kvm, linux-headers-lowlatency-64k-hwe-20.04-edge,
linux-image-virtual, linux-headers-lowlatency-hwe-20.04,
linux-lowlatency-cloud-tools-common, linux-modules-extra-5.19.0-28-generic,
linux-tools-5.19.0-1015-kvm, linux-image-generic-64k, linux-lowlatency-64k,
linux-image-extra-virtual, linux-buildinfo-5.19.0-28-generic-lpae,
linux-image-5.19.0-28-generic-lpae,
linux-image-generic-lpae-hwe-22.04-edge,
linux-headers-generic-hwe-22.04-edge, linux-aws-tools-5.19.0-1016,
linux-tools-5.19.0-28-generic-lpae,
linux-lowlatency-cloud-tools-5.19.0-1014,
linux-headers-lowlatency-hwe-20.04-edge,
linux-cloud-tools-virtual-hwe-22.04, linux-generic-lpae-hwe-22.04-edge,
linux-headers-5.19.0-1016-aws, linux-lowlatency-hwe-20.04-edge,
linux-headers-5.19.0-1015-kvm, linux-cloud-tools-common, linux-image-raspi,
linux-image-5.19.0-1011-raspi-nolpae,
linux-modules-5.19.0-1014-lowlatency-64k, linux-kvm,
linux-virtual-hwe-22.04-edge, linux-image-5.19.0-28-generic-64k,
linux-modules-5.19.0-28-generic-64k,
linux-cloud-tools-lowlatency-hwe-20.04-edge,
linux-image-virtual-hwe-22.04-edge, linux-image-unsigned-5.19.0-28-generic,
linux-tools-lowlatency-hwe-22.04-edge, linux-image-generic-lpae-hwe-22.04,
linux-tools-virtual, linux-image-lowlatency-64k-hwe-22.04-edge,
linux-headers-5.19.0-1011-raspi,
linux-modules-extra-5.19.0-1011-raspi-nolpae,
linux-tools-5.19.0-1014-lowlatency, linux-virtual-hwe-22.04,
linux-lowlatency-tools-5.19.0-1014,
linux-cloud-tools-virtual-hwe-22.04-edge, linux-modules-5.19.0-1016-aws,
linux-headers-generic-64k-hwe-22.04, linux-headers-5.19.0-28-generic-lpae,
linux-tools-5.19.0-28, linux-headers-5.19.0-28, linux-headers-raspi,
linux-tools-lowlatency, linux-cloud-tools-5.19.0-28-generic,
linux-image-unsigned-5.19.0-1014-lowlatency, linux-cloud-tools-lowlatency,
linux-headers-generic-64k, linux-headers-virtual-hwe-22.04,
linux-modules-iwlwifi-5.19.0-28-generic,
linux-buildinfo-5.19.0-1014-lowlatency-64k,
linux-modules-5.19.0-28-generic-lpae, linux-headers-virtual-hwe-22.04-edge,
linux-modules-extra-5.19.0-1016-aws,
linux-tools-lowlatency-64k-hwe-20.04-edge,
linux-buildinfo-5.19.0-1011-raspi-nolpae, linux-tools-5.19.0-1016-aws,
linux-image-unsigned-5.19.0-1014-lowlatency-64k,
linux-modules-iwlwifi-generic, linux-headers-lowlatency-64k-hwe-22.04,
linux-tools-5.19.0-28-generic, linux-cloud-tools-5.19.0-1014-lowlatency,
linux-tools-virtual-hwe-22.04-edge, linux-image-5.19.0-1014-lowlatency,
linux-headers-oem-22.04, linux-tools-generic-lpae-hwe-22.04,
linux-image-lowlatency-64k-hwe-20.04-edge, linux-tools-kvm, linux-generic,
linux-image-generic-hwe-22.04-edge, linux-lowlatency-64k-hwe-22.04-edge,
linux-lowlatency, linux-image-generic, linux, linux-libc-dev,
linux-lowlatency-64k-hwe-22.04, linux-tools-5.19.0-1011-raspi-nolpae,
linux-headers-generic, linux-tools-raspi-nolpae,
linux-aws-headers-5.19.0-1016, linux-headers-lowlatency,
linux-tools-5.19.0-1014-lowlatency-64k, linux-tools-generic-hwe-22.04,
linux-image-unsigned-5.19.0-28-generic-64k, linux-image-5.19.0-1016-aws,
linux-raspi-headers-5.19.0-1011, linux-buildinfo-5.19.0-1016-aws,
linux-headers-5.19.0-1014-lowlatency-64k,
linux-cloud-tools-5.19.0-1016-aws, linux-headers-5.19.0-28-generic,
linux-cloud-tools-lowlatency-hwe-20.04,
linux-image-lowlatency-hwe-20.04-edge, linux-headers-lowlatency-64k,
linux-image-unsigned-5.19.0-1015-kvm, linux-modules-5.19.0-1011-raspi,
linux-modules-5.19.0-1014-lowlatency, linux-tools-virtual-hwe-22.04,
linux-generic-64k-hwe-22.04, linux-headers-5.19.0-28-generic-64k,
linux-modules-5.19.0-1015-kvm, linux-tools-generic-lpae,
linux-tools-lowlatency-hwe-22.04, linux-crashdump,
linux-image-lowlatency-64k-hwe-20.04, linux-cloud-tools-generic-hwe-22.04,
linux-lowlatency-64k-hwe-20.04-edge, linux-buildinfo-5.19.0-1015-kvm,
linux-generic-lpae-hwe-22.04, linux-lowlatency-tools-host,
linux-headers-generic-lpae, linux-kvm-headers-5.19.0-1015,
linux-buildinfo-5.19.0-28-generic, linux-tools-generic-64k-hwe-22.04-edge,
linux-image-generic-lpae, linux-image-kvm, linux-image-lowlatency-64k,
linux-modules-extra-aws, linux-tools-5.19.0-1011-raspi,
linux-headers-generic-64k-hwe-22.04-edge, linux-image-5.19.0-28-generic,
linux-tools-raspi, linux-aws
o USN-5791-2 : linux-cloud-tools-5.4.0-1100-azure,
linux-cloud-tools-azure-lts-20.04, linux-image-5.4.0-1100-azure,
linux-image-azure-lts-20.04, linux-modules-extra-5.4.0-1100-azure,
linux-image-unsigned-5.4.0-1100-azure, linux-modules-extra-azure-lts-20.04,
linux-azure-cloud-tools-5.4.0-1100, linux-modules-5.4.0-1100-azure,
linux-tools-azure-lts-20.04, linux-azure-headers-5.4.0-1100,
linux-headers-azure-lts-20.04, linux-azure, linux-headers-5.4.0-1100-azure,
linux-tools-5.4.0-1100-azure, linux-azure-tools-5.4.0-1100,
linux-buildinfo-5.4.0-1100-azure, linux-azure-lts-20.04
o USN-5792-2 : linux-azure-5.15, linux-azure-fde-edge,
linux-image-unsigned-5.15.0-1030-azure, linux-image-azure,
linux-cloud-tools-5.15.0-1027-aws, linux-azure,
linux-modules-extra-aws-lts-22.04, linux-tools-aws-lts-22.04,
linux-tools-azure-edge, linux-headers-aws-lts-22.04,
linux-tools-5.15.0-1030-azure, linux-tools-aws,
linux-headers-azure-fde-edge, linux-headers-aws, linux-headers-azure,
linux-image-aws-lts-22.04, linux-azure-edge,
linux-modules-iwlwifi-5.15.0-1030-azure,
linux-modules-extra-5.15.0-1030-azure, linux-image-5.15.0-1030-azure-fde,
linux-aws-edge, linux-image-aws, linux-image-azure-edge,
linux-tools-azure-lts-22.04, linux-aws-5.15-headers-5.15.0-1027,
linux-modules-extra-azure-fde, linux-azure-headers-5.15.0-1030,
linux-image-5.15.0-1027-aws, linux-azure-fde,
linux-buildinfo-5.15.0-1030-azure, linux-aws-lts-22.04,
linux-aws-tools-5.15.0-1027, linux-tools-azure-fde-edge,
linux-azure-lts-22.04, linux-image-aws-edge, linux-cloud-tools-azure-edge,
linux-image-azure-lts-22.04, linux-cloud-tools-azure-fde,
linux-modules-extra-azure-fde-edge,
linux-image-unsigned-5.15.0-1030-azure-fde,
linux-azure-5.15-headers-5.15.0-1030, linux-headers-azure-lts-22.04,
linux-image-azure-fde, linux-modules-extra-5.15.0-1027-aws,
linux-tools-aws-edge, linux-headers-5.15.0-1030-azure,
linux-modules-extra-azure, linux-azure-tools-5.15.0-1030,
linux-aws-cloud-tools-5.15.0-1027, linux-headers-azure-edge,
linux-aws-5.15-tools-5.15.0-1027, linux-modules-5.15.0-1027-aws,
linux-tools-azure-fde, linux-azure-5.15-tools-5.15.0-1030,
linux-aws-headers-5.15.0-1027, linux-cloud-tools-5.15.0-1030-azure,
linux-aws-5.15, linux-image-5.15.0-1030-azure,
linux-modules-extra-azure-lts-22.04, linux-azure-cloud-tools-5.15.0-1030,
linux-cloud-tools-azure, linux-modules-extra-aws-edge,
linux-cloud-tools-azure-lts-22.04, linux-headers-aws-edge,
linux-tools-azure, linux-tools-5.15.0-1027-aws, linux-image-azure-fde-edge,
linux-headers-5.15.0-1027-aws, linux-headers-azure-fde,
linux-buildinfo-5.15.0-1027-aws, linux-image-unsigned-5.15.0-1027-aws,
linux-cloud-tools-azure-fde-edge, linux-modules-extra-azure-edge,
linux-modules-extra-aws, linux-modules-5.15.0-1030-azure,
linux-azure-5.15-cloud-tools-5.15.0-1030,
linux-aws-5.15-cloud-tools-5.15.0-1027, linux-aws
o USN-5793-2 : linux-azure-headers-5.19.0-1016,
linux-cloud-tools-5.19.0-1016-azure, linux-headers-azure,
linux-azure-cloud-tools-5.19.0-1016,
linux-image-unsigned-5.19.0-1016-azure, linux-tools-5.19.0-1016-azure,
linux-modules-5.19.0-1016-azure, linux-cloud-tools-azure,
linux-buildinfo-5.19.0-1016-azure, linux-image-azure,
linux-azure-tools-5.19.0-1016, linux-tools-azure, linux-azure,
linux-modules-extra-5.19.0-1016-azure, linux-image-5.19.0-1016-azure,
linux-modules-extra-azure, linux-headers-5.19.0-1016-azure
o USN-5793-3 : linux-oracle-tools-5.19.0-1014, linux-modules-extra-gcp,
linux-image-unsigned-5.19.0-1014-gcp, linux-modules-extra-5.19.0-1014-gcp,
linux-gcp-tools-5.19.0-1014, linux-tools-5.19.0-1014-oracle,
linux-image-unsigned-5.19.0-1014-oracle, linux-tools-gcp,
linux-headers-5.19.0-1014-gcp, linux-tools-5.19.0-1014-gcp,
linux-gcp-headers-5.19.0-1014, linux-headers-5.19.0-1014-oracle,
linux-modules-5.19.0-1014-gcp, linux-modules-extra-5.19.0-1014-oracle,
linux-gcp, linux-buildinfo-5.19.0-1014-gcp,
linux-oracle-headers-5.19.0-1014, linux-image-5.19.0-1014-gcp,
linux-tools-oracle, linux-modules-iwlwifi-5.19.0-1014-gcp,
linux-buildinfo-5.19.0-1014-oracle, linux-image-oracle, linux-headers-gcp,
linux-modules-5.19.0-1014-oracle, linux-image-5.19.0-1014-oracle,
linux-oracle, linux-headers-oracle,
linux-modules-iwlwifi-5.19.0-1014-oracle, linux-image-gcp
o USN-5793-4 : linux-ibm-tools-common, linux-ibm-tools-5.19.0-1014,
linux-ibm, linux-headers-ibm, linux-headers-5.19.0-1014-ibm,
linux-modules-5.19.0-1014-ibm, linux-ibm-source-5.19.0,
linux-modules-extra-5.19.0-1014-ibm, linux-image-5.19.0-1014-ibm,
linux-modules-iwlwifi-5.19.0-1014-ibm, linux-tools-ibm,
linux-ibm-headers-5.19.0-1014, linux-image-ibm,
linux-ibm-cloud-tools-common, linux-buildinfo-5.19.0-1014-ibm,
linux-tools-5.19.0-1014-ibm, linux-image-unsigned-5.19.0-1014-ibm
o USN-5877-1 : linux-image-gke-5.15, linux-image-5.15.0-1027-gke,
linux-image-unsigned-5.15.0-1027-gke, linux-tools-gke-edge,
linux-modules-iwlwifi-5.15.0-1027-gke, linux-tools-5.15.0-1027-gke,
linux-gke-edge, linux-buildinfo-5.15.0-1027-gke,
linux-headers-5.15.0-1027-gke, linux-gke-5.15-headers-5.15.0-1027,
linux-modules-5.15.0-1027-gke, linux-tools-gke-5.15,
linux-modules-extra-5.15.0-1027-gke, linux-image-gke-edge,
linux-headers-gke-edge, linux-gke-5.15-tools-5.15.0-1027, linux-gke-5.15,
linux-headers-gke-5.15
o USN-5791-3 : linux-cloud-tools-5.4.0-1100-azure, linux-azure-5.4,
linux-modules-extra-azure-fde, linux-azure-5.4-headers-5.4.0-1100,
linux-azure-fde, linux-headers-azure-edge, linux-image-azure, linux-azure,
linux-tools-azure-fde, linux-tools-5.4.0-1100-azure,
linux-buildinfo-5.4.0-1100-azure, linux-tools-azure-edge,
linux-image-5.4.0-1100-azure, linux-signed-azure-edge,
linux-image-5.4.0-1100-azure-fde, linux-headers-azure-fde,
linux-image-unsigned-5.4.0-1100-azure-fde, linux-modules-5.4.0-1100-azure,
linux-cloud-tools-azure-edge, linux-cloud-tools-azure-fde,
linux-signed-image-azure, linux-headers-azure,
linux-modules-extra-5.4.0-1100-azure,
linux-image-unsigned-5.4.0-1100-azure, linux-azure-edge,
linux-headers-5.4.0-1100-azure, linux-image-azure-fde,
linux-modules-extra-azure-edge, linux-azure-5.4-cloud-tools-5.4.0-1100,
linux-modules-extra-azure, linux-cloud-tools-azure, linux-signed-azure,
linux-signed-image-azure-edge, linux-tools-azure, linux-image-azure-edge,
linux-azure-5.4-tools-5.4.0-1100
o USN-5815-1 : linux-buildinfo-5.4.0-1054-bluefield, linux-tools-bluefield,
linux-image-unsigned-5.4.0-1054-bluefield,
linux-tools-5.4.0-1054-bluefield, linux-modules-5.4.0-1054-bluefield,
linux-bluefield-tools-5.4.0-1054, linux-bluefield,
linux-image-5.4.0-1054-bluefield, linux-headers-5.4.0-1054-bluefield,
linux-headers-bluefield, linux-bluefield-headers-5.4.0-1054,
linux-image-bluefield
o USN-6045-1 : linux-tools-generic, linux-image-extra-virtual-lts-vivid,
linux-aws-cloud-tools-4.4.0-1118, linux-lts-xenial-tools-4.4.0-240,
linux-signed-image-lowlatency-lts-wily, linux-image-extra-virtual-lts-wily,
linux-virtual, linux-virtual-lts-utopic, linux-cloud-tools-virtual,
linux-image-extra-virtual-lts-xenial, linux-tools-4.4.0-240-lowlatency,
linux-cloud-tools-virtual-lts-wily, linux-cloud-tools-virtual-lts-utopic,
linux-kvm-tools-4.4.0-1119, linux-signed-generic,
linux-image-lowlatency-lts-utopic, linux-source, linux-source-4.4.0,
linux-headers-4.4.0-1119-kvm, linux-aws-tools-4.4.0-1118,
linux-image-lowlatency, linux-tools-aws, linux-headers-virtual,
linux-headers-lowlatency-lts-vivid, linux-headers-aws,
linux-cloud-tools-generic, linux-kvm-cloud-tools-4.4.0-1119,
linux-signed-image-lowlatency, linux-headers-generic-lts-vivid,
linux-cloud-tools-lowlatency-lts-vivid, linux-image-4.4.0-240-generic,
linux-cloud-tools-4.4.0-1156-aws, linux-tools-host,
linux-image-unsigned-4.4.0-240-generic, linux-aws-headers-4.4.0-1118,
linux-cloud-tools-generic-lts-utopic, linux-lowlatency-lts-utopic,
linux-modules-4.4.0-240-generic, linux-tools-generic-lts-utopic,
linux-signed-image-generic-lts-utopic, linux-cloud-tools-generic-lts-wily,
linux-image-aws, linux-image-virtual-lts-wily,
linux-signed-generic-lts-utopic, linux-tools-common,
linux-tools-virtual-lts-xenial, linux-headers-kvm,
linux-signed-lowlatency-lts-xenial, linux-aws-tools-4.4.0-1156,
linux-signed-image-generic-lts-wily, linux-headers-generic-lts-xenial,
linux-lts-xenial-cloud-tools-4.4.0-240, linux-modules-4.4.0-1156-aws,
linux-modules-extra-4.4.0-1156-aws, linux-signed-lowlatency-lts-wily,
linux-virtual-lts-xenial, linux-headers-generic-lts-utopic,
linux-image-generic-lts-vivid, linux-cloud-tools-generic-lts-xenial,
linux-doc, linux-tools-generic-lts-xenial,
linux-aws-cloud-tools-4.4.0-1156, linux-image-extra-virtual-lts-utopic,
linux-image-4.4.0-1119-kvm, linux-virtual-lts-vivid,
linux-cloud-tools-generic-lts-vivid, linux-tools-lowlatency-lts-utopic,
linux-signed-image-generic-lts-xenial, linux-signed-image-generic,
linux-headers-4.4.0-240, linux-tools-4.4.0-1118-aws,
linux-tools-4.4.0-1119-kvm, linux-cloud-tools-4.4.0-1118-aws,
linux-headers-lowlatency-lts-utopic, linux-image-virtual,
linux-image-virtual-lts-vivid, linux-cloud-tools-4.4.0-240-lowlatency,
linux-image-extra-virtual, linux-headers-generic-lts-wily,
linux-buildinfo-4.4.0-1118-aws, linux-modules-4.4.0-240-lowlatency,
linux-generic-lts-vivid, linux-signed-image-generic-lts-vivid,
linux-cloud-tools-common, linux-buildinfo-4.4.0-240-generic,
linux-modules-4.4.0-1119-kvm, linux-cloud-tools-4.4.0-240-generic,
linux-tools-virtual-lts-wily, linux-kvm, linux-headers-4.4.0-1118-aws,
linux-aws-headers-4.4.0-1156, linux-tools-virtual,
linux-modules-extra-4.4.0-240-generic, linux-signed-generic-lts-wily,
linux-signed-generic-lts-vivid, linux-image-lowlatency-lts-wily,
linux-image-virtual-lts-utopic, linux-tools-lowlatency,
linux-cloud-tools-lowlatency, linux-buildinfo-4.4.0-1156-aws,
linux-hwe-virtual-trusty, linux-image-hwe-virtual-trusty,
linux-image-hwe-generic-trusty, linux-tools-lowlatency-lts-vivid,
linux-headers-4.4.0-1156-aws, linux-tools-4.4.0-240-generic,
linux-tools-lowlatency-lts-xenial, linux-tools-kvm, linux-generic,
linux-buildinfo-4.4.0-1119-kvm, linux-lowlatency,
linux-buildinfo-4.4.0-240-lowlatency, linux-headers-virtual-lts-wily,
linux-image-generic, linux-tools-lts-utopic, linux,
linux-lowlatency-lts-wily, linux-image-generic-lts-utopic, linux-libc-dev,
linux-signed-lowlatency, linux-headers-generic,
linux-tools-generic-lts-wily, linux-tools-virtual-lts-vivid,
linux-generic-lts-utopic, linux-generic-lts-wily, linux-headers-lowlatency,
linux-signed-generic-lts-xenial, linux-headers-virtual-lts-vivid,
linux-signed-image-lowlatency-lts-xenial, linux-lowlatency-lts-vivid,
linux-lowlatency-lts-xenial, linux-image-4.4.0-240-lowlatency,
linux-tools-generic-lts-vivid, linux-cloud-tools-4.4.0-240,
linux-image-virtual-lts-xenial, linux-image-generic-lts-wily,
linux-tools-virtual-lts-utopic, linux-image-4.4.0-1118-aws,
linux-cloud-tools-virtual-lts-vivid,
linux-cloud-tools-lowlatency-lts-xenial, linux-crashdump,
linux-image-generic-lts-xenial, linux-tools-lowlatency-lts-wily,
linux-headers-4.4.0-240-lowlatency, linux-headers-virtual-lts-utopic,
linux-modules-4.4.0-1118-aws, linux-headers-virtual-lts-xenial,
linux-kvm-headers-4.4.0-1119, linux-image-lowlatency-lts-xenial,
linux-tools-4.4.0-1156-aws, linux-headers-lowlatency-lts-wily,
linux-cloud-tools-lowlatency-lts-wily, linux-image-lowlatency-lts-vivid,
linux-tools-4.4.0-240, linux-cloud-tools-4.4.0-1119-kvm,
linux-headers-lowlatency-lts-xenial, linux-virtual-lts-wily,
linux-hwe-generic-trusty, linux-cloud-tools-lowlatency-lts-utopic,
linux-image-kvm, linux-lts-xenial, linux-modules-extra-aws,
linux-image-4.4.0-1156-aws, linux-cloud-tools-virtual-lts-xenial,
linux-generic-lts-xenial, linux-image-unsigned-4.4.0-240-lowlatency,
linux-headers-4.4.0-240-generic, linux-aws
o USN-6071-1 : linux-modules-iwlwifi-5.17.0-1031-oem, linux-tools-oem-22.04a,
linux-headers-oem-22.04a, linux-buildinfo-5.17.0-1031-oem,
linux-oem-22.04a, linux-oem-22.04, linux-modules-ipu6-oem-22.04,
linux-image-5.17.0-1031-oem, linux-image-unsigned-5.17.0-1031-oem,
linux-modules-ivsc-oem-22.04a, linux-modules-iwlwifi-oem-22.04,
linux-oem-5.17-headers-5.17.0-1031, linux-oem-5.17-tools-host,
linux-oem-5.17-tools-5.17.0-1031, linux-image-oem-22.04a,
linux-modules-ipu6-oem-22.04a, linux-headers-oem-22.04,
linux-image-oem-22.04, linux-modules-5.17.0-1031-oem,
linux-tools-5.17.0-1031-oem, linux-tools-oem-22.04,
linux-headers-5.17.0-1031-oem, linux-modules-iwlwifi-oem-22.04a,
linux-modules-ipu6-5.17.0-1031-oem, linux-oem-5.17,
linux-modules-ivsc-5.17.0-1031-oem, linux-modules-ivsc-oem-22.04
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=5QWq
-----END PGP SIGNATURE-----
ESB-2023.3081 - [Ubuntu] Linux kernel (OEM): CVSS (Max): 7.8*
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3081
USN-6123-1: Linux kernel (OEM) vulnerabilities
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Linux kernel (OEM)
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2023-32233 CVE-2023-30456 CVE-2023-26606
CVE-2023-2612 CVE-2023-1670
Original Bulletin:
https://ubuntu.com/security/notices/USN-6123-1
Comment: CVSS (Max): 7.8* CVE-2023-32233 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* Not all CVSS available when published
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6123-1: Linux kernel (OEM) vulnerabilities
30 May 2023
Several security issues were fixed in the Linux kernel.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 22.04 LTS
Packages
o linux-oem-6.0 - Linux kernel for OEM systems
Details
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. ( CVE-2023-32233 )
Reima Ishii discovered that the nested KVM implementation for Intel x86
processors in the Linux kernel did not properly validate control registers
