AusCERT - Security Bulletins

Subscribe to AusCERT - Security Bulletins hírcsatorna
Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 59 perc 1 másodperc
58 perc 29 másodperc

ESB-2023.3086 - [Win][Linux][Virtual] VMware Products: CVSS (Max): 6.1

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3086 VMware Workspace ONE Access and Identity Manager update addresses an Insecure Redirect Vulnerability 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware Workspace ONE Access (Access) VMware Identity Manager (vIDM) VMware Cloud Foundation (Cloud Foundation) Publisher: VMware Operating System: Windows Linux variants Virtualisation VMware ESX Server Resolution: Patch/Upgrade CVE Names: CVE-2023-20884 Original Bulletin: https://www.vmware.com/security/advisories/VMSA-2023-0011.html Comment: CVSS (Max): 6.1 CVE-2023-20884 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) CVSS Source: VMware Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- 1. Impacted Products VMware Workspace ONE Access (Access) VMware Identity Manager (vIDM) VMware Cloud Foundation (Cloud Foundation) 2. Introduction An insecure redirect vulnerability in Workspace ONE Access and Identity Manager was privately reported to VMware. Updates are available to address this vulnerability in affected VMware products. 3a. Insecure Redirect Vulnerability (CVE-2023-20884) Description VMware Workspace ONE Access and VMware Identity Manager contain an insecure redirect vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 6.1. Known Attack Vectors An unauthenticated malicious actor may be able to redirect a victim to an attacker controlled domain due to improper path handling leading to sensitive information disclosure. Resolution To remediate CVE-2023-20884 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' below. Workarounds None. Additional Documentation None. Notes None. Acknowledgements VMware would like to thank Hari Namburi of Wells Fargo for reporting this vulnerability to us. Response Matrix Product Version Running CVE Identifier CVSSv3 Severity Fixed Workarounds Additional On Version Documentation Workspace 22.09.1.0 Linux CVE-2023-20884 6.1 moderate KB92512 None None ONE Access Workspace 22.09.0.0 Linux CVE-2023-20884 6.1 moderate 22.09.1.0 None None ONE Access Workspace 21.08.x Linux CVE-2023-20884 6.1 moderate 22.09.1.0 None None ONE Access Workspace ONE Access All Windows CVE-2023-20884 N/A N/A Unaffected N/A N/A Connector VMware Identity 3.3.7 Linux CVE-2023-20884 6.1 moderate KB92512 None None Manager (vIDM) VMware Identity 3.3.6 Linux CVE-2023-20884 6.1 moderate 3.3.7 None None Manager (vIDM) VMware Identity Manager All Windows CVE-2023-20884 N/A N/A Unaffected N/A N/A (vIDM) Connector VMware Cloud Any Any CVE-2023-20884 6.1 moderate KB92512 None None Foundation (vIDM) 4. References VMware Workspace ONE Access 22.09.1.0 KB92512 VMware Identity Manager (vIDM) KB92512 VMware Cloud Foundation (vIDM) KB92512 Mitre CVE Dictionary Links: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20884 FIRST CVSSv3 Calculator: CVE-2023-20884: 6.1 https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/ AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N 5. Change Log 2023-05-30: VMSA-2023-0011 Initial security advisory. 6. Contact E-mail: security@vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2023 VMware Inc. All rights reserved. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaIJ8kNZI30y1K9AQj23g//Uc6j6S32mASV85KdCy4gOBIzM0WURD99 ApLVmyPMsdPktleuPLUPwa0ar2gLy4lxUWwUTtayicY/eClmIVLgqwvgEgp+Bi83 Bf9aCCSltVDUeL8plX1INrzUqt5KuJd9p+NH53ifz6FTfuEIHwS3FqmInZXl5UEF T4jZL6yx/m73pl7H5cktz8jcNKyG//wErhWCnL7BgSLll9E2PXRo1TH848IaqXoD wkNZImObYhQ4OZZYxb2Qh71QPRZ0gZ2JhpjFlzARO+QZP99AX00gdSnw7Q2zdBrc 2RkJz2w0gcH5Na9uh9W4EOFME8YHfhJakNVMY5M9W+qnjWQ0nk+D3GSpf7UNE+9G 3tD6MQnGE5Ce+FstchoBzLrSgjjcnoaB6qaEEN9QNvTGcM/mjntTqf4xl8V7xQFI MhlVTESN5ogtfkU8rYRYAPHhmbRl824dNT4eUYoGDgbNrq/jezcg8e+n6F5w61Qw WMhk2MRtIsRwQHRielQ7rmLuySQjG9YPJTYTzZ5KXZV6NZhfLrIU0L6Osu+XK8g5 WkVzy9nC2aQoDXQDCApbTRTfEwX6Wuv0nK2FayccKJRMqtGaoSfPT/cOkc0WZnPu BVAOBrvP1G33lC1Uzh786QCfBlGCVzkSwrNO1zQ8I0XC6b645Ikpzyg5FgQy5SF1 XCYd4y46rQU= =i8/5 -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3085 - [Debian] kamailio: CVSS (Max): 9.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3085 kamailio security update 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kamailio Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2020-27507 Original Bulletin: https://lists.debian.org/debian-lts-announce/2023/05/msg00030.html Comment: CVSS (Max): 9.8 CVE-2020-27507 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3438-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb May 30, 2023 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : kamailio Version : 5.2.1-1+deb10u1 CVE ID : CVE-2020-27507 It was discovered that there was a potential denial-of-service (DoS) attack in the Kamailio SIP telephony server. This was caused by the Kamailio server mishandling INVITE requests with duplicated fields. For Debian 10 buster, this problem has been fixed in version 5.2.1-1+deb10u1. We recommend that you upgrade your kamailio packages. For the detailed security status of kamailio please refer to its security tracker page at: https://security-tracker.debian.org/tracker/kamailio Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmR2DvAACgkQHpU+J9Qx HljI7g//bsD28BbX8EWWa2Cc9H5EbM5a+4Mm2p3cSagkxM0gIqSshlUJqVlkx3fR eMLsiU+Scxj9+Z65SiUboKr7y/Am3Bu4Fr9+1jLIJW+meJB7Cdm77TD8YwujgkHK wIlsGsOsx8VhWJ3zKPKOWg4+Ux1N+WFKwrItFc/Zc/6kRfPqgtP9FgJFRgSpNROV bCjxr8wA9CyBoH5mNF75kcymdR3RA0KQ28FmMLwqPXh6vKv5wBUMLQ1CR64ssxT2 IFtEIx1LMX4EmKdmO5VUEPeXmzwpZ7mCR9luSeLhtYULLH2CUEv5Fy33AGHw3y0U Ae7sUhIHENdZEnpD1nCM6+NLAeWSJ7zXTn6AFU68uoOiB3J/QFvaksSQXh3ezGFj ZtGLaXMbSBuxb8hDV6RDQulLBO2wk3hKzJ4QoSxImA0dK6K3FTdxqRmyevxNwj+p 8daKNE9Uum2VOQ1PjRugHbX3/OrKlX/383YQnEVKsdkSjVlSgFOOiefMifRW5JXD P2mzWV4YIDORAOZAXvxqm/rDeCOnLtjmKVtqMhqlIn1Kxi2bHA8WFpxde4wbUwME 2YMbbGiC+uJ6V5JjrY2zL4vBQvdps/G7VcJYPCc2zAnCo0AFYEXXIirzDm6vieLL tp2nsZ3Y86QCwxhvv5G+bGHWnT4C4AvbNQlSssFe67rYMgcPlRc= =E+nI - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaHsskNZI30y1K9AQivBxAArLUTsAhLDttD6LaflDH4s4n+k5iLmcvA 0+WPZzmE0a2U1Zsi6KHHqDl55oCkgF71bwO/qhtDBS344p0vnAhaBr+2pSeC5XJ6 2OXHXC7DUp0N1K67yKPJwFyau0j8C28xZ0FzC/uS8ElvIA+b+mZK//lRCss+9Edj OW351j1m9lIsA7BXKWK2qMAwB9AHU/Kh/cZJoM3zrH5/TpzppWs5afG0ffQ1qZjY b1cfOX0quueWYy8OnQ0wwmnNUYysGo6gf0ZZKIGG1SxmWICsdN1Wce4/pw5ByVXf ds3b0ncdV10Uaq6bPpE835Mzhr7dkHVn7gy432doz0n0KKIvFrI+0iE5vhYJGudW mQyZZUwtokRYuSB7y9m9RT27AtDKStRKUS6TQGdGO3AM8UYPRhIRQLf7Sxx/sCvf +/zfOUa7k2KSU8qzqlDZAXiQdA++A998pA/4f8JkoYJUCVLIgYRP6xnuHiboQvZT 0Lvi9PBOSuLu7HSLatAbbx9ALXbs4hnkQ+5gKBGwWQuFdllUtv5UlY0wa4YC9CI6 azKF1BLIrPiskLIbbSnU8nh2lAP+nRtQti33FgjYANt+6evQNBiKRFYIUoy0Fuyl sUCYB8f+Zusx3DV/8OUKtzCmevvZ3DGtH1oZPpHX2evBbu/mYddu0a0FZFnV0Yi9 Q/raw55j7/o= =Ci+I -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3084 - [Debian] connman: CVSS (Max): 6.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3084 connman security update 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: connman Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2023-28488 Original Bulletin: https://lists.debian.org/debian-security-announce/2023/msg00107.html Comment: CVSS (Max): 6.5 CVE-2023-28488 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-5416-1 security@debian.org https://www.debian.org/security/ Aron Xu May 31, 2023 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : connman CVE ID : CVE-2023-28488 Debian Bug : 1034393 It was discovered that there was a potential buffer overflow and denial of service vulnerabilty in the gdhcp client implementation of connman, a command-line network manager designed for use on embedded devices. For the stable distribution (bullseye), this problem has been fixed in version 1.36-2.2+deb11u2. We recommend that you upgrade your connman packages. For the detailed security status of connman please refer to its security tracker page at: https://security-tracker.debian.org/tracker/connman Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEhhz+aYQl/Bp4OTA7O1LKKgqv2VQFAmR2MiEACgkQO1LKKgqv 2VQR/QgApr1QeIQIfrW7WfJYD0C0xVXhLuO2X1D2yxgUjHIEChpaWu7ogcOh3dBN QkZAWmsWqFs/TnCdrltt8txJHfBz/PYkzPjwBN/CHZjW2t7HxCZqmA3tnuHGtzot JRQD5G2d1W5ycJUL88ZWar0GKn98nwdsxTCRy8mi157Gy588pTrQbS+P9HtTK0I0 eUysoupKoEb2HGgn6nlpQJoRWqJnqkv7FmB6jOecP4ivAnmjwiciwMztIvggsJ+y jYns6BXLzNQyU5T0ch2a2Mduddm4iR9Ax7KV8fv8+UIEEzwp+2tCKctV/yAmQodg K3LJsgIkoFMJBMjevuozcp8o6QNbZw== =e5Qs - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaHnskNZI30y1K9AQi9jg//UkiMlblOeQXraXnyl+xms6lIrr3toe2Z KhuF/RaBa7bo4AEhdCL6LT7SunH462XDgi6PzJm/Ysd0GZ0A+z7ZTOHYpBybj6pj TecMAa8ZLQ8l0rNEjdQyXI0Kemj+IfVtyKyiuQTgoffG8b5IbP1fI92DcjJx/yN3 jMuqop97RFMvVuSeYaOiq7aWxXlUJemThIBPdz2C5OaG26EMrcIliZmx02gkxmxn 6MLvendZbCeVvciLfLwOnCGTvV1kkwJp1S9vB3MrMWmuMV2Y6qSFXA3Q/4jCIOWm PWDhNOUXwYsLimqT9bHyriEH/hl+thC1J2QlSUkfFmoYRk9U1vHtIzkzFHEHhwA3 3gNVOmmiAHagj74MFEHRk+5NwAg/bLaJuS1r0l2n0JYp1cDI/cKnYgGu8nqqOevG 3/hVMbuyy0Hpoo2dECbjkE4sbBwlvIqByvKDs4qR3/rLViPyY5XqPev8a8hWbHyF l3zMhJuR5BIIxU2LkAQ0OgZV48m3ZDxIEF4XYvDai7Mt5mFCkgkP1EloGBqn5NBk 9Rh5472yFgbtSQMBJm9FE/5R8oObofRVHyGJsWRUjgaRWZEYAeXA9NYstjQzlY+O NxTQ9xJVYQjSw5/f33ukKxObZvVbTsTTMc6XjKX/begV6CRv2Tgl3VvhAZOwSUzE nvYuNfyIMcY= =s4b+ -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3083 - [Appliance] Advantech WebAccess/SCADA: CVSS (Max): 7.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3083 ICS Advisory | ICSA-23-150-01 Advantech WebAccess/SCADA 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Advantech WebAccess/SCADA Publisher: ICS-CERT Operating System: Network Appliance Resolution: Patch/Upgrade CVE Names: CVE-2023-2866 Original Bulletin: https://www.cisa.gov/news-events/ics-advisories/icsa-23-150-01 Comment: CVSS (Max): 7.3 CVE-2023-2866 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) CVSS Source: ICS-CERT Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- ICS Advisory (ICSA-23-150-01) Advantech WebAccess/SCADA Release Date May 30, 2023 1. EXECUTIVE SUMMARY o CVSS v3 7.3 o ATTENTION: Low attack complexity o Vendor: Advantech o Equipment: WebAccess/SCADA o Vulnerabilities: Insufficient Type Distinction 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker full control over the supervisory control and data acquisition (SCADA) server. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Advantech reports this vulnerability affect the following WebAccess/SCADA product: o WebAccess/SCADA: version 8.4.5 3.2 VULNERABILITY OVERVIEW 3.2.1 INSUFFICIENT TYPE DISTINCTION CWE-351 If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server. CVE-2023-2866 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:L/UI:R/S:U/ C:H/I:H/A:H ). 3.3 BACKGROUND o CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing, Energy, Water and Wastewater Systems o COUNTRIES/AREAS DEPLOYED: East Asia, Europe, United States o COMPANY HEADQUARTERS LOCATION: Taiwan 3.4 RESEARCHER Marlon Luis Petry reported this vulnerability to CISA. 4. MITIGATIONS Advantech recommends users locate and delete the "WADashboardSetup.msi" file to avoid this issue. If users wish to remedy this problem in version 8.4.5, they can uninstall "WebAccess Dashboard" from the control panel. Delete all the files: 1. \Inetpub\wwwroot\broadweb\WADashboard 2. \WebAccess\Node\WADashboardSetup.msi Advantech released a new version V9.1.4 to address the problem by not including these files. CISA recommends users take the following measures to protect themselves from social engineering attacks: o Do not click web links or open attachments in unsolicited email messages. o Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. o Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics . Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies . Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies . Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploits specifically target this vulnerability. This vulnerability is not exploitable remotely. Related Advisories May 25, 2023 ICS Advisory | ICSA-23-145-01 Moxa MXsecurity Series May 23, 2023 ICS Advisory | ICSA-23-143-02 Hitachi Energy's RTU500 Series Product May 23, 2023 ICS Advisory | ICSA-23-143-03 Mitsubishi Electric MELSEC Series CPU module May 23, 2023 ICS Advisory | ICSA-23-143-01 Hitachi Energy's AFS65x, AFS67x, AFR67x and AFF66x Products - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaHgMkNZI30y1K9AQibWBAAtgim9kK0IYn7VKkBdCCWIilHPNWB1IG3 KGfGy2+30yf2JkxPQcqkxYwssGjMykGSXkGu+R+QjAn3ccXQs7VXDt+Nm+IUHEyE wMnkZ7dhi5zllUxUXK2l3orVZF+HuQNcRTNd8X3ZzWpwQM7NK/vP6OuvqhNUGifO NbBe9ZSsWtsdUK6I/4v+YOuRUamTaoncRkjXhQkrf1iTY5OmOu6zsRrFeNPFfI7t l2a/VDuHZwZlF1TLJ/LttkDxzpxep+iiXBm9BwroyyS/KP6rtvJ/vkLpL06s7Mjt iS2sXn+e71FbtdR+vRXtuM7xIA1sVmp4v2Ra38ZHjLbJkkfOW6/EikQyjyxHU0t/ xju2s3giWosUMWxztmJkRPUjBEHskA6EfwkCzKMLFUfxXiyOFJJMsJ8aJimGvwvh eFssA6XK/HZ5yTxbA2/+riFzI5JNLxQvMUQPYCW43h7zr2CjFnwn8occtNZLoF6J 2jl8GVfBX31JNK+tWEUJuRnmoGbOzKqzg+vzBAjjD+iLiqKmvurzPaD8So6a891s o16hIB6OMfmK4d/WGvDahsSxW5Ro6UpLd+Bem9YWEVuDivS9/9iULPyH6btly1vs wEx4A3/bnUXFNVdbdTSNUKYlH+6yu1W1rPWNyv7AF4y5dwj/uT6Zx8uths4mkRoR /cML6J6UWUY= =NiXc -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3082 - [Ubuntu] Linux kernel (OEM): CVSS (Max): 7.8*

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3082 USN-6124-1: Linux kernel (OEM) vulnerabilities 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux kernel (OEM) Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2023-32233 CVE-2023-30456 CVE-2023-2612 CVE-2023-1670 CVE-2022-4139 CVE-2022-3586 Original Bulletin: https://ubuntu.com/security/notices/USN-6124-1 Comment: CVSS (Max): 7.8* CVE-2023-32233 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * Not all CVSS available when published - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6124-1: Linux kernel (OEM) vulnerabilities 30 May 2023 Several security issues were fixed in the Linux kernel. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 22.04 LTS Packages o linux-oem-5.17 - Linux kernel for OEM systems Details Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2023-32233 ) Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). ( CVE-2023-30456 ) Gwnaun Jung discovered that the SFB packet scheduling implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2022-3586 ) It was discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. ( CVE-2022-4139 ) It was discovered that the Xircom PCMCIA network device driver in the Linux kernel did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). ( CVE-2023-1670 ) Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock). ( CVE-2023-2612 ) Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 o linux-image-oem-22.04 - 5.17.0.1032.30 o linux-image-oem-22.04a - 5.17.0.1032.30 o linux-image-5.17.0-1032-oem - 5.17.0-1032.33 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References o CVE-2023-30456 o CVE-2023-32233 o CVE-2023-2612 o CVE-2022-4139 o CVE-2022-3586 o CVE-2023-1670 Related notices o USN-6033-1 : linux-image-oem-22.04c, linux-image-unsigned-6.1.0-1009-oem, linux-modules-ivsc-oem-22.04c, linux-oem-22.04c, linux-headers-oem-22.04c, linux-modules-6.1.0-1009-oem, linux-oem-6.1, linux-image-6.1.0-1009-oem, linux-oem-6.1-tools-6.1.0-1009, linux-modules-ipu6-oem-22.04c, linux-modules-ivsc-6.1.0-1009-oem, linux-tools-6.1.0-1009-oem, linux-oem-6.1-headers-6.1.0-1009, linux-headers-6.1.0-1009-oem, linux-modules-ipu6-6.1.0-1009-oem, linux-tools-oem-22.04c, linux-buildinfo-6.1.0-1009-oem, linux-oem-6.1-tools-host o USN-6123-1 : linux-modules-ivsc-6.0.0-1017-oem, linux-modules-iwlwifi-6.0.0-1017-oem, linux-headers-6.0.0-1017-oem, linux-oem-22.04b, linux-oem-6.0, linux-oem-6.0-tools-6.0.0-1017, linux-image-oem-22.04b, linux-modules-iwlwifi-oem-22.04b, linux-oem-6.0-headers-6.0.0-1017, linux-tools-6.0.0-1017-oem, linux-modules-6.0.0-1017-oem, linux-image-6.0.0-1017-oem, linux-modules-ipu6-6.0.0-1017-oem, linux-modules-ipu6-oem-22.04b, linux-image-unsigned-6.0.0-1017-oem, linux-buildinfo-6.0.0-1017-oem, linux-headers-oem-22.04b, linux-tools-oem-22.04b, linux-oem-6.0-tools-host, linux-modules-ivsc-oem-22.04b o USN-6122-1 : linux-tools-6.1.0-1013-oem, linux-headers-6.1.0-1013-oem, linux-image-unsigned-6.1.0-1013-oem, linux-oem-6.1, linux-headers-oem-22.04c, linux-oem-6.1-tools-6.1.0-1013, linux-image-6.1.0-1013-oem, linux-oem-6.1-tools-host, linux-modules-iwlwifi-6.1.0-1013-oem, linux-modules-iwlwifi-oem-22.04c, linux-tools-oem-22.04c, linux-image-oem-22.04c, linux-oem-22.04c, linux-modules-ipu6-6.1.0-1013-oem, linux-modules-ivsc-oem-22.04c, linux-modules-ipu6-oem-22.04c, linux-buildinfo-6.1.0-1013-oem, linux-modules-ivsc-6.1.0-1013-oem, linux-modules-6.1.0-1013-oem, linux-oem-6.1-headers-6.1.0-1013 o USN-5859-1 : linux-modules-iwlwifi-oem-20.04d, linux-image-oem-20.04d, linux-headers-5.14.0-1057-oem, linux-oem-20.04b, linux-headers-oem-20.04c, linux-oem-5.14-tools-5.14.0-1057, linux-modules-iwlwifi-5.14.0-1057-oem, linux-oem-20.04c, linux-tools-oem-20.04b, linux-image-oem-20.04b, linux-oem-5.14-tools-host, linux-tools-oem-20.04, linux-image-unsigned-5.14.0-1057-oem, linux-tools-oem-20.04c, linux-image-oem-20.04c, linux-tools-5.14.0-1057-oem, linux-modules-iwlwifi-oem-20.04, linux-oem-5.14-headers-5.14.0-1057, linux-buildinfo-5.14.0-1057-oem, linux-tools-oem-20.04d, linux-modules-5.14.0-1057-oem, linux-headers-oem-20.04d, linux-oem-20.04, linux-headers-oem-20.04b, linux-oem-20.04d, linux-oem-5.14, linux-headers-oem-20.04, linux-image-5.14.0-1057-oem, linux-image-oem-20.04 o USN-5912-1 : linux-azure-5.15, linux-buildinfo-5.15.0-67-lowlatency, linux-image-unsigned-5.15.0-67-generic, linux-azure-fde-edge, linux-lowlatency-hwe-5.15-headers-5.15.0-67, linux-tools-generic, linux-headers-5.15.0-67-lowlatency-64k, linux-gke-5.15-headers-5.15.0-1028, linux-modules-5.15.0-1028-gke, linux-modules-extra-gcp, linux-virtual, linux-cloud-tools-5.15.0-1031-aws, linux-generic-lpae-hwe-20.04-edge, linux-image-azure, linux-gcp-5.15-tools-5.15.0-1030, linux-tools-lowlatency-64k, linux-cloud-tools-virtual, linux-azure, linux-image-lowlatency-hwe-20.04, linux-image-unsigned-5.15.0-1034-azure, linux-modules-extra-5.15.0-1034-azure, linux-image-extra-virtual-hwe-20.04-edge, linux-modules-extra-aws-lts-22.04, linux-oracle-5.15-headers-5.15.0-1030, linux-tools-aws-lts-22.04, linux-gke-5.15, linux-image-generic-hwe-20.04, linux-tools-azure-edge, linux-headers-aws-lts-22.04, linux-gcp-edge, linux-image-virtual-hwe-20.04-edge, linux-source, linux-image-5.15.0-67-generic-lpae, linux-tools-generic-lpae-hwe-20.04, linux-buildinfo-5.15.0-1034-azure, linux-image-lowlatency, linux-buildinfo-5.15.0-67-lowlatency-64k, linux-tools-aws, linux-gcp-5.15-headers-5.15.0-1030, linux-headers-virtual, linux-aws-5.15-tools-5.15.0-1031, linux-headers-azure-fde-edge, linux-tools-gcp-edge, linux-gcp, linux-lowlatency-tools-common, linux-modules-extra-5.15.0-1031-aws, linux-headers-aws, linux-cloud-tools-generic, linux-headers-azure, linux-tools-lowlatency-hwe-20.04, linux-modules-extra-5.15.0-67-generic, linux-headers-5.15.0-1030-gcp, linux-image-aws-lts-22.04, linux-lowlatency-hwe-20.04, linux-azure-edge, linux-hwe-5.15-cloud-tools-common, linux-modules-iwlwifi-5.15.0-1030-gcp, linux-image-5.15.0-1034-azure, linux-tools-host, linux-gke-headers-5.15.0-1028, linux-azure-5.15-headers-5.15.0-1034, linux-generic-64k, linux-image-gke, linux-image-oracle, linux-virtual-hwe-20.04-edge, linux-oem-20.04, linux-modules-extra-5.15.0-1030-oracle, linux-hwe-5.15-tools-host, linux-image-unsigned-5.15.0-1028-gke, linux-tools-5.15.0-1034-azure, linux-aws-edge, linux-image-aws, linux-tools-common, linux-gke-5.15-tools-5.15.0-1028, linux-image-azure-edge, linux-tools-generic-64k, linux-headers-5.15.0-1028-gke, linux-headers-5.15.0-1034-azure, linux-tools-azure-lts-22.04, linux-image-oem-20.04, linux-modules-extra-azure-fde, linux-gke, linux-image-generic-hwe-20.04-edge, linux-tools-azure, linux-hwe-5.15-headers-5.15.0-67, linux-lowlatency-headers-5.15.0-67, linux-azure-fde, linux-headers-generic-lpae-hwe-20.04-edge, linux-headers-5.15.0-67-generic, linux-modules-extra-5.15.0-1030-gcp, linux-modules-extra-aws-edge, linux-tools-5.15.0-1028-gke, linux-generic-lpae, linux-aws-lts-22.04, linux-image-unsigned-5.15.0-1030-gcp, linux-buildinfo-5.15.0-1031-aws, linux-lowlatency-64k-hwe-20.04, linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-67, linux-tools-gke, linux-tools-azure-fde-edge, linux-generic-hwe-20.04, linux-gcp-5.15, linux-tools-lowlatency-hwe-20.04-edge, linux-tools-lowlatency-64k-hwe-20.04, linux-doc, linux-azure-lts-22.04, linux-buildinfo-5.15.0-67-generic-64k, linux-azure-tools-5.15.0-1034, linux-image-unsigned-5.15.0-1030-oracle, linux-image-aws-edge, linux-headers-gcp-edge, linux-headers-lowlatency-64k-hwe-20.04, linux-cloud-tools-5.15.0-67-lowlatency, linux-cloud-tools-azure-edge, linux-oracle-tools-5.15.0-1030, linux-headers-gke, linux-image-azure-lts-22.04, linux-headers-virtual-hwe-20.04, linux-modules-extra-5.15.0-1028-gke, linux-cloud-tools-azure-fde, linux-modules-extra-azure-fde-edge, linux-image-unsigned-5.15.0-67-lowlatency-64k, linux-aws-headers-5.15.0-1031, linux-hwe-5.15-source-5.15.0, linux-tools-5.15.0-1030-gcp, linux-modules-iwlwifi-5.15.0-67-lowlatency, linux-lowlatency-hwe-5.15, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-image-virtual, linux-buildinfo-5.15.0-1030-oracle, linux-headers-lowlatency-hwe-20.04, linux-lowlatency-cloud-tools-common, linux-azure-5.15-cloud-tools-5.15.0-1034, linux-image-generic-64k, linux-aws-cloud-tools-5.15.0-1031, linux-cloud-tools-5.15.0-67-generic, linux-headers-5.15.0-67-lowlatency, linux-headers-azure-lts-22.04, linux-azure-headers-5.15.0-1034, linux-image-azure-fde, linux-image-extra-virtual, linux-lowlatency-64k, linux-lowlatency-cloud-tools-5.15.0-67, linux-lowlatency-hwe-5.15-cloud-tools-common, linux-headers-lowlatency-hwe-20.04-edge, linux-headers-oracle-edge, linux-tools-aws-edge, linux-azure-cloud-tools-5.15.0-1034, linux-image-unsigned-5.15.0-67-lowlatency, linux-gke-edge, linux-lowlatency-hwe-20.04-edge, linux-oracle, linux-tools-oracle-edge, linux-cloud-tools-common, linux-gcp-tools-5.15.0-1030, linux-image-unsigned-5.15.0-67-generic-64k, linux-modules-iwlwifi-generic-hwe-20.04-edge, linux-lowlatency-tools-5.15.0-67, linux-headers-oem-20.04, linux-generic-lpae-hwe-20.04, linux-headers-generic-hwe-20.04, linux-modules-extra-azure, linux-image-generic-lpae-hwe-20.04-edge, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-hwe-5.15, linux-image-generic-lpae-hwe-20.04, linux-image-unsigned-5.15.0-1031-aws, linux-hwe-5.15-tools-common, linux-tools-virtual, linux-modules-5.15.0-67-generic-64k, linux-headers-azure-edge, linux-image-5.15.0-67-lowlatency, linux-modules-extra-gcp-edge, linux-tools-5.15.0-67-lowlatency, linux-headers-5.15.0-1031-aws, linux-tools-5.15.0-67-lowlatency-64k, linux-tools-5.15.0-1030-oracle, linux-buildinfo-5.15.0-67-generic-lpae, linux-tools-azure-fde, linux-tools-generic-hwe-20.04-edge, linux-tools-gcp, linux-modules-5.15.0-67-lowlatency-64k, linux-tools-lowlatency, linux-aws-tools-5.15.0-1031, linux-tools-5.15.0-1031-aws, linux-tools-oem-20.04, linux-modules-5.15.0-1031-aws, linux-cloud-tools-lowlatency, linux-generic-64k-hwe-20.04-edge, linux-headers-generic-64k, linux-image-extra-virtual-hwe-20.04, linux-modules-iwlwifi-5.15.0-67-generic, linux-tools-generic-lpae-hwe-20.04-edge, linux-aws-5.15-cloud-tools-5.15.0-1031, linux-oracle-5.15, linux-tools-5.15.0-67-generic-lpae, linux-hwe-5.15-tools-5.15.0-67, linux-modules-5.15.0-67-generic, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-headers-gke-5.15, linux-image-unsigned-5.15.0-1034-azure-fde, linux-modules-iwlwifi-generic, linux-image-5.15.0-67-generic-64k, linux-tools-oracle, linux-aws-5.15, linux-image-gcp-edge, linux-cloud-tools-5.15.0-67, linux-oracle-headers-5.15.0-1030, linux-source-5.15.0, linux-image-lowlatency-64k-hwe-20.04-edge, linux-image-gke-edge, linux-generic, linux-tools-gke-edge, linux-modules-extra-azure-lts-22.04, linux-headers-gke-edge, linux-gcp-headers-5.15.0-1030, linux-modules-iwlwifi-generic-hwe-20.04, linux-headers-gcp, linux-lowlatency, linux-image-generic, linux-headers-generic-64k-hwe-20.04-edge, linux-cloud-tools-azure, linux-headers-5.15.0-1030-oracle, linux, linux-image-5.15.0-67-generic, linux-libc-dev, linux-cloud-tools-azure-lts-22.04, linux-headers-aws-edge, linux-headers-generic, linux-image-5.15.0-1030-gcp, linux-headers-5.15.0-67-generic-64k, linux-headers-lowlatency, linux-hwe-5.15-cloud-tools-5.15.0-67, linux-lowlatency-hwe-5.15-tools-host, linux-headers-5.15.0-67-generic-lpae, linux-headers-generic-hwe-20.04-edge, linux-buildinfo-5.15.0-67-generic, linux-image-gcp, linux-image-5.15.0-1034-azure-fde, linux-image-generic-64k-hwe-20.04, linux-tools-virtual-hwe-20.04-edge, linux-headers-5.15.0-67, linux-modules-5.15.0-67-generic-lpae, linux-image-5.15.0-67-lowlatency-64k, linux-cloud-tools-5.15.0-1034-azure, linux-tools-gke-5.15, linux-tools-virtual-hwe-20.04, linux-oracle-5.15-tools-5.15.0-1030, linux-cloud-tools-lowlatency-hwe-20.04, linux-image-lowlatency-hwe-20.04-edge, linux-headers-lowlatency-64k, linux-oracle-edge, linux-tools-generic-hwe-20.04, linux-virtual-hwe-20.04, linux-image-azure-fde-edge, linux-image-virtual-hwe-20.04, linux-generic-64k-hwe-20.04, linux-aws-5.15-headers-5.15.0-1031, linux-modules-5.15.0-67-lowlatency, linux-modules-5.15.0-1030-gcp, linux-tools-generic-lpae, linux-tools-generic-64k-hwe-20.04, linux-buildinfo-5.15.0-1030-gcp, linux-crashdump, linux-headers-generic-64k-hwe-20.04, linux-azure-5.15-tools-5.15.0-1034, linux-headers-azure-fde, linux-image-lowlatency-64k-hwe-20.04, linux-image-oracle-edge, linux-lowlatency-64k-hwe-20.04-edge, linux-modules-5.15.0-1030-oracle, linux-lowlatency-tools-host, linux-image-gke-5.15, linux-modules-iwlwifi-5.15.0-1028-gke, linux-headers-generic-lpae, linux-tools-5.15.0-67-generic, linux-gke-tools-5.15.0-1028, linux-image-5.15.0-1030-oracle, linux-cloud-tools-virtual-hwe-20.04-edge, linux-buildinfo-5.15.0-1028-gke, linux-cloud-tools-azure-fde-edge, linux-headers-virtual-hwe-20.04-edge, linux-cloud-tools-generic-hwe-20.04, linux-image-generic-lpae, linux-modules-extra-azure-edge, linux-cloud-tools-virtual-hwe-20.04, linux-tools-5.15.0-67, linux-tools-5.15.0-67-generic-64k, linux-image-lowlatency-64k, linux-modules-5.15.0-1034-azure, linux-lowlatency-hwe-5.15-tools-common, linux-image-5.15.0-1028-gke, linux-generic-hwe-20.04-edge, linux-modules-extra-aws, linux-cloud-tools-generic-hwe-20.04-edge, linux-lowlatency-hwe-5.15-tools-5.15.0-67, linux-headers-oracle, linux-image-generic-64k-hwe-20.04-edge, linux-headers-generic-lpae-hwe-20.04, linux-tools-generic-64k-hwe-20.04-edge, linux-image-5.15.0-1031-aws, linux-aws o USN-5917-1 : linux-gkeop-headers-5.4.0-1065, linux-tools-generic, linux-modules-5.4.0-1087-kvm, linux-image-unsigned-5.4.0-1097-aws, linux-tools-5.4.0-1087-kvm, linux-tools-virtual-hwe-18.04-edge, linux-aws-headers-5.4.0-1097, linux-image-5.4.0-144-lowlatency, linux-modules-extra-azure-lts-20.04, linux-virtual, linux-generic-lpae-hwe-18.04-edge, linux-hwe-5.4-cloud-tools-5.4.0-144, linux-image-5.4.0-144-generic, linux-image-azure, linux-oem-osp1-tools-host, linux-cloud-tools-virtual, linux-azure, linux-headers-5.4.0-1104-azure, linux-kvm-tools-5.4.0-1087, linux-headers-5.4.0-1101-gcp, linux-oracle-5.4-tools-5.4.0-1094, linux-modules-extra-gkeop-5.4, linux-image-oem-osp1, linux-tools-azure-edge, linux-azure-5.4-cloud-tools-5.4.0-1104, linux-source, linux-buildinfo-5.4.0-1097-aws, linux-image-lowlatency, linux-buildinfo-5.4.0-1094-oracle, linux-oem-tools-host, linux-tools-aws, linux-headers-virtual, linux-azure-lts-20.04, linux-image-aws-lts-20.04, linux-gcp, linux-buildinfo-5.4.0-1095-gke, linux-headers-aws, linux-cloud-tools-generic, linux-headers-5.4.0-1094-oracle, linux-headers-5.4.0-1097-aws, linux-headers-azure, linux-headers-gcp-lts-20.04, linux-image-unsigned-5.4.0-1104-azure, linux-cloud-tools-5.4.0-144-generic, linux-azure-edge, linux-headers-snapdragon-hwe-18.04-edge, linux-tools-5.4.0-144, linux-tools-aws-lts-20.04, linux-tools-lowlatency-hwe-18.04-edge, linux-aws-lts-20.04, linux-tools-host, linux-tools-oracle-lts-20.04, linux-image-gke, linux-image-oracle, linux-tools-5.4.0-144-lowlatency, linux-modules-5.4.0-1097-aws, linux-buildinfo-5.4.0-1101-gcp, linux-virtual-hwe-18.04, linux-tools-oem-osp1, linux-cloud-tools-gkeop-5.4, linux-aws-edge, linux-gke-tools-5.4.0-1095, linux-hwe-5.4-cloud-tools-common, linux-buildinfo-5.4.0-1087-kvm, linux-image-aws, linux-image-snapdragon-hwe-18.04, linux-tools-common, linux-image-azure-edge, linux-image-snapdragon-hwe-18.04-edge, linux-buildinfo-5.4.0-1104-azure, linux-modules-5.4.0-1101-gcp, linux-image-generic-hwe-18.04, linux-image-unsigned-5.4.0-1094-oracle, linux-headers-kvm, linux-gke, linux-modules-extra-5.4.0-1065-gkeop, linux-image-5.4.0-1094-oracle, linux-image-virtual-hwe-18.04-edge, linux-headers-5.4.0-144, linux-hwe-5.4-tools-5.4.0-144, linux-image-5.4.0-1104-azure, linux-image-gke-5.4, linux-modules-5.4.0-1104-azure, linux-modules-5.4.0-144-generic-lpae, linux-oracle-5.4, linux-modules-extra-virtual-hwe-18.04, linux-oracle-tools-5.4.0-1094, linux-image-unsigned-5.4.0-1101-gcp, linux-tools-5.4.0-1104-azure, linux-generic-lpae, linux-buildinfo-5.4.0-144-generic-lpae, linux-snapdragon-hwe-18.04-edge, linux-tools-gke, linux-snapdragon-hwe-18.04, linux-cloud-tools-5.4.0-1097-aws, linux-gcp-lts-20.04, linux-image-5.4.0-1101-gcp, linux-image-virtual-hwe-18.04, linux-modules-extra-gkeop, linux-cloud-tools-generic-hwe-18.04, linux-doc, linux-headers-5.4.0-144-lowlatency, linux-headers-aws-lts-20.04, linux-image-extra-virtual-hwe-18.04, linux-tools-5.4.0-1065-gkeop, linux-azure-5.4-headers-5.4.0-1104, linux-tools-5.4.0-1101-gcp, linux-tools-gke-5.4, linux-image-aws-edge, linux-headers-generic-lpae-hwe-18.04, linux-image-extra-virtual-hwe-18.04-edge, linux-modules-extra-oracle-edge, linux-cloud-tools-azure-edge, linux-tools-5.4.0-1095-gke, linux-image-gcp-lts-20.04, linux-headers-gke, linux-signed-image-azure, linux-modules-extra-5.4.0-1101-gcp, linux-cloud-tools-azure-lts-20.04, linux-image-5.4.0-144-generic-lpae, linux-modules-extra-5.4.0-144-generic, linux-lowlatency-hwe-18.04-edge, linux-hwe-5.4, linux-image-virtual, linux-generic-hwe-18.04-edge, linux-headers-oracle-lts-20.04, linux-modules-5.4.0-144-lowlatency, linux-tools-5.4.0-1097-aws, linux-headers-gke-5.4, linux-image-extra-virtual, linux-modules-extra-5.4.0-1097-aws, linux-tools-5.4.0-144-generic, linux-gkeop-cloud-tools-5.4.0-1065, linux-modules-extra-5.4.0-1094-oracle, linux-aws-tools-5.4.0-1097, linux-aws-5.4-tools-5.4.0-1097, linux-hwe-5.4-tools-common, linux-image-gkeop, linux-image-generic-lpae-hwe-18.04-edge, linux-modules-5.4.0-144-generic, linux-image-oem, linux-cloud-tools-virtual-hwe-18.04-edge, linux-headers-oracle-edge, linux-tools-aws-edge, linux-oracle, linux-tools-oracle-edge, linux-signed-image-azure-edge, linux-cloud-tools-common, linux-tools-generic-hwe-18.04, linux-headers-gkeop, linux-cloud-tools-lowlatency-hwe-18.04, linux-kvm, linux-modules-extra-azure, linux-gcp-tools-5.4.0-1101, linux-headers-virtual-hwe-18.04, linux-image-generic-lpae-hwe-18.04, linux-modules-5.4.0-1065-gkeop, linux-modules-extra-gke, linux-tools-generic-hwe-18.04-edge, linux-headers-generic-hwe-18.04, linux-headers-azure-edge, linux-tools-virtual, linux-modules-5.4.0-1095-gke, linux-tools-generic-lpae-hwe-18.04-edge, linux-cloud-tools-gkeop, linux-aws-5.4-headers-5.4.0-1097, linux-headers-5.4.0-144-generic-lpae, linux-image-5.4.0-1065-gkeop, linux-headers-5.4.0-1087-kvm, linux-tools-lowlatency, linux-gkeop-5.4, linux-image-lowlatency-hwe-18.04, linux-modules-extra-aws-lts-20.04, linux-cloud-tools-5.4.0-144-lowlatency, linux-gke-headers-5.4.0-1095, linux-cloud-tools-lowlatency, linux-cloud-tools-generic-hwe-18.04-edge, linux-generic-hwe-18.04, linux-buildinfo-5.4.0-1065-gkeop, linux-image-gkeop-5.4, linux-tools-gkeop-5.4, linux-aws-5.4, linux-modules-extra-5.4.0-1104-azure, linux-cloud-tools-lowlatency-hwe-18.04-edge, linux-image-oracle-lts-20.04, linux-image-unsigned-5.4.0-144-lowlatency, linux-cloud-tools-5.4.0-144, linux-tools-5.4.0-1094-oracle, linux-tools-oracle, linux-image-5.4.0-1087-kvm, linux-headers-5.4.0-1065-gkeop, linux-tools-generic-lpae-hwe-18.04, linux-headers-lowlatency-hwe-18.04, linux-modules-extra-gke-5.4, linux-oem, linux-azure-5.4-tools-5.4.0-1104, linux-gke-5.4, linux-headers-5.4.0-144-generic, linux-tools-kvm, linux-generic, linux-azure-cloud-tools-5.4.0-1104, linux-image-unsigned-5.4.0-1087-kvm, linux-hwe-5.4-headers-5.4.0-144, linux-headers-lowlatency-hwe-18.04-edge, linux-headers-oem, linux-aws-5.4-cloud-tools-5.4.0-1097, linux-image-generic, linux-lowlatency, linux-oracle-5.4-headers-5.4.0-1094, linux-signed-oracle, linux-cloud-tools-azure, linux-oem-osp1, linux, linux-libc-dev, linux-image-lowlatency-hwe-18.04-edge, linux-headers-aws-edge, linux-cloud-tools-5.4.0-1065-gkeop, linux-headers-azure-lts-20.04, linux-headers-generic, linux-cloud-tools-virtual-hwe-18.04, linux-headers-lowlatency, linux-modules-extra-aws-edge, linux-modules-extra-oracle, linux-tools-5.4.0-144-generic-lpae, linux-tools-azure, linux-tools-lowlatency-hwe-18.04, linux-buildinfo-5.4.0-144-lowlatency, linux-azure-5.4, linux-modules-extra-5.4.0-1095-gke, linux-headers-virtual-hwe-18.04-edge, linux-signed-image-oracle-edge, linux-image-azure-lts-20.04, linux-virtual-hwe-18.04-edge, linux-image-unsigned-5.4.0-144-generic, linux-buildinfo-5.4.0-144-generic, linux-modules-5.4.0-1094-oracle, linux-oracle-edge, linux-headers-oem-osp1, linux-image-unsigned-5.4.0-1065-gkeop, linux-modules-extra-gcp-lts-20.04, linux-tools-snapdragon-hwe-18.04, linux-azure-headers-5.4.0-1104, linux-signed-oracle-edge, linux-headers-snapdragon-hwe-18.04, linux-signed-azure-edge, linux-tools-generic-lpae, linux-cloud-tools-5.4.0-1104-azure, linux-gkeop, linux-crashdump, linux-image-oracle-edge, linux-tools-snapdragon-hwe-18.04-edge, linux-gkeop-tools-5.4.0-1065, linux-tools-oem, linux-image-unsigned-5.4.0-1095-gke, linux-azure-tools-5.4.0-1104, linux-headers-generic-hwe-18.04-edge, linux-headers-generic-lpae, linux-lowlatency-hwe-18.04, linux-image-generic-hwe-18.04-edge, linux-headers-generic-lpae-hwe-18.04-edge, linux-tools-gkeop, linux-tools-azure-lts-20.04, linux-signed-image-oracle, linux-tools-gcp-lts-20.04, linux-headers-gkeop-5.4, linux-image-generic-lpae, linux-modules-extra-azure-edge, linux-image-kvm, linux-aws-cloud-tools-5.4.0-1097, linux-source-5.4.0, linux-modules-extra-aws, linux-gkeop-source-5.4.0, linux-modules-extra-virtual-hwe-18.04-edge, linux-headers-5.4.0-1095-gke, linux-image-5.4.0-1095-gke, linux-image-5.4.0-1097-aws, linux-gcp-headers-5.4.0-1101, linux-hwe-5.4-source-5.4.0, linux-headers-oracle, linux-oracle-lts-20.04, linux-generic-lpae-hwe-18.04, linux-signed-azure, linux-tools-virtual-hwe-18.04, linux-oracle-headers-5.4.0-1094, linux-kvm-headers-5.4.0-1087, linux-aws o USN-5929-1 : linux-raspi-headers-5.19.0-1014, linux-modules-5.19.0-1014-raspi, linux-headers-raspi-nolpae, linux-tools-5.19.0-1014-raspi-nolpae, linux-modules-extra-raspi, linux-headers-raspi, linux-buildinfo-5.19.0-1014-raspi-nolpae, linux-tools-5.19.0-1014-raspi, linux-modules-extra-raspi-nolpae, linux-raspi-nolpae, linux-modules-5.19.0-1014-raspi-nolpae, linux-raspi, linux-modules-extra-5.19.0-1014-raspi-nolpae, linux-image-5.19.0-1014-raspi-nolpae, linux-headers-5.19.0-1014-raspi-nolpae, linux-image-5.19.0-1014-raspi, linux-modules-extra-5.19.0-1014-raspi, linux-headers-5.19.0-1014-raspi, linux-image-raspi-nolpae, linux-raspi-tools-5.19.0-1014, linux-tools-raspi, linux-image-raspi, linux-tools-raspi-nolpae, linux-buildinfo-5.19.0-1014-raspi o USN-5934-1 : linux-raspi-hwe-18.04-edge, linux-image-raspi2, linux-raspi2, linux-buildinfo-5.4.0-1081-raspi, linux-headers-raspi2, linux-tools-raspi2-hwe-18.04, linux-image-raspi-hwe-18.04-edge, linux-headers-raspi-hwe-18.04, linux-headers-raspi, linux-raspi2-hwe-18.04, linux-image-raspi2-hwe-18.04-edge, linux-image-5.4.0-1081-raspi, linux-headers-raspi2-hwe-18.04-edge, linux-tools-raspi-hwe-18.04-edge, linux-tools-raspi-hwe-18.04, linux-tools-raspi2, linux-raspi-tools-5.4.0-1081, linux-tools-5.4.0-1081-raspi, linux-headers-raspi2-hwe-18.04, linux-raspi, linux-raspi2-hwe-18.04-edge, linux-headers-5.4.0-1081-raspi, linux-modules-5.4.0-1081-raspi, linux-raspi-headers-5.4.0-1081, linux-raspi-hwe-18.04, linux-image-raspi, linux-image-raspi-hwe-18.04, linux-tools-raspi, linux-tools-raspi2-hwe-18.04-edge, linux-image-raspi2-hwe-18.04, linux-headers-raspi-hwe-18.04-edge o USN-5935-1 : linux-tools-5.15.0-1025-raspi-nolpae, linux-ibm-headers-5.15.0-1026, linux-image-unsigned-5.15.0-1026-ibm, linux-image-5.15.0-1026-ibm, linux-image-ibm, linux-headers-5.15.0-1026-ibm, linux-headers-raspi-nolpae, linux-modules-extra-raspi, linux-modules-extra-5.15.0-1025-raspi-nolpae, linux-headers-raspi, linux-tools-5.15.0-1026-ibm, linux-headers-ibm, linux-headers-5.15.0-1025-raspi, linux-modules-5.15.0-1025-raspi, linux-tools-ibm, linux-modules-extra-raspi-nolpae, linux-raspi-nolpae, linux-ibm-source-5.15.0, linux-modules-5.15.0-1026-ibm, linux-tools-5.15.0-1025-raspi, linux-ibm-tools-common, linux-buildinfo-5.15.0-1025-raspi-nolpae, linux-buildinfo-5.15.0-1026-ibm, linux-ibm, linux-raspi, linux-modules-extra-5.15.0-1026-ibm, linux-image-5.15.0-1025-raspi, linux-ibm-tools-5.15.0-1026, linux-modules-extra-5.15.0-1025-raspi, linux-raspi-headers-5.15.0-1025, linux-image-5.15.0-1025-raspi-nolpae, linux-buildinfo-5.15.0-1025-raspi, linux-raspi-tools-5.15.0-1025, linux-image-raspi-nolpae, linux-modules-5.15.0-1025-raspi-nolpae, linux-tools-raspi, linux-image-raspi, linux-tools-raspi-nolpae, linux-ibm-cloud-tools-common, linux-headers-5.15.0-1025-raspi-nolpae