in certain situations. An attacker in a guest VM could use this to cause a
denial of service (guest crash). ( CVE-2023-30456 )
It was discovered that the Xircom PCMCIA network device driver in the Linux
kernel did not properly handle device removal events. A physically
proximate attacker could use this to cause a denial of service (system
crash). ( CVE-2023-1670 )
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). ( CVE-2023-2612 )
It was discovered that the NTFS file system implementation in the Linux
kernel did not properly handle a loop termination condition, leading to an
out-of-bounds read vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly expose sensitive
information. ( CVE-2023-26606 )
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 22.04
o linux-image-oem-22.04b - 6.0.0.1017.17
o linux-image-6.0.0-1017-oem - 6.0.0-1017.17
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
o CVE-2023-30456
o CVE-2023-2612
o CVE-2023-1670
o CVE-2023-26606
o CVE-2023-32233
Related notices
o USN-6033-1 : linux-oem-6.1-tools-6.1.0-1009,
linux-buildinfo-6.1.0-1009-oem, linux-headers-6.1.0-1009-oem,
linux-image-unsigned-6.1.0-1009-oem, linux-oem-6.1-headers-6.1.0-1009,
linux-headers-oem-22.04c, linux-tools-oem-22.04c, linux-oem-6.1-tools-host,
linux-image-oem-22.04c, linux-oem-6.1, linux-modules-6.1.0-1009-oem,
linux-modules-ivsc-6.1.0-1009-oem, linux-modules-ivsc-oem-22.04c,
linux-tools-6.1.0-1009-oem, linux-modules-ipu6-6.1.0-1009-oem,
linux-modules-ipu6-oem-22.04c, linux-image-6.1.0-1009-oem, linux-oem-22.04c
o USN-6124-1 : linux-modules-ipu6-oem-22.04, linux-headers-oem-22.04a,
linux-modules-ivsc-oem-22.04a, linux-modules-ipu6-oem-22.04a,
linux-modules-ipu6-5.17.0-1032-oem, linux-tools-5.17.0-1032-oem,
linux-image-oem-22.04, linux-oem-5.17-tools-5.17.0-1032,
linux-image-5.17.0-1032-oem, linux-oem-22.04,
linux-buildinfo-5.17.0-1032-oem, linux-image-oem-22.04a,
linux-modules-5.17.0-1032-oem, linux-tools-oem-22.04, linux-oem-5.17,
linux-oem-5.17-tools-host, linux-tools-oem-22.04a,
linux-modules-iwlwifi-oem-22.04a, linux-oem-5.17-headers-5.17.0-1032,
linux-image-unsigned-5.17.0-1032-oem, linux-modules-ivsc-5.17.0-1032-oem,
linux-headers-oem-22.04, linux-headers-5.17.0-1032-oem, linux-oem-22.04a,
linux-modules-ivsc-oem-22.04, linux-modules-iwlwifi-oem-22.04,
linux-modules-iwlwifi-5.17.0-1032-oem
o USN-6122-1 : linux-modules-ipu6-6.1.0-1013-oem,
linux-oem-6.1-tools-6.1.0-1013, linux-tools-6.1.0-1013-oem,
linux-oem-6.1-headers-6.1.0-1013, linux-tools-oem-22.04c,
linux-headers-oem-22.04c, linux-oem-6.1-tools-host,
linux-headers-6.1.0-1013-oem, linux-image-oem-22.04c,
linux-modules-iwlwifi-oem-22.04c, linux-modules-ivsc-oem-22.04c,
linux-modules-ipu6-oem-22.04c, linux-oem-22.04c,
linux-image-unsigned-6.1.0-1013-oem, linux-image-6.1.0-1013-oem,
linux-modules-6.1.0-1013-oem, linux-oem-6.1,
linux-modules-ivsc-6.1.0-1013-oem, linux-modules-iwlwifi-6.1.0-1013-oem,
linux-buildinfo-6.1.0-1013-oem
o USN-6045-1 : linux-headers-virtual-lts-vivid, linux-tools-4.4.0-1119-kvm,
linux-virtual-lts-wily, linux-kvm-headers-4.4.0-1119,
linux-headers-4.4.0-1118-aws, linux-tools-generic,
linux-headers-lowlatency-lts-vivid, linux-image-lowlatency-lts-utopic,
linux-signed-image-generic, linux-aws,
linux-cloud-tools-virtual-lts-xenial,
linux-cloud-tools-lowlatency-lts-xenial, linux-buildinfo-4.4.0-1156-aws,
linux-virtual-lts-utopic, linux-tools-kvm,
linux-lts-xenial-tools-4.4.0-240, linux-signed-generic-lts-utopic,
linux-tools-virtual-lts-vivid, linux-cloud-tools-lowlatency-lts-vivid,
linux-tools-virtual-lts-utopic, linux-image-4.4.0-240-lowlatency,
linux-image-extra-virtual, linux-cloud-tools-virtual-lts-wily,
linux-lowlatency, linux-image-lowlatency, linux-cloud-tools-4.4.0-240,
linux-aws-headers-4.4.0-1156, linux-modules-4.4.0-240-generic,
linux-headers-aws, linux-generic, linux-crashdump, linux-modules-extra-aws,
linux-signed-generic-lts-xenial, linux-image-lowlatency-lts-xenial,
linux-tools-aws, linux-kvm-cloud-tools-4.4.0-1119,
linux-tools-4.4.0-240-generic, linux-signed-image-generic-lts-utopic,
linux-headers-4.4.0-240, linux-image-extra-virtual-lts-xenial,
linux-modules-extra-4.4.0-1156-aws, linux-doc,
linux-buildinfo-4.4.0-1119-kvm, linux-buildinfo-4.4.0-240-lowlatency,
linux-signed-lowlatency, linux-tools-generic-lts-utopic,
linux-image-virtual, linux-headers-4.4.0-240-lowlatency,
linux-headers-virtual-lts-xenial, linux-cloud-tools-4.4.0-1156-aws,
linux-tools-generic-lts-wily, linux-modules-4.4.0-240-lowlatency,
linux-image-virtual-lts-wily, linux-cloud-tools-virtual-lts-utopic,
linux-image-virtual-lts-xenial, linux-headers-virtual,
linux-buildinfo-4.4.0-1118-aws, linux-headers-generic-lts-wily,
linux-signed-generic-lts-wily, linux-headers-lowlatency-lts-utopic,
linux-cloud-tools-lowlatency-lts-utopic, linux-tools-lowlatency,
linux-image-4.4.0-240-generic, linux-headers-generic-lts-utopic,
linux-headers-virtual-lts-utopic, linux-lts-xenial-cloud-tools-4.4.0-240,
linux-image-unsigned-4.4.0-240-generic, linux-tools-lowlatency-lts-utopic,
linux-headers-generic-lts-vivid, linux-tools-common,
linux-aws-tools-4.4.0-1118, linux-signed-image-lowlatency-lts-wily,
linux-headers-lowlatency-lts-xenial, linux-virtual-lts-vivid,
linux-lowlatency-lts-xenial, linux-headers-generic,
linux-headers-virtual-lts-wily, linux-image-hwe-generic-trusty,
linux-lowlatency-lts-vivid, linux-cloud-tools-generic-lts-xenial,
linux-cloud-tools-common, linux-signed-image-lowlatency-lts-xenial,
linux-tools-virtual-lts-xenial, linux-signed-generic,
linux-image-hwe-virtual-trusty, linux-image-virtual-lts-utopic,
linux-source, linux-cloud-tools-generic-lts-wily,
linux-headers-4.4.0-1156-aws, linux-headers-4.4.0-240-generic,
linux-image-generic-lts-xenial, linux-cloud-tools-4.4.0-240-generic,
linux-virtual-lts-xenial, linux-image-generic-lts-wily,
linux-cloud-tools-lowlatency-lts-wily, linux-tools-4.4.0-240,
linux-hwe-generic-trusty, linux-virtual,
linux-cloud-tools-generic-lts-utopic, linux-cloud-tools-virtual,
linux-cloud-tools-virtual-lts-vivid, linux-generic-lts-vivid,
linux-image-4.4.0-1118-aws, linux-tools-lts-utopic,
linux-headers-lowlatency-lts-wily, linux-image-aws,
linux-modules-4.4.0-1118-aws, linux-image-4.4.0-1156-aws,
linux-signed-image-generic-lts-xenial, linux-image-extra-virtual-lts-wily,
linux-cloud-tools-generic, linux-cloud-tools-4.4.0-240-lowlatency,
linux-image-virtual-lts-vivid, linux-image-unsigned-4.4.0-240-lowlatency,
linux-image-generic-lts-vivid, linux-signed-generic-lts-vivid,
linux-tools-lowlatency-lts-xenial, linux-signed-image-lowlatency,
linux-cloud-tools-lowlatency, linux-cloud-tools-4.4.0-1119-kvm,
linux-tools-virtual, linux-generic-lts-xenial,
linux-image-extra-virtual-lts-utopic, linux-headers-4.4.0-1119-kvm,
linux-image-generic, linux-cloud-tools-generic-lts-vivid, linux,
linux-tools-4.4.0-240-lowlatency, linux-tools-generic-lts-xenial,
linux-aws-tools-4.4.0-1156, linux-tools-4.4.0-1118-aws,
linux-headers-generic-lts-xenial, linux-tools-4.4.0-1156-aws,
linux-buildinfo-4.4.0-240-generic, linux-modules-4.4.0-1156-aws,
linux-generic-lts-utopic, linux-aws-cloud-tools-4.4.0-1118,
linux-signed-lowlatency-lts-xenial, linux-libc-dev, linux-headers-kvm,
linux-headers-lowlatency, linux-signed-lowlatency-lts-wily,
linux-generic-lts-wily, linux-image-lowlatency-lts-vivid, linux-tools-host,
linux-cloud-tools-4.4.0-1118-aws, linux-image-extra-virtual-lts-vivid,
linux-image-generic-lts-utopic, linux-modules-4.4.0-1119-kvm,
linux-aws-headers-4.4.0-1118, linux-image-lowlatency-lts-wily,
linux-image-kvm, linux-lowlatency-lts-utopic, linux-source-4.4.0,
linux-lowlatency-lts-wily, linux-image-4.4.0-1119-kvm,
linux-signed-image-generic-lts-wily, linux-tools-lowlatency-lts-vivid,
linux-tools-virtual-lts-wily, linux-modules-extra-4.4.0-240-generic,
linux-signed-image-generic-lts-vivid, linux-tools-generic-lts-vivid,
linux-lts-xenial, linux-tools-lowlatency-lts-wily,
linux-aws-cloud-tools-4.4.0-1156, linux-kvm-tools-4.4.0-1119,
linux-hwe-virtual-trusty, linux-kvm
o USN-5982-1 : linux-tools-generic, linux-image-unsigned-5.15.0-69-generic,
linux-aws, linux-tools-generic-hwe-20.04, linux-aws-5.15-tools-5.15.0-1033,
linux-image-oracle-edge, linux-tools-generic-lpae-hwe-20.04,
linux-generic-lpae-hwe-20.04-edge, linux-tools-virtual-hwe-20.04-edge,
linux-image-generic-lpae-hwe-20.04, linux-cloud-tools-azure-edge,
linux-headers-5.15.0-69, linux-tools-azure-edge, linux-cloud-tools-azure,
linux-modules-extra-gkeop-5.15, linux-image-5.15.0-1032-oracle,
linux-cloud-tools-virtual-hwe-20.04, linux-tools-aws-edge, linux-gkeop,
linux-image-5.15.0-1033-aws, linux-tools-5.15.0-1026-raspi,
linux-tools-generic-lpae-hwe-20.04-edge, linux-cloud-tools-azure-fde,
linux-headers-5.15.0-1026-raspi, linux-lowlatency-cloud-tools-common,
linux-tools-generic-64k-hwe-20.04, linux-azure-tools-5.15.0-1035,
linux-tools-lowlatency-hwe-20.04, linux-azure-5.15-cloud-tools-5.15.0-1035,
linux-image-5.15.0-1026-raspi-nolpae, linux-azure-headers-5.15.0-1035,
linux-headers-virtual-hwe-20.04-edge, linux-hwe-5.15-tools-5.15.0-69,
linux-cloud-tools-5.15.0-69-generic, linux-modules-extra-raspi,
linux-lowlatency-hwe-5.15-tools-host, linux-image-lowlatency-64k-hwe-20.04,
linux-generic-hwe-20.04, linux-buildinfo-5.15.0-1035-azure,
linux-headers-azure, linux-tools-generic-64k,
linux-modules-5.15.0-69-lowlatency-64k, linux-aws-headers-5.15.0-1033,
linux-modules-extra-azure-edge, linux-hwe-5.15-tools-common,
linux-modules-5.15.0-1031-gcp, linux-image-lowlatency-64k-hwe-20.04-edge,
linux-cloud-tools-virtual, linux-headers-azure-fde,
linux-lowlatency-hwe-5.15-headers-5.15.0-69, linux-image-aws,
linux-modules-extra-raspi-nolpae, linux-image-azure, linux-generic-lpae,
linux-modules-extra-aws-edge, linux-tools-azure, linux-raspi-nolpae,
linux-oracle-5.15, linux-azure-5.15-tools-5.15.0-1035,
linux-image-generic-64k, linux-image-lowlatency-hwe-20.04,
linux-gkeop-5.15, linux-buildinfo-5.15.0-1026-raspi-nolpae,
linux-gkeop-cloud-tools-5.15.0-1017, linux,
linux-headers-5.15.0-1017-gkeop, linux-modules-5.15.0-1026-raspi-nolpae,
linux-hwe-5.15-headers-5.15.0-69, linux-headers-raspi-nolpae,
linux-aws-5.15-cloud-tools-5.15.0-1033, linux-headers-5.15.0-69-generic,
linux-oracle-tools-5.15.0-1032, linux-headers-5.15.0-1035-azure,
linux-image-generic-hwe-20.04, linux-gkeop-tools-5.15.0-1017,
linux-modules-iwlwifi-5.15.0-1031-gcp,
linux-image-5.15.0-69-lowlatency-64k,
linux-modules-extra-5.15.0-1026-raspi-nolpae, linux-image-azure-lts-22.04,
linux-image-unsigned-5.15.0-1031-gcp, linux-gcp,
linux-cloud-tools-5.15.0-69-lowlatency,
linux-image-unsigned-5.15.0-1035-azure, linux-headers-aws-edge,
linux-generic-lpae-hwe-20.04, linux-cloud-tools-gkeop,
linux-headers-lowlatency-64k-hwe-20.04-edge, linux-headers-oracle,
linux-buildinfo-5.15.0-69-generic, linux-lowlatency-hwe-20.04-edge,
linux-lowlatency-hwe-20.04, linux-image-extra-virtual-hwe-20.04-edge,
linux-image-5.15.0-1035-azure, linux-tools-aws, linux-aws-lts-22.04,
linux-image-lowlatency-64k, linux-headers-raspi, linux-doc,
linux-lowlatency-hwe-5.15-tools-5.15.0-69,
linux-headers-generic-64k-hwe-20.04-edge,
linux-headers-generic-lpae-hwe-20.04, linux-headers-generic-hwe-20.04,
linux-oracle, linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-69,
linux-aws-edge, linux-headers-aws-lts-22.04, linux-tools-lowlatency-64k,
linux-tools-5.15.0-69-lowlatency, linux-headers-generic-64k-hwe-20.04,
linux-image-gkeop-5.15, linux-virtual-hwe-20.04-edge,
linux-cloud-tools-generic-hwe-20.04-edge, linux-modules-5.15.0-1032-oracle,
linux-image-5.15.0-1035-azure-fde, linux-oracle-headers-5.15.0-1032,
linux-cloud-tools-lowlatency-hwe-20.04, linux-image-oem-20.04,
linux-tools-common, linux-cloud-tools-5.15.0-1035-azure, linux-azure-edge,
linux-tools-5.15.0-1026-raspi-nolpae, linux-image-azure-edge,
linux-tools-oracle-edge, linux-headers-5.15.0-69-generic-lpae,
linux-cloud-tools-generic-hwe-20.04, linux-modules-extra-5.15.0-1017-gkeop,
linux-tools-virtual-hwe-20.04, linux-modules-iwlwifi-5.15.0-69-lowlatency,
linux-aws-5.15, linux-virtual, linux-image-5.15.0-1026-raspi,
linux-gcp-headers-5.15.0-1031, linux-modules-extra-azure-fde,
linux-headers-oracle-edge, linux-headers-gkeop-5.15,
linux-image-unsigned-5.15.0-1032-oracle, linux-tools-5.15.0-69-generic-64k,
linux-headers-5.15.0-1032-oracle, linux-raspi-headers-5.15.0-1026,
linux-headers-generic-hwe-20.04-edge, linux-tools-gkeop-5.15,
linux-headers-5.15.0-1031-gcp, linux-headers-lowlatency-64k,
linux-headers-gkeop, linux-modules-extra-aws-lts-22.04,
linux-image-generic, linux-image-unsigned-5.15.0-69-lowlatency,
linux-cloud-tools-gkeop-5.15, linux-tools-generic-64k-hwe-20.04-edge,
linux-tools-generic-lpae, linux-tools-5.15.0-1035-azure,
linux-buildinfo-5.15.0-1026-raspi, linux-tools-oracle,
linux-modules-extra-5.15.0-1026-raspi,
linux-image-unsigned-5.15.0-69-generic-64k, linux-tools-5.15.0-69,
linux-headers-lowlatency, linux-modules-5.15.0-69-generic-lpae,
linux-generic-64k-hwe-20.04, linux-tools-gcp-edge,
linux-image-unsigned-5.15.0-1035-azure-fde, linux-image-aws-edge,
linux-modules-extra-5.15.0-1035-azure, linux-headers-azure-lts-22.04,
linux-source-5.15.0, linux-modules-5.15.0-69-lowlatency,
linux-cloud-tools-virtual-hwe-20.04-edge, linux-gkeop-headers-5.15.0-1017,
linux-headers-5.15.0-1033-aws, linux-modules-extra-gkeop,
linux-image-extra-virtual, linux-headers-aws, linux-crashdump,
linux-modules-extra-5.15.0-1033-aws, linux-modules-extra-aws,
linux-headers-gcp-edge, linux-modules-iwlwifi-5.15.0-69-generic,
linux-image-unsigned-5.15.0-1033-aws,
linux-headers-generic-lpae-hwe-20.04-edge, linux-tools-5.15.0-69-generic,
linux-raspi-tools-5.15.0-1026, linux-azure-5.15-headers-5.15.0-1035,
linux-aws-cloud-tools-5.15.0-1033, linux-hwe-5.15-cloud-tools-5.15.0-69,
linux-tools-5.15.0-1032-oracle, linux-lowlatency-cloud-tools-5.15.0-69,
linux-buildinfo-5.15.0-1017-gkeop, linux-modules-iwlwifi-generic-hwe-20.04,
linux-image-unsigned-5.15.0-1017-gkeop, linux-image-generic-lpae,
linux-buildinfo-5.15.0-69-generic-64k, linux-modules-extra-gcp-edge,
linux-gcp-tools-5.15.0-1031, linux-buildinfo-5.15.0-1032-oracle,
linux-aws-tools-5.15.0-1033, linux-tools-5.15.0-69-lowlatency-64k,
linux-virtual-hwe-20.04, linux-oem-20.04, linux-azure-lts-22.04,
linux-hwe-5.15-source-5.15.0, linux-cloud-tools-common,
linux-tools-5.15.0-1033-aws, linux-buildinfo-5.15.0-69-lowlatency,
linux-lowlatency-tools-host, linux-lowlatency-tools-common,
linux-modules-5.15.0-1033-aws, linux-oracle-5.15-tools-5.15.0-1032,
linux-cloud-tools-5.15.0-1017-gkeop, linux-modules-extra-azure-lts-22.04,
linux-tools-5.15.0-69-generic-lpae, linux-modules-iwlwifi-generic,
linux-headers-generic-lpae, linux-image-5.15.0-69-generic-64k,
linux-image-5.15.0-1017-gkeop,
linux-lowlatency-hwe-5.15-cloud-tools-common,
linux-headers-virtual-hwe-20.04, linux-tools-lowlatency-64k-hwe-20.04-edge,
linux-tools-virtual, linux-cloud-tools-azure-lts-22.04,
linux-lowlatency-64k-hwe-20.04, linux-modules-5.15.0-1035-azure,
linux-headers-oem-20.04, linux-image-generic-64k-hwe-20.04,
linux-image-raspi-nolpae, linux-generic-64k, linux-libc-dev,
linux-image-generic-hwe-20.04-edge, linux-azure-5.15,
linux-lowlatency-headers-5.15.0-69, linux-tools-raspi,
linux-lowlatency-hwe-5.15-tools-common, linux-lowlatency-64k,
linux-headers-5.15.0-1026-raspi-nolpae, linux-gcp-5.15-headers-5.15.0-1031,
linux-tools-raspi-nolpae, linux-headers-5.15.0-69-generic-64k,
linux-oracle-5.15-headers-5.15.0-1032, linux-lowlatency-hwe-5.15,
linux-tools-5.15.0-1017-gkeop, linux-cloud-tools-5.15.0-69,
linux-tools-lowlatency-64k-hwe-20.04,
linux-image-lowlatency-hwe-20.04-edge, linux-image-virtual-hwe-20.04-edge,
linux-image-generic-lpae-hwe-20.04-edge, linux-lowlatency,
linux-image-lowlatency, linux-image-unsigned-5.15.0-69-lowlatency-64k,
linux-generic, linux-tools-5.15.0-1031-gcp,
linux-lowlatency-tools-5.15.0-69, linux-modules-extra-5.15.0-1031-gcp,
linux-image-generic-64k-hwe-20.04-edge, linux-tools-generic-hwe-20.04-edge,
linux-gcp-edge, linux-buildinfo-5.15.0-1033-aws, linux-tools-oem-20.04,
linux-headers-azure-edge, linux-modules-5.15.0-1026-raspi,
linux-image-virtual, linux-hwe-5.15-cloud-tools-common, linux-image-gkeop,
linux-modules-5.15.0-69-generic-64k, linux-modules-5.15.0-1017-gkeop,
linux-headers-virtual, linux-headers-lowlatency-64k-hwe-20.04,
linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-image-virtual-hwe-20.04,
linux-tools-lowlatency, linux-modules-extra-5.15.0-69-generic,
linux-azure-cloud-tools-5.15.0-1035, linux-image-gcp-edge,
linux-modules-extra-azure, linux-image-oracle, linux-raspi,
linux-image-extra-virtual-hwe-20.04, linux-headers-generic,
linux-hwe-5.15-tools-host, linux-cloud-tools-5.15.0-1033-aws,
linux-image-aws-lts-22.04, linux-modules-extra-5.15.0-1032-oracle,
linux-gcp-5.15, linux-oracle-edge, linux-tools-azure-lts-22.04,
linux-hwe-5.15, linux-image-5.15.0-1031-gcp, linux-image-raspi,
linux-headers-5.15.0-69-lowlatency, linux-image-gcp,
linux-gcp-5.15-tools-5.15.0-1031, linux-buildinfo-5.15.0-69-generic-lpae,
linux-cloud-tools-generic, linux-headers-5.15.0-69-lowlatency-64k,
linux-image-5.15.0-69-generic, linux-image-5.15.0-69-lowlatency,
linux-lowlatency-64k-hwe-20.04-edge, linux-modules-extra-gcp,
linux-image-azure-fde, linux-azure, linux-cloud-tools-lowlatency,
linux-headers-gcp, linux-tools-gkeop, linux-image-5.15.0-69-generic-lpae,
linux-azure-fde, linux-tools-gcp, linux-tools-lowlatency-hwe-20.04-edge,
linux-aws-5.15-headers-5.15.0-1033, linux-generic-64k-hwe-20.04-edge,
linux-buildinfo-5.15.0-1031-gcp,
linux-modules-iwlwifi-generic-hwe-20.04-edge, linux-tools-azure-fde,
linux-tools-host, linux-buildinfo-5.15.0-69-lowlatency-64k,
linux-tools-aws-lts-22.04, linux-headers-lowlatency-hwe-20.04-edge,
linux-headers-lowlatency-hwe-20.04, linux-modules-5.15.0-69-generic,
linux-generic-hwe-20.04-edge, linux-headers-generic-64k, linux-source
o USN-5987-1 : linux-image-5.15.0-1030-gke, linux-buildinfo-5.15.0-1030-gke,
linux-image-gke-edge, linux-tools-gke-5.15, linux-tools-5.15.0-1030-gke,
linux-image-ibm, linux-modules-iwlwifi-5.15.0-1030-gke,
linux-headers-gke-edge, linux-ibm-tools-5.15.0-1027, linux-tools-gke-edge,
linux-ibm-cloud-tools-common, linux-kvm-tools-5.15.0-1030,
linux-headers-ibm, linux-modules-extra-5.15.0-1029-gke,
linux-modules-5.15.0-1029-gke, linux-image-unsigned-5.15.0-1029-gke,
linux-tools-gke, linux-tools-kvm, linux-buildinfo-5.15.0-1027-ibm,
linux-ibm-tools-common, linux-kvm, linux-headers-gke,
linux-tools-5.15.0-1029-gke, linux-gke, linux-buildinfo-5.15.0-1030-kvm,
linux-gke-tools-5.15.0-1030, linux-gke-5.15-tools-5.15.0-1029,
linux-modules-5.15.0-1030-kvm, linux-tools-5.15.0-1027-ibm,
linux-headers-kvm, linux-headers-gke-5.15, linux-ibm-headers-5.15.0-1027,
linux-image-5.15.0-1027-ibm, linux-modules-extra-5.15.0-1027-ibm,
linux-buildinfo-5.15.0-1029-gke, linux-modules-5.15.0-1030-gke,
linux-headers-5.15.0-1027-ibm, linux-modules-iwlwifi-5.15.0-1029-gke,
linux-tools-ibm, linux-image-5.15.0-1029-gke,
linux-image-unsigned-5.15.0-1027-ibm, linux-image-unsigned-5.15.0-1030-kvm,
linux-kvm-headers-5.15.0-1030, linux-modules-extra-5.15.0-1030-gke,
linux-tools-5.15.0-1030-kvm, linux-gke-5.15, linux-image-kvm,
linux-image-gke-5.15, linux-headers-5.15.0-1030-gke, linux-ibm,
linux-headers-5.15.0-1030-kvm, linux-gke-edge, linux-image-5.15.0-1030-kvm,
linux-modules-5.15.0-1027-ibm, linux-image-gke,
linux-gke-5.15-headers-5.15.0-1029, linux-ibm-source-5.15.0,
linux-gke-headers-5.15.0-1030, linux-headers-5.15.0-1029-gke,
linux-image-unsigned-5.15.0-1030-gke
o USN-6004-1 : linux-tools-5.15.0-1027-intel-iotg,
linux-headers-5.15.0-1027-intel-iotg, linux-image-5.15.0-1027-intel-iotg,
linux-intel-iotg-cloud-tools-common, linux-image-intel-iotg,
linux-intel-iotg-tools-common, linux-intel-iotg, linux-tools-intel-iotg,
linux-buildinfo-5.15.0-1027-intel-iotg, linux-intel-iotg-tools-host,
linux-modules-5.15.0-1027-intel-iotg,
linux-cloud-tools-5.15.0-1027-intel-iotg,
linux-modules-iwlwifi-5.15.0-1027-intel-iotg,
linux-modules-extra-5.15.0-1027-intel-iotg,
linux-intel-iotg-cloud-tools-5.15.0-1027,
linux-intel-iotg-headers-5.15.0-1027, linux-intel-iotg-tools-5.15.0-1027,
linux-headers-intel-iotg, linux-image-unsigned-5.15.0-1027-intel-iotg
o USN-6024-1 : linux-cloud-tools-5.19.0-1023-aws,
linux-oracle-tools-5.19.0-1020, linux-modules-5.19.0-1021-kvm,
linux-headers-5.19.0-40-generic-lpae,
linux-cloud-tools-virtual-hwe-22.04-edge,
linux-generic-lpae-hwe-22.04-edge, linux-tools-raspi-nolpae,
linux-aws-headers-5.19.0-1023, linux-headers-5.19.0-40,
linux-kvm-tools-5.19.0-1021, linux-headers-lowlatency-64k-hwe-20.04-edge,
linux-modules-ivsc-generic, linux-modules-extra-5.19.0-1020-oracle,
linux-image-lowlatency-64k-hwe-22.04-edge,
linux-modules-5.19.0-40-generic-64k, linux-raspi-headers-5.19.0-1016,
linux-tools-generic, linux-headers-oracle, linux-aws,
linux-image-unsigned-5.19.0-40-generic,
linux-cloud-tools-5.19.0-40-generic, linux-buildinfo-5.19.0-1016-raspi,
linux-cloud-tools-generic-hwe-22.04, linux-tools-5.19.0-40-generic,
linux-tools-kvm, linux-hwe-5.19-cloud-tools-5.19.0-40,
linux-modules-iwlwifi-5.19.0-1022-lowlatency,
linux-image-5.19.0-1023-azure, linux-tools-lowlatency-64k-hwe-22.04,
linux-headers-5.19.0-1016-raspi-nolpae, linux-image-5.19.0-1021-kvm,
linux-modules-5.19.0-1020-oracle, linux-modules-extra-5.19.0-1023-azure,
linux-azure-cloud-tools-5.19.0-1023, linux-lowlatency-hwe-20.04-edge,
linux-image-lowlatency-hwe-20.04-edge, linux-modules-5.19.0-1020-gcp,
linux-tools-lowlatency-64k-hwe-20.04, linux-image-extra-virtual,
linux-image-virtual-hwe-22.04, linux-gcp-tools-5.19.0-1020,
linux-lowlatency-hwe-20.04, linux-lowlatency, linux-image-lowlatency,
linux-tools-oem-22.04, linux-modules-ipu6-generic-hwe-22.04,
linux-headers-aws, linux-generic, linux-tools-5.19.0-1016-raspi-nolpae,
linux-crashdump, linux-modules-extra-aws,
linux-tools-5.19.0-1022-lowlatency-64k, linux-tools-aws,
linux-buildinfo-5.19.0-1020-oracle, linux-cloud-tools-azure,
linux-tools-generic-lpae-hwe-22.04-edge, linux-headers-5.19.0-1023-aws,
linux-image-lowlatency-64k, linux-aws-tools-5.19.0-1023,
linux-tools-lowlatency-64k-hwe-22.04-edge, linux-headers-raspi, linux-doc,
linux-tools-5.19.0-1020-gcp, linux-image-5.19.0-1022-lowlatency,
linux-image-generic-64k-hwe-22.04, linux-modules-ipu6-generic,
linux-headers-generic-hwe-22.04-edge, linux-image-extra-virtual-hwe-22.04,
linux-modules-5.19.0-1023-azure, linux-hwe-5.19-tools-5.19.0-40,
linux-image-unsigned-5.19.0-1023-azure, linux-image-virtual,
linux-image-5.19.0-1016-raspi-nolpae, linux-oracle,
linux-lowlatency-hwe-22.04-edge, linux-tools-generic-lpae-hwe-22.04,
linux-image-lowlatency-hwe-22.04-edge, linux-oracle-headers-5.19.0-1020,
linux-modules-extra-5.19.0-1020-gcp, linux-tools-lowlatency-64k,
linux-hwe-5.19-cloud-tools-common, linux-oem-22.04,
linux-image-generic-lpae, linux-generic-hwe-22.04-edge,
linux-image-unsigned-5.19.0-1023-aws, linux-lowlatency-cloud-tools-common,
linux-modules-extra-5.19.0-1016-raspi-nolpae, linux-headers-virtual,
linux-headers-lowlatency-64k-hwe-20.04,
linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-image-5.19.0-1023-aws,
linux-image-virtual-hwe-22.04-edge, linux-tools-lowlatency-hwe-20.04,
linux-kvm-headers-5.19.0-1021, linux-headers-5.19.0-40-generic,
linux-tools-lowlatency, linux-modules-5.19.0-40-generic,
linux-tools-virtual-hwe-22.04-edge, linux-tools-generic-64k-hwe-22.04,
linux-cloud-tools-lowlatency-hwe-20.04, linux-image-generic-lpae-hwe-22.04,
linux-modules-5.19.0-1016-raspi-nolpae, linux-image-lowlatency-hwe-22.04,
linux-headers-5.19.0-1016-raspi, linux-tools-common,
linux-headers-generic-64k-hwe-22.04, linux-modules-extra-raspi,
linux-lowlatency-headers-5.19.0-1022, linux-generic-hwe-22.04,
linux-buildinfo-5.19.0-1023-azure, linux-modules-extra-azure,
linux-modules-ivsc-5.19.0-40-generic,
linux-modules-ipu6-5.19.0-1022-lowlatency, linux-image-oracle, linux-raspi,
linux-image-lowlatency-64k-hwe-20.04, linux-azure-headers-5.19.0-1023,
linux-hwe-5.19-headers-5.19.0-40, linux-modules-extra-5.19.0-1023-aws,
linux-headers-generic, linux-cloud-tools-generic-hwe-22.04-edge,
linux-headers-generic-lpae-hwe-22.04, linux-headers-lowlatency-hwe-22.04,
linux-buildinfo-5.19.0-1021-kvm,
linux-buildinfo-5.19.0-1022-lowlatency-64k,
linux-image-5.19.0-1022-lowlatency-64k,
linux-image-unsigned-5.19.0-1020-gcp, linux-tools-5.19.0-1021-kvm,
linux-headers-azure, linux-headers-generic-hwe-22.04,
linux-tools-generic-64k, linux-modules-ipu6-5.19.0-40-generic,
linux-cloud-tools-common, linux-raspi-tools-5.19.0-1016,
linux-headers-generic-lpae-hwe-22.04-edge,
linux-image-unsigned-5.19.0-40-generic-64k,
linux-modules-5.19.0-1022-lowlatency, linux-lowlatency-tools-5.19.0-1022,
linux-tools-5.19.0-1022-lowlatency, linux-virtual-hwe-22.04,
linux-cloud-tools-lowlatency-hwe-22.04-edge, linux-virtual-hwe-22.04-edge,
linux-source, linux-lowlatency-tools-host, linux-tools-5.19.0-1023-aws,
linux-buildinfo-5.19.0-1016-raspi-nolpae,
linux-headers-5.19.0-1022-lowlatency,
linux-image-extra-virtual-hwe-22.04-edge, linux-headers-5.19.0-1023-azure,
linux-buildinfo-5.19.0-1022-lowlatency,
linux-image-unsigned-5.19.0-1022-lowlatency-64k,
linux-lowlatency-tools-common, linux-modules-extra-5.19.0-1016-raspi,
linux-image-raspi, linux-tools-generic-hwe-22.04-edge,
linux-tools-5.19.0-40, linux-tools-generic-64k-hwe-22.04-edge,
linux-image-lowlatency-64k-hwe-20.04-edge, linux-virtual,
linux-cloud-tools-virtual, linux-headers-5.19.0-1020-gcp,
linux-modules-ipu6-generic-hwe-22.04-edge, linux-tools-5.19.0-1016-raspi,
linux-modules-ivsc-generic-hwe-22.04, linux-modules-5.19.0-1016-raspi,
linux-image-generic-lpae-hwe-22.04-edge, linux-headers-virtual-hwe-22.04,
linux-modules-iwlwifi-generic, linux-buildinfo-5.19.0-1023-aws,
linux-headers-generic-lpae, linux-image-aws,
linux-image-generic-hwe-22.04-edge,
linux-headers-lowlatency-hwe-22.04-edge, linux-modules-extra-raspi-nolpae,
linux-cloud-tools-5.19.0-40, linux-image-gcp,
linux-lowlatency-64k-hwe-22.04, linux-headers-5.19.0-40-generic-64k,
linux-modules-iwlwifi-generic-hwe-22.04, linux-image-azure,
linux-generic-lpae, linux-image-5.19.0-1020-oracle,
linux-headers-oem-22.04, linux-modules-extra-5.19.0-40-generic,
linux-cloud-tools-generic, linux-lowlatency-64k-hwe-20.04-edge,
linux-headers-virtual-hwe-22.04-edge, linux-tools-azure,
linux-modules-extra-gcp, linux-modules-ivsc-generic-hwe-22.04-edge,
linux-tools-5.19.0-40-generic-lpae, linux-raspi-nolpae,
linux-tools-generic-hwe-22.04, linux-lowlatency-cloud-tools-5.19.0-1022,
linux-headers-5.19.0-1022-lowlatency-64k, linux-azure,
linux-headers-lowlatency-64k-hwe-22.04, linux-headers-lowlatency-64k,
linux-generic-lpae-hwe-22.04, linux-hwe-5.19, linux-image-generic-64k,
linux-image-5.19.0-1020-gcp, linux-cloud-tools-lowlatency,
linux-image-5.19.0-40-generic-64k, linux-lowlatency-hwe-22.04,
linux-cloud-tools-lowlatency-hwe-22.04, linux-headers-gcp,
linux-image-lowlatency-hwe-20.04, linux-tools-5.19.0-1020-oracle,
linux-gcp-headers-5.19.0-1020, linux-tools-lowlatency-64k-hwe-20.04-edge,
linux-image-unsigned-5.19.0-1022-lowlatency, linux-tools-virtual,
linux-tools-virtual-hwe-22.04, linux-lowlatency-64k-hwe-20.04,
linux-cloud-tools-5.19.0-1023-azure, linux-image-oem-22.04,
linux-image-generic, linux-buildinfo-5.19.0-40-generic-lpae,
linux-modules-ivsc-5.19.0-1022-lowlatency, linux, linux-source-5.19.0,
linux-tools-gcp, linux-tools-lowlatency-hwe-20.04-edge,
linux-cloud-tools-5.19.0-1022-lowlatency, linux-tools-generic-lpae,
linux-image-lowlatency-64k-hwe-22.04, linux-image-raspi-nolpae,
linux-generic-64k, linux-headers-generic-64k-hwe-22.04-edge,
linux-image-unsigned-5.19.0-1020-oracle,
linux-modules-iwlwifi-5.19.0-40-generic, linux-tools-oracle,
linux-modules-5.19.0-1022-lowlatency-64k, linux-libc-dev,
linux-generic-64k-hwe-22.04, linux-buildinfo-5.19.0-40-generic,
linux-cloud-tools-virtual-hwe-22.04, linux-headers-kvm,
linux-aws-cloud-tools-5.19.0-1023, linux-headers-lowlatency,
linux-hwe-5.19-tools-common, linux-modules-5.19.0-1023-aws,
linux-headers-raspi-nolpae, linux-image-generic-64k-hwe-22.04-edge,
linux-tools-lowlatency-hwe-22.04-edge,
linux-buildinfo-5.19.0-40-generic-64k, linux-hwe-5.19-tools-host,
linux-image-unsigned-5.19.0-1021-kvm, linux-tools-host,
linux-headers-5.19.0-1021-kvm, linux-image-generic-hwe-22.04,
linux-image-5.19.0-1016-raspi, linux-image-5.19.0-40-generic-lpae,
linux-headers-lowlatency-hwe-20.04-edge, linux-buildinfo-5.19.0-1020-gcp,
linux-image-kvm, linux-tools-raspi, linux-headers-5.19.0-1020-oracle,
linux-azure-tools-5.19.0-1023, linux-tools-lowlatency-hwe-22.04,
linux-headers-lowlatency-64k-hwe-22.04-edge,
linux-headers-lowlatency-hwe-20.04, linux-lowlatency-64k,
linux-image-5.19.0-40-generic, linux-lowlatency-64k-hwe-22.04-edge,
linux-modules-iwlwifi-generic-hwe-22.04-edge,
linux-tools-5.19.0-40-generic-64k, linux-modules-5.19.0-40-generic-lpae,
linux-gcp, linux-tools-5.19.0-1023-azure, linux-headers-generic-64k,
linux-generic-64k-hwe-22.04-edge, linux-kvm
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=iV4D
-----END PGP SIGNATURE-----
ESB-2023.3080 - [Ubuntu] Linux kernel (OEM): CVSS (Max): 7.8*
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3080
USN-6122-1: Linux kernel (OEM) vulnerabilities
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Linux kernel (OEM)
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2023-32233 CVE-2023-2612
Original Bulletin:
https://ubuntu.com/security/notices/USN-6122-1
Comment: CVSS (Max): 7.8* CVE-2023-32233 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* Not all CVSS available when published
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6122-1: Linux kernel (OEM) vulnerabilities
30 May 2023
Several security issues were fixed in the Linux kernel.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 22.04 LTS
Packages
o linux-oem-6.1 - Linux kernel for OEM systems
Details
Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in
the netfilter subsystem of the Linux kernel when processing batch requests,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. ( CVE-2023-32233 )
Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu
Linux kernel contained a race condition when handling inode locking in some
situations. A local attacker could use this to cause a denial of service
(kernel deadlock). ( CVE-2023-2612 )
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 22.04
o linux-image-6.1.0-1013-oem - 6.1.0-1013.13
o linux-image-oem-22.04c - 6.1.0.1013.13
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
o CVE-2023-32233
o CVE-2023-2612
Related notices
o USN-6123-1 : linux-oem-6.0-tools-6.0.0-1017, linux-tools-oem-22.04b,
linux-image-oem-22.04b, linux-modules-ivsc-oem-22.04b,
linux-modules-iwlwifi-6.0.0-1017-oem, linux-tools-6.0.0-1017-oem,
linux-modules-iwlwifi-oem-22.04b, linux-oem-6.0, linux-oem-22.04b,
linux-image-unsigned-6.0.0-1017-oem, linux-buildinfo-6.0.0-1017-oem,
linux-headers-6.0.0-1017-oem, linux-modules-ivsc-6.0.0-1017-oem,
linux-oem-6.0-headers-6.0.0-1017, linux-headers-oem-22.04b,
linux-modules-6.0.0-1017-oem, linux-modules-ipu6-6.0.0-1017-oem,
linux-modules-ipu6-oem-22.04b, linux-image-6.0.0-1017-oem,
linux-oem-6.0-tools-host
o USN-6124-1 : linux-modules-iwlwifi-oem-22.04a, linux-headers-oem-22.04a,
linux-modules-ipu6-oem-22.04, linux-image-oem-22.04,
linux-modules-5.17.0-1032-oem, linux-tools-5.17.0-1032-oem,
linux-image-5.17.0-1032-oem, linux-modules-iwlwifi-oem-22.04,
linux-oem-22.04, linux-oem-5.17-headers-5.17.0-1032,
linux-oem-5.17-tools-5.17.0-1032, linux-buildinfo-5.17.0-1032-oem,
linux-modules-ivsc-oem-22.04, linux-headers-oem-22.04,
linux-modules-ivsc-oem-22.04a, linux-headers-5.17.0-1032-oem,
linux-modules-ivsc-5.17.0-1032-oem, linux-tools-oem-22.04a,
linux-image-unsigned-5.17.0-1032-oem, linux-image-oem-22.04a,
linux-tools-oem-22.04, linux-modules-ipu6-oem-22.04a,
linux-oem-5.17-tools-host, linux-oem-22.04a,
linux-modules-ipu6-5.17.0-1032-oem, linux-modules-iwlwifi-5.17.0-1032-oem,
linux-oem-5.17
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
iQIVAwUBZHaCe8kNZI30y1K9AQibGw//U5FRIrEO4bvvtKWf2k4+TR+n3Qc0Mg/y
xyPnitGi2SP1wr8Xta1efMuyoCvUnK6UsOBCWtCRuRJqIGY8iBfdyd5isKc3Wkha
M4WyfaJCqanBvFAfyrk2RQmrRLiwNXVMwqJ/HlmpXD23WO/uMBuJreDNR3cxQH8K
8kXISlV93/nK6Kk1gM4aP29nvWSTqTJAqh+RG7A3KVkLrAmK/yD4mtR44hxoxR0F
eYCjDsi3YmdWnMc+nHLgAzNnHXsFgkoWx3l2d8xj6dMqkbJNzWYXBySZrw15bWWi
a+K8N8NL+wM7yNOyfHEvycEcghHKm27dpFxduLVjH0RZ3KXtX6cMY6u2bOHlKpAE
dVJfzp5F89ooeVf9iYqwSCj7j9RbdOQrh/k+AtiejYm2hDged7Qh9wrsgz+gMtA3
gCxo+tBV1FHTUFsS0YlR+NCpIiv37WM5S39AZNQQ51xCc8GMxfy73pcOvcI7W1Kx
Hyma2ia4Qk3DDcyrD+ACYBuu9lHsBuj66CkQHslhG68aEY7VmCxPmcG2l+8i05KQ
KVRi5UE38BStZMqNeetZb5nw8GfxjQlVNX94g/qOE+Q6M8IXvipaOxN5+bYeSxfH
n0IZawKtFWLtDu2KnONgK2/O0+61M2tBAlApkeN9tkv0mRQjt+VlMTey2N0aTSJ3
qWvwWxI8En8=
=0sfA
-----END PGP SIGNATURE-----
ESB-2023.3079 - [Ubuntu] Nanopb: CVSS (Max): 7.5
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3079
USN-6121-1: Nanopb vulnerabilities
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Nanopb
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2021-21401 CVE-2020-26243
Original Bulletin:
https://ubuntu.com/security/notices/USN-6121-1
Comment: CVSS (Max): 7.5 CVE-2020-26243 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6121-1: Nanopb vulnerabilities
30 May 2023
Several security issues were fixed in Nanopb.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 20.04 LTS
Packages
o nanopb - Protocol Buffers with small code size
Details
It was discovered that Nanopb incorrectly handled certain decode messages.
An attacker could possibly use this cause a denial of service or expose
sensitive information. ( CVE-2020-26243 )
It was discovered that Nanopb incorrectly handled certain decode messages.
An attacker could possibly use this issue to cause a denial of service
or execute arbitrary code. ( CVE-2021-21401 )
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 20.04
o nanopb - 0.4.1-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
o CVE-2021-21401
o CVE-2020-26243
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=i64H
-----END PGP SIGNATURE-----
ESB-2023.3078 - [Ubuntu] SpiderMonkey: CVSS (Max): 7.5
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3078
USN-6120-1: SpiderMonkey vulnerabilities
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: SpiderMonkey
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2023-32215 CVE-2023-32211 CVE-2023-29550
CVE-2023-29548 CVE-2023-29536 CVE-2023-29535
CVE-2023-25751 CVE-2023-25739 CVE-2023-25735
Original Bulletin:
https://ubuntu.com/security/notices/USN-6120-1
Comment: CVSS (Max): 7.5 CVE-2023-32215 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS Source: Red Hat
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6120-1: SpiderMonkey vulnerabilities
30 May 2023
Several security issues were fixed in SpiderMonkey.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 23.04
o Ubuntu 22.10
o Ubuntu 22.04 LTS
Packages
o mozjs102 - SpiderMonkey JavaScript library
Details
Several security issues were discovered in the SpiderMonkey JavaScript
library. If a user were tricked into opening malicious JavaScript
applications or processing malformed data, a remote attacker could exploit
a variety of issues related to JavaScript security, including denial of
service attacks, and arbitrary code execution.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 23.04
o libmozjs-102-0 - 102.11.0-0ubuntu0.23.04.1
Ubuntu 22.10
o libmozjs-102-0 - 102.11.0-0ubuntu0.22.10.1
Ubuntu 22.04
o libmozjs-102-0 - 102.11.0-0ubuntu0.22.04.1
After a standard system update you need to reboot your computer to make all
the necessary changes.