o USN-5938-1 : linux-buildinfo-5.15.0-1016-gkeop, linux-modules-extra-gkeop-5.15, linux-modules-extra-gkeop, linux-cloud-tools-gkeop, linux-gkeop-headers-5.15.0-1016, linux-gkeop-5.15, linux-image-5.15.0-1016-gkeop, linux-modules-5.15.0-1016-gkeop, linux-tools-5.15.0-1016-gkeop, linux-gkeop, linux-cloud-tools-gkeop-5.15, linux-image-gkeop-5.15, linux-tools-gkeop, linux-gkeop-cloud-tools-5.15.0-1016, linux-modules-extra-5.15.0-1016-gkeop, linux-tools-gkeop-5.15, linux-image-gkeop, linux-cloud-tools-5.15.0-1016-gkeop, linux-gkeop-tools-5.15.0-1016, linux-headers-gkeop-5.15, linux-headers-5.15.0-1016-gkeop, linux-headers-gkeop, linux-image-unsigned-5.15.0-1016-gkeop o USN-5939-1 : linux-modules-extra-gcp, linux-gcp-5.4-headers-5.4.0-1101, linux-modules-extra-gcp-edge, linux-image-unsigned-5.4.0-1101-gcp, linux-headers-5.4.0-1101-gcp, linux-image-5.4.0-1101-gcp, linux-tools-gcp, linux-gcp-edge, linux-tools-5.4.0-1101-gcp, linux-headers-gcp-edge, linux-tools-gcp-edge, linux-gcp, linux-modules-extra-5.4.0-1101-gcp, linux-image-gcp-edge, linux-headers-gcp, linux-buildinfo-5.4.0-1101-gcp, linux-gcp-5.4-tools-5.4.0-1101, linux-gcp-5.4, linux-modules-5.4.0-1101-gcp, linux-image-gcp o USN-5940-1 : linux-tools-raspi-hwe-18.04, linux-raspi-hwe-18.04-edge, linux-tools-5.4.0-1081-raspi, linux-raspi-5.4, linux-headers-5.4.0-1081-raspi, linux-modules-5.4.0-1081-raspi, linux-buildinfo-5.4.0-1081-raspi, linux-image-5.4.0-1081-raspi, linux-raspi-5.4-headers-5.4.0-1081, linux-tools-raspi-hwe-18.04-edge, linux-raspi-hwe-18.04, linux-image-raspi-hwe-18.04, linux-raspi-5.4-tools-5.4.0-1081, linux-image-raspi-hwe-18.04-edge, linux-headers-raspi-hwe-18.04, linux-headers-raspi-hwe-18.04-edge o USN-5941-1 : linux-image-kvm, linux-image-unsigned-5.15.0-1029-kvm, linux-buildinfo-5.15.0-1029-kvm, linux-headers-5.15.0-1029-kvm, linux-modules-5.15.0-1029-kvm, linux-image-5.15.0-1029-kvm, linux-kvm-tools-5.15.0-1029, linux-tools-5.15.0-1029-kvm, linux-tools-kvm, linux-kvm, linux-kvm-headers-5.15.0-1029, linux-headers-kvm o USN-5950-1 : linux-kvm-headers-5.19.0-1019, linux-image-kvm, linux-buildinfo-5.19.0-1019-kvm, linux-image-5.19.0-1019-kvm, linux-tools-5.19.0-1019-kvm, linux-modules-5.19.0-1019-kvm, linux-headers-5.19.0-1019-kvm, linux-tools-kvm, linux-kvm-tools-5.19.0-1019, linux-kvm, linux-image-unsigned-5.19.0-1019-kvm, linux-headers-kvm o USN-5951-1 : linux-modules-5.4.0-1045-ibm, linux-ibm-lts-20.04, linux-tools-ibm-edge, linux-headers-ibm-lts-20.04, linux-image-5.4.0-1045-ibm, linux-ibm-headers-5.4.0-1045, linux-image-ibm, linux-ibm-5.4-cloud-tools-common, linux-ibm-5.4-tools-5.4.0-1045, linux-headers-ibm, linux-modules-extra-5.4.0-1045-ibm, linux-tools-ibm, linux-buildinfo-5.4.0-1045-ibm, linux-ibm-5.4-tools-common, linux-image-ibm-lts-20.04, linux-modules-extra-ibm-lts-20.04, linux-tools-5.4.0-1045-ibm, linux-ibm-edge, linux-ibm-tools-common, linux-ibm-tools-5.4.0-1045, linux-modules-extra-ibm, linux-tools-ibm-lts-20.04, linux-ibm, linux-ibm-5.4-source-5.4.0, linux-headers-ibm-edge, linux-modules-extra-ibm-edge, linux-ibm-5.4-headers-5.4.0-1045, linux-image-unsigned-5.4.0-1045-ibm, linux-image-ibm-edge, linux-ibm-cloud-tools-common, linux-ibm-5.4, linux-ibm-source-5.4.0, linux-headers-5.4.0-1045-ibm o USN-5911-1 : linux-headers-5.19.0-1020-aws, linux-image-extra-virtual-hwe-22.04-edge, linux-tools-generic, linux-modules-extra-gcp, linux-virtual, linux-modules-extra-5.19.0-1021-azure, linux-tools-5.19.0-35-generic-lpae, linux-headers-5.19.0-35-generic, linux-image-azure, linux-tools-lowlatency-64k, linux-buildinfo-5.19.0-1020-aws, linux-cloud-tools-virtual, linux-azure, linux-image-lowlatency-hwe-20.04, linux-modules-5.19.0-1018-gcp, linux-headers-lowlatency-64k-hwe-22.04-edge, linux-modules-iwlwifi-generic-hwe-22.04, linux-buildinfo-5.19.0-1021-azure, linux-image-lowlatency-hwe-22.04, linux-cloud-tools-5.19.0-1021-azure, linux-cloud-tools-generic-hwe-22.04-edge, linux-source, linux-modules-ipu6-5.19.0-1018-lowlatency, linux-tools-lowlatency-64k-hwe-22.04-edge, linux-image-lowlatency, linux-headers-generic-lpae-hwe-22.04-edge, linux-tools-ibm, linux-tools-aws, linux-headers-virtual, linux-headers-5.19.0-1018-gcp, linux-modules-5.19.0-1020-aws, linux-gcp, linux-lowlatency-tools-common, linux-headers-aws, linux-cloud-tools-generic, linux-headers-azure, linux-tools-lowlatency-hwe-20.04, linux-ibm, linux-source-5.19.0, linux-lowlatency-hwe-20.04, linux-generic-hwe-22.04-edge, linux-tools-generic-64k-hwe-22.04, linux-headers-generic-hwe-22.04, linux-image-generic-hwe-22.04, linux-image-virtual-hwe-22.04, linux-cloud-tools-5.19.0-35-generic, linux-lowlatency-headers-5.19.0-1018, linux-modules-extra-5.19.0-1018-oracle, linux-image-oem-22.04, linux-tools-host, linux-image-oracle, linux-generic-64k, linux-tools-generic-lpae-hwe-22.04-edge, linux-tools-oem-22.04, linux-oracle-headers-5.19.0-1018, linux-buildinfo-5.19.0-35-generic-lpae, linux-image-5.19.0-1018-lowlatency-64k, linux-tools-lowlatency-64k-hwe-22.04, linux-image-aws, linux-cloud-tools-lowlatency-hwe-22.04, linux-image-lowlatency-hwe-22.04-edge, linux-tools-common, linux-generic-64k-hwe-22.04-edge, linux-tools-generic-64k, linux-image-generic-64k-hwe-22.04-edge, linux-lowlatency-hwe-22.04-edge, linux-modules-ivsc-5.19.0-35-generic, linux-modules-ivsc-5.19.0-1018-lowlatency, linux-cloud-tools-5.19.0-1018-lowlatency, linux-image-unsigned-5.19.0-1018-lowlatency, linux-lowlatency-cloud-tools-5.19.0-1018, linux-modules-5.19.0-35-generic, linux-modules-iwlwifi-generic-hwe-22.04-edge, linux-generic-lpae, linux-image-5.19.0-35-generic-64k, linux-image-lowlatency-64k-hwe-22.04, linux-tools-generic-hwe-22.04-edge, linux-image-ibm, linux-buildinfo-5.19.0-35-generic, linux-image-5.19.0-1020-aws, linux-lowlatency-64k-hwe-20.04, linux-modules-5.19.0-1018-lowlatency, linux-image-extra-virtual-hwe-22.04, linux-tools-lowlatency-hwe-20.04-edge, linux-azure-cloud-tools-5.19.0-1021, linux-ibm-tools-5.19.0-1018, linux-tools-lowlatency-64k-hwe-20.04, linux-headers-generic-lpae-hwe-22.04, linux-doc, linux-cloud-tools-lowlatency-hwe-22.04-edge, linux-headers-lowlatency-hwe-22.04, linux-oem-22.04, linux-headers-ibm, linux-image-unsigned-5.19.0-35-generic, linux-generic-hwe-22.04, linux-image-generic-64k-hwe-22.04, linux-cloud-tools-5.19.0-1020-aws, linux-headers-lowlatency-hwe-22.04-edge, linux-headers-lowlatency-64k-hwe-20.04, linux-aws, linux-modules-ivsc-generic, linux-modules-5.19.0-35-generic-lpae, linux-tools-5.19.0-35, linux-lowlatency-hwe-22.04, linux-tools-5.19.0-35-generic-64k, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-image-virtual, linux-headers-lowlatency-hwe-20.04, linux-lowlatency-cloud-tools-common, linux-modules-5.19.0-1018-lowlatency-64k, linux-image-generic-64k, linux-lowlatency-64k, linux-image-extra-virtual, linux-modules-ivsc-generic-hwe-22.04-edge, linux-image-generic-lpae-hwe-22.04-edge, linux-headers-5.19.0-35-generic-64k, linux-hwe-5.19-tools-5.19.0-35, linux-headers-generic-hwe-22.04-edge, linux-headers-lowlatency-hwe-20.04-edge, linux-image-5.19.0-1018-gcp, linux-modules-extra-5.19.0-1018-gcp, linux-cloud-tools-virtual-hwe-22.04, linux-generic-lpae-hwe-22.04-edge, linux-lowlatency-hwe-20.04-edge, linux-oracle, linux-ibm-source-5.19.0, linux-cloud-tools-common, linux-hwe-5.19-headers-5.19.0-35, linux-aws-cloud-tools-5.19.0-1020, linux-tools-5.19.0-35-generic, linux-virtual-hwe-22.04-edge, linux-modules-extra-azure, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-image-virtual-hwe-22.04-edge, linux-headers-5.19.0-35, linux-tools-lowlatency-hwe-22.04-edge, linux-azure-tools-5.19.0-1021, linux-hwe-5.19-tools-host, linux-image-generic-lpae-hwe-22.04, linux-image-lowlatency-64k-hwe-22.04-edge, linux-tools-virtual, linux-ibm-cloud-tools-common, linux-virtual-hwe-22.04, linux-headers-5.19.0-1018-lowlatency-64k, linux-cloud-tools-virtual-hwe-22.04-edge, linux-headers-generic-64k-hwe-22.04, linux-image-unsigned-5.19.0-35-generic-64k, linux-tools-gcp, linux-tools-lowlatency, linux-image-5.19.0-35-generic, linux-tools-5.19.0-1018-lowlatency-64k, linux-image-unsigned-5.19.0-1018-oracle, linux-cloud-tools-lowlatency, linux-headers-generic-64k, linux-headers-virtual-hwe-22.04, linux-image-5.19.0-1018-lowlatency, linux-modules-extra-5.19.0-35-generic, linux-headers-virtual-hwe-22.04-edge, linux-buildinfo-5.19.0-1018-oracle, linux-cloud-tools-5.19.0-35, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-ibm-tools-common, linux-modules-ipu6-generic-hwe-22.04, linux-modules-iwlwifi-generic, linux-hwe-5.19, linux-headers-lowlatency-64k-hwe-22.04, linux-image-5.19.0-1021-azure, linux-tools-5.19.0-1018-lowlatency, linux-tools-oracle, linux-tools-virtual-hwe-22.04-edge, linux-headers-oem-22.04, linux-oracle-tools-5.19.0-1018, linux-image-lowlatency-64k-hwe-20.04-edge, linux-tools-5.19.0-1020-aws, linux-tools-generic-lpae-hwe-22.04, linux-generic, linux-modules-5.19.0-1021-azure, linux-aws-headers-5.19.0-1020, linux-image-generic-hwe-22.04-edge, linux-lowlatency-64k-hwe-22.04-edge, linux-headers-gcp, linux-headers-5.19.0-1018-oracle, linux-image-generic, linux-lowlatency, linux-cloud-tools-azure, linux-modules-5.19.0-35-generic-64k, linux, linux-image-unsigned-5.19.0-1018-lowlatency-64k, linux-libc-dev, linux-lowlatency-64k-hwe-22.04, linux-headers-5.19.0-1021-azure, linux-headers-generic, linux-tools-azure, linux-headers-lowlatency, linux-headers-5.19.0-35-generic-lpae, linux-tools-generic-hwe-22.04, linux-hwe-5.19-cloud-tools-common, linux-image-gcp, linux-buildinfo-5.19.0-1018-lowlatency, linux-modules-ipu6-generic-hwe-22.04-edge, linux-ibm-headers-5.19.0-1018, linux-modules-5.19.0-1018-ibm, linux-modules-ipu6-5.19.0-35-generic, linux-image-5.19.0-1018-oracle, linux-modules-extra-5.19.0-1018-ibm, linux-modules-extra-5.19.0-1020-aws, linux-cloud-tools-lowlatency-hwe-20.04, linux-image-lowlatency-hwe-20.04-edge, linux-headers-lowlatency-64k, linux-gcp-tools-5.19.0-1018, linux-image-5.19.0-1018-ibm, linux-gcp-headers-5.19.0-1018, linux-buildinfo-5.19.0-1018-lowlatency-64k, linux-buildinfo-5.19.0-35-generic-64k, linux-tools-virtual-hwe-22.04, linux-tools-5.19.0-1018-oracle, linux-image-unsigned-5.19.0-1021-azure, linux-generic-64k-hwe-22.04, linux-tools-generic-lpae, linux-tools-lowlatency-hwe-22.04, linux-crashdump, linux-image-lowlatency-64k-hwe-20.04, linux-cloud-tools-generic-hwe-22.04, linux-lowlatency-tools-5.19.0-1018, linux-lowlatency-64k-hwe-20.04-edge, linux-modules-ivsc-generic-hwe-22.04, linux-headers-5.19.0-1018-lowlatency, linux-generic-lpae-hwe-22.04, linux-lowlatency-tools-host, linux-modules-iwlwifi-5.19.0-1018-lowlatency, linux-image-unsigned-5.19.0-1018-gcp, linux-headers-generic-lpae, linux-tools-5.19.0-1018-ibm, linux-image-unsigned-5.19.0-1020-aws, linux-tools-generic-64k-hwe-22.04-edge, linux-image-5.19.0-35-generic-lpae, linux-modules-iwlwifi-5.19.0-35-generic, linux-modules-5.19.0-1018-oracle, linux-tools-5.19.0-1021-azure, linux-hwe-5.19-tools-common, linux-image-generic-lpae, linux-image-unsigned-5.19.0-1018-ibm, linux-buildinfo-5.19.0-1018-ibm, linux-image-lowlatency-64k, linux-modules-extra-aws, linux-headers-generic-64k-hwe-22.04-edge, linux-tools-5.19.0-1018-gcp, linux-headers-oracle, linux-buildinfo-5.19.0-1018-gcp, linux-modules-ipu6-generic, linux-headers-5.19.0-1018-ibm, linux-hwe-5.19-cloud-tools-5.19.0-35, linux-azure-headers-5.19.0-1021, linux-aws-tools-5.19.0-1020 o USN-5962-1 : linux-intel-iotg-tools-host, linux-modules-5.15.0-1026-intel-iotg, linux-tools-intel-iotg, linux-headers-5.15.0-1026-intel-iotg, linux-modules-iwlwifi-5.15.0-1026-intel-iotg, linux-headers-intel-iotg, linux-intel-iotg-headers-5.15.0-1026, linux-image-unsigned-5.15.0-1026-intel-iotg, linux-modules-extra-5.15.0-1026-intel-iotg, linux-image-5.15.0-1026-intel-iotg, linux-buildinfo-5.15.0-1026-intel-iotg, linux-intel-iotg-cloud-tools-5.15.0-1026, linux-intel-iotg-tools-5.15.0-1026, linux-image-intel-iotg, linux-tools-5.15.0-1026-intel-iotg, linux-cloud-tools-5.15.0-1026-intel-iotg, linux-intel-iotg, linux-intel-iotg-cloud-tools-common, linux-intel-iotg-tools-common o USN-6000-1 : linux-headers-5.4.0-1059-bluefield, linux-image-5.4.0-1059-bluefield, linux-tools-bluefield, linux-tools-5.4.0-1059-bluefield, linux-image-unsigned-5.4.0-1059-bluefield, linux-bluefield-tools-5.4.0-1059, linux-modules-5.4.0-1059-bluefield, linux-bluefield, linux-bluefield-headers-5.4.0-1059, linux-headers-bluefield, linux-buildinfo-5.4.0-1059-bluefield, linux-image-bluefield o USN-6089-1 : linux-oem-6.0-tools-6.0.0-1016, linux-modules-iwlwifi-6.0.0-1016-oem, linux-tools-6.0.0-1016-oem, linux-oem-22.04b, linux-oem-6.0, linux-image-oem-22.04b, linux-modules-iwlwifi-oem-22.04b, linux-buildinfo-6.0.0-1016-oem, linux-image-unsigned-6.0.0-1016-oem, linux-headers-6.0.0-1016-oem, linux-image-6.0.0-1016-oem, linux-modules-ipu6-6.0.0-1016-oem, linux-modules-ipu6-oem-22.04b, linux-oem-6.0-headers-6.0.0-1016, linux-headers-oem-22.04b, linux-tools-oem-22.04b, linux-modules-ivsc-6.0.0-1016-oem, linux-modules-6.0.0-1016-oem, linux-oem-6.0-tools-host, linux-modules-ivsc-oem-22.04b o USN-5790-1 : linux-snapdragon, linux-tools-generic, linux-modules-extra-gcp, linux-tools-4.15.0-1147-aws, linux-tools-4.15.0-201-generic-lpae, linux-virtual, linux-headers-4.15.0-1133-kvm, linux-signed-generic-hwe-16.04, linux-headers-generic-lpae-hwe-16.04, linux-modules-4.15.0-1133-kvm, linux-gcp-lts-18.04, linux-headers-gcp-lts-18.04, linux-image-azure, linux-signed-image-generic-hwe-16.04, linux-cloud-tools-virtual, linux-azure, linux-aws-tools-4.15.0-1147, linux-virtual-hwe-16.04, linux-headers-4.15.0-1058-dell300x, linux-azure-4.15-cloud-tools-4.15.0-1158, linux-cloud-tools-4.15.0-1158-azure, linux-cloud-tools-virtual-hwe-16.04, linux-modules-extra-gcp-lts-18.04, linux-signed-oracle-lts-18.04, linux-modules-extra-4.15.0-1112-oracle, linux-generic-hwe-16.04, linux-signed-generic, linux-lowlatency-hwe-16.04, linux-source, linux-tools-gcp-lts-18.04, linux-image-4.15.0-1112-oracle, linux-tools-aws-hwe, linux-image-unsigned-4.15.0-1147-aws, linux-headers-lowlatency-hwe-16.04-edge, linux-image-lowlatency, linux-hwe-cloud-tools-4.15.0-201, linux-image-generic-hwe-16.04-edge, linux-signed-image-lowlatency-hwe-16.04-edge, linux-headers-virtual, linux-gcp, linux-tools-4.15.0-1112-oracle, linux-source-4.15.0, linux-signed-image-oracle-lts-18.04, linux-tools-4.15.0-201, linux-cloud-tools-generic, linux-headers-azure, linux-buildinfo-4.15.0-1143-snapdragon, linux-headers-aws-lts-18.04, linux-signed-image-lowlatency, linux-image-extra-virtual-hwe-16.04, linux-image-extra-virtual-hwe-16.04-edge, linux-image-unsigned-4.15.0-1158-azure, linux-image-virtual-hwe-16.04, linux-signed-image-lowlatency-hwe-16.04, linux-signed-lowlatency-hwe-16.04-edge, linux-oracle-lts-18.04, linux-image-gcp-lts-18.04, linux-image-snapdragon, linux-image-unsigned-4.15.0-1112-oracle, linux-tools-4.15.0-201-lowlatency, linux-image-aws-hwe, linux-tools-generic-lpae-hwe-16.04-edge, linux-tools-host, linux-cloud-tools-azure-lts-18.04, linux-azure-4.15-headers-4.15.0-1158, linux-image-gke, linux-headers-4.15.0-201-generic-lpae, linux-image-oracle, linux-modules-4.15.0-1142-gcp, linux-tools-lowlatency-hwe-16.04, linux-tools-virtual-hwe-16.04, linux-raspi2-headers-4.15.0-1125, linux-headers-4.15.0-1142-gcp, linux-signed-image-oem, linux-aws-edge, linux-buildinfo-4.15.0-1125-raspi2, linux-modules-extra-4.15.0-1147-aws, linux-cloud-tools-4.15.0-201-lowlatency, linux-image-4.15.0-201-lowlatency, linux-lowlatency-hwe-16.04-edge, linux-tools-4.15.0-201-generic, linux-headers-azure-lts-18.04, linux-modules-4.15.0-1112-oracle, linux-image-lowlatency-hwe-16.04, linux-modules-4.15.0-1125-raspi2, linux-tools-common, linux-headers-virtual-hwe-16.04, linux-oracle-tools-4.15.0-1112, linux-headers-kvm, linux-dell300x, linux-gke, linux-image-dell300x, linux-image-unsigned-4.15.0-1142-gcp, linux-cloud-tools-generic-hwe-16.04-edge, linux-modules-4.15.0-201-generic, linux-tools-oracle-lts-18.04, linux-buildinfo-4.15.0-1112-oracle, linux-image-raspi2, linux-cloud-tools-virtual-hwe-16.04-edge, linux-aws-hwe-tools-4.15.0-1147, linux-gcp-4.15, linux-gcp-4.15-tools-4.15.0-1142, linux-tools-generic-lpae-hwe-16.04, linux-generic-lpae, linux-modules-extra-azure-lts-18.04, linux-cloud-tools-4.15.0-1147-aws, linux-tools-gke, linux-cloud-tools-lowlatency-hwe-16.04, linux-signed-image-generic-hwe-16.04-edge, linux-doc, linux-headers-4.15.0-1125-raspi2, linux-kvm-headers-4.15.0-1133, linux-buildinfo-4.15.0-1142-gcp, linux-tools-4.15.0-1133-kvm, linux-oracle-headers-4.15.0-1112, linux-image-4.15.0-201-generic, linux-headers-4.15.0-1147-aws, linux-buildinfo-4.15.0-1058-dell300x, linux-modules-extra-4.15.0-201-generic, linux-headers-gke, linux-signed-image-generic, linux-signed-image-azure, linux-tools-raspi2, linux-aws-hwe, linux-image-virtual, linux-gcp-tools-4.15.0-1142, linux-image-azure-lts-18.04, linux-image-4.15.0-1142-gcp, linux-image-extra-virtual, linux-tools-aws-lts-18.04, linux-image-4.15.0-1133-kvm, linux-image-oem, linux-modules-4.15.0-201-generic-lpae, linux-buildinfo-4.15.0-201-lowlatency, linux-gcp-headers-4.15.0-1142, linux-tools-generic-hwe-16.04, linux-modules-4.15.0-201-lowlatency, linux-headers-4.15.0-201-lowlatency, linux-oracle, linux-signed-image-azure-lts-18.04, linux-cloud-tools-common, linux-tools-4.15.0-1142-gcp, linux-modules-4.15.0-1058-dell300x, linux-generic-lpae-hwe-16.04, linux-kvm, linux-modules-extra-azure, linux-tools-snapdragon, linux-image-oracle-lts-18.04, linux-tools-4.15.0-1158-azure, linux-azure-headers-4.15.0-1158, linux-image-lowlatency-hwe-16.04-edge, linux-buildinfo-4.15.0-201-generic, linux-modules-extra-gke, linux-snapdragon-headers-4.15.0-1143, linux-tools-virtual, linux-image-aws-lts-18.04, linux-headers-raspi2, linux-cloud-tools-4.15.0-201-generic, linux-aws-lts-18.04, linux-image-4.15.0-1125-raspi2, linux-tools-gcp, linux-signed-generic-hwe-16.04-edge, linux-tools-lowlatency, linux-image-generic-hwe-16.04, linux-cloud-tools-lowlatency, linux-azure-cloud-tools-4.15.0-1158, linux-cloud-tools-lowlatency-hwe-16.04-edge, linux-modules-extra-4.15.0-1142-gcp, linux-dell300x-tools-4.15.0-1058, linux-aws-cloud-tools-4.15.0-1147, linux-tools-oracle, linux-signed-lowlatency-hwe-16.04, linux-oem, linux-headers-4.15.0-201-generic, linux-tools-4.15.0-1058-dell300x, linux-cloud-tools-4.15.0-201, linux-aws-hwe-cloud-tools-4.15.0-1147, linux-tools-kvm, linux-generic, linux-tools-4.15.0-1125-raspi2, linux-generic-hwe-16.04-edge, linux-headers-gcp, linux-headers-oem, linux-image-generic, linux-lowlatency, linux-signed-oracle, linux-hwe, linux-cloud-tools-generic-hwe-16.04, linux-buildinfo-4.15.0-1147-aws, linux-cloud-tools-azure, linux-headers-lowlatency-hwe-16.04, linux-image-4.15.0-1147-aws, linux, linux-kvm-tools-4.15.0-1133, linux-tools-azure-lts-18.04, linux-libc-dev, linux-modules-4.15.0-1143-snapdragon, linux-signed-lowlatency, linux-headers-generic, linux-snapdragon-tools-4.15.0-1143, linux-tools-azure, linux-headers-lowlatency, linux-headers-generic-hwe-16.04-edge, linux-modules-extra-aws-hwe, linux-image-unsigned-4.15.0-201-generic, linux-tools-lowlatency-hwe-16.04-edge, linux-image-gcp, linux-modules-4.15.0-1147-aws, linux-azure-tools-4.15.0-1158, linux-buildinfo-4.15.0-1133-kvm, linux-hwe-tools-4.15.0-201, linux-raspi2, linux-tools-4.15.0-1143-snapdragon, linux-buildinfo-4.15.0-1158-azure, linux-image-unsigned-4.15.0-201-lowlatency, linux-virtual-hwe-16.04-edge, linux-image-4.15.0-201-generic-lpae, linux-image-generic-lpae-hwe-16.04, linux-azure-lts-18.04, linux-gcp-4.15-headers-4.15.0-1142, linux-image-virtual-hwe-16.04-edge, linux-image-4.15.0-1158-azure, linux-modules-extra-aws-lts-18.04, linux-headers-4.15.0-1143-snapdragon, linux-tools-virtual-hwe-16.04-edge, linux-image-4.15.0-1143-snapdragon, linux-headers-4.15.0-1112-oracle, linux-headers-oracle-lts-18.04, linux-tools-generic-hwe-16.04-edge, linux-headers-aws-hwe, linux-tools-generic-lpae, linux-headers-generic-hwe-16.04, linux-crashdump, linux-image-4.15.0-1147-aws-hwe, linux-dell300x-headers-4.15.0-1058, linux-image-generic-lpae-hwe-16.04-edge, linux-headers-4.15.0-201, linux-tools-oem, linux-tools-dell300x, linux-headers-generic-lpae, linux-headers-virtual-hwe-16.04-edge, linux-generic-lpae-hwe-16.04-edge, linux-headers-4.15.0-1158-azure, linux-headers-dell300x, linux-signed-image-oracle, linux-headers-generic-lpae-hwe-16.04-edge, linux-modules-extra-4.15.0-1158-azure, linux-image-generic-lpae, linux-signed-oem, linux-image-kvm, linux-headers-snapdragon, linux-azure-4.15-tools-4.15.0-1158, linux-modules-4.15.0-1158-azure, linux-azure-4.15, linux-image-4.15.0-1058-dell300x, linux-headers-oracle, linux-raspi2-tools-4.15.0-1125, linux-aws-headers-4.15.0-1147, linux-buildinfo-4.15.0-201-generic-lpae, linux-image-unsigned-4.15.0-1058-dell300x, linux-signed-azure, linux-signed-azure-lts-18.04, linux-aws o USN-5791-1 : linux-tools-generic, linux-image-5.4.0-1097-gcp, linux-modules-extra-gcp, linux-tools-virtual-hwe-18.04-edge, linux-cloud-tools-5.4.0-136-lowlatency, linux-oracle-5.4-tools-5.4.0-1091, linux-gcp-edge, linux-gcp-tools-5.4.0-1097, linux-image-lowlatency, linux-oem-tools-host, linux-aws-5.4-tools-5.4.0-1093, linux-cloud-tools-generic, linux-aws-lts-20.04, linux-tools-host, linux-virtual-hwe-18.04, linux-tools-oem-osp1, linux-gcp-5.4, linux-image-aws, linux-image-snapdragon-hwe-18.04, linux-tools-common, linux-ibm-5.4, linux-tools-5.4.0-136-generic-lpae, linux-aws-5.4-headers-5.4.0-1093, linux-hwe-5.4-tools-5.4.0-136, linux-tools-5.4.0-136-lowlatency, linux-ibm-5.4-headers-5.4.0-1041, linux-oracle-5.4, linux-snapdragon-hwe-18.04-edge, linux-tools-gke, linux-image-virtual-hwe-18.04, linux-headers-ibm, linux-image-unsigned-5.4.0-1093-aws, linux-image-extra-virtual-hwe-18.04, linux-cloud-tools-5.4.0-136-generic, linux-modules-extra-oracle-edge, linux-headers-gke, linux-tools-raspi2, linux-aws-cloud-tools-5.4.0-1093, linux-headers-5.4.0-136, linux-image-virtual, linux-headers-gke-5.4, linux-cloud-tools-virtual-hwe-18.04-edge, linux-tools-oracle-edge, linux-tools-generic-hwe-18.04, linux-headers-5.4.0-136-lowlatency, linux-modules-5.4.0-1083-kvm, linux-gke-tools-5.4.0-1091, linux-cloud-tools-lowlatency-hwe-18.04, linux-kvm, linux-headers-5.4.0-1083-kvm, linux-image-unsigned-5.4.0-136-generic, linux-ibm-lts-20.04, linux-tools-virtual, linux-headers-generic-hwe-18.04, linux-tools-raspi2-hwe-18.04, linux-headers-raspi-hwe-18.04, linux-headers-raspi, linux-gkeop-5.4, linux-raspi2-hwe-18.04, linux-tools-5.4.0-1097-gcp, linux-cloud-tools-lowlatency, linux-image-unsigned-5.4.0-1097-gcp, linux-tools-gkeop-5.4, linux-modules-extra-5.4.0-1093-aws, linux-image-5.4.0-136-generic-lpae, linux-gke-headers-5.4.0-1091, linux-tools-oracle, linux-buildinfo-5.4.0-1091-gke, linux-headers-gcp, linux-image-5.4.0-1041-ibm, linux-oem-osp1, linux-headers-aws-edge, linux-gcp-headers-5.4.0-1097, linux-headers-virtual-hwe-18.04-edge, linux-virtual-hwe-18.04-edge, linux-modules-5.4.0-1093-aws, linux-image-unsigned-5.4.0-1083-kvm, linux-modules-5.4.0-1091-gke, linux-signed-oracle-edge, linux-modules-5.4.0-1097-gcp, linux-tools-generic-lpae, linux-gkeop, linux-crashdump, linux-headers-generic-lpae, linux-modules-extra-5.4.0-1041-ibm, linux-image-generic-hwe-18.04-edge, linux-headers-generic-lpae-hwe-18.04-edge, linux-tools-gkeop, linux-tools-gcp-lts-20.04, linux-image-unsigned-5.4.0-1091-oracle, linux-image-generic-lpae, linux-image-kvm, linux-tools-5.4.0-1091-gke, linux-gkeop-source-5.4.0, linux-cloud-tools-5.4.0-1061-gkeop, linux-oracle-lts-20.04, linux-headers-oracle, linux-oracle-tools-5.4.0-1091, linux-tools-raspi, linux-tools-virtual-hwe-18.04, linux-aws, linux-image-unsigned-5.4.0-136-lowlatency, linux-tools-ibm-edge, linux-image-raspi2-hwe-18.04-edge, linux-tools-ibm, linux-tools-aws, linux-ibm-tools-5.4.0-1041, linux-tools-gcp-edge, linux-image-unsigned-5.4.0-1061-gkeop, linux-aws-5.4-cloud-tools-5.4.0-1093, linux-raspi, linux-headers-5.4.0-136-generic, linux-headers-snapdragon-hwe-18.04-edge, linux-headers-5.4.0-1091-gke, linux-tools-oracle-lts-20.04, linux-modules-extra-5.4.0-1091-oracle, linux-aws-edge, linux-tools-raspi2-hwe-18.04-edge, linux-modules-extra-5.4.0-1097-gcp, linux-oracle-headers-5.4.0-1091, linux-image-gke-5.4, linux-image-raspi2, linux-headers-ibm-lts-20.04, linux-buildinfo-5.4.0-136-lowlatency, linux-cloud-tools-generic-hwe-18.04, linux-headers-5.4.0-1061-gkeop, linux-headers-aws-lts-20.04, linux-tools-gke-5.4, linux-image-aws-edge, linux-image-extra-virtual-hwe-18.04-edge, linux-image-gcp-lts-20.04, linux-kvm-tools-5.4.0-1083, linux-headers-oracle-lts-20.04, linux-image-extra-virtual, linux-image-oem, linux-headers-oracle-edge, linux-tools-aws-edge, linux-image-generic-lpae-hwe-18.04, linux-modules-extra-gcp-edge, linux-tools-5.4.0-1041-ibm, linux-ibm-5.4-cloud-tools-common, linux-tools-gcp, linux-modules-extra-aws-lts-20.04, linux-ibm-5.4-tools-common, linux-aws-5.4, linux-modules-5.4.0-1091-oracle, linux-cloud-tools-lowlatency-hwe-18.04-edge, linux-tools-raspi-hwe-18.04, linux-tools-ibm-lts-20.04, linux-tools-5.4.0-1091-oracle, linux-aws-tools-5.4.0-1093, linux-buildinfo-5.4.0-136-generic-lpae, linux-cloud-tools-5.4.0-136, linux-lowlatency, linux, linux-modules-extra-aws-edge, linux-image-lowlatency-hwe-18.04-edge, linux-headers-generic, linux-headers-lowlatency, linux-modules-extra-oracle, linux-image-gcp, linux-image-5.4.0-1078-raspi, linux-raspi2, linux-headers-5.4.0-1093-aws, linux-modules-extra-gcp-lts-20.04, linux-modules-extra-ibm-lts-20.04, linux-headers-5.4.0-1041-ibm, linux-tools-oem, linux-signed-image-oracle, linux-modules-extra-aws, linux-modules-extra-virtual-hwe-18.04-edge, linux-generic-lpae-hwe-18.04, linux-raspi-hwe-18.04, linux-virtual, linux-generic-lpae-hwe-18.04-edge, linux-cloud-tools-virtual, linux-buildinfo-5.4.0-1083-kvm, linux-tools-raspi-hwe-18.04-edge, linux-headers-virtual, linux-image-aws-lts-20.04, linux-gcp, linux-ibm-edge, linux-ibm, linux-tools-aws-lts-20.04, linux-ibm-5.4-source-5.4.0, linux-raspi-5.4-tools-5.4.0-1078, linux-hwe-5.4-cloud-tools-common, linux-image-ibm-edge, linux-tools-5.4.0-136, linux-generic-lpae, linux-image-ibm, linux-headers-generic-lpae-hwe-18.04, linux-headers-gcp-edge, linux-buildinfo-5.4.0-1097-gcp, linux-oracle-5.4-headers-5.4.0-1091, linux-image-unsigned-5.4.0-1091-gke, linux-tools-5.4.0-136-generic, linux-hwe-5.4-headers-5.4.0-136, linux-tools-5.4.0-1083-kvm, linux-modules-extra-ibm-edge, linux-image-gkeop, linux-hwe-5.4-tools-common, linux-image-generic-lpae-hwe-18.04-edge, linux-oracle, linux-headers-gkeop, linux-image-raspi-hwe-18.04, linux-image-raspi2-hwe-18.04, linux-headers-raspi-hwe-18.04-edge, linux-headers-raspi2, linux-buildinfo-5.4.0-136-generic, linux-tools-generic-lpae-hwe-18.04-edge, linux-cloud-tools-gkeop, linux-generic-hwe-18.04, linux-image-gkeop-5.4, linux-tools-5.4.0-1061-gkeop, linux-image-5.4.0-1091-gke, linux-tools-generic-lpae-hwe-18.04, linux-headers-lowlatency-hwe-18.04, linux-modules-extra-gke-5.4, linux-raspi2-hwe-18.04-edge, linux-tools-kvm, linux-headers-lowlatency-hwe-18.04-edge, linux-image-generic, linux-signed-oracle, linux-libc-dev, linux-tools-lowlatency-hwe-18.04, linux-cloud-tools-virtual-hwe-18.04, linux-ibm-source-5.4.0, linux-aws-headers-5.4.0-1093, linux-image-5.4.0-136-generic, linux-gkeop-headers-5.4.0-1061, linux-image-5.4.0-1093-aws, linux-tools-snapdragon-hwe-18.04, linux-headers-snapdragon-hwe-18.04, linux-raspi-tools-5.4.0-1078, linux-modules-extra-5.4.0-136-generic, linux-image-oracle-edge, linux-lowlatency-hwe-18.04, linux-gkeop-tools-5.4.0-1061, linux-source-5.4.0, linux-hwe-5.4-source-5.4.0, linux-ibm-cloud-tools-common, linux-modules-extra-gkeop-5.4, linux-tools-5.4.0-1078-raspi, linux-ibm-5.4-tools-5.4.0-1041, linux-modules-extra-5.4.0-1061-gkeop, linux-oem-osp1-tools-host, linux-modules-5.4.0-1078-raspi, linux-image-oem-osp1, linux-modules-5.4.0-1041-ibm, linux-source, linux-hwe-5.4-cloud-tools-5.4.0-136, linux-tools-5.4.0-1093-aws, linux-modules-extra-ibm, linux-headers-aws, linux-headers-gcp-lts-20.04, linux-modules-extra-5.4.0-1091-gke, linux-tools-lowlatency-hwe-18.04-edge, linux-image-5.4.0-136-lowlatency, linux-gcp-5.4-headers-5.4.0-1097, linux-image-gke, linux-image-oracle, linux-cloud-tools-gkeop-5.4, linux-image-snapdragon-hwe-18.04-edge, linux-image-generic-hwe-18.04, linux-headers-5.4.0-1091-oracle, linux-headers-kvm, linux-gke, linux-image-virtual-hwe-18.04-edge, linux-modules-extra-virtual-hwe-18.04, linux-image-5.4.0-1061-gkeop, linux-cloud-tools-5.4.0-1093-aws, linux-image-raspi-hwe-18.04-edge, linux-snapdragon-hwe-18.04, linux-modules-extra-gkeop, linux-gcp-lts-20.04, linux-doc, linux-buildinfo-5.4.0-1093-aws, linux-gcp-5.4-tools-5.4.0-1097, linux-image-ibm-lts-20.04, linux-image-5.4.0-1091-oracle, linux-headers-raspi2-hwe-18.04, linux-lowlatency-hwe-18.04-edge, linux-buildinfo-5.4.0-1091-oracle, linux-hwe-5.4, linux-generic-hwe-18.04-edge, linux-modules-5.4.0-136-generic-lpae, linux-image-5.4.0-1083-kvm, linux-cloud-tools-common, linux-image-raspi, linux-headers-virtual-hwe-18.04, linux-raspi-hwe-18.04-edge, linux-modules-extra-gke, linux-tools-generic-hwe-18.04-edge, linux-kvm-headers-5.4.0-1083, linux-buildinfo-5.4.0-1041-ibm, linux-tools-lowlatency, linux-image-lowlatency-hwe-18.04, linux-raspi-5.4, linux-modules-5.4.0-1061-gkeop, linux-cloud-tools-generic-hwe-18.04-edge, linux-modules-5.4.0-136-lowlatency, linux-ibm-tools-common, linux-image-oracle-lts-20.04, linux-gkeop-cloud-tools-5.4.0-1061, linux-headers-5.4.0-1097-gcp, linux-image-gcp-edge, linux-modules-5.4.0-136-generic, linux-oem, linux-gke-5.4, linux-buildinfo-5.4.0-1078-raspi, linux-generic, linux-headers-oem, linux-raspi-headers-5.4.0-1078, linux-ibm-headers-5.4.0-1041, linux-raspi-5.4-headers-5.4.0-1078, linux-headers-5.4.0-136-generic-lpae, linux-signed-image-oracle-edge, linux-oracle-edge, linux-headers-oem-osp1, linux-buildinfo-5.4.0-1061-gkeop, linux-headers-raspi2-hwe-18.04-edge, linux-tools-snapdragon-hwe-18.04-edge, linux-headers-generic-hwe-18.04-edge, linux-headers-gkeop-5.4, linux-headers-5.4.0-1078-raspi, linux-headers-ibm-edge, linux-image-unsigned-5.4.0-1041-ibm o USN-5792-1 : linux-tools-generic, linux-modules-extra-gcp, linux-virtual, linux-image-unsigned-5.15.0-57-generic, linux-image-5.15.0-57-lowlatency-64k, linux-generic-lpae-hwe-20.04-edge, linux-hwe-5.15-cloud-tools-5.15.0-57, linux-tools-lowlatency-64k, linux-cloud-tools-virtual, linux-image-lowlatency-hwe-20.04, linux-buildinfo-5.15.0-57-lowlatency, linux-image-extra-virtual-hwe-20.04-edge, linux-gke-5.15, linux-image-generic-hwe-20.04, linux-modules-5.15.0-1025-kvm, linux-modules-iwlwifi-generic-hwe-22.04, linux-image-lowlatency-hwe-22.04, linux-headers-5.15.0-57, linux-image-virtual-hwe-20.04-edge, linux-tools-5.15.0-1012-gkeop, linux-source, linux-tools-generic-lpae-hwe-20.04, linux-image-lowlatency, linux-headers-5.15.0-1022-raspi-nolpae, linux-tools-ibm, linux-raspi-nolpae, linux-cloud-tools-gkeop-5.15, linux-headers-virtual, linux-tools-5.15.0-1025-kvm, linux-tools-5.15.0-1026-gcp, linux-tools-5.15.0-57-lowlatency-64k, linux-gcp, linux-lowlatency-tools-common, linux-headers-5.15.0-57-generic, linux-image-gkeop-5.15, linux-cloud-tools-generic, linux-tools-lowlatency-hwe-20.04, linux-ibm, linux-raspi, linux-lowlatency-hwe-20.04, linux-buildinfo-5.15.0-1026-gcp, linux-image-5.15.0-57-generic, linux-hwe-5.15-cloud-tools-common, linux-headers-generic-hwe-22.04, linux-image-generic-hwe-22.04, linux-modules-5.15.0-1022-raspi-nolpae, linux-image-virtual-hwe-22.04, linux-modules-extra-5.15.0-1012-gkeop, linux-oracle-headers-5.15.0-1026, linux-tools-generic-64k-hwe-22.04, linux-buildinfo-5.15.0-1012-gkeop, linux-gkeop-cloud-tools-5.15.0-1012, linux-tools-host, linux-headers-5.15.0-1022-ibm, linux-modules-extra-5.15.0-1022-raspi, linux-image-gke, linux-generic-64k, linux-image-oracle, linux-virtual-hwe-20.04-edge, linux-oem-20.04, linux-hwe-5.15-tools-host, linux-image-raspi-nolpae, linux-tools-lowlatency-64k-hwe-22.04, linux-cloud-tools-lowlatency-hwe-22.04, linux-image-unsigned-5.15.0-1026-oracle, linux-tools-common, linux-buildinfo-5.15.0-1025-kvm, linux-tools-generic-64k, linux-image-oem-20.04, linux-headers-kvm, linux-gke, linux-headers-5.15.0-57-generic-lpae, linux-image-generic-hwe-20.04-edge, linux-image-unsigned-5.15.0-1012-gkeop, linux-headers-5.15.0-1024-gke, linux-headers-generic-lpae-hwe-20.04-edge, linux-image-unsigned-5.15.0-57-lowlatency, linux-buildinfo-5.15.0-57-generic, linux-image-5.15.0-1022-raspi, linux-generic-lpae, linux-image-lowlatency-64k-hwe-22.04, linux-image-5.15.0-1026-oracle, linux-image-ibm, linux-lowlatency-64k-hwe-20.04, linux-headers-raspi-nolpae, linux-tools-gke, linux-modules-5.15.0-1026-oracle, linux-image-extra-virtual-hwe-22.04, linux-generic-hwe-20.04, linux-image-unsigned-5.15.0-1022-ibm, linux-modules-extra-gkeop, linux-modules-extra-raspi, linux-gkeop-5.15, linux-headers-generic-lpae-hwe-22.04, linux-hwe-5.15-headers-5.15.0-57, linux-doc, linux-modules-extra-5.15.0-1026-oracle, linux-tools-generic-64k-hwe-20.04-edge, linux-headers-lowlatency-hwe-22.04, linux-tools-lowlatency-64k-hwe-20.04, linux-headers-ibm, linux-modules-5.15.0-1024-gke, linux-generic-hwe-22.04, linux-image-generic-64k-hwe-22.04, linux-image-5.15.0-1025-kvm, linux-image-5.15.0-57-generic-lpae, linux-modules-extra-raspi-nolpae, linux-headers-lowlatency-64k-hwe-20.04, linux-buildinfo-5.15.0-1022-ibm, linux-image-5.15.0-1012-gkeop, linux-modules-iwlwifi-5.15.0-1024-gke, linux-headers-gke, linux-raspi-tools-5.15.0-1022, linux-headers-virtual-hwe-20.04, linux-cloud-tools-5.15.0-57, linux-modules-5.15.0-1022-raspi, linux-headers-5.15.0-1012-gkeop, linux-gkeop-tools-5.15.0-1012, linux-hwe-5.15-source-5.15.0, linux-image-5.15.0-1022-raspi-nolpae, linux-lowlatency-hwe-22.04, linux-lowlatency-tools-5.15.0-57, linux-headers-5.15.0-57-lowlatency-64k, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-image-virtual, linux-headers-lowlatency-hwe-20.04, linux-lowlatency-cloud-tools-common, linux-image-generic-64k, linux-cloud-tools-5.15.0-57-generic, linux-image-extra-virtual, linux-lowlatency-64k, linux-modules-iwlwifi-5.15.0-57-generic, linux-image-5.15.0-1024-gke, linux-tools-5.15.0-57-generic, linux-image-unsigned-5.15.0-57-generic-64k, linux-tools-5.15.0-1022-raspi-nolpae, linux-image-gkeop, linux-modules-iwlwifi-5.15.0-1026-gcp, linux-headers-lowlatency-hwe-20.04-edge, linux-image-5.15.0-57-lowlatency, linux-cloud-tools-virtual-hwe-22.04, linux-gkeop-headers-5.15.0-1012, linux-lowlatency-hwe-20.04-edge, linux-oracle, linux-cloud-tools-common, linux-modules-iwlwifi-generic-hwe-20.04-edge, linux-headers-gkeop, linux-image-raspi, linux-image-unsigned-5.15.0-1026-gcp, linux-buildinfo-5.15.0-1026-oracle, linux-headers-oem-20.04, linux-modules-5.15.0-1012-gkeop, linux-generic-lpae-hwe-20.04, linux-headers-generic-hwe-20.04, linux-kvm, linux-image-generic-lpae-hwe-20.04-edge, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-tools-5.15.0-57, linux-hwe-5.15, linux-image-generic-lpae-hwe-20.04, linux-hwe-5.15-tools-common, linux-image-generic-lpae-hwe-22.04, linux-cloud-tools-5.15.0-57-lowlatency, linux-tools-virtual, linux-virtual-hwe-22.04, linux-modules-5.15.0-57-generic-64k, linux-raspi-headers-5.15.0-1022, linux-cloud-tools-gkeop, linux-headers-generic-64k-hwe-22.04, linux-tools-generic-hwe-20.04-edge, linux-tools-gcp, linux-tools-lowlatency, linux-headers-raspi, linux-tools-oem-20.04, linux-headers-5.15.0-1022-raspi, linux-tools-5.15.0-57-generic-64k, linux-cloud-tools-lowlatency, linux-generic-64k-hwe-20.04-edge, linux-headers-generic-64k, linux-headers-virtual-hwe-22.04, linux-image-extra-virtual-hwe-20.04, linux-tools-generic-lpae-hwe-20.04-edge, linux-image-unsigned-5.15.0-1025-kvm, linux-modules-5.15.0-57-generic-lpae, linux-kvm-tools-5.15.0-1025, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-headers-gke-5.15, linux-ibm-tools-common, linux-buildinfo-5.15.0-1024-gke, linux-modules-iwlwifi-generic, linux-tools-oracle, linux-headers-lowlatency-64k-hwe-22.04, linux-source-5.15.0, linux-image-5.15.0-57-generic-64k, linux-tools-generic-lpae-hwe-22.04, linux-image-lowlatency-64k-hwe-20.04-edge, linux-modules-5.15.0-57-generic, linux-headers-5.15.0-57-generic-64k, linux-gcp-headers-5.15.0-1026, linux-generic, linux-hwe-5.15-tools-5.15.0-57, linux-tools-5.15.0-1022-raspi, linux-tools-gkeop-5.15, linux-modules-extra-5.15.0-57-generic, linux-tools-5.15.0-1022-ibm, linux-modules-iwlwifi-generic-hwe-20.04, linux-tools-kvm, linux-headers-gcp, linux-lowlatency, linux-image-generic, linux-modules-extra-5.15.0-1024-gke, linux-tools-5.15.0-1026-oracle, linux-headers-generic-64k-hwe-20.04-edge, linux-headers-gkeop-5.15, linux-buildinfo-5.15.0-57-lowlatency-64k, linux, linux-modules-5.15.0-1026-gcp, linux-libc-dev, linux-buildinfo-5.15.0-57-generic-64k, linux-lowlatency-64k-hwe-22.04, linux-headers-generic, linux-tools-5.15.0-1024-gke, linux-tools-raspi-nolpae, linux-headers-lowlatency, linux-modules-5.15.0-57-lowlatency-64k, linux-headers-generic-hwe-20.04-edge, linux-image-gcp, linux-tools-generic-hwe-22.04, linux-headers-5.15.0-1026-gcp, linux-headers-5.15.0-57-lowlatency, linux-image-generic-64k-hwe-20.04, linux-tools-virtual-hwe-20.04-edge, linux-tools-5.15.0-57-generic-lpae, linux-tools-5.15.0-57-lowlatency, linux-ibm-headers-5.15.0-1022, linux-ibm-tools-5.15.0-1022, linux-lowlatency-cloud-tools-5.15.0-57, linux-tools-gke-5.15, linux-tools-lowlatency-hwe-20.04-edge, linux-modules-extra-gkeop-5.15, linux-tools-virtual-hwe-20.04, linux-cloud-tools-lowlatency-hwe-20.04, linux-image-lowlatency-hwe-20.04-edge, linux-headers-lowlatency-64k, linux-tools-generic-hwe-20.04, linux-virtual-hwe-20.04, linux-image-virtual-hwe-20.04, linux-generic-64k-hwe-20.04, linux-headers-5.15.0-1025-kvm, linux-tools-virtual-hwe-22.04, linux-generic-64k-hwe-22.04, linux-modules-extra-5.15.0-1022-ibm, linux-tools-generic-lpae, linux-tools-lowlatency-hwe-22.04, linux-gkeop, linux-crashdump, linux-headers-generic-64k-hwe-20.04, linux-cloud-tools-generic-hwe-22.04, linux-image-lowlatency-64k-hwe-20.04, linux-lowlatency-64k-hwe-20.04-edge, linux-tools-generic-64k-hwe-20.04, linux-generic-lpae-hwe-22.04, linux-ibm-source-5.15.0, linux-cloud-tools-5.15.0-1012-gkeop, linux-lowlatency-tools-host, linux-image-gke-5.15, linux-lowlatency-headers-5.15.0-57, linux-modules-iwlwifi-5.15.0-1022-ibm, linux-headers-generic-lpae, linux-image-5.15.0-1026-gcp, linux-cloud-tools-virtual-hwe-20.04-edge, linux-gcp-tools-5.15.0-1026, linux-modules-extra-5.15.0-1026-gcp, linux-image-unsigned-5.15.0-57-lowlatency-64k, linux-oracle-tools-5.15.0-1026, linux-tools-gkeop, linux-buildinfo-5.15.0-1022-raspi-nolpae, linux-modules-5.15.0-1022-ibm, linux-kvm-headers-5.15.0-1025, linux-headers-virtual-hwe-20.04-edge, linux-buildinfo-5.15.0-1022-raspi, linux-cloud-tools-generic-hwe-20.04, linux-image-generic-lpae, linux-cloud-tools-virtual-hwe-20.04, linux-image-unsigned-5.15.0-1024-gke, linux-headers-5.15.0-1026-oracle, linux-image-kvm, linux-image-lowlatency-64k, linux-buildinfo-5.15.0-57-generic-lpae, linux-generic-hwe-20.04-edge, linux-cloud-tools-generic-hwe-20.04-edge, linux-gke-headers-5.15.0-1024, linux-image-5.15.0-1022-ibm, linux-headers-oracle, linux-image-generic-64k-hwe-20.04-edge, linux-tools-raspi, linux-gke-tools-5.15.0-1024, linux-headers-generic-lpae-hwe-20.04, linux-modules-iwlwifi-5.15.0-57-lowlatency, linux-ibm-cloud-tools-common, linux-modules-5.15.0-57-lowlatency, linux-modules-extra-5.15.0-1022-raspi-nolpae