References
o CVE-2023-29535
o CVE-2023-29536
o CVE-2023-25739
o CVE-2023-32211
o CVE-2023-32215
o CVE-2023-25751
o CVE-2023-29550
o CVE-2023-25735
o CVE-2023-29548
Related notices
o USN-6010-1 : firefox-locale-xh, firefox-locale-ml, firefox-locale-gu,
firefox-locale-is, firefox-locale-gl, firefox-locale-th, firefox-dev,
firefox-locale-hr, firefox-locale-bg, firefox-locale-hsb,
firefox-locale-hi, firefox-locale-ku, firefox-locale-el, firefox-locale-or,
firefox-locale-mk, firefox-locale-hy, firefox-locale-af, firefox-locale-hu,
firefox-locale-pa, firefox-locale-ne, firefox-locale-uk, firefox-locale-ja,
firefox-locale-az, firefox-locale-an, firefox-locale-ko, firefox-locale-bn,
firefox-locale-tr, firefox-locale-kab, firefox-locale-lv,
firefox-locale-nso, firefox-locale-pl, firefox-locale-szl,
firefox-locale-zh-hans, firefox-geckodriver, firefox-locale-sq,
firefox-mozsymbols, firefox-locale-as, firefox-locale-fa,
firefox-locale-si, firefox-locale-sr, firefox-locale-br, firefox,
firefox-locale-de, firefox-locale-cs, firefox-locale-nb, firefox-locale-eo,
firefox-locale-kk, firefox-locale-he, firefox-locale-be, firefox-locale-my,
firefox-locale-cak, firefox-locale-ms, firefox-locale-zh-hant,
firefox-locale-sw, firefox-locale-oc, firefox-locale-zu, firefox-locale-da,
firefox-locale-sv, firefox-locale-ast, firefox-locale-es,
firefox-locale-nl, firefox-locale-ga, firefox-locale-it, firefox-locale-gn,
firefox-locale-fr, firefox-locale-te, firefox-locale-ca, firefox-locale-gd,
firefox-locale-kn, firefox-locale-ur, firefox-locale-ar, firefox-locale-lg,
firefox-locale-sk, firefox-locale-uz, firefox-locale-fi, firefox-locale-en,
firefox-locale-et, firefox-locale-ro, firefox-locale-bs, firefox-locale-fy,
firefox-locale-sl, firefox-locale-mn, firefox-locale-ia, firefox-locale-km,
firefox-locale-ta, firefox-locale-eu, firefox-locale-mai,
firefox-locale-csb, firefox-locale-pt, firefox-locale-mr,
firefox-locale-vi, firefox-locale-lt, firefox-locale-ru, firefox-locale-cy,
firefox-locale-ka, firefox-locale-nn, firefox-locale-id
o USN-6015-1 : thunderbird-locale-rm, thunderbird-locale-lv,
thunderbird-locale-th, thunderbird-locale-kab, thunderbird-locale-gd,
thunderbird-locale-bn, thunderbird-locale-ta, thunderbird-locale-zh-cn,
thunderbird-locale-en-us, thunderbird-locale-ko, thunderbird-locale-nn,
thunderbird-locale-es-ar, thunderbird-locale-is, thunderbird-locale-uk,
thunderbird-locale-kk, thunderbird-locale-zh-hant,
thunderbird-locale-bn-bd, thunderbird-locale-sq, thunderbird-gnome-support,
thunderbird-locale-ast, thunderbird-locale-cak, thunderbird-locale-bg,
thunderbird-locale-en-gb, thunderbird-locale-zh-hans,
thunderbird-locale-en, thunderbird-locale-ta-lk, thunderbird-locale-ar,
thunderbird-locale-fy-nl, thunderbird, thunderbird-locale-ru,
thunderbird-locale-hu, thunderbird-locale-de, thunderbird-locale-fr,
thunderbird-locale-mk, thunderbird-locale-ms, thunderbird-dev,
thunderbird-locale-ka, thunderbird-locale-sv-se, thunderbird-locale-pt,
thunderbird-locale-it, thunderbird-locale-da, thunderbird-locale-hy,
thunderbird-locale-he, thunderbird-locale-gl, thunderbird-locale-hsb,
thunderbird-locale-si, thunderbird-locale-tr, thunderbird-locale-af,
thunderbird-locale-ja, thunderbird-locale-be, xul-ext-gdata-provider,
thunderbird-locale-et, thunderbird-locale-cs, thunderbird-locale-ca,
thunderbird-locale-pt-br, thunderbird-locale-es, thunderbird-locale-nb,
thunderbird-locale-fa, thunderbird-locale-ga-ie,
xul-ext-calendar-timezones, thunderbird-locale-pa, xul-ext-lightning,
thunderbird-locale-cy, thunderbird-locale-pa-in, thunderbird-locale-ga,
thunderbird-locale-vi, thunderbird-locale-sv, thunderbird-locale-br,
thunderbird-locale-ro, thunderbird-locale-dsb, thunderbird-mozsymbols,
thunderbird-locale-fi, thunderbird-locale-uz, thunderbird-locale-hr,
thunderbird-locale-nn-no, thunderbird-locale-eu, thunderbird-locale-sk,
thunderbird-locale-nl, thunderbird-locale-sl, thunderbird-locale-id,
thunderbird-locale-lt, thunderbird-locale-sr, thunderbird-locale-pt-pt,
thunderbird-locale-el, thunderbird-locale-es-es, thunderbird-locale-zh-tw,
thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-pl
o USN-5880-1 : firefox-locale-xh, firefox-locale-ml, firefox-locale-gu,
firefox-locale-is, firefox-locale-gl, firefox-locale-th, firefox-dev,
firefox-locale-hr, firefox-locale-bg, firefox-locale-hsb,
firefox-locale-hi, firefox-locale-ku, firefox-locale-el, firefox-locale-or,
firefox-locale-mk, firefox-locale-hy, firefox-locale-af, firefox-locale-hu,
firefox-locale-pa, firefox-locale-ne, firefox-locale-uk, firefox-locale-ja,
firefox-locale-az, firefox-locale-an, firefox-locale-ko, firefox-locale-bn,
firefox-locale-tr, firefox-locale-kab, firefox-locale-lv,
firefox-locale-nso, firefox-locale-pl, firefox-locale-szl,
firefox-locale-zh-hans, firefox-geckodriver, firefox-locale-sq,
firefox-mozsymbols, firefox-locale-as, firefox-locale-fa,
firefox-locale-si, firefox-locale-sr, firefox-locale-br, firefox,
firefox-locale-de, firefox-locale-cs, firefox-locale-nb, firefox-locale-eo,
firefox-locale-kk, firefox-locale-he, firefox-locale-be, firefox-locale-my,
firefox-locale-cak, firefox-locale-ms, firefox-locale-zh-hant,
firefox-locale-sw, firefox-locale-oc, firefox-locale-zu, firefox-locale-da,
firefox-locale-sv, firefox-locale-ast, firefox-locale-es,
firefox-locale-nl, firefox-locale-ga, firefox-locale-it, firefox-locale-gn,
firefox-locale-fr, firefox-locale-te, firefox-locale-ca, firefox-locale-gd,
firefox-locale-kn, firefox-locale-ur, firefox-locale-ar, firefox-locale-lg,
firefox-locale-sk, firefox-locale-uz, firefox-locale-fi, firefox-locale-en,
firefox-locale-et, firefox-locale-ro, firefox-locale-bs, firefox-locale-fy,
firefox-locale-sl, firefox-locale-mn, firefox-locale-ia, firefox-locale-km,
firefox-locale-ta, firefox-locale-eu, firefox-locale-mai,
firefox-locale-csb, firefox-locale-pt, firefox-locale-mr,
firefox-locale-vi, firefox-locale-lt, firefox-locale-ru, firefox-locale-cy,
firefox-locale-ka, firefox-locale-nn, firefox-locale-id
o USN-5943-1 : thunderbird-locale-rm, thunderbird-locale-lv,
thunderbird-locale-th, thunderbird-locale-kab, thunderbird-locale-gd,
thunderbird-locale-bn, thunderbird-locale-ta, thunderbird-locale-zh-cn,
thunderbird-locale-en-us, thunderbird-locale-ko, thunderbird-locale-nn,
thunderbird-locale-es-ar, thunderbird-locale-is, thunderbird-locale-uk,
thunderbird-locale-kk, thunderbird-locale-zh-hant,
thunderbird-locale-bn-bd, thunderbird-locale-sq, thunderbird-gnome-support,
thunderbird-locale-ast, thunderbird-locale-cak, thunderbird-locale-bg,
thunderbird-locale-en-gb, thunderbird-locale-zh-hans,
thunderbird-locale-en, thunderbird-locale-ta-lk, thunderbird-locale-ar,
thunderbird-locale-fy-nl, thunderbird, thunderbird-locale-ru,
thunderbird-locale-hu, thunderbird-locale-de, thunderbird-locale-fr,
thunderbird-locale-mk, thunderbird-locale-ms, thunderbird-dev,
thunderbird-locale-ka, thunderbird-locale-sv-se, thunderbird-locale-pt,
thunderbird-locale-it, thunderbird-locale-da, thunderbird-locale-hy,
thunderbird-locale-he, thunderbird-locale-gl, thunderbird-locale-hsb,
thunderbird-locale-si, thunderbird-locale-tr, thunderbird-locale-af,
thunderbird-locale-ja, thunderbird-locale-be, xul-ext-gdata-provider,
thunderbird-locale-et, thunderbird-locale-cs, thunderbird-locale-ca,
thunderbird-locale-pt-br, thunderbird-locale-es, thunderbird-locale-nb,
thunderbird-locale-fa, thunderbird-locale-ga-ie,
xul-ext-calendar-timezones, thunderbird-locale-pa, xul-ext-lightning,
thunderbird-locale-cy, thunderbird-locale-pa-in, thunderbird-locale-ga,
thunderbird-locale-vi, thunderbird-locale-sv, thunderbird-locale-br,
thunderbird-locale-ro, thunderbird-locale-dsb, thunderbird-mozsymbols,
thunderbird-locale-fi, thunderbird-locale-uz, thunderbird-locale-hr,
thunderbird-locale-nn-no, thunderbird-locale-eu, thunderbird-locale-sk,
thunderbird-locale-nl, thunderbird-locale-sl, thunderbird-locale-id,
thunderbird-locale-lt, thunderbird-locale-sr, thunderbird-locale-pt-pt,
thunderbird-locale-el, thunderbird-locale-es-es, thunderbird-locale-zh-tw,
thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-pl
o USN-6074-1 : firefox-locale-xh, firefox-locale-ml, firefox-locale-gu,
firefox-locale-is, firefox-locale-gl, firefox-locale-th, firefox-dev,
firefox-locale-hr, firefox-locale-bg, firefox-locale-hsb,
firefox-locale-hi, firefox-locale-ku, firefox-locale-el, firefox-locale-or,
firefox-locale-mk, firefox-locale-hy, firefox-locale-af, firefox-locale-hu,
firefox-locale-pa, firefox-locale-ne, firefox-locale-uk, firefox-locale-ja,
firefox-locale-az, firefox-locale-an, firefox-locale-ko, firefox-locale-bn,
firefox-locale-tr, firefox-locale-kab, firefox-locale-lv,
firefox-locale-nso, firefox-locale-pl, firefox-locale-szl,
firefox-locale-tg, firefox-locale-zh-hans, firefox-geckodriver,
firefox-locale-sq, firefox-mozsymbols, firefox-locale-as,
firefox-locale-fa, firefox-locale-si, firefox-locale-sr, firefox-locale-br,
firefox, firefox-locale-de, firefox-locale-cs, firefox-locale-nb,
firefox-locale-eo, firefox-locale-kk, firefox-locale-he, firefox-locale-be,
firefox-locale-my, firefox-locale-cak, firefox-locale-ms,
firefox-locale-zh-hant, firefox-locale-sw, firefox-locale-oc,
firefox-locale-zu, firefox-locale-da, firefox-locale-sv,
firefox-locale-ast, firefox-locale-es, firefox-locale-nl,
firefox-locale-ga, firefox-locale-it, firefox-locale-gn, firefox-locale-fr,
firefox-locale-te, firefox-locale-ca, firefox-locale-gd, firefox-locale-kn,
firefox-locale-ur, firefox-locale-ar, firefox-locale-lg, firefox-locale-sk,
firefox-locale-uz, firefox-locale-fi, firefox-locale-en, firefox-locale-et,
firefox-locale-ro, firefox-locale-bs, firefox-locale-fy, firefox-locale-sl,
firefox-locale-mn, firefox-locale-ia, firefox-locale-km, firefox-locale-ta,
firefox-locale-eu, firefox-locale-mai, firefox-locale-csb,
firefox-locale-pt, firefox-locale-mr, firefox-locale-vi, firefox-locale-lt,
firefox-locale-ru, firefox-locale-cy, firefox-locale-ka, firefox-locale-nn,
firefox-locale-id
o USN-6075-1 : thunderbird-locale-rm, thunderbird-locale-lv,
thunderbird-locale-th, thunderbird-locale-kab, thunderbird-locale-gd,
thunderbird-locale-bn, thunderbird-locale-ta, thunderbird-locale-zh-cn,
thunderbird-locale-en-us, thunderbird-locale-ko, thunderbird-locale-nn,
thunderbird-locale-es-ar, thunderbird-locale-is, thunderbird-locale-uk,
thunderbird-locale-kk, thunderbird-locale-zh-hant,
thunderbird-locale-bn-bd, thunderbird-locale-sq, thunderbird-gnome-support,
thunderbird-locale-ast, thunderbird-locale-cak, thunderbird-locale-bg,
thunderbird-locale-en-gb, thunderbird-locale-zh-hans,
thunderbird-locale-en, thunderbird-locale-ta-lk, thunderbird-locale-ar,
thunderbird-locale-fy-nl, thunderbird, thunderbird-locale-ru,
thunderbird-locale-hu, thunderbird-locale-de, thunderbird-locale-fr,
thunderbird-locale-mk, thunderbird-locale-ms, thunderbird-dev,
thunderbird-locale-ka, thunderbird-locale-sv-se, thunderbird-locale-pt,
thunderbird-locale-it, thunderbird-locale-da, thunderbird-locale-hy,
thunderbird-locale-he, thunderbird-locale-gl, thunderbird-locale-hsb,
thunderbird-locale-si, thunderbird-locale-tr, thunderbird-locale-af,
thunderbird-locale-ja, thunderbird-locale-be, xul-ext-gdata-provider,
thunderbird-locale-et, thunderbird-locale-cs, thunderbird-locale-ca,
thunderbird-locale-pt-br, thunderbird-locale-es, thunderbird-locale-nb,
thunderbird-locale-fa, thunderbird-locale-ga-ie,
xul-ext-calendar-timezones, thunderbird-locale-pa, xul-ext-lightning,
thunderbird-locale-cy, thunderbird-locale-pa-in, thunderbird-locale-ga,
thunderbird-locale-vi, thunderbird-locale-sv, thunderbird-locale-br,
thunderbird-locale-ro, thunderbird-locale-dsb, thunderbird-mozsymbols,
thunderbird-locale-fi, thunderbird-locale-uz, thunderbird-locale-hr,
thunderbird-locale-nn-no, thunderbird-locale-eu, thunderbird-locale-sk,
thunderbird-locale-nl, thunderbird-locale-sl, thunderbird-locale-id,
thunderbird-locale-lt, thunderbird-locale-sr, thunderbird-locale-pt-pt,
thunderbird-locale-el, thunderbird-locale-es-es, thunderbird-locale-zh-tw,
thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-pl
o USN-5954-1 : firefox-locale-xh, firefox-locale-ml, firefox-locale-gu,
firefox-locale-is, firefox-locale-gl, firefox-locale-th, firefox-dev,
firefox-locale-hr, firefox-locale-bg, firefox-locale-hsb,
firefox-locale-hi, firefox-locale-ku, firefox-locale-el, firefox-locale-or,
firefox-locale-mk, firefox-locale-hy, firefox-locale-af, firefox-locale-hu,
firefox-locale-pa, firefox-locale-ne, firefox-locale-uk, firefox-locale-ja,
firefox-locale-az, firefox-locale-an, firefox-locale-ko, firefox-locale-bn,
firefox-locale-tr, firefox-locale-kab, firefox-locale-lv,
firefox-locale-nso, firefox-locale-pl, firefox-locale-szl,
firefox-locale-zh-hans, firefox-geckodriver, firefox-locale-sq,
firefox-mozsymbols, firefox-locale-as, firefox-locale-fa,
firefox-locale-si, firefox-locale-sr, firefox-locale-br, firefox,
firefox-locale-de, firefox-locale-cs, firefox-locale-nb, firefox-locale-eo,
firefox-locale-kk, firefox-locale-he, firefox-locale-be, firefox-locale-my,
firefox-locale-cak, firefox-locale-ms, firefox-locale-zh-hant,
firefox-locale-sw, firefox-locale-oc, firefox-locale-zu, firefox-locale-da,
firefox-locale-sv, firefox-locale-ast, firefox-locale-es,
firefox-locale-nl, firefox-locale-ga, firefox-locale-it, firefox-locale-gn,
firefox-locale-fr, firefox-locale-te, firefox-locale-ca, firefox-locale-gd,
firefox-locale-kn, firefox-locale-ur, firefox-locale-ar, firefox-locale-lg,
firefox-locale-sk, firefox-locale-uz, firefox-locale-fi, firefox-locale-en,
firefox-locale-et, firefox-locale-ro, firefox-locale-bs, firefox-locale-fy,
firefox-locale-sl, firefox-locale-mn, firefox-locale-ia, firefox-locale-km,
firefox-locale-ta, firefox-locale-eu, firefox-locale-mai,
firefox-locale-csb, firefox-locale-pt, firefox-locale-mr,
firefox-locale-vi, firefox-locale-lt, firefox-locale-ru, firefox-locale-cy,
firefox-locale-ka, firefox-locale-nn, firefox-locale-id
o USN-5972-1 : thunderbird-locale-rm, thunderbird-locale-lv,
thunderbird-locale-th, thunderbird-locale-kab, thunderbird-locale-gd,
thunderbird-locale-bn, thunderbird-locale-ta, thunderbird-locale-zh-cn,
thunderbird-locale-en-us, thunderbird-locale-ko, thunderbird-locale-nn,
thunderbird-locale-es-ar, thunderbird-locale-is, thunderbird-locale-uk,
thunderbird-locale-kk, thunderbird-locale-zh-hant,
thunderbird-locale-bn-bd, thunderbird-locale-sq, thunderbird-gnome-support,
thunderbird-locale-ast, thunderbird-locale-cak, thunderbird-locale-bg,
thunderbird-locale-en-gb, thunderbird-locale-zh-hans,
thunderbird-locale-en, thunderbird-locale-ta-lk, thunderbird-locale-ar,
thunderbird-locale-fy-nl, thunderbird, thunderbird-locale-ru,
thunderbird-locale-hu, thunderbird-locale-de, thunderbird-locale-fr,
thunderbird-locale-mk, thunderbird-locale-ms, thunderbird-dev,
thunderbird-locale-ka, thunderbird-locale-sv-se, thunderbird-locale-pt,
thunderbird-locale-it, thunderbird-locale-da, thunderbird-locale-hy,
thunderbird-locale-he, thunderbird-locale-gl, thunderbird-locale-hsb,
thunderbird-locale-si, thunderbird-locale-tr, thunderbird-locale-af,
thunderbird-locale-ja, thunderbird-locale-be, xul-ext-gdata-provider,
thunderbird-locale-et, thunderbird-locale-cs, thunderbird-locale-ca,
thunderbird-locale-pt-br, thunderbird-locale-es, thunderbird-locale-nb,
thunderbird-locale-fa, thunderbird-locale-ga-ie,
xul-ext-calendar-timezones, thunderbird-locale-pa, xul-ext-lightning,
thunderbird-locale-cy, thunderbird-locale-pa-in, thunderbird-locale-ga,
thunderbird-locale-vi, thunderbird-locale-sv, thunderbird-locale-br,
thunderbird-locale-ro, thunderbird-locale-dsb, thunderbird-mozsymbols,
thunderbird-locale-fi, thunderbird-locale-uz, thunderbird-locale-hr,
thunderbird-locale-nn-no, thunderbird-locale-eu, thunderbird-locale-sk,
thunderbird-locale-nl, thunderbird-locale-sl, thunderbird-locale-id,
thunderbird-locale-lt, thunderbird-locale-sr, thunderbird-locale-pt-pt,
thunderbird-locale-el, thunderbird-locale-es-es, thunderbird-locale-zh-tw,
thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-pl
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=6ecs
-----END PGP SIGNATURE-----
ESB-2023.3077 - [Ubuntu] Batik: CVSS (Max): 8.2
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3077
USN-6117-1: Apache Batik vulnerabilities
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Batik
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2022-42890 CVE-2022-41704 CVE-2022-40146
CVE-2022-38648 CVE-2022-38398 CVE-2020-11987
CVE-2019-17566
Original Bulletin:
https://ubuntu.com/security/notices/USN-6117-1
Comment: CVSS (Max): 8.2 CVE-2020-11987 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6117-1: Apache Batik vulnerabilities
30 May 2023
Several security issues were fixed in Apache Batik.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 22.10
o Ubuntu 22.04 LTS
o Ubuntu 20.04 LTS
o Ubuntu 18.04 ESM
o Ubuntu 16.04 ESM
o Ubuntu 14.04 ESM
Packages
o batik - SVG Library
Details
It was discovered that Apache Batik incorrectly handled certain inputs. An
attacker could possibly use this to perform a cross site request forgery
attack. ( CVE-2019-17566 , CVE-2020-11987 , CVE-2022-38398 , CVE-2022-38648 )
It was discovered that Apache Batik incorrectly handled Jar URLs in some
situations. A remote attacker could use this issue to access files on the
server. ( CVE-2022-40146 )
It was discovered that Apache Batik allowed running untrusted Java code from
an SVG. An attacker could use this issue to cause a denial of service,
or possibly execute arbitrary code. ( CVE-2022-41704 , CVE-2022-42890 )
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 22.10
o libbatik-java - 1.14-2ubuntu0.1
Ubuntu 22.04
o libbatik-java - 1.14-1ubuntu0.2
Ubuntu 20.04
o libbatik-java - 1.12-1ubuntu0.1
Ubuntu 18.04
o libbatik-java - 1.10-2~18.04.1
Ubuntu 16.04
o libbatik-java - 1.8-3ubuntu1+esm1
Available with Ubuntu Pro
Ubuntu 14.04
o libbatik-java - 1.7.ubuntu-8ubuntu2.14.04.3+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
o CVE-2022-40146
o CVE-2020-11987
o CVE-2022-41704
o CVE-2022-38648
o CVE-2022-38398
o CVE-2019-17566
o CVE-2022-42890
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=JNo4
-----END PGP SIGNATURE-----
ESB-2023.3076 - [Ubuntu] OpenSSL: CVSS (Max): 5.9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3076
USN-6119-1: OpenSSL vulnerabilities
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: OpenSSL
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2023-2650 CVE-2023-1255
Original Bulletin:
https://ubuntu.com/security/notices/USN-6119-1
Comment: CVSS (Max): 5.9 CVE-2023-1255 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS Source: [NVD], Red Hat
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6119-1: OpenSSL vulnerabilities
30 May 2023
Several security issues were fixed in OpenSSL.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 23.04
o Ubuntu 22.10
o Ubuntu 22.04 LTS
o Ubuntu 20.04 LTS
o Ubuntu 18.04 ESM
Packages
o openssl - Secure Socket Layer (SSL) cryptographic library and tools
o openssl1.0 - Secure Socket Layer (SSL) cryptographic library and tools
Details
Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1
object identifiers. A remote attacker could possibly use this issue to
cause OpenSSL to consume resources, resulting in a denial of service.
( CVE-2023-2650 )
Anton Romanov discovered that OpenSSL incorrectly handled AES-XTS cipher
decryption on 64-bit ARM platforms. An attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04.
( CVE-2023-1255 )
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 23.04
o libssl3 - 3.0.8-1ubuntu1.2
Ubuntu 22.10
o libssl3 - 3.0.5-2ubuntu2.3
Ubuntu 22.04
o libssl3 - 3.0.2-0ubuntu1.10
Ubuntu 20.04
o libssl1.1 - 1.1.1f-1ubuntu2.19
Ubuntu 18.04
o libssl1.0.0 - 1.0.2n-1ubuntu5.13
o libssl1.1 - 1.1.1-1ubuntu2.1~18.04.23
After a standard system update you need to reboot your computer to make all
the necessary changes.