o USN-5793-1 : linux-tools-generic, linux-image-extra-virtual-hwe-22.04-edge, linux-headers-5.19.0-1014-lowlatency, linux-modules-5.19.0-28-generic, linux-virtual, linux-buildinfo-5.19.0-28-generic-64k, linux-tools-lowlatency-64k, linux-cloud-tools-virtual, linux-image-lowlatency-hwe-20.04, linux-headers-5.19.0-1011-raspi-nolpae, linux-headers-lowlatency-64k-hwe-22.04-edge, linux-modules-iwlwifi-5.19.0-1014-lowlatency, linux-modules-iwlwifi-generic-hwe-22.04, linux-image-lowlatency-hwe-22.04, linux-cloud-tools-generic-hwe-22.04-edge, linux-source, linux-modules-5.19.0-1011-raspi-nolpae, linux-tools-lowlatency-64k-hwe-22.04-edge, linux-image-lowlatency, linux-headers-generic-lpae-hwe-22.04-edge, linux-raspi-nolpae, linux-raspi-tools-5.19.0-1011, linux-tools-aws, linux-headers-virtual, linux-modules-extra-5.19.0-1011-raspi, linux-lowlatency-tools-common, linux-buildinfo-5.19.0-1014-lowlatency, linux-headers-aws, linux-cloud-tools-generic, linux-tools-5.19.0-28-generic-64k, linux-buildinfo-5.19.0-1011-raspi, linux-tools-lowlatency-hwe-20.04, linux-lowlatency-headers-5.19.0-1014, linux-raspi, linux-lowlatency-hwe-20.04, linux-source-5.19.0, linux-generic-hwe-22.04-edge, linux-tools-generic-64k-hwe-22.04, linux-headers-generic-hwe-22.04, linux-image-generic-hwe-22.04, linux-image-virtual-hwe-22.04, linux-aws-cloud-tools-5.19.0-1016, linux-image-oem-22.04, linux-tools-host, linux-cloud-tools-5.19.0-28, linux-generic-64k, linux-tools-generic-lpae-hwe-22.04-edge, linux-tools-oem-22.04, linux-image-unsigned-5.19.0-1016-aws, linux-image-raspi-nolpae, linux-tools-lowlatency-64k-hwe-22.04, linux-image-aws, linux-cloud-tools-lowlatency-hwe-22.04, linux-image-lowlatency-hwe-22.04-edge, linux-tools-common, linux-generic-64k-hwe-22.04-edge, linux-tools-generic-64k, linux-image-5.19.0-1011-raspi, linux-headers-kvm, linux-image-generic-64k-hwe-22.04-edge, linux-lowlatency-hwe-22.04-edge, linux-modules-iwlwifi-generic-hwe-22.04-edge, linux-generic-lpae, linux-image-lowlatency-64k-hwe-22.04, linux-tools-generic-hwe-22.04-edge, linux-lowlatency-64k-hwe-20.04, linux-headers-raspi-nolpae, linux-modules-extra-raspi, linux-image-extra-virtual-hwe-22.04, linux-tools-lowlatency-hwe-20.04-edge, linux-tools-lowlatency-64k-hwe-20.04, linux-headers-generic-lpae-hwe-22.04, linux-doc, linux-cloud-tools-lowlatency-hwe-22.04-edge, linux-headers-lowlatency-hwe-22.04, linux-oem-22.04, linux-generic-hwe-22.04, linux-image-generic-64k-hwe-22.04, linux-kvm-tools-5.19.0-1015, linux-headers-lowlatency-hwe-22.04-edge, linux-modules-extra-raspi-nolpae, linux-headers-lowlatency-64k-hwe-20.04, linux-image-5.19.0-1014-lowlatency-64k, linux-lowlatency-hwe-22.04, linux-image-5.19.0-1015-kvm, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-image-virtual, linux-headers-lowlatency-hwe-20.04, linux-lowlatency-cloud-tools-common, linux-modules-extra-5.19.0-28-generic, linux-tools-5.19.0-1015-kvm, linux-image-generic-64k, linux-lowlatency-64k, linux-image-extra-virtual, linux-buildinfo-5.19.0-28-generic-lpae, linux-image-5.19.0-28-generic-lpae, linux-image-generic-lpae-hwe-22.04-edge, linux-headers-generic-hwe-22.04-edge, linux-aws-tools-5.19.0-1016, linux-tools-5.19.0-28-generic-lpae, linux-lowlatency-cloud-tools-5.19.0-1014, linux-headers-lowlatency-hwe-20.04-edge, linux-cloud-tools-virtual-hwe-22.04, linux-generic-lpae-hwe-22.04-edge, linux-headers-5.19.0-1016-aws, linux-lowlatency-hwe-20.04-edge, linux-headers-5.19.0-1015-kvm, linux-cloud-tools-common, linux-image-raspi, linux-image-5.19.0-1011-raspi-nolpae, linux-modules-5.19.0-1014-lowlatency-64k, linux-kvm, linux-virtual-hwe-22.04-edge, linux-image-5.19.0-28-generic-64k, linux-modules-5.19.0-28-generic-64k, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-image-virtual-hwe-22.04-edge, linux-image-unsigned-5.19.0-28-generic, linux-tools-lowlatency-hwe-22.04-edge, linux-image-generic-lpae-hwe-22.04, linux-tools-virtual, linux-image-lowlatency-64k-hwe-22.04-edge, linux-headers-5.19.0-1011-raspi, linux-modules-extra-5.19.0-1011-raspi-nolpae, linux-tools-5.19.0-1014-lowlatency, linux-virtual-hwe-22.04, linux-lowlatency-tools-5.19.0-1014, linux-cloud-tools-virtual-hwe-22.04-edge, linux-modules-5.19.0-1016-aws, linux-headers-generic-64k-hwe-22.04, linux-headers-5.19.0-28-generic-lpae, linux-tools-5.19.0-28, linux-headers-5.19.0-28, linux-headers-raspi, linux-tools-lowlatency, linux-cloud-tools-5.19.0-28-generic, linux-image-unsigned-5.19.0-1014-lowlatency, linux-cloud-tools-lowlatency, linux-headers-generic-64k, linux-headers-virtual-hwe-22.04, linux-modules-iwlwifi-5.19.0-28-generic, linux-buildinfo-5.19.0-1014-lowlatency-64k, linux-modules-5.19.0-28-generic-lpae, linux-headers-virtual-hwe-22.04-edge, linux-modules-extra-5.19.0-1016-aws, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-buildinfo-5.19.0-1011-raspi-nolpae, linux-tools-5.19.0-1016-aws, linux-image-unsigned-5.19.0-1014-lowlatency-64k, linux-modules-iwlwifi-generic, linux-headers-lowlatency-64k-hwe-22.04, linux-tools-5.19.0-28-generic, linux-cloud-tools-5.19.0-1014-lowlatency, linux-tools-virtual-hwe-22.04-edge, linux-image-5.19.0-1014-lowlatency, linux-headers-oem-22.04, linux-tools-generic-lpae-hwe-22.04, linux-image-lowlatency-64k-hwe-20.04-edge, linux-tools-kvm, linux-generic, linux-image-generic-hwe-22.04-edge, linux-lowlatency-64k-hwe-22.04-edge, linux-lowlatency, linux-image-generic, linux, linux-libc-dev, linux-lowlatency-64k-hwe-22.04, linux-tools-5.19.0-1011-raspi-nolpae, linux-headers-generic, linux-tools-raspi-nolpae, linux-aws-headers-5.19.0-1016, linux-headers-lowlatency, linux-tools-5.19.0-1014-lowlatency-64k, linux-tools-generic-hwe-22.04, linux-image-unsigned-5.19.0-28-generic-64k, linux-image-5.19.0-1016-aws, linux-raspi-headers-5.19.0-1011, linux-buildinfo-5.19.0-1016-aws, linux-headers-5.19.0-1014-lowlatency-64k, linux-cloud-tools-5.19.0-1016-aws, linux-headers-5.19.0-28-generic, linux-cloud-tools-lowlatency-hwe-20.04, linux-image-lowlatency-hwe-20.04-edge, linux-headers-lowlatency-64k, linux-image-unsigned-5.19.0-1015-kvm, linux-modules-5.19.0-1011-raspi, linux-modules-5.19.0-1014-lowlatency, linux-tools-virtual-hwe-22.04, linux-generic-64k-hwe-22.04, linux-headers-5.19.0-28-generic-64k, linux-modules-5.19.0-1015-kvm, linux-tools-generic-lpae, linux-tools-lowlatency-hwe-22.04, linux-crashdump, linux-image-lowlatency-64k-hwe-20.04, linux-cloud-tools-generic-hwe-22.04, linux-lowlatency-64k-hwe-20.04-edge, linux-buildinfo-5.19.0-1015-kvm, linux-generic-lpae-hwe-22.04, linux-lowlatency-tools-host, linux-headers-generic-lpae, linux-kvm-headers-5.19.0-1015, linux-buildinfo-5.19.0-28-generic, linux-tools-generic-64k-hwe-22.04-edge, linux-image-generic-lpae, linux-image-kvm, linux-image-lowlatency-64k, linux-modules-extra-aws, linux-tools-5.19.0-1011-raspi, linux-headers-generic-64k-hwe-22.04-edge, linux-image-5.19.0-28-generic, linux-tools-raspi, linux-aws o USN-5791-2 : linux-cloud-tools-5.4.0-1100-azure, linux-cloud-tools-azure-lts-20.04, linux-image-5.4.0-1100-azure, linux-image-azure-lts-20.04, linux-modules-extra-5.4.0-1100-azure, linux-image-unsigned-5.4.0-1100-azure, linux-modules-extra-azure-lts-20.04, linux-azure-cloud-tools-5.4.0-1100, linux-modules-5.4.0-1100-azure, linux-tools-azure-lts-20.04, linux-azure-headers-5.4.0-1100, linux-headers-azure-lts-20.04, linux-azure, linux-headers-5.4.0-1100-azure, linux-tools-5.4.0-1100-azure, linux-azure-tools-5.4.0-1100, linux-buildinfo-5.4.0-1100-azure, linux-azure-lts-20.04 o USN-5792-2 : linux-azure-5.15, linux-azure-fde-edge, linux-image-unsigned-5.15.0-1030-azure, linux-image-azure, linux-cloud-tools-5.15.0-1027-aws, linux-azure, linux-modules-extra-aws-lts-22.04, linux-tools-aws-lts-22.04, linux-tools-azure-edge, linux-headers-aws-lts-22.04, linux-tools-5.15.0-1030-azure, linux-tools-aws, linux-headers-azure-fde-edge, linux-headers-aws, linux-headers-azure, linux-image-aws-lts-22.04, linux-azure-edge, linux-modules-iwlwifi-5.15.0-1030-azure, linux-modules-extra-5.15.0-1030-azure, linux-image-5.15.0-1030-azure-fde, linux-aws-edge, linux-image-aws, linux-image-azure-edge, linux-tools-azure-lts-22.04, linux-aws-5.15-headers-5.15.0-1027, linux-modules-extra-azure-fde, linux-azure-headers-5.15.0-1030, linux-image-5.15.0-1027-aws, linux-azure-fde, linux-buildinfo-5.15.0-1030-azure, linux-aws-lts-22.04, linux-aws-tools-5.15.0-1027, linux-tools-azure-fde-edge, linux-azure-lts-22.04, linux-image-aws-edge, linux-cloud-tools-azure-edge, linux-image-azure-lts-22.04, linux-cloud-tools-azure-fde, linux-modules-extra-azure-fde-edge, linux-image-unsigned-5.15.0-1030-azure-fde, linux-azure-5.15-headers-5.15.0-1030, linux-headers-azure-lts-22.04, linux-image-azure-fde, linux-modules-extra-5.15.0-1027-aws, linux-tools-aws-edge, linux-headers-5.15.0-1030-azure, linux-modules-extra-azure, linux-azure-tools-5.15.0-1030, linux-aws-cloud-tools-5.15.0-1027, linux-headers-azure-edge, linux-aws-5.15-tools-5.15.0-1027, linux-modules-5.15.0-1027-aws, linux-tools-azure-fde, linux-azure-5.15-tools-5.15.0-1030, linux-aws-headers-5.15.0-1027, linux-cloud-tools-5.15.0-1030-azure, linux-aws-5.15, linux-image-5.15.0-1030-azure, linux-modules-extra-azure-lts-22.04, linux-azure-cloud-tools-5.15.0-1030, linux-cloud-tools-azure, linux-modules-extra-aws-edge, linux-cloud-tools-azure-lts-22.04, linux-headers-aws-edge, linux-tools-azure, linux-tools-5.15.0-1027-aws, linux-image-azure-fde-edge, linux-headers-5.15.0-1027-aws, linux-headers-azure-fde, linux-buildinfo-5.15.0-1027-aws, linux-image-unsigned-5.15.0-1027-aws, linux-cloud-tools-azure-fde-edge, linux-modules-extra-azure-edge, linux-modules-extra-aws, linux-modules-5.15.0-1030-azure, linux-azure-5.15-cloud-tools-5.15.0-1030, linux-aws-5.15-cloud-tools-5.15.0-1027, linux-aws o USN-5793-2 : linux-azure-headers-5.19.0-1016, linux-cloud-tools-5.19.0-1016-azure, linux-headers-azure, linux-azure-cloud-tools-5.19.0-1016, linux-image-unsigned-5.19.0-1016-azure, linux-tools-5.19.0-1016-azure, linux-modules-5.19.0-1016-azure, linux-cloud-tools-azure, linux-buildinfo-5.19.0-1016-azure, linux-image-azure, linux-azure-tools-5.19.0-1016, linux-tools-azure, linux-azure, linux-modules-extra-5.19.0-1016-azure, linux-image-5.19.0-1016-azure, linux-modules-extra-azure, linux-headers-5.19.0-1016-azure o USN-5793-3 : linux-oracle-tools-5.19.0-1014, linux-modules-extra-gcp, linux-image-unsigned-5.19.0-1014-gcp, linux-modules-extra-5.19.0-1014-gcp, linux-gcp-tools-5.19.0-1014, linux-tools-5.19.0-1014-oracle, linux-image-unsigned-5.19.0-1014-oracle, linux-tools-gcp, linux-headers-5.19.0-1014-gcp, linux-tools-5.19.0-1014-gcp, linux-gcp-headers-5.19.0-1014, linux-headers-5.19.0-1014-oracle, linux-modules-5.19.0-1014-gcp, linux-modules-extra-5.19.0-1014-oracle, linux-gcp, linux-buildinfo-5.19.0-1014-gcp, linux-oracle-headers-5.19.0-1014, linux-image-5.19.0-1014-gcp, linux-tools-oracle, linux-modules-iwlwifi-5.19.0-1014-gcp, linux-buildinfo-5.19.0-1014-oracle, linux-image-oracle, linux-headers-gcp, linux-modules-5.19.0-1014-oracle, linux-image-5.19.0-1014-oracle, linux-oracle, linux-headers-oracle, linux-modules-iwlwifi-5.19.0-1014-oracle, linux-image-gcp o USN-5793-4 : linux-ibm-tools-common, linux-ibm-tools-5.19.0-1014, linux-ibm, linux-headers-ibm, linux-headers-5.19.0-1014-ibm, linux-modules-5.19.0-1014-ibm, linux-ibm-source-5.19.0, linux-modules-extra-5.19.0-1014-ibm, linux-image-5.19.0-1014-ibm, linux-modules-iwlwifi-5.19.0-1014-ibm, linux-tools-ibm, linux-ibm-headers-5.19.0-1014, linux-image-ibm, linux-ibm-cloud-tools-common, linux-buildinfo-5.19.0-1014-ibm, linux-tools-5.19.0-1014-ibm, linux-image-unsigned-5.19.0-1014-ibm o USN-5877-1 : linux-image-gke-5.15, linux-image-5.15.0-1027-gke, linux-image-unsigned-5.15.0-1027-gke, linux-tools-gke-edge, linux-modules-iwlwifi-5.15.0-1027-gke, linux-tools-5.15.0-1027-gke, linux-gke-edge, linux-buildinfo-5.15.0-1027-gke, linux-headers-5.15.0-1027-gke, linux-gke-5.15-headers-5.15.0-1027, linux-modules-5.15.0-1027-gke, linux-tools-gke-5.15, linux-modules-extra-5.15.0-1027-gke, linux-image-gke-edge, linux-headers-gke-edge, linux-gke-5.15-tools-5.15.0-1027, linux-gke-5.15, linux-headers-gke-5.15 o USN-5791-3 : linux-cloud-tools-5.4.0-1100-azure, linux-azure-5.4, linux-modules-extra-azure-fde, linux-azure-5.4-headers-5.4.0-1100, linux-azure-fde, linux-headers-azure-edge, linux-image-azure, linux-azure, linux-tools-azure-fde, linux-tools-5.4.0-1100-azure, linux-buildinfo-5.4.0-1100-azure, linux-tools-azure-edge, linux-image-5.4.0-1100-azure, linux-signed-azure-edge, linux-image-5.4.0-1100-azure-fde, linux-headers-azure-fde, linux-image-unsigned-5.4.0-1100-azure-fde, linux-modules-5.4.0-1100-azure, linux-cloud-tools-azure-edge, linux-cloud-tools-azure-fde, linux-signed-image-azure, linux-headers-azure, linux-modules-extra-5.4.0-1100-azure, linux-image-unsigned-5.4.0-1100-azure, linux-azure-edge, linux-headers-5.4.0-1100-azure, linux-image-azure-fde, linux-modules-extra-azure-edge, linux-azure-5.4-cloud-tools-5.4.0-1100, linux-modules-extra-azure, linux-cloud-tools-azure, linux-signed-azure, linux-signed-image-azure-edge, linux-tools-azure, linux-image-azure-edge, linux-azure-5.4-tools-5.4.0-1100 o USN-5815-1 : linux-buildinfo-5.4.0-1054-bluefield, linux-tools-bluefield, linux-image-unsigned-5.4.0-1054-bluefield, linux-tools-5.4.0-1054-bluefield, linux-modules-5.4.0-1054-bluefield, linux-bluefield-tools-5.4.0-1054, linux-bluefield, linux-image-5.4.0-1054-bluefield, linux-headers-5.4.0-1054-bluefield, linux-headers-bluefield, linux-bluefield-headers-5.4.0-1054, linux-image-bluefield o USN-6045-1 : linux-tools-generic, linux-image-extra-virtual-lts-vivid, linux-aws-cloud-tools-4.4.0-1118, linux-lts-xenial-tools-4.4.0-240, linux-signed-image-lowlatency-lts-wily, linux-image-extra-virtual-lts-wily, linux-virtual, linux-virtual-lts-utopic, linux-cloud-tools-virtual, linux-image-extra-virtual-lts-xenial, linux-tools-4.4.0-240-lowlatency, linux-cloud-tools-virtual-lts-wily, linux-cloud-tools-virtual-lts-utopic, linux-kvm-tools-4.4.0-1119, linux-signed-generic, linux-image-lowlatency-lts-utopic, linux-source, linux-source-4.4.0, linux-headers-4.4.0-1119-kvm, linux-aws-tools-4.4.0-1118, linux-image-lowlatency, linux-tools-aws, linux-headers-virtual, linux-headers-lowlatency-lts-vivid, linux-headers-aws, linux-cloud-tools-generic, linux-kvm-cloud-tools-4.4.0-1119, linux-signed-image-lowlatency, linux-headers-generic-lts-vivid, linux-cloud-tools-lowlatency-lts-vivid, linux-image-4.4.0-240-generic, linux-cloud-tools-4.4.0-1156-aws, linux-tools-host, linux-image-unsigned-4.4.0-240-generic, linux-aws-headers-4.4.0-1118, linux-cloud-tools-generic-lts-utopic, linux-lowlatency-lts-utopic, linux-modules-4.4.0-240-generic, linux-tools-generic-lts-utopic, linux-signed-image-generic-lts-utopic, linux-cloud-tools-generic-lts-wily, linux-image-aws, linux-image-virtual-lts-wily, linux-signed-generic-lts-utopic, linux-tools-common, linux-tools-virtual-lts-xenial, linux-headers-kvm, linux-signed-lowlatency-lts-xenial, linux-aws-tools-4.4.0-1156, linux-signed-image-generic-lts-wily, linux-headers-generic-lts-xenial, linux-lts-xenial-cloud-tools-4.4.0-240, linux-modules-4.4.0-1156-aws, linux-modules-extra-4.4.0-1156-aws, linux-signed-lowlatency-lts-wily, linux-virtual-lts-xenial, linux-headers-generic-lts-utopic, linux-image-generic-lts-vivid, linux-cloud-tools-generic-lts-xenial, linux-doc, linux-tools-generic-lts-xenial, linux-aws-cloud-tools-4.4.0-1156, linux-image-extra-virtual-lts-utopic, linux-image-4.4.0-1119-kvm, linux-virtual-lts-vivid, linux-cloud-tools-generic-lts-vivid, linux-tools-lowlatency-lts-utopic, linux-signed-image-generic-lts-xenial, linux-signed-image-generic, linux-headers-4.4.0-240, linux-tools-4.4.0-1118-aws, linux-tools-4.4.0-1119-kvm, linux-cloud-tools-4.4.0-1118-aws, linux-headers-lowlatency-lts-utopic, linux-image-virtual, linux-image-virtual-lts-vivid, linux-cloud-tools-4.4.0-240-lowlatency, linux-image-extra-virtual, linux-headers-generic-lts-wily, linux-buildinfo-4.4.0-1118-aws, linux-modules-4.4.0-240-lowlatency, linux-generic-lts-vivid, linux-signed-image-generic-lts-vivid, linux-cloud-tools-common, linux-buildinfo-4.4.0-240-generic, linux-modules-4.4.0-1119-kvm, linux-cloud-tools-4.4.0-240-generic, linux-tools-virtual-lts-wily, linux-kvm, linux-headers-4.4.0-1118-aws, linux-aws-headers-4.4.0-1156, linux-tools-virtual, linux-modules-extra-4.4.0-240-generic, linux-signed-generic-lts-wily, linux-signed-generic-lts-vivid, linux-image-lowlatency-lts-wily, linux-image-virtual-lts-utopic, linux-tools-lowlatency, linux-cloud-tools-lowlatency, linux-buildinfo-4.4.0-1156-aws, linux-hwe-virtual-trusty, linux-image-hwe-virtual-trusty, linux-image-hwe-generic-trusty, linux-tools-lowlatency-lts-vivid, linux-headers-4.4.0-1156-aws, linux-tools-4.4.0-240-generic, linux-tools-lowlatency-lts-xenial, linux-tools-kvm, linux-generic, linux-buildinfo-4.4.0-1119-kvm, linux-lowlatency, linux-buildinfo-4.4.0-240-lowlatency, linux-headers-virtual-lts-wily, linux-image-generic, linux-tools-lts-utopic, linux, linux-lowlatency-lts-wily, linux-image-generic-lts-utopic, linux-libc-dev, linux-signed-lowlatency, linux-headers-generic, linux-tools-generic-lts-wily, linux-tools-virtual-lts-vivid, linux-generic-lts-utopic, linux-generic-lts-wily, linux-headers-lowlatency, linux-signed-generic-lts-xenial, linux-headers-virtual-lts-vivid, linux-signed-image-lowlatency-lts-xenial, linux-lowlatency-lts-vivid, linux-lowlatency-lts-xenial, linux-image-4.4.0-240-lowlatency, linux-tools-generic-lts-vivid, linux-cloud-tools-4.4.0-240, linux-image-virtual-lts-xenial, linux-image-generic-lts-wily, linux-tools-virtual-lts-utopic, linux-image-4.4.0-1118-aws, linux-cloud-tools-virtual-lts-vivid, linux-cloud-tools-lowlatency-lts-xenial, linux-crashdump, linux-image-generic-lts-xenial, linux-tools-lowlatency-lts-wily, linux-headers-4.4.0-240-lowlatency, linux-headers-virtual-lts-utopic, linux-modules-4.4.0-1118-aws, linux-headers-virtual-lts-xenial, linux-kvm-headers-4.4.0-1119, linux-image-lowlatency-lts-xenial, linux-tools-4.4.0-1156-aws, linux-headers-lowlatency-lts-wily, linux-cloud-tools-lowlatency-lts-wily, linux-image-lowlatency-lts-vivid, linux-tools-4.4.0-240, linux-cloud-tools-4.4.0-1119-kvm, linux-headers-lowlatency-lts-xenial, linux-virtual-lts-wily, linux-hwe-generic-trusty, linux-cloud-tools-lowlatency-lts-utopic, linux-image-kvm, linux-lts-xenial, linux-modules-extra-aws, linux-image-4.4.0-1156-aws, linux-cloud-tools-virtual-lts-xenial, linux-generic-lts-xenial, linux-image-unsigned-4.4.0-240-lowlatency, linux-headers-4.4.0-240-generic, linux-aws