References
o CVE-2023-1255
o CVE-2023-2650
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=iWKy
-----END PGP SIGNATURE-----
ESB-2023.3075 - [Ubuntu] Linux kernel (Oracle): CVSS (Max): 7.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3075
USN-6118-1: Linux kernel (Oracle) vulnerabilities
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Linux kernel (Oracle)
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2023-32269 CVE-2023-2162 CVE-2023-1513
CVE-2023-1118 CVE-2023-1078 CVE-2023-1075
CVE-2023-0459 CVE-2022-3707
Original Bulletin:
https://ubuntu.com/security/notices/USN-6118-1
Comment: CVSS (Max): 7.8 CVE-2023-1118 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: [NVD], SUSE
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6118-1: Linux kernel (Oracle) vulnerabilities
30 May 2023
Several security issues were fixed in the Linux kernel.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 20.04 LTS
o Ubuntu 18.04 ESM
Packages
o linux-oracle - Linux kernel for Oracle Cloud systems
o linux-oracle-5.4 - Linux kernel for Oracle Cloud systems
Details
Zheng Wang discovered that the Intel i915 graphics driver in the Linux
kernel did not properly handle certain error conditions, leading to a
double-free. A local attacker could possibly use this to cause a denial of
service (system crash). ( CVE-2022-3707 )
Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did
not properly implement speculative execution barriers in usercopy functions
in certain situations. A local attacker could use this to expose sensitive
information (kernel memory). ( CVE-2023-0459 )
It was discovered that the TLS subsystem in the Linux kernel contained a
type confusion vulnerability in some situations. A local attacker could use
this to cause a denial of service (system crash) or possibly expose
sensitive information. ( CVE-2023-1075 )
It was discovered that the Reliable Datagram Sockets (RDS) protocol
implementation in the Linux kernel contained a type confusion vulnerability
in some situations. An attacker could use this to cause a denial of service
(system crash). ( CVE-2023-1078 )
Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel
did not properly initialize some data structures. A local attacker could
use this to expose sensitive information (kernel memory). ( CVE-2023-1513 )
It was discovered that a use-after-free vulnerability existed in the iSCSI
TCP implementation in the Linux kernel. A local attacker could possibly use
this to cause a denial of service (system crash). ( CVE-2023-2162 )
It was discovered that the NET/ROM protocol implementation in the Linux
kernel contained a race condition in some situations, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
( CVE-2023-32269 )
Duoming Zhou discovered that a race condition existed in the infrared
receiver/transceiver driver in the Linux kernel, leading to a use-after-
free vulnerability. A privileged attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
( CVE-2023-1118 )
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 20.04
o linux-image-5.4.0-1101-oracle - 5.4.0-1101.110
o linux-image-oracle-lts-20.04 - 5.4.0.1101.94
Ubuntu 18.04
o linux-image-oracle - 5.4.0.1101.110~18.04.73
o linux-image-5.4.0-1101-oracle - 5.4.0-1101.110~18.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
o CVE-2023-1118
o CVE-2023-1075
o CVE-2023-0459
o CVE-2022-3707
o CVE-2023-1078
o CVE-2023-2162
o CVE-2023-32269
o CVE-2023-1513
Related notices
o USN-6001-1 : linux-aws-headers-4.4.0-1155, linux-headers-aws,
linux-buildinfo-4.4.0-1155-aws, linux-aws-cloud-tools-4.4.0-1155,
linux-headers-4.4.0-1155-aws, linux-modules-4.4.0-1155-aws,
linux-image-4.4.0-1155-aws, linux-image-aws, linux-modules-extra-aws,
linux-tools-4.4.0-1155-aws, linux-aws-tools-4.4.0-1155, linux-tools-aws,
linux-modules-extra-4.4.0-1155-aws, linux-aws,
linux-cloud-tools-4.4.0-1155-aws
o USN-6013-1 : linux-cloud-tools-4.4.0-1117-aws, linux-headers-aws,
linux-modules-4.4.0-1117-aws, linux-aws-tools-4.4.0-1117,
linux-image-4.4.0-1117-aws, linux-image-aws, linux-tools-aws,
linux-headers-4.4.0-1117-aws, linux-tools-4.4.0-1117-aws, linux-aws,
linux-aws-headers-4.4.0-1117, linux-aws-cloud-tools-4.4.0-1117,
linux-buildinfo-4.4.0-1117-aws
o USN-6014-1 : linux-headers-virtual-lts-vivid, linux-virtual-lts-wily,
linux-buildinfo-4.4.0-239-generic, linux-image-unsigned-4.4.0-239-generic,
linux-tools-generic, linux-modules-extra-4.4.0-239-generic,
linux-headers-lowlatency-lts-vivid, linux-image-lowlatency-lts-utopic,
linux-modules-4.4.0-1118-kvm, linux-signed-image-generic,
linux-cloud-tools-virtual-lts-xenial,
linux-cloud-tools-lowlatency-lts-xenial,
linux-cloud-tools-4.4.0-239-lowlatency, linux-virtual-lts-utopic,
linux-tools-kvm, linux-signed-generic-lts-utopic,
linux-tools-virtual-lts-vivid, linux-cloud-tools-lowlatency-lts-vivid,
linux-tools-4.4.0-1118-kvm, linux-tools-virtual-lts-utopic,
linux-image-extra-virtual, linux-cloud-tools-virtual-lts-wily,
linux-headers-4.4.0-239-lowlatency, linux-image-lowlatency,
linux-lowlatency, linux-generic, linux-crashdump,
linux-signed-generic-lts-xenial, linux-image-lowlatency-lts-xenial,
linux-signed-image-generic-lts-utopic,
linux-image-extra-virtual-lts-xenial, linux-doc, linux-signed-lowlatency,
linux-headers-4.4.0-239, linux-tools-4.4.0-239,
linux-tools-generic-lts-utopic, linux-image-virtual,
linux-headers-virtual-lts-xenial, linux-tools-generic-lts-wily,
linux-image-virtual-lts-wily, linux-cloud-tools-virtual-lts-utopic,
linux-image-virtual-lts-xenial, linux-headers-virtual,
linux-headers-generic-lts-wily, linux-signed-generic-lts-wily,
linux-headers-lowlatency-lts-utopic,
linux-cloud-tools-lowlatency-lts-utopic, linux-tools-lowlatency,
linux-modules-4.4.0-239-lowlatency, linux-headers-generic-lts-utopic,
linux-headers-virtual-lts-utopic, linux-image-4.4.0-239-lowlatency,
linux-tools-lowlatency-lts-utopic, linux-headers-generic-lts-vivid,
linux-tools-common, linux-cloud-tools-4.4.0-239-generic,
linux-signed-image-lowlatency-lts-wily, linux-modules-4.4.0-239-generic,
linux-headers-lowlatency-lts-xenial, linux-virtual-lts-vivid,
linux-lowlatency-lts-xenial, linux-headers-generic,
linux-headers-virtual-lts-wily, linux-image-hwe-generic-trusty,
linux-lowlatency-lts-vivid, linux-buildinfo-4.4.0-239-lowlatency,
linux-headers-4.4.0-1118-kvm, linux-image-4.4.0-1118-kvm,
linux-cloud-tools-generic-lts-xenial,
linux-lts-xenial-cloud-tools-4.4.0-239, linux-cloud-tools-common,
linux-signed-image-lowlatency-lts-xenial, linux-tools-virtual-lts-xenial,
linux-signed-generic, linux-image-hwe-virtual-trusty,
linux-image-virtual-lts-utopic, linux-kvm-headers-4.4.0-1118, linux-source,
linux-cloud-tools-generic-lts-wily, linux-image-generic-lts-xenial,
linux-virtual-lts-xenial, linux-image-generic-lts-wily,
linux-cloud-tools-lowlatency-lts-wily, linux-hwe-generic-trusty,
linux-virtual, linux-cloud-tools-generic-lts-utopic,
linux-cloud-tools-virtual, linux-cloud-tools-virtual-lts-vivid,
linux-generic-lts-vivid, linux-tools-lts-utopic,
linux-headers-lowlatency-lts-wily, linux-cloud-tools-4.4.0-1118-kvm,
linux-headers-4.4.0-239-generic, linux-signed-image-generic-lts-xenial,
linux-image-extra-virtual-lts-wily, linux-cloud-tools-generic,
linux-image-virtual-lts-vivid, linux-image-4.4.0-239-generic,
linux-buildinfo-4.4.0-1118-kvm, linux-kvm-tools-4.4.0-1118,
linux-tools-4.4.0-239-lowlatency, linux-image-generic-lts-vivid,
linux-signed-generic-lts-vivid, linux-tools-lowlatency-lts-xenial,
linux-cloud-tools-4.4.0-239, linux-signed-image-lowlatency,
linux-cloud-tools-lowlatency, linux-tools-virtual,
linux-generic-lts-xenial, linux-image-extra-virtual-lts-utopic,
linux-image-generic, linux-cloud-tools-generic-lts-vivid, linux,
linux-tools-generic-lts-xenial, linux-kvm-cloud-tools-4.4.0-1118,
linux-headers-generic-lts-xenial, linux-generic-lts-utopic,
linux-signed-lowlatency-lts-xenial, linux-libc-dev, linux-headers-kvm,
linux-headers-lowlatency, linux-signed-lowlatency-lts-wily,
linux-generic-lts-wily, linux-image-lowlatency-lts-vivid, linux-tools-host,
linux-image-extra-virtual-lts-vivid, linux-image-generic-lts-utopic,
linux-lts-xenial-tools-4.4.0-239, linux-image-lowlatency-lts-wily,
linux-image-kvm, linux-lowlatency-lts-utopic, linux-source-4.4.0,
linux-lowlatency-lts-wily, linux-signed-image-generic-lts-wily,
linux-tools-lowlatency-lts-vivid, linux-tools-virtual-lts-wily,
linux-signed-image-generic-lts-vivid, linux-tools-generic-lts-vivid,
linux-lts-xenial, linux-tools-4.4.0-239-generic,
linux-tools-lowlatency-lts-wily, linux-image-unsigned-4.4.0-239-lowlatency,
linux-hwe-virtual-trusty, linux-kvm
o USN-6031-1 : linux-modules-ipu6-oem-22.04, linux-headers-oem-22.04a,
linux-modules-ivsc-oem-22.04a, linux-image-unsigned-5.17.0-1030-oem,
linux-modules-ipu6-oem-22.04a, linux-image-oem-22.04,
linux-modules-ipu6-5.17.0-1030-oem, linux-oem-22.04,
linux-modules-iwlwifi-5.17.0-1030-oem, linux-headers-5.17.0-1030-oem,
linux-image-5.17.0-1030-oem, linux-image-oem-22.04a,
linux-tools-5.17.0-1030-oem, linux-tools-oem-22.04, linux-oem-5.17,
linux-oem-5.17-tools-host, linux-tools-oem-22.04a,
linux-buildinfo-5.17.0-1030-oem, linux-modules-5.17.0-1030-oem,
linux-modules-iwlwifi-oem-22.04a, linux-oem-5.17-tools-5.17.0-1030,
linux-headers-oem-22.04, linux-oem-22.04a, linux-modules-ivsc-oem-22.04,
linux-modules-iwlwifi-oem-22.04, linux-oem-5.17-headers-5.17.0-1030,
linux-modules-ivsc-5.17.0-1030-oem
o USN-6032-1 : linux-oem-6.0, linux-headers-6.0.0-1014-oem,
linux-modules-iwlwifi-oem-22.04b, linux-headers-oem-22.04b,
linux-oem-6.0-tools-host, linux-oem-6.0-tools-6.0.0-1014,
linux-modules-ivsc-6.0.0-1014-oem, linux-modules-ivsc-oem-22.04b,
linux-modules-iwlwifi-6.0.0-1014-oem, linux-tools-6.0.0-1014-oem,
linux-modules-ipu6-oem-22.04b, linux-image-unsigned-6.0.0-1014-oem,
linux-modules-6.0.0-1014-oem, linux-oem-6.0-headers-6.0.0-1014,
linux-image-oem-22.04b, linux-modules-ipu6-6.0.0-1014-oem,
linux-buildinfo-6.0.0-1014-oem, linux-oem-22.04b,
linux-image-6.0.0-1014-oem, linux-tools-oem-22.04b
o USN-6033-1 : linux-oem-6.1-tools-6.1.0-1009,
linux-buildinfo-6.1.0-1009-oem, linux-headers-6.1.0-1009-oem,
linux-image-unsigned-6.1.0-1009-oem, linux-oem-6.1-headers-6.1.0-1009,
linux-headers-oem-22.04c, linux-tools-oem-22.04c, linux-oem-6.1-tools-host,
linux-image-oem-22.04c, linux-oem-6.1, linux-modules-6.1.0-1009-oem,
linux-modules-ivsc-6.1.0-1009-oem, linux-modules-ivsc-oem-22.04c,
linux-tools-6.1.0-1009-oem, linux-modules-ipu6-6.1.0-1009-oem,
linux-modules-ipu6-oem-22.04c, linux-image-6.1.0-1009-oem, linux-oem-22.04c
o USN-6079-1 : linux-headers-5.19.0-42-generic,
linux-modules-ivsc-5.19.0-42-generic,
linux-cloud-tools-virtual-hwe-22.04-edge,
linux-modules-ipu6-5.19.0-42-generic,
linux-image-unsigned-5.19.0-1024-lowlatency-64k,
linux-generic-lpae-hwe-22.04-edge, linux-tools-raspi-nolpae,
linux-tools-generic, linux-modules-ivsc-generic,
linux-headers-lowlatency-64k-hwe-20.04-edge,
linux-image-unsigned-5.19.0-1026-azure,
linux-image-lowlatency-64k-hwe-22.04-edge, linux-modules-5.19.0-42-generic,
linux-aws, linux-cloud-tools-5.19.0-1025-aws,
linux-cloud-tools-generic-hwe-22.04,
linux-tools-5.19.0-1024-lowlatency-64k, linux-tools-kvm,
linux-azure-5.19-tools-5.19.0-1026, linux-modules-extra-5.19.0-1026-azure,
linux-tools-lowlatency-64k-hwe-22.04, linux-lowlatency-hwe-20.04-edge,
linux-tools-lowlatency-64k-hwe-20.04,
linux-image-lowlatency-hwe-20.04-edge, linux-headers-5.19.0-1025-aws,
linux-kvm-headers-5.19.0-1023, linux-azure-tools-5.19.0-1026,
linux-image-extra-virtual, linux-cloud-tools-azure-edge,
linux-image-virtual-hwe-22.04, linux-lowlatency-hwe-20.04,
linux-lowlatency, linux-buildinfo-5.19.0-1018-raspi,
linux-image-lowlatency, linux-tools-oem-22.04,
linux-modules-ipu6-generic-hwe-22.04, linux-headers-aws, linux-generic,
linux-tools-5.19.0-1018-raspi-nolpae,
linux-modules-extra-5.19.0-1018-raspi, linux-crashdump,
linux-modules-extra-aws, linux-tools-azure-edge,
linux-modules-5.19.0-1018-raspi-nolpae, linux-tools-aws,
linux-cloud-tools-azure, linux-modules-ipu6-5.19.0-1024-lowlatency,
linux-modules-5.19.0-42-generic-64k, linux-aws-headers-5.19.0-1025,
linux-modules-5.19.0-1018-raspi, linux-tools-generic-lpae-hwe-22.04-edge,
linux-image-lowlatency-64k, linux-tools-lowlatency-64k-hwe-22.04-edge,
linux-kvm-tools-5.19.0-1023, linux-cloud-tools-5.19.0-1024-lowlatency,
linux-headers-raspi, linux-doc, linux-image-5.19.0-1018-raspi,
linux-image-generic-64k-hwe-22.04, linux-modules-ipu6-generic,
linux-headers-generic-hwe-22.04-edge,
linux-modules-iwlwifi-5.19.0-42-generic,
linux-image-extra-virtual-hwe-22.04, linux-headers-azure-edge,
linux-buildinfo-5.19.0-1024-lowlatency, linux-image-virtual,
linux-headers-5.19.0-42-generic-64k, linux-image-5.19.0-1026-azure,
linux-lowlatency-hwe-22.04-edge, linux-image-lowlatency-hwe-22.04-edge,
linux-tools-5.19.0-1023-kvm, linux-tools-generic-lpae-hwe-22.04,
linux-image-5.19.0-1024-lowlatency, linux-tools-lowlatency-64k,
linux-oem-22.04, linux-image-generic-lpae,
linux-tools-5.19.0-1024-lowlatency, linux-generic-hwe-22.04-edge,
linux-buildinfo-5.19.0-1018-raspi-nolpae,
linux-modules-5.19.0-1024-lowlatency, linux-aws-tools-5.19.0-1025,
linux-buildinfo-5.19.0-1023-kvm, linux-modules-ivsc-5.19.0-1024-lowlatency,
linux-headers-5.19.0-1018-raspi, linux-lowlatency-cloud-tools-5.19.0-1024,
linux-lowlatency-cloud-tools-common, linux-headers-virtual,
linux-headers-lowlatency-64k-hwe-20.04,
linux-cloud-tools-lowlatency-hwe-20.04-edge,
linux-image-virtual-hwe-22.04-edge, linux-tools-5.19.0-42,
linux-tools-lowlatency-hwe-20.04, linux-buildinfo-5.19.0-42-generic-lpae,
linux-headers-5.19.0-42-generic-lpae,
linux-image-5.19.0-1024-lowlatency-64k, linux-tools-lowlatency,
linux-tools-virtual-hwe-22.04-edge, linux-modules-5.19.0-1023-kvm,
linux-tools-generic-64k-hwe-22.04, linux-cloud-tools-lowlatency-hwe-20.04,
linux-image-generic-lpae-hwe-22.04, linux-image-unsigned-5.19.0-42-generic,
linux-image-lowlatency-hwe-22.04,
linux-modules-extra-5.19.0-1018-raspi-nolpae, linux-tools-common,
linux-headers-generic-64k-hwe-22.04, linux-modules-extra-raspi,
linux-tools-5.19.0-1025-aws, linux-tools-5.19.0-42-generic-64k,
linux-buildinfo-5.19.0-1025-aws, linux-generic-hwe-22.04,
linux-modules-extra-5.19.0-42-generic, linux-modules-extra-azure,
linux-modules-5.19.0-42-generic-lpae, linux-raspi,
linux-image-lowlatency-64k-hwe-20.04,
linux-headers-5.19.0-1018-raspi-nolpae, linux-headers-5.19.0-1023-kvm,
linux-headers-generic, linux-cloud-tools-generic-hwe-22.04-edge,
linux-headers-generic-lpae-hwe-22.04, linux-headers-lowlatency-hwe-22.04,
linux-azure-edge, linux-image-unsigned-5.19.0-1024-lowlatency,
linux-image-azure-edge, linux-cloud-tools-5.19.0-1026-azure,
linux-headers-azure, linux-headers-generic-hwe-22.04,
linux-tools-generic-64k, linux-image-5.19.0-42-generic-64k,
linux-azure-5.19-headers-5.19.0-1026, linux-cloud-tools-common,
linux-headers-generic-lpae-hwe-22.04-edge, linux-modules-extra-azure-edge,
linux-modules-5.19.0-1026-azure, linux-cloud-tools-5.19.0-42,
linux-image-5.19.0-1023-kvm, linux-virtual-hwe-22.04,
linux-cloud-tools-lowlatency-hwe-22.04-edge, linux-virtual-hwe-22.04-edge,
linux-source, linux-lowlatency-tools-host, linux-tools-5.19.0-1026-azure,
linux-image-extra-virtual-hwe-22.04-edge, linux-lowlatency-tools-common,
linux-tools-generic-hwe-22.04-edge, linux-image-unsigned-5.19.0-1023-kvm,
linux-image-raspi, linux-modules-extra-5.19.0-1025-aws,
linux-tools-generic-64k-hwe-22.04-edge,
linux-image-lowlatency-64k-hwe-20.04-edge, linux-virtual,
linux-cloud-tools-virtual, linux-raspi-tools-5.19.0-1018,
linux-modules-ipu6-generic-hwe-22.04-edge,
linux-modules-ivsc-generic-hwe-22.04,
linux-image-generic-lpae-hwe-22.04-edge, linux-headers-virtual-hwe-22.04,
linux-buildinfo-5.19.0-42-generic-64k, linux-headers-generic-lpae,
linux-image-generic-hwe-22.04-edge, linux-image-aws,
linux-modules-extra-raspi-nolpae, linux-headers-lowlatency-hwe-22.04-edge,
linux-modules-iwlwifi-generic, linux-lowlatency-64k-hwe-22.04,
linux-tools-5.19.0-42-generic, linux-modules-iwlwifi-generic-hwe-22.04,
linux-image-azure, linux-generic-lpae, linux-headers-5.19.0-42,
linux-headers-oem-22.04, linux-cloud-tools-generic,
linux-lowlatency-64k-hwe-20.04-edge, linux-headers-virtual-hwe-22.04-edge,
linux-tools-azure, linux-cloud-tools-5.19.0-42-generic,
linux-modules-5.19.0-1025-aws, linux-modules-ivsc-generic-hwe-22.04-edge,
linux-raspi-nolpae, linux-tools-generic-hwe-22.04,
linux-buildinfo-5.19.0-1026-azure, linux-azure,
linux-image-5.19.0-42-generic, linux-headers-lowlatency-64k-hwe-22.04,
linux-headers-lowlatency-64k, linux-generic-lpae-hwe-22.04,
linux-image-generic-64k, linux-cloud-tools-lowlatency,
linux-azure-cloud-tools-5.19.0-1026, linux-lowlatency-hwe-22.04,
linux-cloud-tools-lowlatency-hwe-22.04, linux-image-lowlatency-hwe-20.04,
linux-buildinfo-5.19.0-42-generic, linux-image-5.19.0-1018-raspi-nolpae,
linux-tools-lowlatency-64k-hwe-20.04-edge, linux-tools-virtual,
linux-image-unsigned-5.19.0-1025-aws, linux-tools-virtual-hwe-22.04,
linux-lowlatency-64k-hwe-20.04, linux-tools-5.19.0-42-generic-lpae,
linux-image-oem-22.04, linux-image-generic, linux,
linux-azure-5.19-cloud-tools-5.19.0-1026, linux-source-5.19.0,
linux-tools-lowlatency-hwe-20.04-edge,
linux-headers-5.19.0-1024-lowlatency, linux-tools-generic-lpae,
linux-image-lowlatency-64k-hwe-22.04, linux-image-5.19.0-1025-aws,
linux-lowlatency-headers-5.19.0-1024, linux-image-raspi-nolpae,
linux-generic-64k, linux-headers-generic-64k-hwe-22.04-edge,
linux-headers-5.19.0-1024-lowlatency-64k, linux-azure-5.19,
linux-raspi-headers-5.19.0-1018, linux-libc-dev,
linux-generic-64k-hwe-22.04, linux-cloud-tools-virtual-hwe-22.04,
linux-headers-kvm, linux-image-unsigned-5.19.0-42-generic-64k,
linux-headers-lowlatency, linux-azure-headers-5.19.0-1026,
linux-headers-raspi-nolpae, linux-image-generic-64k-hwe-22.04-edge,
linux-modules-iwlwifi-5.19.0-1024-lowlatency,
linux-tools-lowlatency-hwe-22.04-edge, linux-tools-host,
linux-image-generic-hwe-22.04, linux-image-5.19.0-42-generic-lpae,
linux-buildinfo-5.19.0-1024-lowlatency-64k,
linux-headers-lowlatency-hwe-20.04-edge, linux-image-kvm,
linux-lowlatency-tools-5.19.0-1024, linux-tools-raspi,
linux-aws-cloud-tools-5.19.0-1025, linux-tools-lowlatency-hwe-22.04,
linux-headers-lowlatency-64k-hwe-22.04-edge,
linux-headers-5.19.0-1026-azure, linux-headers-lowlatency-hwe-20.04,
linux-lowlatency-64k, linux-lowlatency-64k-hwe-22.04-edge,
linux-modules-iwlwifi-generic-hwe-22.04-edge,
linux-tools-5.19.0-1018-raspi, linux-modules-5.19.0-1024-lowlatency-64k,
linux-headers-generic-64k, linux-generic-64k-hwe-22.04-edge, linux-kvm
o USN-6080-1 : linux-image-ibm, linux-headers-aws-edge,
linux-generic-lpae-hwe-20.04, linux-headers-5.15.0-1036-aws,
linux-tools-generic, linux-cloud-tools-5.15.0-72-generic,
linux-headers-lowlatency-64k-hwe-20.04-edge,
linux-image-unsigned-5.15.0-1036-aws, linux-modules-5.15.0-1036-aws,
linux-headers-azure-cvm, linux-headers-oracle, linux-aws,
linux-modules-5.15.0-72-generic, linux-tools-generic-hwe-20.04,
linux-tools-generic-lpae-hwe-20.04,
linux-buildinfo-5.15.0-72-lowlatency-64k,
linux-cloud-tools-virtual-hwe-20.04-edge, linux-tools-kvm,
linux-generic-lpae-hwe-20.04-edge, linux-lowlatency-hwe-5.15,
linux-modules-extra-5.15.0-1035-oracle, linux-image-oem-20.04d,
linux-ibm-tools-common, linux-oracle-tools-5.15.0-1035,
linux-tools-virtual-hwe-20.04-edge, linux-lowlatency-hwe-20.04-edge,
linux-tools-lowlatency-64k-hwe-20.04,
linux-image-lowlatency-hwe-20.04-edge, linux-image-oem-20.04c,
linux-image-generic-lpae-hwe-20.04, linux-hwe-5.15-headers-5.15.0-72,
linux-image-extra-virtual, linux-cloud-tools-azure-edge,
linux-image-generic-lpae-hwe-20.04-edge,
linux-image-extra-virtual-hwe-20.04-edge,
linux-image-virtual-hwe-20.04-edge, linux-lowlatency-headers-5.15.0-72,
linux-lowlatency, linux-image-lowlatency, linux-lowlatency-hwe-20.04,
linux-kvm-tools-5.15.0-1033, linux-headers-aws, linux-generic,
linux-crashdump, linux-modules-extra-aws,
linux-image-unsigned-5.15.0-1035-oracle, linux-tools-aws,
linux-tools-azure-edge, linux-oem-20.04b,
linux-azure-cloud-tools-5.15.0-1038, linux-aws-tools-5.15.0-1036,
linux-cloud-tools-azure, linux-modules-5.15.0-72-lowlatency-64k,
linux-tools-5.15.0-72, linux-aws-lts-22.04,
linux-headers-generic-lpae-hwe-20.04-edge,
linux-cloud-tools-virtual-hwe-20.04, linux-image-lowlatency-64k, linux-ibm,
linux-tools-aws-edge, linux-tools-azure-cvm,
linux-image-generic-64k-hwe-20.04-edge,
linux-aws-5.15-cloud-tools-5.15.0-1036, linux-doc,
linux-image-azure-fde-edge, linux-tools-generic-hwe-20.04-edge,
linux-headers-generic-64k-hwe-20.04-edge, linux-headers-5.15.0-1030-ibm,
linux-modules-iwlwifi-5.15.0-72-lowlatency, linux-modules-5.15.0-1033-kvm,
linux-tools-5.15.0-1038-azure, linux-headers-azure-edge,
linux-headers-generic-lpae-hwe-20.04, linux-tools-oem-20.04,
linux-cloud-tools-5.15.0-72, linux-tools-generic-lpae-hwe-20.04-edge,
linux-image-virtual, linux-headers-generic-hwe-20.04, linux-oracle,
linux-cloud-tools-azure-fde, linux-headers-5.15.0-72-generic-64k,
linux-image-5.15.0-72-generic, linux-aws-edge, linux-headers-aws-lts-22.04,
linux-ibm-cloud-tools-common, linux-ibm-tools-5.15.0-1030,
linux-modules-extra-5.15.0-1030-ibm,
linux-modules-iwlwifi-generic-hwe-20.04, linux-oem-20.04c,
linux-tools-lowlatency-64k, linux-tools-5.15.0-72-generic-64k,
linux-lowlatency-hwe-5.15-tools-5.15.0-72,
linux-hwe-5.15-cloud-tools-common, linux-image-5.15.0-1038-azure-fde,
linux-image-generic-lpae, linux-modules-extra-azure-fde-edge,
linux-headers-generic-64k-hwe-20.04, linux-tools-oem-20.04d,
linux-azure-5.15-headers-5.15.0-1038, linux-lowlatency-cloud-tools-common,
linux-tools-generic-64k-hwe-20.04, linux-headers-virtual,
linux-buildinfo-5.15.0-1035-oracle, linux-headers-lowlatency-64k-hwe-20.04,
linux-headers-5.15.0-72-generic,
linux-cloud-tools-lowlatency-hwe-20.04-edge,
linux-tools-lowlatency-hwe-20.04, linux-cloud-tools-generic-hwe-20.04-edge,
linux-modules-extra-5.15.0-72-generic, linux-modules-extra-azure-cvm,
linux-virtual-hwe-20.04-edge, linux-modules-5.15.0-72-generic-64k,
linux-image-virtual-hwe-20.04, linux-image-5.15.0-1036-aws,
linux-tools-lowlatency, linux-headers-virtual-hwe-20.04-edge,
linux-tools-5.15.0-72-lowlatency-64k, linux-azure-fde-5.15,
linux-cloud-tools-lowlatency-hwe-20.04, linux-headers-5.15.0-1038-azure,
linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-72, linux-image-oem-20.04,
linux-hwe-5.15-tools-5.15.0-72, linux-aws-cloud-tools-5.15.0-1036,
linux-image-5.15.0-1033-kvm, linux-lowlatency-cloud-tools-5.15.0-72,
linux-tools-common, linux-buildinfo-5.15.0-72-generic-lpae,
linux-azure-fde-edge, linux-image-unsigned-5.15.0-72-lowlatency,
linux-image-unsigned-5.15.0-72-generic, linux-tools-5.15.0-72-generic-lpae,
linux-headers-oem-20.04b, linux-azure-lts-22.04,
linux-modules-extra-5.15.0-1036-aws, linux-modules-extra-azure,
linux-hwe-5.15-source-5.15.0, linux-lowlatency-hwe-5.15-tools-host,
linux-oem-20.04, linux-image-oracle, linux-image-lowlatency-64k-hwe-20.04,
linux-oem-20.04d, linux-headers-5.15.0-72-generic-lpae,
linux-image-5.15.0-72-lowlatency, linux-image-extra-virtual-hwe-20.04,
linux-kvm-headers-5.15.0-1033, linux-headers-generic,
linux-tools-5.15.0-1036-aws, linux-tools-azure-fde-edge,
linux-generic-hwe-20.04, linux-azure-edge, linux-azure-cvm,
linux-hwe-5.15-tools-host, linux-image-azure-edge,
linux-modules-iwlwifi-5.15.0-72-generic,
linux-lowlatency-hwe-5.15-headers-5.15.0-72, linux-image-oem-20.04b,
linux-tools-5.15.0-72-lowlatency, linux-headers-azure,
linux-tools-generic-64k, linux-cloud-tools-generic-hwe-20.04,
linux-ibm-headers-5.15.0-1030, linux-image-aws-lts-22.04,
linux-cloud-tools-common, linux-image-5.15.0-1038-azure,
linux-modules-iwlwifi-oem-20.04, linux-modules-extra-azure-edge,
linux-virtual-hwe-20.04, linux-hwe-5.15-tools-common,
linux-image-5.15.0-1035-oracle, linux-tools-azure-lts-22.04, linux-source,
linux-lowlatency-tools-host, linux-hwe-5.15, linux-tools-virtual-hwe-20.04,
linux-modules-5.15.0-1030-ibm, linux-lowlatency-tools-common,
linux-modules-5.15.0-72-generic-lpae, linux-headers-azure-fde-edge,
linux-tools-oem-20.04c, linux-headers-5.15.0-1033-kvm,
linux-aws-5.15-headers-5.15.0-1036, linux-aws-5.15,
linux-image-lowlatency-64k-hwe-20.04-edge, linux-virtual,
linux-cloud-tools-virtual, linux-headers-5.15.0-72-lowlatency-64k,
linux-modules-extra-azure-fde, linux-headers-5.15.0-1035-oracle,
linux-buildinfo-5.15.0-72-generic-64k, linux-cloud-tools-azure-fde-edge,
linux-modules-extra-azure-lts-22.04, linux-azure-5.15-tools-5.15.0-1038,
linux-tools-oem-20.04b, linux-headers-5.15.0-72,
linux-image-unsigned-5.15.0-1038-azure-fde, linux-modules-iwlwifi-generic,
linux-headers-azure-fde, linux-headers-generic-lpae, linux-image-aws,
linux-modules-5.15.0-1038-azure, linux-tools-5.15.0-1033-kvm,
linux-lowlatency-tools-5.15.0-72, linux-image-azure,
linux-buildinfo-5.15.0-1033-kvm, linux-generic-lpae,
linux-headers-5.15.0-72-lowlatency, linux-modules-extra-aws-edge,
linux-cloud-tools-generic, linux-lowlatency-64k-hwe-20.04-edge,
linux-tools-azure, linux-azure-5.15-cloud-tools-5.15.0-1038,
linux-buildinfo-5.15.0-1038-azure, linux-headers-generic-hwe-20.04-edge,
linux-image-azure-fde, linux-image-unsigned-5.15.0-1030-ibm,
linux-tools-5.15.0-72-generic, linux-oracle-headers-5.15.0-1035,
linux-azure, linux-hwe-5.15-cloud-tools-5.15.0-72,
linux-image-5.15.0-72-generic-lpae, linux-headers-lowlatency-64k,
linux-image-unsigned-5.15.0-1033-kvm, linux-image-generic-64k,
linux-image-unsigned-5.15.0-72-lowlatency-64k,
linux-lowlatency-hwe-5.15-cloud-tools-common,
linux-buildinfo-5.15.0-1036-aws, linux-cloud-tools-lowlatency,
linux-headers-virtual-hwe-20.04, linux-modules-5.15.0-72-lowlatency,
linux-image-lowlatency-hwe-20.04, linux-tools-5.15.0-1035-oracle,
linux-tools-lowlatency-64k-hwe-20.04-edge,
linux-cloud-tools-azure-lts-22.04, linux-tools-virtual,
linux-azure-tools-5.15.0-1038, linux-modules-extra-aws-lts-22.04,
linux-lowlatency-64k-hwe-20.04, linux-azure-fde, linux-image-azure-cvm,
linux-headers-ibm, linux-azure-headers-5.15.0-1038,
linux-cloud-tools-5.15.0-1036-aws, linux-image-generic,
linux-modules-5.15.0-1035-oracle, linux, linux-headers-oem-20.04,
linux-tools-lowlatency-hwe-20.04-edge, linux-modules-iwlwifi-oem-20.04d,
linux-image-5.15.0-72-generic-64k, linux-tools-generic-64k-hwe-20.04-edge,
linux-tools-generic-lpae, linux-image-generic-64k-hwe-20.04,
linux-modules-extra-5.15.0-1038-azure, linux-generic-64k,
linux-generic-64k-hwe-20.04-edge, linux-buildinfo-5.15.0-72-lowlatency,
linux-modules-iwlwifi-generic-hwe-20.04-edge, linux-tools-oracle,
linux-cloud-tools-5.15.0-72-lowlatency, linux-tools-azure-fde,
linux-headers-oem-20.04c, linux-libc-dev,
linux-image-generic-hwe-20.04-edge, linux-headers-kvm,
linux-headers-lowlatency, linux-headers-oem-20.04d,
linux-aws-headers-5.15.0-1036, linux-image-5.15.0-72-lowlatency-64k,
linux-tools-host, linux-image-generic-hwe-20.04, linux-tools-ibm,
linux-aws-5.15-tools-5.15.0-1036, linux-tools-aws-lts-22.04,
linux-azure-5.15, linux-headers-lowlatency-hwe-20.04-edge, linux-image-kvm,
linux-cloud-tools-5.15.0-1038-azure,
linux-image-unsigned-5.15.0-72-generic-64k, linux-generic-64k-hwe-20.04,
linux-image-5.15.0-1030-ibm, linux-image-azure-lts-22.04,
linux-buildinfo-5.15.0-1030-ibm, linux-headers-lowlatency-hwe-20.04,
linux-lowlatency-64k, linux-image-unsigned-5.15.0-1038-azure,
linux-buildinfo-5.15.0-72-generic, linux-lowlatency-hwe-5.15-tools-common,
linux-tools-5.15.0-1030-ibm, linux-image-aws-edge,
linux-generic-hwe-20.04-edge, linux-headers-azure-lts-22.04,
linux-headers-generic-64k, linux-ibm-source-5.15.0, linux-kvm,
linux-cloud-tools-azure-cvm, linux-source-5.15.0
o USN-6081-1 : linux-virtual-hwe-16.04, linux-modules-4.15.0-1140-kvm,
linux-tools-4.15.0-211-generic, linux-cloud-tools-virtual-hwe-16.04,
linux-generic-hwe-16.04-edge, linux-image-lowlatency-hwe-16.04-edge,
linux-tools-generic, linux-buildinfo-4.15.0-211-generic-lpae,
linux-cloud-tools-lowlatency-hwe-16.04-edge, linux-signed-image-generic,
linux-aws, linux-generic-hwe-16.04, linux-tools-kvm,
linux-headers-generic-hwe-16.04, linux-cloud-tools-4.15.0-211-generic,
linux-cloud-tools-generic-hwe-16.04-edge,
linux-cloud-tools-virtual-hwe-16.04-edge,
linux-headers-lowlatency-hwe-16.04-edge, linux-image-extra-virtual,
linux-headers-aws-hwe, linux-headers-4.15.0-1140-kvm, linux-lowlatency,
linux-image-lowlatency, linux-modules-extra-4.15.0-211-generic,
linux-tools-aws-hwe, linux-generic, linux-image-generic-lpae-hwe-16.04,
linux-crashdump, linux-headers-virtual-hwe-16.04-edge,
linux-buildinfo-4.15.0-1156-aws, linux-tools-lowlatency-hwe-16.04-edge,
linux-signed-image-lowlatency-hwe-16.04, linux-aws-hwe-tools-4.15.0-1156,
linux-doc, linux-tools-virtual-hwe-16.04,
linux-image-4.15.0-211-generic-lpae, linux-image-generic-hwe-16.04-edge,
linux-signed-lowlatency, linux-signed-image-lowlatency-hwe-16.04-edge,
linux-tools-4.15.0-211-lowlatency, linux-cloud-tools-generic-hwe-16.04,
linux-generic-lpae-hwe-16.04, linux-image-virtual,
linux-signed-lowlatency-hwe-16.04-edge, linux-image-virtual-hwe-16.04,
linux-lowlatency-hwe-16.04-edge, linux-aws-edge, linux-aws-hwe,
linux-image-generic-lpae, linux-generic-lpae-hwe-16.04-edge,
linux-image-unsigned-4.15.0-211-generic, linux-headers-aws-lts-18.04,
linux-headers-virtual, linux-aws-lts-18.04,
linux-aws-hwe-cloud-tools-4.15.0-1156, linux-source-4.15.0,
linux-tools-lowlatency, linux-modules-extra-aws-lts-18.04,
linux-image-unsigned-4.15.0-1156-aws, linux-tools-common,
linux-tools-generic-lpae-hwe-16.04, linux-modules-extra-aws-hwe,
linux-tools-4.15.0-211-generic-lpae, linux-tools-generic-hwe-16.04-edge,
linux-headers-generic, linux-signed-generic-hwe-16.04-edge,
linux-image-unsigned-4.15.0-211-lowlatency, linux-tools-4.15.0-211,
linux-modules-4.15.0-211-lowlatency,
linux-headers-generic-lpae-hwe-16.04-edge, linux-cloud-tools-common,
linux-cloud-tools-lowlatency-hwe-16.04, linux-aws-headers-4.15.0-1156,
linux-image-4.15.0-211-lowlatency, linux-signed-generic,
linux-tools-aws-lts-18.04, linux-headers-4.15.0-211-generic,
linux-buildinfo-4.15.0-211-generic,
linux-signed-image-generic-hwe-16.04-edge, linux-tools-4.15.0-1156-aws,
linux-virtual-hwe-16.04-edge, linux-image-4.15.0-1140-kvm, linux-virtual,
linux-tools-generic-hwe-16.04, linux-modules-extra-4.15.0-1156-aws,
linux-cloud-tools-virtual, linux-image-4.15.0-211-generic,
linux-headers-lowlatency-hwe-16.04, linux-image-generic-hwe-16.04,
linux-headers-generic-lpae, linux-image-virtual-hwe-16.04-edge,
linux-modules-4.15.0-211-generic, linux-headers-4.15.0-1156-aws,
linux-image-4.15.0-1156-aws, linux-headers-generic-lpae-hwe-16.04,
linux-generic-lpae, linux-signed-image-generic-hwe-16.04,
linux-cloud-tools-generic, linux-headers-generic-hwe-16.04-edge,
linux-tools-virtual-hwe-16.04-edge, linux-image-extra-virtual-hwe-16.04,
linux-tools-4.15.0-1140-kvm, linux-signed-image-lowlatency,
linux-headers-4.15.0-211, linux-cloud-tools-lowlatency,
linux-tools-generic-lpae-hwe-16.04-edge, linux-lowlatency-hwe-16.04,
linux-tools-virtual, linux-image-aws-hwe, linux-kvm-tools-4.15.0-1140,
linux-image-generic, linux-aws-cloud-tools-4.15.0-1156, linux,
linux-cloud-tools-4.15.0-1156-aws, linux-tools-generic-lpae,
linux-cloud-tools-4.15.0-211, linux-buildinfo-4.15.0-211-lowlatency,
linux-modules-4.15.0-211-generic-lpae, linux-libc-dev,
linux-headers-4.15.0-211-generic-lpae, linux-headers-kvm,
linux-image-extra-virtual-hwe-16.04-edge, linux-headers-lowlatency,
linux-image-generic-lpae-hwe-16.04-edge, linux-image-lowlatency-hwe-16.04,
linux-signed-generic-hwe-16.04, linux-aws-tools-4.15.0-1156,
linux-tools-host, linux-cloud-tools-4.15.0-211-lowlatency, linux-image-kvm,
linux-image-aws-lts-18.04, linux-buildinfo-4.15.0-1140-kvm,
linux-kvm-headers-4.15.0-1140, linux-tools-lowlatency-hwe-16.04,
linux-headers-4.15.0-211-lowlatency, linux-headers-virtual-hwe-16.04,
linux-modules-4.15.0-1156-aws, linux-signed-lowlatency-hwe-16.04,
linux-source, linux-kvm
o USN-6084-1 : linux-buildinfo-4.15.0-1119-oracle,
linux-headers-4.15.0-1119-oracle, linux-image-4.15.0-1150-gcp,
linux-image-unsigned-4.15.0-1150-gcp, linux-oracle,
linux-signed-oracle-lts-18.04, linux-modules-extra-4.15.0-1119-oracle,
linux-headers-oracle, linux-signed-oracle, linux-oracle-lts-18.04,
linux-image-4.15.0-1119-oracle, linux-modules-extra-gcp-lts-18.04,
linux-tools-4.15.0-1119-oracle, linux-oracle-headers-4.15.0-1119,
linux-gcp-4.15-headers-4.15.0-1150, linux-modules-4.15.0-1150-gcp,
linux-signed-image-oracle, linux-headers-4.15.0-1150-gcp,
linux-tools-oracle, linux-tools-gcp-lts-18.04,
linux-buildinfo-4.15.0-1150-gcp, linux-gcp-4.15,
linux-signed-image-oracle-lts-18.04, linux-oracle-tools-4.15.0-1119,
linux-headers-oracle-lts-18.04, linux-image-gcp-lts-18.04,
linux-modules-4.15.0-1119-oracle, linux-image-unsigned-4.15.0-1119-oracle,
linux-modules-extra-4.15.0-1150-gcp, linux-tools-oracle-lts-18.04,
linux-tools-4.15.0-1150-gcp, linux-gcp-lts-18.04,
linux-image-oracle-lts-18.04, linux-gcp-4.15-tools-4.15.0-1150,
linux-image-oracle, linux-headers-gcp-lts-18.04
o USN-6085-1 : linux-tools-raspi-nolpae,
linux-tools-5.15.0-1029-raspi-nolpae, linux-modules-5.15.0-1029-raspi,
linux-modules-extra-5.15.0-1029-raspi-nolpae, linux-image-raspi-nolpae,
linux-buildinfo-5.15.0-1029-raspi, linux-image-5.15.0-1029-raspi,
linux-image-raspi, linux-raspi-tools-5.15.0-1029,
linux-headers-raspi-nolpae, linux-modules-extra-raspi-nolpae,
linux-headers-5.15.0-1029-raspi, linux-modules-extra-5.15.0-1029-raspi,
linux-image-5.15.0-1029-raspi-nolpae, linux-tools-raspi,
linux-modules-extra-raspi, linux-tools-5.15.0-1029-raspi,
linux-headers-raspi, linux-modules-5.15.0-1029-raspi-nolpae,
linux-raspi-headers-5.15.0-1029, linux-raspi-nolpae, linux-raspi,
linux-headers-5.15.0-1029-raspi-nolpae,
linux-buildinfo-5.15.0-1029-raspi-nolpae
o USN-6090-1 : linux-image-5.15.0-1020-gkeop,
linux-headers-5.15.0-1020-gkeop, linux-cloud-tools-gkeop,
linux-headers-oracle, linux-image-oracle-edge,
linux-modules-extra-5.15.0-1035-oracle, linux-modules-extra-gcp-lts-22.04,
linux-modules-extra-gkeop, linux-image-5.15.0-1033-gke,
linux-gcp-5.15-tools-5.15.0-1034, linux-image-unsigned-5.15.0-1035-oracle,
linux-headers-gcp-edge, linux-modules-extra-5.15.0-1033-gke,
linux-oracle-5.15-headers-5.15.0-1035, linux-modules-extra-gkeop-5.15,
linux-gke-5.15-headers-5.15.0-1033, linux-image-unsigned-5.15.0-1033-gke,
linux-gke-edge, linux-gkeop, linux-gcp-edge, linux-headers-gcp-lts-22.04,
linux-tools-gke, linux-image-unsigned-5.15.0-1034-gcp,
linux-gke-tools-5.15.0-1033, linux-oracle,
linux-image-unsigned-5.15.0-1020-gkeop, linux-tools-gke-edge,
linux-gkeop-cloud-tools-5.15.0-1020, linux-image-gkeop,
linux-modules-extra-gcp-edge, linux-modules-5.15.0-1033-gke,
linux-image-gkeop-5.15, linux-headers-gke, linux-gke,
linux-buildinfo-5.15.0-1035-oracle, linux-buildinfo-5.15.0-1033-gke,
linux-tools-5.15.0-1020-gkeop, linux-modules-extra-5.15.0-1034-gcp,
linux-image-gcp-edge, linux-image-5.15.0-1034-gcp, linux-image-oracle,
linux-cloud-tools-5.15.0-1020-gkeop, linux-gcp-5.15-headers-5.15.0-1034,
linux-tools-gke-5.15, linux-tools-oracle-edge, linux-gcp-lts-22.04,
linux-headers-gke-edge, linux-headers-5.15.0-1034-gcp,
linux-gke-5.15-tools-5.15.0-1033, linux-gcp-5.15,
linux-image-5.15.0-1035-oracle, linux-image-gcp-lts-22.04,
linux-oracle-edge, linux-gkeop-headers-5.15.0-1020,
linux-modules-iwlwifi-5.15.0-1034-gcp, linux-tools-gcp-lts-22.04,
linux-tools-5.15.0-1033-gke, linux-headers-gke-5.15,
linux-modules-5.15.0-1020-gkeop, linux-headers-5.15.0-1035-oracle,
linux-tools-5.15.0-1034-gcp, linux-modules-5.15.0-1034-gcp,
linux-headers-oracle-edge, linux-headers-gkeop-5.15, linux-image-gcp,
linux-gcp-headers-5.15.0-1034, linux-gke-5.15, linux-modules-extra-gcp,
linux-buildinfo-5.15.0-1020-gkeop, linux-oracle-5.15, linux-image-gke,
linux-gcp-tools-5.15.0-1034, linux-tools-gkeop-5.15, linux-image-gke-edge,
linux-headers-gcp, linux-gkeop-5.15, linux-headers-gkeop,
linux-tools-gkeop, linux-tools-5.15.0-1035-oracle,
linux-modules-5.15.0-1035-oracle, linux-tools-gcp,
linux-cloud-tools-gkeop-5.15, linux-tools-oracle,
linux-gkeop-tools-5.15.0-1020, linux-modules-iwlwifi-5.15.0-1033-gke,
linux-headers-5.15.0-1033-gke, linux-oracle-5.15-tools-5.15.0-1035,
linux-image-gke-5.15, linux-tools-gcp-edge, linux-gke-headers-5.15.0-1033,
linux-modules-extra-5.15.0-1020-gkeop, linux-gcp,
linux-buildinfo-5.15.0-1034-gcp
o USN-6091-1 : linux-ibm-headers-5.19.0-1022, linux-image-5.19.0-1023-oracle,
linux-image-ibm, linux-headers-5.19.0-1022-ibm, linux-oracle,
linux-ibm-cloud-tools-common, linux-headers-oracle,
linux-image-5.19.0-1022-ibm, linux-headers-ibm,
linux-modules-5.19.0-1023-oracle, linux-tools-5.19.0-1022-ibm,
linux-modules-extra-5.19.0-1022-ibm, linux-oracle-headers-5.19.0-1023,
linux-ibm-tools-common, linux-headers-5.19.0-1023-oracle,
linux-modules-5.19.0-1022-ibm, linux-oracle-tools-5.19.0-1023,
linux-image-unsigned-5.19.0-1022-ibm, linux-tools-oracle,
linux-buildinfo-5.19.0-1023-oracle, linux-buildinfo-5.19.0-1022-ibm,
linux-ibm-tools-5.19.0-1022, linux-image-unsigned-5.19.0-1023-oracle,
linux-tools-5.19.0-1023-oracle, linux-ibm-source-5.19.0,
linux-modules-extra-5.19.0-1023-oracle, linux-tools-ibm, linux-ibm,
linux-image-oracle
o USN-6092-1 : linux-signed-azure-edge, linux-cloud-tools-4.15.0-1165-azure,
linux-image-azure-edge, linux-signed-image-azure-lts-18.04,
linux-azure-4.15-cloud-tools-4.15.0-1165, linux-headers-azure,
linux-azure-4.15-headers-4.15.0-1165, linux-headers-4.15.0-1165-azure,
linux-image-azure-lts-18.04, linux-cloud-tools-azure-lts-18.04,
linux-modules-extra-azure-edge, linux-azure-headers-4.15.0-1165,
linux-image-4.15.0-1165-azure, linux-modules-4.15.0-1165-azure,
linux-azure-4.15, linux-cloud-tools-azure-edge,
linux-modules-extra-azure-lts-18.04, linux-headers-azure-lts-18.04,
linux-azure-4.15-tools-4.15.0-1165, linux-signed-image-azure-edge,
linux-image-unsigned-4.15.0-1165-azure, linux-tools-azure-edge,
linux-modules-extra-4.15.0-1165-azure, linux-azure-cloud-tools-4.15.0-1165,
linux-cloud-tools-azure, linux-signed-azure, linux-image-azure,
linux-azure-tools-4.15.0-1165, linux-signed-image-azure,
linux-tools-azure-lts-18.04, linux-tools-azure, linux-modules-extra-azure,
linux-azure-lts-18.04, linux-azure, linux-signed-azure-lts-18.04,
linux-buildinfo-4.15.0-1165-azure, linux-tools-4.15.0-1165-azure,
linux-azure-edge, linux-headers-azure-edge
o USN-6094-1 : linux-modules-extra-gcp-lts-20.04, linux-signed-azure-edge,
linux-image-virtual-hwe-18.04-edge, linux-image-ibm,
linux-image-generic-hwe-18.04, linux-tools-5.4.0-149-generic-lpae,
linux-cloud-tools-gkeop, linux-tools-generic, linux-headers-oem-osp1,
linux-cloud-tools-generic-hwe-18.04-edge,
linux-cloud-tools-lowlatency-hwe-18.04, linux-generic-hwe-18.04-edge,
linux-image-5.4.0-149-generic-lpae, linux-oem, linux-aws, linux-gkeop-5.4,
linux-ibm-headers-5.4.0-1049, linux-cloud-tools-5.4.0-1108-azure,
linux-image-gcp-lts-20.04, linux-tools-kvm, linux-tools-generic-hwe-18.04,
linux-cloud-tools-azure-lts-20.04, linux-headers-virtual-hwe-18.04,
linux-aws-tools-5.4.0-1102, linux-ibm-tools-common,
linux-image-extra-virtual-hwe-18.04-edge, linux-azure-5.4,
linux-gcp-lts-20.04, linux-snapdragon-hwe-18.04-edge,
linux-modules-extra-gkeop, linux-image-extra-virtual,
linux-cloud-tools-azure-edge, linux-headers-5.4.0-1091-kvm,
linux-modules-5.4.0-1105-gcp, linux-modules-extra-5.4.0-1099-gke,
linux-tools-aws-lts-20.04, linux-lowlatency,
linux-cloud-tools-virtual-hwe-18.04, linux-buildinfo-5.4.0-1099-gke,
linux-headers-5.4.0-1105-gcp, linux-image-lowlatency,
linux-azure-cloud-tools-5.4.0-1108, linux-ibm-5.4-source-5.4.0,
linux-kvm-headers-5.4.0-1091, linux-generic, linux-crashdump,
linux-tools-azure-edge, linux-headers-gcp-edge,
linux-cloud-tools-lowlatency-hwe-18.04-edge,
linux-azure-5.4-cloud-tools-5.4.0-1108,
linux-cloud-tools-generic-hwe-18.04, linux-gcp-5.4,
linux-headers-gcp-lts-20.04, linux-cloud-tools-azure,
linux-headers-5.4.0-1099-gke, linux-image-gkeop-5.4, linux-signed-azure,
linux-gcp-5.4-tools-5.4.0-1105, linux-tools-ibm-lts-20.04,
linux-image-ibm-lts-20.04, linux-tools-5.4.0-1099-gke,
linux-image-extra-virtual-hwe-18.04, linux-headers-oem,
linux-image-ibm-edge, linux-tools-generic-lpae-hwe-18.04-edge, linux-ibm,
linux-gkeop, linux-doc, linux-hwe-5.4-tools-5.4.0-149, linux-gcp-edge,
linux-modules-extra-gke, linux-tools-virtual-hwe-18.04,
linux-hwe-5.4-headers-5.4.0-149, linux-tools-generic-hwe-18.04-edge,
linux-tools-gke, linux-gke-5.4, linux-headers-azure-edge, linux-image-oem,
linux-source-5.4.0, linux-image-virtual,
linux-buildinfo-5.4.0-149-lowlatency,
linux-image-unsigned-5.4.0-1108-azure,
linux-modules-extra-5.4.0-149-generic, linux-modules-5.4.0-1108-azure,
linux-tools-lowlatency-hwe-18.04-edge, linux-image-unsigned-5.4.0-1102-aws,
linux-modules-extra-virtual-hwe-18.04,
linux-cloud-tools-5.4.0-149-lowlatency, linux-ibm-cloud-tools-common,
linux-cloud-tools-5.4.0-1102-aws, linux-headers-5.4.0-149-lowlatency,
linux-ibm-5.4-headers-5.4.0-1049, linux-image-generic-lpae,
linux-image-gkeop, linux-modules-extra-azure-lts-20.04,
linux-headers-azure-lts-20.04, linux-image-unsigned-5.4.0-1069-gkeop,
linux-modules-extra-gcp-edge, linux-image-5.4.0-149-generic,
linux-modules-extra-ibm, linux-aws-headers-5.4.0-1102,
linux-tools-snapdragon-hwe-18.04-edge, linux-tools-lowlatency-hwe-18.04,
linux-headers-gke, linux-oem-tools-host, linux-gke, linux-headers-virtual,
linux-hwe-5.4-tools-common, linux-modules-extra-5.4.0-1108-azure,
linux-tools-generic-lpae-hwe-18.04, linux-virtual-hwe-18.04,
linux-virtual-hwe-18.04-edge, linux-modules-extra-5.4.0-1049-ibm,
linux-image-unsigned-5.4.0-1091-kvm, linux-headers-lowlatency-hwe-18.04,
linux-azure-headers-5.4.0-1108, linux-image-generic-lpae-hwe-18.04-edge,
linux-modules-extra-gkeop-5.4, linux-modules-5.4.0-149-generic,
linux-headers-gkeop-5.4, linux-buildinfo-5.4.0-1069-gkeop,
linux-tools-ibm-edge, linux-headers-5.4.0-149,
linux-modules-extra-ibm-lts-20.04, linux-tools-lowlatency,
linux-modules-5.4.0-149-generic-lpae, linux-buildinfo-5.4.0-149-generic,
linux-headers-ibm-lts-20.04, linux-headers-lowlatency-hwe-18.04-edge,
linux-modules-extra-virtual-hwe-18.04-edge,
linux-tools-virtual-hwe-18.04-edge, linux-headers-gke-5.4,
linux-tools-5.4.0-149-generic, linux-tools-common,
linux-hwe-5.4-cloud-tools-common, linux-image-gcp-edge,
linux-aws-lts-20.04, linux-modules-extra-azure, linux-tools-5.4.0-149,
linux-ibm-5.4-tools-common, linux-ibm-5.4,
linux-image-5.4.0-149-lowlatency, linux-tools-gkeop-5.4,
linux-gkeop-cloud-tools-5.4.0-1069, linux-headers-generic,
linux-azure-edge, linux-image-azure-edge, linux-tools-5.4.0-1105-gcp,
linux-azure-5.4-tools-5.4.0-1108, linux-headers-azure,
linux-image-unsigned-5.4.0-149-generic, linux-modules-5.4.0-149-lowlatency,
linux-modules-extra-aws-lts-20.04, linux-headers-generic-hwe-18.04,
linux-modules-5.4.0-1049-ibm, linux-buildinfo-5.4.0-1091-kvm,
linux-cloud-tools-common, linux-image-5.4.0-1091-kvm,
linux-hwe-5.4-cloud-tools-5.4.0-149, linux-modules-extra-azure-edge,
linux-headers-ibm-edge, linux-image-5.4.0-1108-azure,
linux-image-5.4.0-1105-gcp, linux-image-azure-lts-20.04,
linux-image-unsigned-5.4.0-1105-gcp, linux-ibm-source-5.4.0,
linux-tools-gke-5.4, linux-headers-5.4.0-149-generic-lpae,
linux-tools-5.4.0-1069-gkeop, linux-ibm-tools-5.4.0-1049,
linux-aws-cloud-tools-5.4.0-1102, linux-ibm-edge,
linux-image-snapdragon-hwe-18.04, linux-image-unsigned-5.4.0-1049-ibm,
linux-virtual, linux-image-5.4.0-1049-ibm, linux-cloud-tools-virtual,
linux-signed-image-azure-edge, linux-modules-5.4.0-1069-gkeop,
linux-headers-aws-lts-20.04, linux-tools-5.4.0-1091-kvm,
linux-headers-generic-lpae, linux-image-gcp, linux-image-5.4.0-1069-gkeop,
linux-buildinfo-5.4.0-1108-azure, linux-headers-5.4.0-1049-ibm,
linux-image-azure, linux-generic-lpae, linux-kvm-tools-5.4.0-1091,
linux-gkeop-headers-5.4.0-1069, linux-image-snapdragon-hwe-18.04-edge,
linux-cloud-tools-generic, linux-image-unsigned-5.4.0-149-lowlatency,
linux-snapdragon-hwe-18.04, linux-tools-azure,
linux-azure-5.4-headers-5.4.0-1108, linux-tools-gcp-lts-20.04,
linux-buildinfo-5.4.0-1049-ibm, linux-modules-extra-gcp,
linux-image-generic-hwe-18.04-edge, linux-generic-lpae-hwe-18.04,
linux-hwe-5.4-source-5.4.0, linux-azure, linux-generic-hwe-18.04,
linux-gcp-tools-5.4.0-1105, linux-image-gke, linux-headers-5.4.0-1102-aws,
linux-gke-headers-5.4.0-1099, linux-headers-snapdragon-hwe-18.04,
linux-tools-5.4.0-149-lowlatency, linux-cloud-tools-lowlatency,
linux-buildinfo-5.4.0-1102-aws, linux-headers-gcp, linux-headers-gkeop,
linux-tools-gkeop, linux-gkeop-tools-5.4.0-1069, linux-image-oem-osp1,
linux-image-unsigned-5.4.0-1099-gke, linux-modules-extra-5.4.0-1105-gcp,
linux-cloud-tools-5.4.0-149-generic, linux-tools-virtual,
linux-headers-5.4.0-149-generic, linux-gcp-5.4-headers-5.4.0-1105,
linux-buildinfo-5.4.0-1105-gcp, linux-headers-5.4.0-1069-gkeop,
linux-image-aws-lts-20.04, linux-headers-ibm, linux-image-generic,
linux-cloud-tools-virtual-hwe-18.04-edge,
linux-headers-generic-hwe-18.04-edge, linux-modules-5.4.0-1099-gke,
linux-ibm-lts-20.04, linux, linux-tools-5.4.0-1102-aws,
linux-cloud-tools-gkeop-5.4, linux-image-5.4.0-1102-aws,
linux-lowlatency-hwe-18.04, linux-modules-extra-5.4.0-1069-gkeop,
linux-modules-extra-5.4.0-1102-aws, linux-tools-gcp,
linux-tools-generic-lpae, linux-image-gke-5.4, linux-oem-osp1,
linux-tools-5.4.0-1108-azure, linux-tools-oem, linux-tools-oem-osp1,
linux-libc-dev, linux-ibm-5.4-tools-5.4.0-1049,
linux-cloud-tools-5.4.0-149, linux-headers-kvm,
linux-image-lowlatency-hwe-18.04, linux-headers-lowlatency,
linux-gcp-headers-5.4.0-1105, linux-lowlatency-hwe-18.04-edge,
linux-tools-azure-lts-20.04, linux-modules-extra-ibm-edge,
linux-headers-virtual-hwe-18.04-edge, linux-headers-generic-lpae-hwe-18.04,
linux-headers-5.4.0-1108-azure, linux-modules-extra-gke-5.4,
linux-buildinfo-5.4.0-149-generic-lpae, linux-tools-host,
linux-image-5.4.0-1099-gke, linux-gkeop-source-5.4.0, linux-tools-ibm,
linux-image-generic-lpae-hwe-18.04, linux-ibm-5.4-cloud-tools-common,
linux-image-virtual-hwe-18.04, linux-azure-tools-5.4.0-1108,
linux-modules-5.4.0-1102-aws, linux-image-kvm, linux-signed-image-azure,
linux-generic-lpae-hwe-18.04-edge, linux-cloud-tools-5.4.0-1069-gkeop,
linux-tools-5.4.0-1049-ibm, linux-modules-5.4.0-1091-kvm,
linux-tools-snapdragon-hwe-18.04, linux-image-lowlatency-hwe-18.04-edge,
linux-headers-snapdragon-hwe-18.04-edge, linux-tools-gcp-edge,
linux-hwe-5.4, linux-headers-generic-lpae-hwe-18.04-edge, linux-gcp,
linux-azure-lts-20.04, linux-source, linux-kvm, linux-gke-tools-5.4.0-1099,
linux-oem-osp1-tools-host
o USN-6095-1 : linux-virtual-hwe-16.04, linux-headers-raspi2,
linux-headers-4.15.0-1132-raspi2, linux-tools-4.15.0-211-generic,
linux-cloud-tools-virtual-hwe-16.04, linux-generic-hwe-16.04-edge,
linux-image-lowlatency-hwe-16.04-edge,
linux-cloud-tools-lowlatency-hwe-16.04-edge, linux-oem,
linux-generic-hwe-16.04, linux-raspi2-tools-4.15.0-1132,
linux-modules-4.15.0-1150-gcp, linux-headers-generic-hwe-16.04,
linux-cloud-tools-4.15.0-211-generic, linux-headers-4.15.0-1150-snapdragon,
linux-snapdragon-tools-4.15.0-1150,
linux-cloud-tools-generic-hwe-16.04-edge,
linux-cloud-tools-virtual-hwe-16.04-edge,
linux-headers-lowlatency-hwe-16.04-edge, linux-headers-4.15.0-1150-gcp,
linux-modules-extra-4.15.0-211-generic, linux-buildinfo-4.15.0-1150-gcp,
linux-image-snapdragon, linux-headers-virtual-hwe-16.04-edge,
linux-modules-extra-4.15.0-1150-gcp, linux-raspi2,
linux-tools-lowlatency-hwe-16.04-edge, linux-tools-4.15.0-1150-gcp,
linux-headers-oem, linux-signed-image-lowlatency-hwe-16.04,
linux-gcp-tools-4.15.0-1150, linux-tools-virtual-hwe-16.04,
linux-signed-oem, linux-tools-4.15.0-1150-snapdragon,
linux-image-generic-hwe-16.04-edge, linux-modules-extra-gke,
linux-raspi2-headers-4.15.0-1132,
linux-signed-image-lowlatency-hwe-16.04-edge, linux-tools-gke,
linux-headers-snapdragon, linux-tools-4.15.0-211-lowlatency,
linux-image-oem, linux-cloud-tools-generic-hwe-16.04,
linux-signed-lowlatency-hwe-16.04-edge, linux-image-virtual-hwe-16.04,
linux-lowlatency-hwe-16.04-edge, linux-image-4.15.0-1132-raspi2,
linux-hwe-cloud-tools-4.15.0-211, linux-image-unsigned-4.15.0-211-generic,
linux-headers-gke, linux-gke, linux-image-4.15.0-1150-snapdragon,
linux-buildinfo-4.15.0-1132-raspi2, linux-source-4.15.0,
linux-snapdragon-headers-4.15.0-1150, linux-tools-generic-hwe-16.04-edge,
linux-image-raspi2, linux-signed-generic-hwe-16.04-edge,
linux-image-unsigned-4.15.0-211-lowlatency,
linux-modules-4.15.0-211-lowlatency, linux-snapdragon,
linux-image-unsigned-4.15.0-1150-gcp,
linux-cloud-tools-lowlatency-hwe-16.04, linux-image-4.15.0-211-lowlatency,
linux-gcp-headers-4.15.0-1150, linux-headers-4.15.0-211-generic,
linux-buildinfo-4.15.0-211-generic, linux-tools-raspi2,
linux-signed-image-generic-hwe-16.04-edge, linux-virtual-hwe-16.04-edge,
linux-tools-generic-hwe-16.04, linux-image-4.15.0-211-generic,
linux-headers-lowlatency-hwe-16.04, linux-image-generic-hwe-16.04,
linux-image-virtual-hwe-16.04-edge, linux-modules-4.15.0-211-generic,
linux-image-gcp, linux-signed-image-generic-hwe-16.04,
linux-headers-generic-hwe-16.04-edge, linux-modules-extra-gcp,
linux-tools-virtual-hwe-16.04-edge, linux-image-extra-virtual-hwe-16.04,
linux-image-gke, linux-headers-4.15.0-211, linux-headers-gcp,
linux-lowlatency-hwe-16.04, linux-image-4.15.0-1150-gcp,
linux-modules-4.15.0-1132-raspi2, linux-buildinfo-4.15.0-1150-snapdragon,
linux-tools-gcp, linux-tools-oem, linux-buildinfo-4.15.0-211-lowlatency,
linux-image-extra-virtual-hwe-16.04-edge, linux-image-lowlatency-hwe-16.04,
linux-signed-generic-hwe-16.04, linux-modules-4.15.0-1150-snapdragon,
linux-cloud-tools-4.15.0-211-lowlatency, linux-signed-image-oem,
linux-tools-lowlatency-hwe-16.04, linux-headers-4.15.0-211-lowlatency,
linux-headers-virtual-hwe-16.04, linux-tools-snapdragon,
linux-tools-4.15.0-1132-raspi2, linux-signed-lowlatency-hwe-16.04,
linux-hwe, linux-gcp, linux-hwe-tools-4.15.0-211
o USN-6096-1 : linux-headers-5.19.0-42-generic,
linux-modules-ivsc-5.19.0-42-generic,
linux-cloud-tools-virtual-hwe-22.04-edge,
linux-modules-ipu6-5.19.0-42-generic, linux-tools-5.19.0-1024-gcp,
linux-generic-lpae-hwe-22.04-edge, linux-modules-5.19.0-42-generic,
linux-cloud-tools-generic-hwe-22.04, linux-hwe-5.19-tools-5.19.0-42,
linux-image-5.19.0-1024-gcp, linux-image-virtual-hwe-22.04,
linux-modules-ipu6-generic-hwe-22.04, linux-modules-5.19.0-42-generic-64k,
linux-tools-generic-lpae-hwe-22.04-edge, linux-headers-5.19.0-1024-gcp,
linux-image-generic-64k-hwe-22.04, linux-headers-generic-hwe-22.04-edge,
linux-modules-iwlwifi-5.19.0-42-generic,
linux-image-extra-virtual-hwe-22.04, linux-headers-5.19.0-42-generic-64k,
linux-tools-generic-lpae-hwe-22.04, linux-hwe-5.19-cloud-tools-common,
linux-generic-hwe-22.04-edge, linux-image-virtual-hwe-22.04-edge,
linux-buildinfo-5.19.0-42-generic-lpae,
linux-headers-5.19.0-42-generic-lpae, linux-tools-virtual-hwe-22.04-edge,
linux-modules-extra-5.19.0-1024-gcp, linux-tools-generic-64k-hwe-22.04,
linux-image-generic-lpae-hwe-22.04, linux-image-unsigned-5.19.0-42-generic,
linux-headers-generic-64k-hwe-22.04, linux-tools-5.19.0-42-generic-64k,
linux-generic-hwe-22.04, linux-modules-extra-5.19.0-42-generic,
linux-modules-5.19.0-42-generic-lpae,
linux-cloud-tools-generic-hwe-22.04-edge,
linux-headers-generic-lpae-hwe-22.04, linux-headers-generic-hwe-22.04,
linux-image-5.19.0-42-generic-64k,
linux-headers-generic-lpae-hwe-22.04-edge, linux-virtual-hwe-22.04,
linux-virtual-hwe-22.04-edge, linux-image-extra-virtual-hwe-22.04-edge,
linux-tools-generic-hwe-22.04-edge, linux-gcp-headers-5.19.0-1024,
linux-tools-generic-64k-hwe-22.04-edge, linux-gcp-tools-5.19.0-1024,
linux-modules-ipu6-generic-hwe-22.04-edge,
linux-modules-ivsc-generic-hwe-22.04,
linux-image-generic-lpae-hwe-22.04-edge, linux-headers-virtual-hwe-22.04,
linux-buildinfo-5.19.0-42-generic-64k, linux-image-generic-hwe-22.04-edge,
linux-image-gcp, linux-tools-5.19.0-42-generic,
linux-modules-iwlwifi-generic-hwe-22.04, linux-hwe-5.19-headers-5.19.0-42,
linux-headers-virtual-hwe-22.04-edge, linux-cloud-tools-5.19.0-42-generic,
linux-modules-extra-gcp, linux-modules-ivsc-generic-hwe-22.04-edge,
linux-tools-generic-hwe-22.04, linux-image-5.19.0-42-generic,
linux-generic-lpae-hwe-22.04, linux-hwe-5.19, linux-headers-gcp,
linux-modules-5.19.0-1024-gcp, linux-buildinfo-5.19.0-42-generic,
linux-tools-virtual-hwe-22.04, linux-tools-5.19.0-42-generic-lpae,
linux-source-5.19.0, linux-tools-gcp, linux-hwe-5.19-cloud-tools-5.19.0-42,
linux-headers-generic-64k-hwe-22.04-edge, linux-generic-64k-hwe-22.04,
linux-cloud-tools-virtual-hwe-22.04,
linux-image-unsigned-5.19.0-42-generic-64k, linux-hwe-5.19-tools-common,
linux-image-generic-64k-hwe-22.04-edge, linux-hwe-5.19-tools-host,
linux-image-generic-hwe-22.04, linux-image-5.19.0-42-generic-lpae,
linux-buildinfo-5.19.0-1024-gcp,
linux-modules-iwlwifi-generic-hwe-22.04-edge, linux-gcp,
linux-generic-64k-hwe-22.04-edge, linux-image-unsigned-5.19.0-1024-gcp
o USN-6109-1 : linux-headers-raspi2, linux-raspi2-hwe-18.04-edge,
linux-tools-raspi2-hwe-18.04, linux-raspi-5.4, linux-image-raspi-hwe-18.04,
linux-headers-raspi2-hwe-18.04, linux-image-raspi-hwe-18.04-edge,
linux-raspi-tools-5.4.0-1085, linux-tools-raspi-hwe-18.04,
linux-modules-5.4.0-1085-raspi, linux-raspi2-hwe-18.04,
linux-image-raspi2-hwe-18.04-edge, linux-raspi-headers-5.4.0-1085,
linux-tools-raspi2, linux-image-5.4.0-1085-raspi,
linux-headers-5.4.0-1085-raspi, linux-image-raspi,
linux-raspi-5.4-headers-5.4.0-1085, linux-buildinfo-5.4.0-1085-raspi,
linux-image-raspi2-hwe-18.04, linux-tools-5.4.0-1085-raspi,
linux-raspi-hwe-18.04-edge, linux-raspi-hwe-18.04, linux-raspi2,
linux-tools-raspi, linux-headers-raspi, linux-headers-raspi-hwe-18.04,
linux-image-raspi2, linux-raspi, linux-raspi-5.4-tools-5.4.0-1085,
linux-headers-raspi-hwe-18.04-edge, linux-tools-raspi2-hwe-18.04-edge,
linux-tools-raspi-hwe-18.04-edge, linux-headers-raspi2-hwe-18.04-edge
o USN-5978-1 : linux-image-6.1.0-1008-oem, linux-modules-ipu6-oem-22.04c,
linux-modules-ivsc-6.1.0-1008-oem, linux-buildinfo-6.1.0-1008-oem,
linux-headers-oem-22.04c, linux-tools-oem-22.04c, linux-oem-6.1-tools-host,
linux-tools-6.1.0-1008-oem, linux-image-oem-22.04c,
linux-modules-ipu6-6.1.0-1008-oem, linux-oem-6.1,
linux-modules-ivsc-oem-22.04c, linux-headers-6.1.0-1008-oem,
linux-oem-6.1-tools-6.1.0-1008, linux-image-unsigned-6.1.0-1008-oem,
linux-modules-6.1.0-1008-oem, linux-oem-6.1-headers-6.1.0-1008,
linux-oem-22.04c
o USN-5915-1 : linux-tools-oem-22.04c, linux-headers-oem-22.04c,
linux-modules-ipu6-6.1.0-1007-oem, linux-modules-6.1.0-1007-oem,
linux-oem-6.1-tools-host, linux-oem-6.1-headers-6.1.0-1007,
linux-oem-6.1-tools-6.1.0-1007, linux-tools-6.1.0-1007-oem,
linux-image-oem-22.04c, linux-oem-6.1, linux-headers-6.1.0-1007-oem,
linux-modules-ivsc-oem-22.04c, linux-image-6.1.0-1007-oem,
linux-modules-ivsc-6.1.0-1007-oem, linux-image-unsigned-6.1.0-1007-oem,
linux-modules-ipu6-oem-22.04c, linux-buildinfo-6.1.0-1007-oem,
linux-oem-22.04c
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=cxtz
-----END PGP SIGNATURE-----
ESB-2023.3074 - [Ubuntu] LuaTeX (TeX Live): CVSS (Max): 7.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3074
USN-6115-1: TeX Live vulnerability
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: LuaTeX (TeX Live)
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2023-32700
Original Bulletin:
https://ubuntu.com/security/notices/USN-6115-1
Comment: CVSS (Max): 7.8 CVE-2023-32700 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6115-1: TeX Live vulnerability
30 May 2023
LuaTeX (TeX Live) could be made to run programs as your login if it compiled a
specially crafted TeX file.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 23.04
o Ubuntu 22.10
o Ubuntu 22.04 LTS
o Ubuntu 20.04 LTS
o Ubuntu 18.04 ESM
Packages
o texlive-bin - Binaries for TeX Live
Details
Max Chernoff discovered that LuaTeX (TeX Live) did not properly disable
shell escape. An attacker could possibly use this issue to execute
arbitrary shell commands.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 23.04
o texlive-binaries - 2022.20220321.62855-5ubuntu0.1
Ubuntu 22.10
o texlive-binaries - 2022.20220321.62855-4ubuntu0.1
Ubuntu 22.04
o texlive-binaries - 2021.20210626.59705-1ubuntu0.1
Ubuntu 20.04
o texlive-binaries - 2019.20190605.51237-3ubuntu0.1
Ubuntu 18.04
o texlive-binaries - 2017.20170613.44572-8ubuntu0.2
In general, a standard system update will make all the necessary changes.
References
o CVE-2023-32700
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=KD+7
-----END PGP SIGNATURE-----
ESB-2023.3073 - [Ubuntu] hawk: CVSS (Max): 7.5
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3073
USN-6116-1: hawk vulnerability
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: hawk
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2022-29167
Original Bulletin:
https://ubuntu.com/security/notices/USN-6116-1
Comment: CVSS (Max): 7.5 CVE-2022-29167 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6116-1: hawk vulnerability
30 May 2023
hawk could be made to crash if it opened a specially crafted file.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 22.10
o Ubuntu 22.04 LTS
o Ubuntu 20.04 LTS
o Ubuntu 18.04 ESM
Packages
o node-hawk - HTTP Holder-Of-Key Authentication Scheme
Details
It was discovered that hawk incorrectly handled certain inputs. If a user or
an automated system were tricked into opening a specially crafted input file,
a remote attacker could possibly use this issue to cause a denial of service.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 22.10
o node-hawk - 8.0.1+dfsg-1ubuntu0.22.10.1
Ubuntu 22.04
o node-hawk - 8.0.1+dfsg-1ubuntu0.22.04.1
Ubuntu 20.04
o node-hawk - 7.1.2+dfsg-1ubuntu0.1
Ubuntu 18.04
o node-hawk - 6.0.1+dfsg-1+deb10u1build0.18.04.1
In general, a standard system update will make all the necessary changes.
References
o CVE-2022-29167
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=zvw3
-----END PGP SIGNATURE-----
ESB-2023.3072 - [Ubuntu] Jhead: CVSS (Max): 5.5
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3072
USN-6113-1: Jhead vulnerability
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Jhead
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2018-6612
Original Bulletin:
https://ubuntu.com/security/notices/USN-6113-1
Comment: CVSS (Max): 5.5 CVE-2018-6612 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6113-1: Jhead vulnerability
30 May 2023
Jhead could be made to crash if it opened a specially crafted file.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 16.04 ESM
o Ubuntu 14.04 ESM
Packages
o jhead - Manipulate the non-image part of Exif compliant JPEG files
Details
It was discovered that Jhead did not properly handle certain crafted images
while processing the Exif markers. An attacker could possibly use this
issue to crash Jhead, resulting in a denial of service.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 16.04
o jhead - 1:3.00-4+deb9u1ubuntu0.1~esm4
Available with Ubuntu Pro
Ubuntu 14.04
o jhead - 1:2.97-1+deb8u2ubuntu0.1~esm4
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
o CVE-2018-6612
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=NA/O
-----END PGP SIGNATURE-----
ESB-2023.0180.3 - UPDATE [Cisco] Cisco Unified Intelligence Center: CVSS (Max): 6.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.0180.3
Cisco Unified Intelligence Center Reflected Cross-Site
Scripting Vulnerability
31 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco Unified Intelligence Center
Publisher: Cisco Systems
Operating System: Cisco
Resolution: Patch/Upgrade
CVE Names: CVE-2023-20058
Original Bulletin:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-xss-Omm8jyBX
Comment: CVSS (Max): 6.1 CVE-2023-20058 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
CVSS Source: Cisco Systems
Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Revision History: May 31 2023: Updated fixed release information
May 30 2023: Vendor updated fixed release information
January 12 2023: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability
Priority: Medium
Advisory ID: cisco-sa-cuis-xss-Omm8jyBX
First Published: 2023 January 11 16:00 GMT
Last Updated: 2023 May 30 14:22 GMT
Version 1.2: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCwc84104
CVE Names: CVE-2023-20058
CVSS Score:
6.1 AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X
Summary
o A vulnerability in the web-based management interface of Cisco Unified
Intelligence Center could allow an unauthenticated, remote attacker to
conduct a reflected cross-site scripting (XSS) attack against a user of the
interface.
This vulnerability exists because the web-based management interface does
not properly validate user-supplied input. An attacker could exploit this
vulnerability by persuading a user of the interface to click a crafted
link. A successful exploit could allow the attacker to execute arbitrary
script code in the context of the affected interface or access sensitive
browser-based information.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-xss-Omm8jyBX
Affected Products
o Vulnerable Products
At the time of publication, this vulnerability affected Cisco Unified
Intelligence Center.
The following Cisco products that may be bundled with Cisco Unified
Intelligence Center are also affected by this vulnerability:
Packaged Contact Center Enterprise (CCE)
Unified CCE
Unified Contact Center Express (CCX)
For information about which Cisco software releases were vulnerable at the
time of publication, see the Fixed Software section of this advisory. See
the Details section in the bug ID(s) at the top of this advisory for the
most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, the release information in the following table
(s) was accurate. See the Details section in the bug ID(s) at the top of
this advisory for the most complete and current information.
The left column lists Cisco software releases, and the right column
indicates whether a release was affected by the vulnerability described in
this advisory and which release included the fix for this vulnerability.
Cisco Unified Intelligence Center Release First Fixed Release
12.0(1) ^1 and earlier Migrate to a fixed release.
12.5(1) 12.5(1) SU ES02
12.6(1) 12.6(1) ES06
12.6(1) ES2 12.6(1) ES06
1. Cisco Unified Intelligence Center Release 12.0(1) has reached End of
Software Maintenance . Customers are advised to migrate to a supported
release that includes the fix for this vulnerability.
Cisco Packaged CCE Release First Fixed Release
12.0(1) ^1 and earlier Migrate to a fixed release.
12.5(1) 12.5(1) SU2 ES05
12.5(1) SU2 12.5(1) SU2 ES05
1. Cisco Packaged CCE Release 12.0(1) has reached End of Software
Maintenance . Customers are advised to migrate to a supported release that
includes the fix for this vulnerability.
Cisco Unified CCE Release First Fixed Release
12.0(1) ^1 and earlier Migrate to a fixed release.
12.5(1) 12.5(1) ES02
12.5(2) 12.6(1) ES06
12.6(1) 12.6(1) ES06
1. Cisco Unified CCE Release 12.0(1) has reached End of Software
Maintenance . Customers are advised to migrate to a supported release that
includes the fix for this vulnerability.
Cisco Unified CCX Release First Fixed Release
12.0(1) ^1 and earlier Migrate to a fixed release.
12.5(1) 12.5(1) SU3
12.5(1) SU2 12.5(1) SU3
1. Cisco Unified CCX Release 12.0(1) has reached End of Software
Maintenance . Customers are advised to migrate to a supported release that
includes the fix for this vulnerability.
The Cisco Product Security Incident Response Team (PSIRT) validates only
the affected and fixed release information that is documented in this
advisory.
Exploitation and Public Announcements
o The Cisco PSIRT is not aware of any public announcements or malicious use
of the vulnerability that is described in this advisory.
Source
o This vulnerability was found during the resolution of a Cisco TAC support
case.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
Subscribe to Cisco Security Notifications
o Subscribe
Related to This Advisory
o Cross-Site Scripting
URL
o https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-xss-Omm8jyBX
Revision History
o +---------+---------------------------+------------+--------+-------------+
| Version | Description | Section | Status | Date |
+---------+---------------------------+------------+--------+-------------+
| 1.2 | Updated fixed release | Fixed | Final | 2023-MAY-30 |
| | information. | Releases | | |
+---------+---------------------------+------------+--------+-------------+
| 1.1 | Updated fixed release | Fixed | Final | 2023-MAY-09 |
| | information. | Releases | | |
+---------+---------------------------+------------+--------+-------------+
| 1.0 | Initial public release. | - | Final | 2023-JAN-11 |
+---------+---------------------------+------------+--------+-------------+
Legal Disclaimer
o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the
distribution URL is an uncontrolled copy and may lack important information
or contain factual errors. The information in this document is intended for
end users of Cisco products.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=UAwy
-----END PGP SIGNATURE-----
ESB-2023.3071 - [Debian] sssd: CVSS (Max): 8.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3071
sssd security update
30 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: sssd
Publisher: Debian
Operating System: Debian GNU/Linux
Resolution: Patch/Upgrade
CVE Names: CVE-2022-4254 CVE-2021-3621 CVE-2019-3811
CVE-2018-16838
Original Bulletin:
https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html
Comment: CVSS (Max): 8.8 CVE-2022-4254 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3436-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
May 29, 2023 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : sssd
Version : 1.16.3-3.2+deb10u1
CVE ID : CVE-2018-16838 CVE-2019-3811 CVE-2021-3621 CVE-2022-4254
Debian Bug : 919051 931432 992710
Multiple vulnerabilities were found in sssd, a set of daemons to manage
access to remote directories and authentication mechanisms, which could
lead to privilege escalation.
CVE-2018-16838
It was discovered that when the Group Policy Objects (GPO) are not
readable by SSSD due to a too strict permission settings on the
server side, SSSD allows all authenticated users to login instead of
denying access.
A new boolean setting (defaulting to False) is introduced for environments
where attributes in the groupPolicyContainer are not readable and changing
the permissions on the GPO objects is not possible or desirable.
See sssd-ad(5).
CVE-2019-3811
It was discovered that if a user was configured with no home
directory set, then sssd(8) returns (i.e., the root directory)
instead of the empty string (meaning no home directory). This could
impact services that restrict the user's filesystem access to within
their home directory through chroot() or similar.
CVE-2021-3621
It was discovered that the sssctl(8) command was vulnerable to shell
command injection via the subcommands.
This flaw could allows an attacker to trick the root user into
running a specially crafted sssctl(8) command, such as via sudo, in
order to gain root privileges.
CVE-2022-4254
It was discovered that libsss_certmap failed to sanitize certificate
data used in LDAP filters.
PKINIT enables a client to authenticate to the KDC using an X.509
certificate and the corresponding private key, rather than a
passphrase or keytab. Mapping rules are used in order to map the
certificate presented during a PKINIT authentication request to the
corresponding principal. However the mapping filter was found to be
vulnerable to LDAP filter injection. As the search result is be
influenced by values in the certificate, which may be attacker
controlled, this flaw could allow an attacker to gain control of the
admin account, leading to full domain takeover.
For Debian 10 buster, these problems have been fixed in version
1.16.3-3.2+deb10u1.
We recommend that you upgrade your sssd packages.
For the detailed security status of sssd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/sssd
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----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=x5Zd
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=1QuI
-----END PGP SIGNATURE-----
ESB-2023.3070 - [Ubuntu] Linux PTP: CVSS (Max): 8.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3070
USN-6097-1: Linux PTP vulnerability
30 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Linux PTP
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2021-3570
Original Bulletin:
https://ubuntu.com/security/notices/USN-6097-1
Comment: CVSS (Max): 8.8 CVE-2021-3570 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6097-1: Linux PTP vulnerability
29 May 2023
Linux PTP could be made to crash, run arbitrary code, or expose sensitive
information if it received specially crafted input.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 20.04 LTS
o Ubuntu 18.04 ESM
o Ubuntu 16.04 ESM
Packages
o linuxptp - Precision Time Protocol (PTP, IEEE1588) implementation for Linux
Details
It was discovered that Linux PTP did not properly perform a length check
when forwarding a PTP message between ports. A remote attacker could
possibly use this issue to access sensitive information, execute
arbitrary code, or cause a denial of service.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 20.04
o linuxptp - 1.9.2-1ubuntu0.1
Ubuntu 18.04
o linuxptp - 1.8-1ubuntu0.1
Ubuntu 16.04
o linuxptp - 1.6-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
o CVE-2021-3570
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=rzo0
-----END PGP SIGNATURE-----
ESB-2023.3069 - [Debian] libssh: CVSS (Max): 8.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3069
libssh security update
30 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: libssh
Publisher: Debian
Operating System: Debian GNU/Linux
Resolution: Patch/Upgrade
CVE Names: CVE-2023-1667 CVE-2019-14889
Original Bulletin:
https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html
Comment: CVSS (Max): 8.8 CVE-2019-14889 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS Source: [NVD], Red Hat
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3437-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Tobias Frost
May 29, 2023 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : libssh
Version : 0.8.7-1+deb10u2
CVE ID : CVE-2019-14889 CVE-2023-1667
Debian Bug : 946548 1035832
Two security issues have been discovered in libssh, a tiny C SSH
library, which may allows an remote authenticated user to cause a denial
of service or inject arbitrary commands.
CVE-2019-14889
A flaw was found with the libssh API function ssh_scp_new() in
versions before 0.9.3 and before 0.8.8. When the libssh SCP client
connects to a server, the scp command, which includes a
user-provided path, is executed on the server-side. In case the
library is used in a way where users can influence the third
parameter of the function, it would become possible for an attacker
to inject arbitrary commands, leading to a compromise of the remote
target.
CVE-2023-1667
A NULL pointer dereference was found In libssh during re-keying with
algorithm guessing. This issue may allow an authenticated client to
cause a denial of service.
For Debian 10 buster, these problems have been fixed in version
0.8.7-1+deb10u2.
We recommend that you upgrade your libssh packages.
For the detailed security status of libssh please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libssh
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
iQIzBAABCAAdFiEE/d0M/zhkJ3YwohhskWT6HRe9XTYFAmR1IK8ACgkQkWT6HRe9
XTZfVRAApgbHqHpwjKPlHEw35hiSiUnk6hBy7wQDi1DIEq5aclOtN9HDJpoo4G7Q
Wec6QB8W1FhN/IAzm5pPIz1klt59cEDpX9H7RTLRxZ157IlPDvrGYq3OlK+DyBcq
al8ylPBBQ5FdR/N5iS9w4LEzqZN9s+GFOxzNIRWBcBBlcSXxiSPkRh7TpoFflYzy
djJCP2AfoOYfSmAvV4OV/0THKUZDx+JEAvZgWsrimORZHB4vQudG8AYA4pMEmWDp
KSwkG637rKoP8klHwZz2Ymghb/4skpaYQLa8moR0ywy5T1LR5MqdyqClURm62UZ2
ijkWVMBZvGqse8KMtUqeSo9cs6cD2t50j19MewHaGf8PzoJbgbwWN6tdB/to7dL6
DTFGILKyAsv2f7fVkrML8xnjhQTnCBk6d35lO8WQuj1jj3OOwdPWusuW4GeRcC5F
KCnCxxwuUJamaLqM+3VBWPKU/AIeNUNQ3I4iyNVx6GsVZHJMj/dVgiW4MjJ3jr0K
E8pMCgYYzz/V7b+rpEfTni6SciOe5YWoLP50NC2G9RpAPTgTDmM3liMnUXcoHilo
yKzGbeJ7alcj/K3GSSvp0n0fXMsRnreukcyT8VA3A3pGkFLpndzaXkyuT8YILyKL
mlvUmI/KiAl0OOMz/WKhnVwHb39PToKyrCoQ/0DNfZdtdjOIzlI=
=CDOK
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
iQIVAwUBZHVmkskNZI30y1K9AQg7BQ/+PPJ7MNFHd9RSE3dFiAuzAhsoahWnDuvW
+/h5Ld0oRnWSW5uttmU/uHTVyI2VS3q1pdO4x1DwUrf6iilkn2eU2aFiiNBfxzC0
kI1ZrJBWaD0ToAWYVZtT51PQ+93a/KyWudkQ3ObVZrlevX4sevbkki0pXGFAZv4K
JhQVw9IKPnWJE5nqWDJXJ3mGwNz8VS5K5P3OSm4Gmyct+vyqsQr6Taiti+ydHpEE
NsGH2o3WiqMpQyjjIDwgafWIJgffY8HYRQdbwlmU/NfTOo0NBRNo1LeC09PGG+OZ
NiLivIn8H11V7A7ieTg5Pu8ePxL9fngjAxUmMpDFEACUfk6+iQtbOCG8xvGMXoRS
AZ35ivTiQeRb9FWtY7kGHzawuAgYKGvBjlL6rKlGb4K8qel9xZ72Z7rzyOwRV58Y
bNGyKgeX5KAYXoXuF9NnbYz+Nix8fWUVDs9bFB9d5M4Mq6FI797hK+B7vRMHJdfA
OnNB3wCR8iOSRsjcoXduFPRul2gAtzqmGltHNdgry/uUXoPyMvXWKkk1whcro1rB
jGLpkRxRRoekV3Lh/tDqrLOiQ97oVQOqYE/XIa3Xs2iMVNy00mS62Ijm/2zyUw7G
Pt3LJZBHAYNH5YGKRhko2FOtBrcjLpRCmnfmWjjS3qK2B5UtdOsQydusRWYaV+UI
b9TjklOsRck=
=Shsk
-----END PGP SIGNATURE-----
ESB-2023.3068 - [Ubuntu] Jhead: CVSS (Max): 7.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2023.3068
USN-6110-1: Jhead vulnerabilities
30 May 2023
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Jhead
Publisher: Ubuntu
Operating System: Ubuntu
Resolution: Patch/Upgrade
CVE Names: CVE-2021-28277 CVE-2021-28275 CVE-2021-3496
Original Bulletin:
https://ubuntu.com/security/notices/USN-6110-1
Comment: CVSS (Max): 7.8 CVE-2021-3496 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS Source: NVD
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-6110-1: Jhead vulnerabilities
29 May 2023
Jhead could be made to crash if it opened a specially crafted file.
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Releases
o Ubuntu 23.04
o Ubuntu 22.10
o Ubuntu 22.04 LTS
o Ubuntu 20.04 LTS
o Ubuntu 18.04 ESM
o Ubuntu 16.04 ESM
o Ubuntu 14.04 ESM
Packages
o jhead - Manipulate the non-image part of Exif compliant JPEG files
Details
It was discovered that Jhead did not properly handle certain crafted Canon
images when processing them. An attacker could possibly use this issue to
crash Jhead, resulting in a denial of service. ( CVE-2021-3496 )
It was discovered that Jhead did not properly handle certain crafted images
when printing Canon-specific information. An attacker could possibly use this
issue to crash Jhead, resulting in a denial of service. ( CVE-2021-28275 )
It was discovered that Jhead did not properly handle certain crafted images
when removing unknown sections. An attacker could possibly use this issue to
crash Jhead, resulting in a denial of service. ( CVE-2021-28275 )
Kyle Brown discovered that Jhead did not properly handle certain crafted
images when editing their comments. An attacker could possibly use this to
crash Jhead, resulting in a denial of service. (LP: #2020068)
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and
Universe repositories, and it is free for up to five machines.
Learn more about Ubuntu Pro
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 23.04
o jhead - 1:3.06.0.1-6ubuntu0.23.04.1
Ubuntu 22.10
o jhead - 1:3.06.0.1-2ubuntu0.22.10.2
Ubuntu 22.04
o jhead - 1:3.06.0.1-2ubuntu0.22.04.1+esm1
Available with Ubuntu Pro
Ubuntu 20.04
o jhead - 1:3.04-1ubuntu0.2+esm1
Available with Ubuntu Pro
Ubuntu 18.04
o jhead - 1:3.00-8~ubuntu0.2+esm1
Available with Ubuntu Pro
Ubuntu 16.04
o jhead - 1:3.00-4+deb9u1ubuntu0.1~esm3
Available with Ubuntu Pro
Ubuntu 14.04
o jhead - 1:2.97-1+deb8u2ubuntu0.1~esm3
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
o CVE-2021-28277
o CVE-2021-28275
o CVE-2021-3496
o https://launchpad.net/bugs/2020068
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/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=Gem2
-----END PGP SIGNATURE-----