o USN-6071-1 : linux-modules-iwlwifi-5.17.0-1031-oem, linux-tools-oem-22.04a, linux-headers-oem-22.04a, linux-buildinfo-5.17.0-1031-oem, linux-oem-22.04a, linux-oem-22.04, linux-modules-ipu6-oem-22.04, linux-image-5.17.0-1031-oem, linux-image-unsigned-5.17.0-1031-oem, linux-modules-ivsc-oem-22.04a, linux-modules-iwlwifi-oem-22.04, linux-oem-5.17-headers-5.17.0-1031, linux-oem-5.17-tools-host, linux-oem-5.17-tools-5.17.0-1031, linux-image-oem-22.04a, linux-modules-ipu6-oem-22.04a, linux-headers-oem-22.04, linux-image-oem-22.04, linux-modules-5.17.0-1031-oem, linux-tools-5.17.0-1031-oem, linux-tools-oem-22.04, linux-headers-5.17.0-1031-oem, linux-modules-iwlwifi-oem-22.04a, linux-modules-ipu6-5.17.0-1031-oem, linux-oem-5.17, linux-modules-ivsc-5.17.0-1031-oem, linux-modules-ivsc-oem-22.04 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaDCckNZI30y1K9AQhxVRAAuLLzbPfUuKdsV9SFxKuhua8ARGfgWWJo 10hApcDXGYBuPGGK83mT5PJiZO/tA2Yoq9omo2toW0+pXD3lTt7/3j7bu/BKzEDM KxwG9EeF6Yux2ggWFPAznWoYq3jL/bKJVbvsv8NOr2XSN5IPz1ojs3S4Shx8h3e7 jKeJuZNp2NW9wftw4rOHTpM3TXKNXCtARW9uWdg8Hr29mHFn1MqX4GHXRIVfg72N dUEVhKVFkQ2dE8MQ/VgwKq4HRPvx3VicBTqbu8BFIZzewG1JchH7XLEJo26RYR+W tItGCoilfWMTumD9JI9CwAQuMAYCAs5wOm8VoxcmhtCzQptu4UEtuTE+HDvYVX4G aYbINcvINxR6C3eERuhW0yzgvmebYUDG7+IYdGmf7YnBALgSem25nuo29nh4zzRF bsMMXehJMB/jdLzYbHrNPfDPV8heuXIvChHyuWQpyx5G9Ff2RsUX2zNxkr+v5Yg+ nkNY7r7Q7KTM3wn58/frzW2ucxwZM1lz86/qsFRNwmbUZE73nvSJ7bAbs0vUEZsT 9rZ9UKA2d7QN9pWf1Ff4W62u1I+oid3TRR2QJ1eCL6wMzUxa4dmjWfVF1dsOLIK0 ZyqyGwHPP867YTdw+cn1vsKQGIO09ohev8k3dFKiFZzaVDV9mag7tgzeaW75vi0K 6XL6/LW9/SI= =5QWq -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3081 - [Ubuntu] Linux kernel (OEM): CVSS (Max): 7.8*

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3081 USN-6123-1: Linux kernel (OEM) vulnerabilities 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux kernel (OEM) Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2023-32233 CVE-2023-30456 CVE-2023-26606 CVE-2023-2612 CVE-2023-1670 Original Bulletin: https://ubuntu.com/security/notices/USN-6123-1 Comment: CVSS (Max): 7.8* CVE-2023-32233 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * Not all CVSS available when published - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6123-1: Linux kernel (OEM) vulnerabilities 30 May 2023 Several security issues were fixed in the Linux kernel. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 22.04 LTS Packages o linux-oem-6.0 - Linux kernel for OEM systems Details Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2023-32233 ) Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). ( CVE-2023-30456 ) It was discovered that the Xircom PCMCIA network device driver in the Linux kernel did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). ( CVE-2023-1670 ) Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock). ( CVE-2023-2612 ) It was discovered that the NTFS file system implementation in the Linux kernel did not properly handle a loop termination condition, leading to an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. ( CVE-2023-26606 ) Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 o linux-image-oem-22.04b - 6.0.0.1017.17 o linux-image-6.0.0-1017-oem - 6.0.0-1017.17 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References o CVE-2023-30456 o CVE-2023-2612 o CVE-2023-1670 o CVE-2023-26606 o CVE-2023-32233 Related notices o USN-6033-1 : linux-oem-6.1-tools-6.1.0-1009, linux-buildinfo-6.1.0-1009-oem, linux-headers-6.1.0-1009-oem, linux-image-unsigned-6.1.0-1009-oem, linux-oem-6.1-headers-6.1.0-1009, linux-headers-oem-22.04c, linux-tools-oem-22.04c, linux-oem-6.1-tools-host, linux-image-oem-22.04c, linux-oem-6.1, linux-modules-6.1.0-1009-oem, linux-modules-ivsc-6.1.0-1009-oem, linux-modules-ivsc-oem-22.04c, linux-tools-6.1.0-1009-oem, linux-modules-ipu6-6.1.0-1009-oem, linux-modules-ipu6-oem-22.04c, linux-image-6.1.0-1009-oem, linux-oem-22.04c o USN-6124-1 : linux-modules-ipu6-oem-22.04, linux-headers-oem-22.04a, linux-modules-ivsc-oem-22.04a, linux-modules-ipu6-oem-22.04a, linux-modules-ipu6-5.17.0-1032-oem, linux-tools-5.17.0-1032-oem, linux-image-oem-22.04, linux-oem-5.17-tools-5.17.0-1032, linux-image-5.17.0-1032-oem, linux-oem-22.04, linux-buildinfo-5.17.0-1032-oem, linux-image-oem-22.04a, linux-modules-5.17.0-1032-oem, linux-tools-oem-22.04, linux-oem-5.17, linux-oem-5.17-tools-host, linux-tools-oem-22.04a, linux-modules-iwlwifi-oem-22.04a, linux-oem-5.17-headers-5.17.0-1032, linux-image-unsigned-5.17.0-1032-oem, linux-modules-ivsc-5.17.0-1032-oem, linux-headers-oem-22.04, linux-headers-5.17.0-1032-oem, linux-oem-22.04a, linux-modules-ivsc-oem-22.04, linux-modules-iwlwifi-oem-22.04, linux-modules-iwlwifi-5.17.0-1032-oem o USN-6122-1 : linux-modules-ipu6-6.1.0-1013-oem, linux-oem-6.1-tools-6.1.0-1013, linux-tools-6.1.0-1013-oem, linux-oem-6.1-headers-6.1.0-1013, linux-tools-oem-22.04c, linux-headers-oem-22.04c, linux-oem-6.1-tools-host, linux-headers-6.1.0-1013-oem, linux-image-oem-22.04c, linux-modules-iwlwifi-oem-22.04c, linux-modules-ivsc-oem-22.04c, linux-modules-ipu6-oem-22.04c, linux-oem-22.04c, linux-image-unsigned-6.1.0-1013-oem, linux-image-6.1.0-1013-oem, linux-modules-6.1.0-1013-oem, linux-oem-6.1, linux-modules-ivsc-6.1.0-1013-oem, linux-modules-iwlwifi-6.1.0-1013-oem, linux-buildinfo-6.1.0-1013-oem o USN-6045-1 : linux-headers-virtual-lts-vivid, linux-tools-4.4.0-1119-kvm, linux-virtual-lts-wily, linux-kvm-headers-4.4.0-1119, linux-headers-4.4.0-1118-aws, linux-tools-generic, linux-headers-lowlatency-lts-vivid, linux-image-lowlatency-lts-utopic, linux-signed-image-generic, linux-aws, linux-cloud-tools-virtual-lts-xenial, linux-cloud-tools-lowlatency-lts-xenial, linux-buildinfo-4.4.0-1156-aws, linux-virtual-lts-utopic, linux-tools-kvm, linux-lts-xenial-tools-4.4.0-240, linux-signed-generic-lts-utopic, linux-tools-virtual-lts-vivid, linux-cloud-tools-lowlatency-lts-vivid, linux-tools-virtual-lts-utopic, linux-image-4.4.0-240-lowlatency, linux-image-extra-virtual, linux-cloud-tools-virtual-lts-wily, linux-lowlatency, linux-image-lowlatency, linux-cloud-tools-4.4.0-240, linux-aws-headers-4.4.0-1156, linux-modules-4.4.0-240-generic, linux-headers-aws, linux-generic, linux-crashdump, linux-modules-extra-aws, linux-signed-generic-lts-xenial, linux-image-lowlatency-lts-xenial, linux-tools-aws, linux-kvm-cloud-tools-4.4.0-1119, linux-tools-4.4.0-240-generic, linux-signed-image-generic-lts-utopic, linux-headers-4.4.0-240, linux-image-extra-virtual-lts-xenial, linux-modules-extra-4.4.0-1156-aws, linux-doc, linux-buildinfo-4.4.0-1119-kvm, linux-buildinfo-4.4.0-240-lowlatency, linux-signed-lowlatency, linux-tools-generic-lts-utopic, linux-image-virtual, linux-headers-4.4.0-240-lowlatency, linux-headers-virtual-lts-xenial, linux-cloud-tools-4.4.0-1156-aws, linux-tools-generic-lts-wily, linux-modules-4.4.0-240-lowlatency, linux-image-virtual-lts-wily, linux-cloud-tools-virtual-lts-utopic, linux-image-virtual-lts-xenial, linux-headers-virtual, linux-buildinfo-4.4.0-1118-aws, linux-headers-generic-lts-wily, linux-signed-generic-lts-wily, linux-headers-lowlatency-lts-utopic, linux-cloud-tools-lowlatency-lts-utopic, linux-tools-lowlatency, linux-image-4.4.0-240-generic, linux-headers-generic-lts-utopic, linux-headers-virtual-lts-utopic, linux-lts-xenial-cloud-tools-4.4.0-240, linux-image-unsigned-4.4.0-240-generic, linux-tools-lowlatency-lts-utopic, linux-headers-generic-lts-vivid, linux-tools-common, linux-aws-tools-4.4.0-1118, linux-signed-image-lowlatency-lts-wily, linux-headers-lowlatency-lts-xenial, linux-virtual-lts-vivid, linux-lowlatency-lts-xenial, linux-headers-generic, linux-headers-virtual-lts-wily, linux-image-hwe-generic-trusty, linux-lowlatency-lts-vivid, linux-cloud-tools-generic-lts-xenial, linux-cloud-tools-common, linux-signed-image-lowlatency-lts-xenial, linux-tools-virtual-lts-xenial, linux-signed-generic, linux-image-hwe-virtual-trusty, linux-image-virtual-lts-utopic, linux-source, linux-cloud-tools-generic-lts-wily, linux-headers-4.4.0-1156-aws, linux-headers-4.4.0-240-generic, linux-image-generic-lts-xenial, linux-cloud-tools-4.4.0-240-generic, linux-virtual-lts-xenial, linux-image-generic-lts-wily, linux-cloud-tools-lowlatency-lts-wily, linux-tools-4.4.0-240, linux-hwe-generic-trusty, linux-virtual, linux-cloud-tools-generic-lts-utopic, linux-cloud-tools-virtual, linux-cloud-tools-virtual-lts-vivid, linux-generic-lts-vivid, linux-image-4.4.0-1118-aws, linux-tools-lts-utopic, linux-headers-lowlatency-lts-wily, linux-image-aws, linux-modules-4.4.0-1118-aws, linux-image-4.4.0-1156-aws, linux-signed-image-generic-lts-xenial, linux-image-extra-virtual-lts-wily, linux-cloud-tools-generic, linux-cloud-tools-4.4.0-240-lowlatency, linux-image-virtual-lts-vivid, linux-image-unsigned-4.4.0-240-lowlatency, linux-image-generic-lts-vivid, linux-signed-generic-lts-vivid, linux-tools-lowlatency-lts-xenial, linux-signed-image-lowlatency, linux-cloud-tools-lowlatency, linux-cloud-tools-4.4.0-1119-kvm, linux-tools-virtual, linux-generic-lts-xenial, linux-image-extra-virtual-lts-utopic, linux-headers-4.4.0-1119-kvm, linux-image-generic, linux-cloud-tools-generic-lts-vivid, linux, linux-tools-4.4.0-240-lowlatency, linux-tools-generic-lts-xenial, linux-aws-tools-4.4.0-1156, linux-tools-4.4.0-1118-aws, linux-headers-generic-lts-xenial, linux-tools-4.4.0-1156-aws, linux-buildinfo-4.4.0-240-generic, linux-modules-4.4.0-1156-aws, linux-generic-lts-utopic, linux-aws-cloud-tools-4.4.0-1118, linux-signed-lowlatency-lts-xenial, linux-libc-dev, linux-headers-kvm, linux-headers-lowlatency, linux-signed-lowlatency-lts-wily, linux-generic-lts-wily, linux-image-lowlatency-lts-vivid, linux-tools-host, linux-cloud-tools-4.4.0-1118-aws, linux-image-extra-virtual-lts-vivid, linux-image-generic-lts-utopic, linux-modules-4.4.0-1119-kvm, linux-aws-headers-4.4.0-1118, linux-image-lowlatency-lts-wily, linux-image-kvm, linux-lowlatency-lts-utopic, linux-source-4.4.0, linux-lowlatency-lts-wily, linux-image-4.4.0-1119-kvm, linux-signed-image-generic-lts-wily, linux-tools-lowlatency-lts-vivid, linux-tools-virtual-lts-wily, linux-modules-extra-4.4.0-240-generic, linux-signed-image-generic-lts-vivid, linux-tools-generic-lts-vivid, linux-lts-xenial, linux-tools-lowlatency-lts-wily, linux-aws-cloud-tools-4.4.0-1156, linux-kvm-tools-4.4.0-1119, linux-hwe-virtual-trusty, linux-kvm o USN-5982-1 : linux-tools-generic, linux-image-unsigned-5.15.0-69-generic, linux-aws, linux-tools-generic-hwe-20.04, linux-aws-5.15-tools-5.15.0-1033, linux-image-oracle-edge, linux-tools-generic-lpae-hwe-20.04, linux-generic-lpae-hwe-20.04-edge, linux-tools-virtual-hwe-20.04-edge, linux-image-generic-lpae-hwe-20.04, linux-cloud-tools-azure-edge, linux-headers-5.15.0-69, linux-tools-azure-edge, linux-cloud-tools-azure, linux-modules-extra-gkeop-5.15, linux-image-5.15.0-1032-oracle, linux-cloud-tools-virtual-hwe-20.04, linux-tools-aws-edge, linux-gkeop, linux-image-5.15.0-1033-aws, linux-tools-5.15.0-1026-raspi, linux-tools-generic-lpae-hwe-20.04-edge, linux-cloud-tools-azure-fde, linux-headers-5.15.0-1026-raspi, linux-lowlatency-cloud-tools-common, linux-tools-generic-64k-hwe-20.04, linux-azure-tools-5.15.0-1035, linux-tools-lowlatency-hwe-20.04, linux-azure-5.15-cloud-tools-5.15.0-1035, linux-image-5.15.0-1026-raspi-nolpae, linux-azure-headers-5.15.0-1035, linux-headers-virtual-hwe-20.04-edge, linux-hwe-5.15-tools-5.15.0-69, linux-cloud-tools-5.15.0-69-generic, linux-modules-extra-raspi, linux-lowlatency-hwe-5.15-tools-host, linux-image-lowlatency-64k-hwe-20.04, linux-generic-hwe-20.04, linux-buildinfo-5.15.0-1035-azure, linux-headers-azure, linux-tools-generic-64k, linux-modules-5.15.0-69-lowlatency-64k, linux-aws-headers-5.15.0-1033, linux-modules-extra-azure-edge, linux-hwe-5.15-tools-common, linux-modules-5.15.0-1031-gcp, linux-image-lowlatency-64k-hwe-20.04-edge, linux-cloud-tools-virtual, linux-headers-azure-fde, linux-lowlatency-hwe-5.15-headers-5.15.0-69, linux-image-aws, linux-modules-extra-raspi-nolpae, linux-image-azure, linux-generic-lpae, linux-modules-extra-aws-edge, linux-tools-azure, linux-raspi-nolpae, linux-oracle-5.15, linux-azure-5.15-tools-5.15.0-1035, linux-image-generic-64k, linux-image-lowlatency-hwe-20.04, linux-gkeop-5.15, linux-buildinfo-5.15.0-1026-raspi-nolpae, linux-gkeop-cloud-tools-5.15.0-1017, linux, linux-headers-5.15.0-1017-gkeop, linux-modules-5.15.0-1026-raspi-nolpae, linux-hwe-5.15-headers-5.15.0-69, linux-headers-raspi-nolpae, linux-aws-5.15-cloud-tools-5.15.0-1033, linux-headers-5.15.0-69-generic, linux-oracle-tools-5.15.0-1032, linux-headers-5.15.0-1035-azure, linux-image-generic-hwe-20.04, linux-gkeop-tools-5.15.0-1017, linux-modules-iwlwifi-5.15.0-1031-gcp, linux-image-5.15.0-69-lowlatency-64k, linux-modules-extra-5.15.0-1026-raspi-nolpae, linux-image-azure-lts-22.04, linux-image-unsigned-5.15.0-1031-gcp, linux-gcp, linux-cloud-tools-5.15.0-69-lowlatency, linux-image-unsigned-5.15.0-1035-azure, linux-headers-aws-edge, linux-generic-lpae-hwe-20.04, linux-cloud-tools-gkeop, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-headers-oracle, linux-buildinfo-5.15.0-69-generic, linux-lowlatency-hwe-20.04-edge, linux-lowlatency-hwe-20.04, linux-image-extra-virtual-hwe-20.04-edge, linux-image-5.15.0-1035-azure, linux-tools-aws, linux-aws-lts-22.04, linux-image-lowlatency-64k, linux-headers-raspi, linux-doc, linux-lowlatency-hwe-5.15-tools-5.15.0-69, linux-headers-generic-64k-hwe-20.04-edge, linux-headers-generic-lpae-hwe-20.04, linux-headers-generic-hwe-20.04, linux-oracle, linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-69, linux-aws-edge, linux-headers-aws-lts-22.04, linux-tools-lowlatency-64k, linux-tools-5.15.0-69-lowlatency, linux-headers-generic-64k-hwe-20.04, linux-image-gkeop-5.15, linux-virtual-hwe-20.04-edge, linux-cloud-tools-generic-hwe-20.04-edge, linux-modules-5.15.0-1032-oracle, linux-image-5.15.0-1035-azure-fde, linux-oracle-headers-5.15.0-1032, linux-cloud-tools-lowlatency-hwe-20.04, linux-image-oem-20.04, linux-tools-common, linux-cloud-tools-5.15.0-1035-azure, linux-azure-edge, linux-tools-5.15.0-1026-raspi-nolpae, linux-image-azure-edge, linux-tools-oracle-edge, linux-headers-5.15.0-69-generic-lpae, linux-cloud-tools-generic-hwe-20.04, linux-modules-extra-5.15.0-1017-gkeop, linux-tools-virtual-hwe-20.04, linux-modules-iwlwifi-5.15.0-69-lowlatency, linux-aws-5.15, linux-virtual, linux-image-5.15.0-1026-raspi, linux-gcp-headers-5.15.0-1031, linux-modules-extra-azure-fde, linux-headers-oracle-edge, linux-headers-gkeop-5.15, linux-image-unsigned-5.15.0-1032-oracle, linux-tools-5.15.0-69-generic-64k, linux-headers-5.15.0-1032-oracle, linux-raspi-headers-5.15.0-1026, linux-headers-generic-hwe-20.04-edge, linux-tools-gkeop-5.15, linux-headers-5.15.0-1031-gcp, linux-headers-lowlatency-64k, linux-headers-gkeop, linux-modules-extra-aws-lts-22.04, linux-image-generic, linux-image-unsigned-5.15.0-69-lowlatency, linux-cloud-tools-gkeop-5.15, linux-tools-generic-64k-hwe-20.04-edge, linux-tools-generic-lpae, linux-tools-5.15.0-1035-azure, linux-buildinfo-5.15.0-1026-raspi, linux-tools-oracle, linux-modules-extra-5.15.0-1026-raspi, linux-image-unsigned-5.15.0-69-generic-64k, linux-tools-5.15.0-69, linux-headers-lowlatency, linux-modules-5.15.0-69-generic-lpae, linux-generic-64k-hwe-20.04, linux-tools-gcp-edge, linux-image-unsigned-5.15.0-1035-azure-fde, linux-image-aws-edge, linux-modules-extra-5.15.0-1035-azure, linux-headers-azure-lts-22.04, linux-source-5.15.0, linux-modules-5.15.0-69-lowlatency, linux-cloud-tools-virtual-hwe-20.04-edge, linux-gkeop-headers-5.15.0-1017, linux-headers-5.15.0-1033-aws, linux-modules-extra-gkeop, linux-image-extra-virtual, linux-headers-aws, linux-crashdump, linux-modules-extra-5.15.0-1033-aws, linux-modules-extra-aws, linux-headers-gcp-edge, linux-modules-iwlwifi-5.15.0-69-generic, linux-image-unsigned-5.15.0-1033-aws, linux-headers-generic-lpae-hwe-20.04-edge, linux-tools-5.15.0-69-generic, linux-raspi-tools-5.15.0-1026, linux-azure-5.15-headers-5.15.0-1035, linux-aws-cloud-tools-5.15.0-1033, linux-hwe-5.15-cloud-tools-5.15.0-69, linux-tools-5.15.0-1032-oracle, linux-lowlatency-cloud-tools-5.15.0-69, linux-buildinfo-5.15.0-1017-gkeop, linux-modules-iwlwifi-generic-hwe-20.04, linux-image-unsigned-5.15.0-1017-gkeop, linux-image-generic-lpae, linux-buildinfo-5.15.0-69-generic-64k, linux-modules-extra-gcp-edge, linux-gcp-tools-5.15.0-1031, linux-buildinfo-5.15.0-1032-oracle, linux-aws-tools-5.15.0-1033, linux-tools-5.15.0-69-lowlatency-64k, linux-virtual-hwe-20.04, linux-oem-20.04, linux-azure-lts-22.04, linux-hwe-5.15-source-5.15.0, linux-cloud-tools-common, linux-tools-5.15.0-1033-aws, linux-buildinfo-5.15.0-69-lowlatency, linux-lowlatency-tools-host, linux-lowlatency-tools-common, linux-modules-5.15.0-1033-aws, linux-oracle-5.15-tools-5.15.0-1032, linux-cloud-tools-5.15.0-1017-gkeop, linux-modules-extra-azure-lts-22.04, linux-tools-5.15.0-69-generic-lpae, linux-modules-iwlwifi-generic, linux-headers-generic-lpae, linux-image-5.15.0-69-generic-64k, linux-image-5.15.0-1017-gkeop, linux-lowlatency-hwe-5.15-cloud-tools-common, linux-headers-virtual-hwe-20.04, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-tools-virtual, linux-cloud-tools-azure-lts-22.04, linux-lowlatency-64k-hwe-20.04, linux-modules-5.15.0-1035-azure, linux-headers-oem-20.04, linux-image-generic-64k-hwe-20.04, linux-image-raspi-nolpae, linux-generic-64k, linux-libc-dev, linux-image-generic-hwe-20.04-edge, linux-azure-5.15, linux-lowlatency-headers-5.15.0-69, linux-tools-raspi, linux-lowlatency-hwe-5.15-tools-common, linux-lowlatency-64k, linux-headers-5.15.0-1026-raspi-nolpae, linux-gcp-5.15-headers-5.15.0-1031, linux-tools-raspi-nolpae, linux-headers-5.15.0-69-generic-64k, linux-oracle-5.15-headers-5.15.0-1032, linux-lowlatency-hwe-5.15, linux-tools-5.15.0-1017-gkeop, linux-cloud-tools-5.15.0-69, linux-tools-lowlatency-64k-hwe-20.04, linux-image-lowlatency-hwe-20.04-edge, linux-image-virtual-hwe-20.04-edge, linux-image-generic-lpae-hwe-20.04-edge, linux-lowlatency, linux-image-lowlatency, linux-image-unsigned-5.15.0-69-lowlatency-64k, linux-generic, linux-tools-5.15.0-1031-gcp, linux-lowlatency-tools-5.15.0-69, linux-modules-extra-5.15.0-1031-gcp, linux-image-generic-64k-hwe-20.04-edge, linux-tools-generic-hwe-20.04-edge, linux-gcp-edge, linux-buildinfo-5.15.0-1033-aws, linux-tools-oem-20.04, linux-headers-azure-edge, linux-modules-5.15.0-1026-raspi, linux-image-virtual, linux-hwe-5.15-cloud-tools-common, linux-image-gkeop, linux-modules-5.15.0-69-generic-64k, linux-modules-5.15.0-1017-gkeop, linux-headers-virtual, linux-headers-lowlatency-64k-hwe-20.04, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-image-virtual-hwe-20.04, linux-tools-lowlatency, linux-modules-extra-5.15.0-69-generic, linux-azure-cloud-tools-5.15.0-1035, linux-image-gcp-edge, linux-modules-extra-azure, linux-image-oracle, linux-raspi, linux-image-extra-virtual-hwe-20.04, linux-headers-generic, linux-hwe-5.15-tools-host, linux-cloud-tools-5.15.0-1033-aws, linux-image-aws-lts-22.04, linux-modules-extra-5.15.0-1032-oracle, linux-gcp-5.15, linux-oracle-edge, linux-tools-azure-lts-22.04, linux-hwe-5.15, linux-image-5.15.0-1031-gcp, linux-image-raspi, linux-headers-5.15.0-69-lowlatency, linux-image-gcp, linux-gcp-5.15-tools-5.15.0-1031, linux-buildinfo-5.15.0-69-generic-lpae, linux-cloud-tools-generic, linux-headers-5.15.0-69-lowlatency-64k, linux-image-5.15.0-69-generic, linux-image-5.15.0-69-lowlatency, linux-lowlatency-64k-hwe-20.04-edge, linux-modules-extra-gcp, linux-image-azure-fde, linux-azure, linux-cloud-tools-lowlatency, linux-headers-gcp, linux-tools-gkeop, linux-image-5.15.0-69-generic-lpae, linux-azure-fde, linux-tools-gcp, linux-tools-lowlatency-hwe-20.04-edge, linux-aws-5.15-headers-5.15.0-1033, linux-generic-64k-hwe-20.04-edge, linux-buildinfo-5.15.0-1031-gcp, linux-modules-iwlwifi-generic-hwe-20.04-edge, linux-tools-azure-fde, linux-tools-host, linux-buildinfo-5.15.0-69-lowlatency-64k, linux-tools-aws-lts-22.04, linux-headers-lowlatency-hwe-20.04-edge, linux-headers-lowlatency-hwe-20.04, linux-modules-5.15.0-69-generic, linux-generic-hwe-20.04-edge, linux-headers-generic-64k, linux-source o USN-5987-1 : linux-image-5.15.0-1030-gke, linux-buildinfo-5.15.0-1030-gke, linux-image-gke-edge, linux-tools-gke-5.15, linux-tools-5.15.0-1030-gke, linux-image-ibm, linux-modules-iwlwifi-5.15.0-1030-gke, linux-headers-gke-edge, linux-ibm-tools-5.15.0-1027, linux-tools-gke-edge, linux-ibm-cloud-tools-common, linux-kvm-tools-5.15.0-1030, linux-headers-ibm, linux-modules-extra-5.15.0-1029-gke, linux-modules-5.15.0-1029-gke, linux-image-unsigned-5.15.0-1029-gke, linux-tools-gke, linux-tools-kvm, linux-buildinfo-5.15.0-1027-ibm, linux-ibm-tools-common, linux-kvm, linux-headers-gke, linux-tools-5.15.0-1029-gke, linux-gke, linux-buildinfo-5.15.0-1030-kvm, linux-gke-tools-5.15.0-1030, linux-gke-5.15-tools-5.15.0-1029, linux-modules-5.15.0-1030-kvm, linux-tools-5.15.0-1027-ibm, linux-headers-kvm, linux-headers-gke-5.15, linux-ibm-headers-5.15.0-1027, linux-image-5.15.0-1027-ibm, linux-modules-extra-5.15.0-1027-ibm, linux-buildinfo-5.15.0-1029-gke, linux-modules-5.15.0-1030-gke, linux-headers-5.15.0-1027-ibm, linux-modules-iwlwifi-5.15.0-1029-gke, linux-tools-ibm, linux-image-5.15.0-1029-gke, linux-image-unsigned-5.15.0-1027-ibm, linux-image-unsigned-5.15.0-1030-kvm, linux-kvm-headers-5.15.0-1030, linux-modules-extra-5.15.0-1030-gke, linux-tools-5.15.0-1030-kvm, linux-gke-5.15, linux-image-kvm, linux-image-gke-5.15, linux-headers-5.15.0-1030-gke, linux-ibm, linux-headers-5.15.0-1030-kvm, linux-gke-edge, linux-image-5.15.0-1030-kvm, linux-modules-5.15.0-1027-ibm, linux-image-gke, linux-gke-5.15-headers-5.15.0-1029, linux-ibm-source-5.15.0, linux-gke-headers-5.15.0-1030, linux-headers-5.15.0-1029-gke, linux-image-unsigned-5.15.0-1030-gke o USN-6004-1 : linux-tools-5.15.0-1027-intel-iotg, linux-headers-5.15.0-1027-intel-iotg, linux-image-5.15.0-1027-intel-iotg, linux-intel-iotg-cloud-tools-common, linux-image-intel-iotg, linux-intel-iotg-tools-common, linux-intel-iotg, linux-tools-intel-iotg, linux-buildinfo-5.15.0-1027-intel-iotg, linux-intel-iotg-tools-host, linux-modules-5.15.0-1027-intel-iotg, linux-cloud-tools-5.15.0-1027-intel-iotg, linux-modules-iwlwifi-5.15.0-1027-intel-iotg, linux-modules-extra-5.15.0-1027-intel-iotg, linux-intel-iotg-cloud-tools-5.15.0-1027, linux-intel-iotg-headers-5.15.0-1027, linux-intel-iotg-tools-5.15.0-1027, linux-headers-intel-iotg, linux-image-unsigned-5.15.0-1027-intel-iotg o USN-6024-1 : linux-cloud-tools-5.19.0-1023-aws, linux-oracle-tools-5.19.0-1020, linux-modules-5.19.0-1021-kvm, linux-headers-5.19.0-40-generic-lpae, linux-cloud-tools-virtual-hwe-22.04-edge, linux-generic-lpae-hwe-22.04-edge, linux-tools-raspi-nolpae, linux-aws-headers-5.19.0-1023, linux-headers-5.19.0-40, linux-kvm-tools-5.19.0-1021, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-modules-ivsc-generic, linux-modules-extra-5.19.0-1020-oracle, linux-image-lowlatency-64k-hwe-22.04-edge, linux-modules-5.19.0-40-generic-64k, linux-raspi-headers-5.19.0-1016, linux-tools-generic, linux-headers-oracle, linux-aws, linux-image-unsigned-5.19.0-40-generic, linux-cloud-tools-5.19.0-40-generic, linux-buildinfo-5.19.0-1016-raspi, linux-cloud-tools-generic-hwe-22.04, linux-tools-5.19.0-40-generic, linux-tools-kvm, linux-hwe-5.19-cloud-tools-5.19.0-40, linux-modules-iwlwifi-5.19.0-1022-lowlatency, linux-image-5.19.0-1023-azure, linux-tools-lowlatency-64k-hwe-22.04, linux-headers-5.19.0-1016-raspi-nolpae, linux-image-5.19.0-1021-kvm, linux-modules-5.19.0-1020-oracle, linux-modules-extra-5.19.0-1023-azure, linux-azure-cloud-tools-5.19.0-1023, linux-lowlatency-hwe-20.04-edge, linux-image-lowlatency-hwe-20.04-edge, linux-modules-5.19.0-1020-gcp, linux-tools-lowlatency-64k-hwe-20.04, linux-image-extra-virtual, linux-image-virtual-hwe-22.04, linux-gcp-tools-5.19.0-1020, linux-lowlatency-hwe-20.04, linux-lowlatency, linux-image-lowlatency, linux-tools-oem-22.04, linux-modules-ipu6-generic-hwe-22.04, linux-headers-aws, linux-generic, linux-tools-5.19.0-1016-raspi-nolpae, linux-crashdump, linux-modules-extra-aws, linux-tools-5.19.0-1022-lowlatency-64k, linux-tools-aws, linux-buildinfo-5.19.0-1020-oracle, linux-cloud-tools-azure, linux-tools-generic-lpae-hwe-22.04-edge, linux-headers-5.19.0-1023-aws, linux-image-lowlatency-64k, linux-aws-tools-5.19.0-1023, linux-tools-lowlatency-64k-hwe-22.04-edge, linux-headers-raspi, linux-doc, linux-tools-5.19.0-1020-gcp, linux-image-5.19.0-1022-lowlatency, linux-image-generic-64k-hwe-22.04, linux-modules-ipu6-generic, linux-headers-generic-hwe-22.04-edge, linux-image-extra-virtual-hwe-22.04, linux-modules-5.19.0-1023-azure, linux-hwe-5.19-tools-5.19.0-40, linux-image-unsigned-5.19.0-1023-azure, linux-image-virtual, linux-image-5.19.0-1016-raspi-nolpae, linux-oracle, linux-lowlatency-hwe-22.04-edge, linux-tools-generic-lpae-hwe-22.04, linux-image-lowlatency-hwe-22.04-edge, linux-oracle-headers-5.19.0-1020, linux-modules-extra-5.19.0-1020-gcp, linux-tools-lowlatency-64k, linux-hwe-5.19-cloud-tools-common, linux-oem-22.04, linux-image-generic-lpae, linux-generic-hwe-22.04-edge, linux-image-unsigned-5.19.0-1023-aws, linux-lowlatency-cloud-tools-common, linux-modules-extra-5.19.0-1016-raspi-nolpae, linux-headers-virtual, linux-headers-lowlatency-64k-hwe-20.04, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-image-5.19.0-1023-aws, linux-image-virtual-hwe-22.04-edge, linux-tools-lowlatency-hwe-20.04, linux-kvm-headers-5.19.0-1021, linux-headers-5.19.0-40-generic, linux-tools-lowlatency, linux-modules-5.19.0-40-generic, linux-tools-virtual-hwe-22.04-edge, linux-tools-generic-64k-hwe-22.04, linux-cloud-tools-lowlatency-hwe-20.04, linux-image-generic-lpae-hwe-22.04, linux-modules-5.19.0-1016-raspi-nolpae, linux-image-lowlatency-hwe-22.04, linux-headers-5.19.0-1016-raspi, linux-tools-common, linux-headers-generic-64k-hwe-22.04, linux-modules-extra-raspi, linux-lowlatency-headers-5.19.0-1022, linux-generic-hwe-22.04, linux-buildinfo-5.19.0-1023-azure, linux-modules-extra-azure, linux-modules-ivsc-5.19.0-40-generic, linux-modules-ipu6-5.19.0-1022-lowlatency, linux-image-oracle, linux-raspi, linux-image-lowlatency-64k-hwe-20.04, linux-azure-headers-5.19.0-1023, linux-hwe-5.19-headers-5.19.0-40, linux-modules-extra-5.19.0-1023-aws, linux-headers-generic, linux-cloud-tools-generic-hwe-22.04-edge, linux-headers-generic-lpae-hwe-22.04, linux-headers-lowlatency-hwe-22.04, linux-buildinfo-5.19.0-1021-kvm, linux-buildinfo-5.19.0-1022-lowlatency-64k, linux-image-5.19.0-1022-lowlatency-64k, linux-image-unsigned-5.19.0-1020-gcp, linux-tools-5.19.0-1021-kvm, linux-headers-azure, linux-headers-generic-hwe-22.04, linux-tools-generic-64k, linux-modules-ipu6-5.19.0-40-generic, linux-cloud-tools-common, linux-raspi-tools-5.19.0-1016, linux-headers-generic-lpae-hwe-22.04-edge, linux-image-unsigned-5.19.0-40-generic-64k, linux-modules-5.19.0-1022-lowlatency, linux-lowlatency-tools-5.19.0-1022, linux-tools-5.19.0-1022-lowlatency, linux-virtual-hwe-22.04, linux-cloud-tools-lowlatency-hwe-22.04-edge, linux-virtual-hwe-22.04-edge, linux-source, linux-lowlatency-tools-host, linux-tools-5.19.0-1023-aws, linux-buildinfo-5.19.0-1016-raspi-nolpae, linux-headers-5.19.0-1022-lowlatency, linux-image-extra-virtual-hwe-22.04-edge, linux-headers-5.19.0-1023-azure, linux-buildinfo-5.19.0-1022-lowlatency, linux-image-unsigned-5.19.0-1022-lowlatency-64k, linux-lowlatency-tools-common, linux-modules-extra-5.19.0-1016-raspi, linux-image-raspi, linux-tools-generic-hwe-22.04-edge, linux-tools-5.19.0-40, linux-tools-generic-64k-hwe-22.04-edge, linux-image-lowlatency-64k-hwe-20.04-edge, linux-virtual, linux-cloud-tools-virtual, linux-headers-5.19.0-1020-gcp, linux-modules-ipu6-generic-hwe-22.04-edge, linux-tools-5.19.0-1016-raspi, linux-modules-ivsc-generic-hwe-22.04, linux-modules-5.19.0-1016-raspi, linux-image-generic-lpae-hwe-22.04-edge, linux-headers-virtual-hwe-22.04, linux-modules-iwlwifi-generic, linux-buildinfo-5.19.0-1023-aws, linux-headers-generic-lpae, linux-image-aws, linux-image-generic-hwe-22.04-edge, linux-headers-lowlatency-hwe-22.04-edge, linux-modules-extra-raspi-nolpae, linux-cloud-tools-5.19.0-40, linux-image-gcp, linux-lowlatency-64k-hwe-22.04, linux-headers-5.19.0-40-generic-64k, linux-modules-iwlwifi-generic-hwe-22.04, linux-image-azure, linux-generic-lpae, linux-image-5.19.0-1020-oracle, linux-headers-oem-22.04, linux-modules-extra-5.19.0-40-generic, linux-cloud-tools-generic, linux-lowlatency-64k-hwe-20.04-edge, linux-headers-virtual-hwe-22.04-edge, linux-tools-azure, linux-modules-extra-gcp, linux-modules-ivsc-generic-hwe-22.04-edge, linux-tools-5.19.0-40-generic-lpae, linux-raspi-nolpae, linux-tools-generic-hwe-22.04, linux-lowlatency-cloud-tools-5.19.0-1022, linux-headers-5.19.0-1022-lowlatency-64k, linux-azure, linux-headers-lowlatency-64k-hwe-22.04, linux-headers-lowlatency-64k, linux-generic-lpae-hwe-22.04, linux-hwe-5.19, linux-image-generic-64k, linux-image-5.19.0-1020-gcp, linux-cloud-tools-lowlatency, linux-image-5.19.0-40-generic-64k, linux-lowlatency-hwe-22.04, linux-cloud-tools-lowlatency-hwe-22.04, linux-headers-gcp, linux-image-lowlatency-hwe-20.04, linux-tools-5.19.0-1020-oracle, linux-gcp-headers-5.19.0-1020, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-image-unsigned-5.19.0-1022-lowlatency, linux-tools-virtual, linux-tools-virtual-hwe-22.04, linux-lowlatency-64k-hwe-20.04, linux-cloud-tools-5.19.0-1023-azure, linux-image-oem-22.04, linux-image-generic, linux-buildinfo-5.19.0-40-generic-lpae, linux-modules-ivsc-5.19.0-1022-lowlatency, linux, linux-source-5.19.0, linux-tools-gcp, linux-tools-lowlatency-hwe-20.04-edge, linux-cloud-tools-5.19.0-1022-lowlatency, linux-tools-generic-lpae, linux-image-lowlatency-64k-hwe-22.04, linux-image-raspi-nolpae, linux-generic-64k, linux-headers-generic-64k-hwe-22.04-edge, linux-image-unsigned-5.19.0-1020-oracle, linux-modules-iwlwifi-5.19.0-40-generic, linux-tools-oracle, linux-modules-5.19.0-1022-lowlatency-64k, linux-libc-dev, linux-generic-64k-hwe-22.04, linux-buildinfo-5.19.0-40-generic, linux-cloud-tools-virtual-hwe-22.04, linux-headers-kvm, linux-aws-cloud-tools-5.19.0-1023, linux-headers-lowlatency, linux-hwe-5.19-tools-common, linux-modules-5.19.0-1023-aws, linux-headers-raspi-nolpae, linux-image-generic-64k-hwe-22.04-edge, linux-tools-lowlatency-hwe-22.04-edge, linux-buildinfo-5.19.0-40-generic-64k, linux-hwe-5.19-tools-host, linux-image-unsigned-5.19.0-1021-kvm, linux-tools-host, linux-headers-5.19.0-1021-kvm, linux-image-generic-hwe-22.04, linux-image-5.19.0-1016-raspi, linux-image-5.19.0-40-generic-lpae, linux-headers-lowlatency-hwe-20.04-edge, linux-buildinfo-5.19.0-1020-gcp, linux-image-kvm, linux-tools-raspi, linux-headers-5.19.0-1020-oracle, linux-azure-tools-5.19.0-1023, linux-tools-lowlatency-hwe-22.04, linux-headers-lowlatency-64k-hwe-22.04-edge, linux-headers-lowlatency-hwe-20.04, linux-lowlatency-64k, linux-image-5.19.0-40-generic, linux-lowlatency-64k-hwe-22.04-edge, linux-modules-iwlwifi-generic-hwe-22.04-edge, linux-tools-5.19.0-40-generic-64k, linux-modules-5.19.0-40-generic-lpae, linux-gcp, linux-tools-5.19.0-1023-azure, linux-headers-generic-64k, linux-generic-64k-hwe-22.04-edge, linux-kvm - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaCwMkNZI30y1K9AQg9jg/9HtoWyh8/S0Za1zGc62mmAMtWuPoFvVbT OlWO0GI/llBaePKznvGAPh3I1xq536dPAqEeX7Rctwpm2ph5RtMnnADJbHxN2/zJ petsLHv6EnzRrZ07W5CgkttzmFFravsOVmWul4U98d7IyiqUQrSUxwdRoIEil3io pc88Cy6ad5U8nT+Bcwc4PpcufGlxD9nOlxndcf/gDla1gkWt+jDyOLhyYIZjcooB bklQi/glF6XBRmSWVynuYz3x4nMEnTjIWzw5wROK9Vd2rxVPFOdkcK/j95a3ZUGr h27nmzogBAg/e0qOhJNQQ0Ry8Z2irB4MEG4nvO0Me9WKpj2twUTNJobuqiyvMWNc 1bijwhihYgLX3M3ft7y03A13LFGy7l4m5bBB1KN4s+Jg5cf66hQw8WPjMwK22kDb La+edBVJXdmlfyD+KwIEfG7YKfHdcZC3ovW6w6HASSlb4+G1nfPPO9P6rUZvH7eQ iH0JvlNYGio3lng1AH6lFzibn2R+EeIL1jTJhjgovKT0eT6afrZIgtLfpBvn3ZqT YGhgx8G3JTz/7/xy75I8jxNesmJjbZ32ewJMF2Fb7RB0vyT4vgH/g85htd/Xn6uo 4+mH32C3HH+z6FrJCkBO4MuC7aztFdjRo7TySCtDepIhY8o8BIGTDuPpePP59h00 wy7/HvE+jm4= =iV4D -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3080 - [Ubuntu] Linux kernel (OEM): CVSS (Max): 7.8*

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3080 USN-6122-1: Linux kernel (OEM) vulnerabilities 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux kernel (OEM) Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2023-32233 CVE-2023-2612 Original Bulletin: https://ubuntu.com/security/notices/USN-6122-1 Comment: CVSS (Max): 7.8* CVE-2023-32233 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * Not all CVSS available when published - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6122-1: Linux kernel (OEM) vulnerabilities 30 May 2023 Several security issues were fixed in the Linux kernel. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 22.04 LTS Packages o linux-oem-6.1 - Linux kernel for OEM systems Details Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2023-32233 ) Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock). ( CVE-2023-2612 ) Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 o linux-image-6.1.0-1013-oem - 6.1.0-1013.13 o linux-image-oem-22.04c - 6.1.0.1013.13 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References o CVE-2023-32233 o CVE-2023-2612 Related notices o USN-6123-1 : linux-oem-6.0-tools-6.0.0-1017, linux-tools-oem-22.04b, linux-image-oem-22.04b, linux-modules-ivsc-oem-22.04b, linux-modules-iwlwifi-6.0.0-1017-oem, linux-tools-6.0.0-1017-oem, linux-modules-iwlwifi-oem-22.04b, linux-oem-6.0, linux-oem-22.04b, linux-image-unsigned-6.0.0-1017-oem, linux-buildinfo-6.0.0-1017-oem, linux-headers-6.0.0-1017-oem, linux-modules-ivsc-6.0.0-1017-oem, linux-oem-6.0-headers-6.0.0-1017, linux-headers-oem-22.04b, linux-modules-6.0.0-1017-oem, linux-modules-ipu6-6.0.0-1017-oem, linux-modules-ipu6-oem-22.04b, linux-image-6.0.0-1017-oem, linux-oem-6.0-tools-host o USN-6124-1 : linux-modules-iwlwifi-oem-22.04a, linux-headers-oem-22.04a, linux-modules-ipu6-oem-22.04, linux-image-oem-22.04, linux-modules-5.17.0-1032-oem, linux-tools-5.17.0-1032-oem, linux-image-5.17.0-1032-oem, linux-modules-iwlwifi-oem-22.04, linux-oem-22.04, linux-oem-5.17-headers-5.17.0-1032, linux-oem-5.17-tools-5.17.0-1032, linux-buildinfo-5.17.0-1032-oem, linux-modules-ivsc-oem-22.04, linux-headers-oem-22.04, linux-modules-ivsc-oem-22.04a, linux-headers-5.17.0-1032-oem, linux-modules-ivsc-5.17.0-1032-oem, linux-tools-oem-22.04a, linux-image-unsigned-5.17.0-1032-oem, linux-image-oem-22.04a, linux-tools-oem-22.04, linux-modules-ipu6-oem-22.04a, linux-oem-5.17-tools-host, linux-oem-22.04a, linux-modules-ipu6-5.17.0-1032-oem, linux-modules-iwlwifi-5.17.0-1032-oem, linux-oem-5.17 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaCe8kNZI30y1K9AQibGw//U5FRIrEO4bvvtKWf2k4+TR+n3Qc0Mg/y xyPnitGi2SP1wr8Xta1efMuyoCvUnK6UsOBCWtCRuRJqIGY8iBfdyd5isKc3Wkha M4WyfaJCqanBvFAfyrk2RQmrRLiwNXVMwqJ/HlmpXD23WO/uMBuJreDNR3cxQH8K 8kXISlV93/nK6Kk1gM4aP29nvWSTqTJAqh+RG7A3KVkLrAmK/yD4mtR44hxoxR0F eYCjDsi3YmdWnMc+nHLgAzNnHXsFgkoWx3l2d8xj6dMqkbJNzWYXBySZrw15bWWi a+K8N8NL+wM7yNOyfHEvycEcghHKm27dpFxduLVjH0RZ3KXtX6cMY6u2bOHlKpAE dVJfzp5F89ooeVf9iYqwSCj7j9RbdOQrh/k+AtiejYm2hDged7Qh9wrsgz+gMtA3 gCxo+tBV1FHTUFsS0YlR+NCpIiv37WM5S39AZNQQ51xCc8GMxfy73pcOvcI7W1Kx Hyma2ia4Qk3DDcyrD+ACYBuu9lHsBuj66CkQHslhG68aEY7VmCxPmcG2l+8i05KQ KVRi5UE38BStZMqNeetZb5nw8GfxjQlVNX94g/qOE+Q6M8IXvipaOxN5+bYeSxfH n0IZawKtFWLtDu2KnONgK2/O0+61M2tBAlApkeN9tkv0mRQjt+VlMTey2N0aTSJ3 qWvwWxI8En8= =0sfA -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3079 - [Ubuntu] Nanopb: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3079 USN-6121-1: Nanopb vulnerabilities 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Nanopb Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2021-21401 CVE-2020-26243 Original Bulletin: https://ubuntu.com/security/notices/USN-6121-1 Comment: CVSS (Max): 7.5 CVE-2020-26243 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6121-1: Nanopb vulnerabilities 30 May 2023 Several security issues were fixed in Nanopb. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 20.04 LTS Packages o nanopb - Protocol Buffers with small code size Details It was discovered that Nanopb incorrectly handled certain decode messages. An attacker could possibly use this cause a denial of service or expose sensitive information. ( CVE-2020-26243 ) It was discovered that Nanopb incorrectly handled certain decode messages. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. ( CVE-2021-21401 ) Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 o nanopb - 0.4.1-1ubuntu0.1~esm1 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References o CVE-2021-21401 o CVE-2020-26243 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaCO8kNZI30y1K9AQgNWA//SQ2/4NMMBPxYyAvklNZSAo5tRYf35sJT NViADgkxdXYj8TilB7JtNSAfKbiqGO+MhtEMK/X5IgvQvsBd8XeFbFByANzOV1tJ AQZPfzYrDOw4rVXu/1ypplaxFJqnB6YIEEznWTLXIGP/3duJ+QZ6g/p+Em+LR7F+ cgVjczzg2gi/wBxR0OuOxdnWkmyi8uL6iwH9dGYyGsJ3PMBfQ1FR+qZSJ3w9Kkkx IiZsy7E0eB6yUTi4HO7FzNHxhY2Sv2icC5Y8SiJf7D0NFfvky31Wx6J38RR2kJQp maJjvoeT+Cl5Fm08dGsXa12ObYpct+xCaSKP6lxXRlPWf3S003Z8U2Eo9HO8Xf6o 0Yz3cVC0sZRY7NexYxnEovpPI9q4Cvb4NVFkyKkCQGALcumxnsj6AdAXNLpxwtBj hjvNTNBU6JJMTQfuPQWJIsymKYDy1ZbtcH+FiTfblOOVIEIXbdD+1I155LOA0pk+ K7SiZHVOIrbFUkTq726FyLNK/is3eM1/3WTZA5Ak65d/3ls6ij7wYXc2xMgkZtt7 VHGNlHuBjoqqK2zZsKt2hqakadHNFOTVfKP7dlVDh+4QaAIwBiFmNqY9FGd0gXNL h8eA6zZxF3oh0b2IKx2LN/k2B8FSrP+aS8tEpgKCDV3iH4li98e0Q08HGY9641IL /nEkD9GJZwE= =i64H -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3078 - [Ubuntu] SpiderMonkey: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3078 USN-6120-1: SpiderMonkey vulnerabilities 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: SpiderMonkey Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2023-32215 CVE-2023-32211 CVE-2023-29550 CVE-2023-29548 CVE-2023-29536 CVE-2023-29535 CVE-2023-25751 CVE-2023-25739 CVE-2023-25735 Original Bulletin: https://ubuntu.com/security/notices/USN-6120-1 Comment: CVSS (Max): 7.5 CVE-2023-32215 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6120-1: SpiderMonkey vulnerabilities 30 May 2023 Several security issues were fixed in SpiderMonkey. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 23.04 o Ubuntu 22.10 o Ubuntu 22.04 LTS Packages o mozjs102 - SpiderMonkey JavaScript library Details Several security issues were discovered in the SpiderMonkey JavaScript library. If a user were tricked into opening malicious JavaScript applications or processing malformed data, a remote attacker could exploit a variety of issues related to JavaScript security, including denial of service attacks, and arbitrary code execution. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04 o libmozjs-102-0 - 102.11.0-0ubuntu0.23.04.1 Ubuntu 22.10 o libmozjs-102-0 - 102.11.0-0ubuntu0.22.10.1 Ubuntu 22.04 o libmozjs-102-0 - 102.11.0-0ubuntu0.22.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. References o CVE-2023-29535 o CVE-2023-29536 o CVE-2023-25739 o CVE-2023-32211 o CVE-2023-32215 o CVE-2023-25751 o CVE-2023-29550 o CVE-2023-25735 o CVE-2023-29548 Related notices o USN-6010-1 : firefox-locale-xh, firefox-locale-ml, firefox-locale-gu, firefox-locale-is, firefox-locale-gl, firefox-locale-th, firefox-dev, firefox-locale-hr, firefox-locale-bg, firefox-locale-hsb, firefox-locale-hi, firefox-locale-ku, firefox-locale-el, firefox-locale-or, firefox-locale-mk, firefox-locale-hy, firefox-locale-af, firefox-locale-hu, firefox-locale-pa, firefox-locale-ne, firefox-locale-uk, firefox-locale-ja, firefox-locale-az, firefox-locale-an, firefox-locale-ko, firefox-locale-bn, firefox-locale-tr, firefox-locale-kab, firefox-locale-lv, firefox-locale-nso, firefox-locale-pl, firefox-locale-szl, firefox-locale-zh-hans, firefox-geckodriver, firefox-locale-sq, firefox-mozsymbols, firefox-locale-as, firefox-locale-fa, firefox-locale-si, firefox-locale-sr, firefox-locale-br, firefox, firefox-locale-de, firefox-locale-cs, firefox-locale-nb, firefox-locale-eo, firefox-locale-kk, firefox-locale-he, firefox-locale-be, firefox-locale-my, firefox-locale-cak, firefox-locale-ms, firefox-locale-zh-hant, firefox-locale-sw, firefox-locale-oc, firefox-locale-zu, firefox-locale-da, firefox-locale-sv, firefox-locale-ast, firefox-locale-es, firefox-locale-nl, firefox-locale-ga, firefox-locale-it, firefox-locale-gn, firefox-locale-fr, firefox-locale-te, firefox-locale-ca, firefox-locale-gd, firefox-locale-kn, firefox-locale-ur, firefox-locale-ar, firefox-locale-lg, firefox-locale-sk, firefox-locale-uz, firefox-locale-fi, firefox-locale-en, firefox-locale-et, firefox-locale-ro, firefox-locale-bs, firefox-locale-fy, firefox-locale-sl, firefox-locale-mn, firefox-locale-ia, firefox-locale-km, firefox-locale-ta, firefox-locale-eu, firefox-locale-mai, firefox-locale-csb, firefox-locale-pt, firefox-locale-mr, firefox-locale-vi, firefox-locale-lt, firefox-locale-ru, firefox-locale-cy, firefox-locale-ka, firefox-locale-nn, firefox-locale-id o USN-6015-1 : thunderbird-locale-rm, thunderbird-locale-lv, thunderbird-locale-th, thunderbird-locale-kab, thunderbird-locale-gd, thunderbird-locale-bn, thunderbird-locale-ta, thunderbird-locale-zh-cn, thunderbird-locale-en-us, thunderbird-locale-ko, thunderbird-locale-nn, thunderbird-locale-es-ar, thunderbird-locale-is, thunderbird-locale-uk, thunderbird-locale-kk, thunderbird-locale-zh-hant, thunderbird-locale-bn-bd, thunderbird-locale-sq, thunderbird-gnome-support, thunderbird-locale-ast, thunderbird-locale-cak, thunderbird-locale-bg, thunderbird-locale-en-gb, thunderbird-locale-zh-hans, thunderbird-locale-en, thunderbird-locale-ta-lk, thunderbird-locale-ar, thunderbird-locale-fy-nl, thunderbird, thunderbird-locale-ru, thunderbird-locale-hu, thunderbird-locale-de, thunderbird-locale-fr, thunderbird-locale-mk, thunderbird-locale-ms, thunderbird-dev, thunderbird-locale-ka, thunderbird-locale-sv-se, thunderbird-locale-pt, thunderbird-locale-it, thunderbird-locale-da, thunderbird-locale-hy, thunderbird-locale-he, thunderbird-locale-gl, thunderbird-locale-hsb, thunderbird-locale-si, thunderbird-locale-tr, thunderbird-locale-af, thunderbird-locale-ja, thunderbird-locale-be, xul-ext-gdata-provider, thunderbird-locale-et, thunderbird-locale-cs, thunderbird-locale-ca, thunderbird-locale-pt-br, thunderbird-locale-es, thunderbird-locale-nb, thunderbird-locale-fa, thunderbird-locale-ga-ie, xul-ext-calendar-timezones, thunderbird-locale-pa, xul-ext-lightning, thunderbird-locale-cy, thunderbird-locale-pa-in, thunderbird-locale-ga, thunderbird-locale-vi, thunderbird-locale-sv, thunderbird-locale-br, thunderbird-locale-ro, thunderbird-locale-dsb, thunderbird-mozsymbols, thunderbird-locale-fi, thunderbird-locale-uz, thunderbird-locale-hr, thunderbird-locale-nn-no, thunderbird-locale-eu, thunderbird-locale-sk, thunderbird-locale-nl, thunderbird-locale-sl, thunderbird-locale-id, thunderbird-locale-lt, thunderbird-locale-sr, thunderbird-locale-pt-pt, thunderbird-locale-el, thunderbird-locale-es-es, thunderbird-locale-zh-tw, thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-pl o USN-5880-1 : firefox-locale-xh, firefox-locale-ml, firefox-locale-gu, firefox-locale-is, firefox-locale-gl, firefox-locale-th, firefox-dev, firefox-locale-hr, firefox-locale-bg, firefox-locale-hsb, firefox-locale-hi, firefox-locale-ku, firefox-locale-el, firefox-locale-or, firefox-locale-mk, firefox-locale-hy, firefox-locale-af, firefox-locale-hu, firefox-locale-pa, firefox-locale-ne, firefox-locale-uk, firefox-locale-ja, firefox-locale-az, firefox-locale-an, firefox-locale-ko, firefox-locale-bn, firefox-locale-tr, firefox-locale-kab, firefox-locale-lv, firefox-locale-nso, firefox-locale-pl, firefox-locale-szl, firefox-locale-zh-hans, firefox-geckodriver, firefox-locale-sq, firefox-mozsymbols, firefox-locale-as, firefox-locale-fa, firefox-locale-si, firefox-locale-sr, firefox-locale-br, firefox, firefox-locale-de, firefox-locale-cs, firefox-locale-nb, firefox-locale-eo, firefox-locale-kk, firefox-locale-he, firefox-locale-be, firefox-locale-my, firefox-locale-cak, firefox-locale-ms, firefox-locale-zh-hant, firefox-locale-sw, firefox-locale-oc, firefox-locale-zu, firefox-locale-da, firefox-locale-sv, firefox-locale-ast, firefox-locale-es, firefox-locale-nl, firefox-locale-ga, firefox-locale-it, firefox-locale-gn, firefox-locale-fr, firefox-locale-te, firefox-locale-ca, firefox-locale-gd, firefox-locale-kn, firefox-locale-ur, firefox-locale-ar, firefox-locale-lg, firefox-locale-sk, firefox-locale-uz, firefox-locale-fi, firefox-locale-en, firefox-locale-et, firefox-locale-ro, firefox-locale-bs, firefox-locale-fy, firefox-locale-sl, firefox-locale-mn, firefox-locale-ia, firefox-locale-km, firefox-locale-ta, firefox-locale-eu, firefox-locale-mai, firefox-locale-csb, firefox-locale-pt, firefox-locale-mr, firefox-locale-vi, firefox-locale-lt, firefox-locale-ru, firefox-locale-cy, firefox-locale-ka, firefox-locale-nn, firefox-locale-id o USN-5943-1 : thunderbird-locale-rm, thunderbird-locale-lv, thunderbird-locale-th, thunderbird-locale-kab, thunderbird-locale-gd, thunderbird-locale-bn, thunderbird-locale-ta, thunderbird-locale-zh-cn, thunderbird-locale-en-us, thunderbird-locale-ko, thunderbird-locale-nn, thunderbird-locale-es-ar, thunderbird-locale-is, thunderbird-locale-uk, thunderbird-locale-kk, thunderbird-locale-zh-hant, thunderbird-locale-bn-bd, thunderbird-locale-sq, thunderbird-gnome-support, thunderbird-locale-ast, thunderbird-locale-cak, thunderbird-locale-bg, thunderbird-locale-en-gb, thunderbird-locale-zh-hans, thunderbird-locale-en, thunderbird-locale-ta-lk, thunderbird-locale-ar, thunderbird-locale-fy-nl, thunderbird, thunderbird-locale-ru, thunderbird-locale-hu, thunderbird-locale-de, thunderbird-locale-fr, thunderbird-locale-mk, thunderbird-locale-ms, thunderbird-dev, thunderbird-locale-ka, thunderbird-locale-sv-se, thunderbird-locale-pt, thunderbird-locale-it, thunderbird-locale-da, thunderbird-locale-hy, thunderbird-locale-he, thunderbird-locale-gl, thunderbird-locale-hsb, thunderbird-locale-si, thunderbird-locale-tr, thunderbird-locale-af, thunderbird-locale-ja, thunderbird-locale-be, xul-ext-gdata-provider, thunderbird-locale-et, thunderbird-locale-cs, thunderbird-locale-ca, thunderbird-locale-pt-br, thunderbird-locale-es, thunderbird-locale-nb, thunderbird-locale-fa, thunderbird-locale-ga-ie, xul-ext-calendar-timezones, thunderbird-locale-pa, xul-ext-lightning, thunderbird-locale-cy, thunderbird-locale-pa-in, thunderbird-locale-ga, thunderbird-locale-vi, thunderbird-locale-sv, thunderbird-locale-br, thunderbird-locale-ro, thunderbird-locale-dsb, thunderbird-mozsymbols, thunderbird-locale-fi, thunderbird-locale-uz, thunderbird-locale-hr, thunderbird-locale-nn-no, thunderbird-locale-eu, thunderbird-locale-sk, thunderbird-locale-nl, thunderbird-locale-sl, thunderbird-locale-id, thunderbird-locale-lt, thunderbird-locale-sr, thunderbird-locale-pt-pt, thunderbird-locale-el, thunderbird-locale-es-es, thunderbird-locale-zh-tw, thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-pl o USN-6074-1 : firefox-locale-xh, firefox-locale-ml, firefox-locale-gu, firefox-locale-is, firefox-locale-gl, firefox-locale-th, firefox-dev, firefox-locale-hr, firefox-locale-bg, firefox-locale-hsb, firefox-locale-hi, firefox-locale-ku, firefox-locale-el, firefox-locale-or, firefox-locale-mk, firefox-locale-hy, firefox-locale-af, firefox-locale-hu, firefox-locale-pa, firefox-locale-ne, firefox-locale-uk, firefox-locale-ja, firefox-locale-az, firefox-locale-an, firefox-locale-ko, firefox-locale-bn, firefox-locale-tr, firefox-locale-kab, firefox-locale-lv, firefox-locale-nso, firefox-locale-pl, firefox-locale-szl, firefox-locale-tg, firefox-locale-zh-hans, firefox-geckodriver, firefox-locale-sq, firefox-mozsymbols, firefox-locale-as, firefox-locale-fa, firefox-locale-si, firefox-locale-sr, firefox-locale-br, firefox, firefox-locale-de, firefox-locale-cs, firefox-locale-nb, firefox-locale-eo, firefox-locale-kk, firefox-locale-he, firefox-locale-be, firefox-locale-my, firefox-locale-cak, firefox-locale-ms, firefox-locale-zh-hant, firefox-locale-sw, firefox-locale-oc, firefox-locale-zu, firefox-locale-da, firefox-locale-sv, firefox-locale-ast, firefox-locale-es, firefox-locale-nl, firefox-locale-ga, firefox-locale-it, firefox-locale-gn, firefox-locale-fr, firefox-locale-te, firefox-locale-ca, firefox-locale-gd, firefox-locale-kn, firefox-locale-ur, firefox-locale-ar, firefox-locale-lg, firefox-locale-sk, firefox-locale-uz, firefox-locale-fi, firefox-locale-en, firefox-locale-et, firefox-locale-ro, firefox-locale-bs, firefox-locale-fy, firefox-locale-sl, firefox-locale-mn, firefox-locale-ia, firefox-locale-km, firefox-locale-ta, firefox-locale-eu, firefox-locale-mai, firefox-locale-csb, firefox-locale-pt, firefox-locale-mr, firefox-locale-vi, firefox-locale-lt, firefox-locale-ru, firefox-locale-cy, firefox-locale-ka, firefox-locale-nn, firefox-locale-id o USN-6075-1 : thunderbird-locale-rm, thunderbird-locale-lv, thunderbird-locale-th, thunderbird-locale-kab, thunderbird-locale-gd, thunderbird-locale-bn, thunderbird-locale-ta, thunderbird-locale-zh-cn, thunderbird-locale-en-us, thunderbird-locale-ko, thunderbird-locale-nn, thunderbird-locale-es-ar, thunderbird-locale-is, thunderbird-locale-uk, thunderbird-locale-kk, thunderbird-locale-zh-hant, thunderbird-locale-bn-bd, thunderbird-locale-sq, thunderbird-gnome-support, thunderbird-locale-ast, thunderbird-locale-cak, thunderbird-locale-bg, thunderbird-locale-en-gb, thunderbird-locale-zh-hans, thunderbird-locale-en, thunderbird-locale-ta-lk, thunderbird-locale-ar, thunderbird-locale-fy-nl, thunderbird, thunderbird-locale-ru, thunderbird-locale-hu, thunderbird-locale-de, thunderbird-locale-fr, thunderbird-locale-mk, thunderbird-locale-ms, thunderbird-dev, thunderbird-locale-ka, thunderbird-locale-sv-se, thunderbird-locale-pt, thunderbird-locale-it, thunderbird-locale-da, thunderbird-locale-hy, thunderbird-locale-he, thunderbird-locale-gl, thunderbird-locale-hsb, thunderbird-locale-si, thunderbird-locale-tr, thunderbird-locale-af, thunderbird-locale-ja, thunderbird-locale-be, xul-ext-gdata-provider, thunderbird-locale-et, thunderbird-locale-cs, thunderbird-locale-ca, thunderbird-locale-pt-br, thunderbird-locale-es, thunderbird-locale-nb, thunderbird-locale-fa, thunderbird-locale-ga-ie, xul-ext-calendar-timezones, thunderbird-locale-pa, xul-ext-lightning, thunderbird-locale-cy, thunderbird-locale-pa-in, thunderbird-locale-ga, thunderbird-locale-vi, thunderbird-locale-sv, thunderbird-locale-br, thunderbird-locale-ro, thunderbird-locale-dsb, thunderbird-mozsymbols, thunderbird-locale-fi, thunderbird-locale-uz, thunderbird-locale-hr, thunderbird-locale-nn-no, thunderbird-locale-eu, thunderbird-locale-sk, thunderbird-locale-nl, thunderbird-locale-sl, thunderbird-locale-id, thunderbird-locale-lt, thunderbird-locale-sr, thunderbird-locale-pt-pt, thunderbird-locale-el, thunderbird-locale-es-es, thunderbird-locale-zh-tw, thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-pl o USN-5954-1 : firefox-locale-xh, firefox-locale-ml, firefox-locale-gu, firefox-locale-is, firefox-locale-gl, firefox-locale-th, firefox-dev, firefox-locale-hr, firefox-locale-bg, firefox-locale-hsb, firefox-locale-hi, firefox-locale-ku, firefox-locale-el, firefox-locale-or, firefox-locale-mk, firefox-locale-hy, firefox-locale-af, firefox-locale-hu, firefox-locale-pa, firefox-locale-ne, firefox-locale-uk, firefox-locale-ja, firefox-locale-az, firefox-locale-an, firefox-locale-ko, firefox-locale-bn, firefox-locale-tr, firefox-locale-kab, firefox-locale-lv, firefox-locale-nso, firefox-locale-pl, firefox-locale-szl, firefox-locale-zh-hans, firefox-geckodriver, firefox-locale-sq, firefox-mozsymbols, firefox-locale-as, firefox-locale-fa, firefox-locale-si, firefox-locale-sr, firefox-locale-br, firefox, firefox-locale-de, firefox-locale-cs, firefox-locale-nb, firefox-locale-eo, firefox-locale-kk, firefox-locale-he, firefox-locale-be, firefox-locale-my, firefox-locale-cak, firefox-locale-ms, firefox-locale-zh-hant, firefox-locale-sw, firefox-locale-oc, firefox-locale-zu, firefox-locale-da, firefox-locale-sv, firefox-locale-ast, firefox-locale-es, firefox-locale-nl, firefox-locale-ga, firefox-locale-it, firefox-locale-gn, firefox-locale-fr, firefox-locale-te, firefox-locale-ca, firefox-locale-gd, firefox-locale-kn, firefox-locale-ur, firefox-locale-ar, firefox-locale-lg, firefox-locale-sk, firefox-locale-uz, firefox-locale-fi, firefox-locale-en, firefox-locale-et, firefox-locale-ro, firefox-locale-bs, firefox-locale-fy, firefox-locale-sl, firefox-locale-mn, firefox-locale-ia, firefox-locale-km, firefox-locale-ta, firefox-locale-eu, firefox-locale-mai, firefox-locale-csb, firefox-locale-pt, firefox-locale-mr, firefox-locale-vi, firefox-locale-lt, firefox-locale-ru, firefox-locale-cy, firefox-locale-ka, firefox-locale-nn, firefox-locale-id o USN-5972-1 : thunderbird-locale-rm, thunderbird-locale-lv, thunderbird-locale-th, thunderbird-locale-kab, thunderbird-locale-gd, thunderbird-locale-bn, thunderbird-locale-ta, thunderbird-locale-zh-cn, thunderbird-locale-en-us, thunderbird-locale-ko, thunderbird-locale-nn, thunderbird-locale-es-ar, thunderbird-locale-is, thunderbird-locale-uk, thunderbird-locale-kk, thunderbird-locale-zh-hant, thunderbird-locale-bn-bd, thunderbird-locale-sq, thunderbird-gnome-support, thunderbird-locale-ast, thunderbird-locale-cak, thunderbird-locale-bg, thunderbird-locale-en-gb, thunderbird-locale-zh-hans, thunderbird-locale-en, thunderbird-locale-ta-lk, thunderbird-locale-ar, thunderbird-locale-fy-nl, thunderbird, thunderbird-locale-ru, thunderbird-locale-hu, thunderbird-locale-de, thunderbird-locale-fr, thunderbird-locale-mk, thunderbird-locale-ms, thunderbird-dev, thunderbird-locale-ka, thunderbird-locale-sv-se, thunderbird-locale-pt, thunderbird-locale-it, thunderbird-locale-da, thunderbird-locale-hy, thunderbird-locale-he, thunderbird-locale-gl, thunderbird-locale-hsb, thunderbird-locale-si, thunderbird-locale-tr, thunderbird-locale-af, thunderbird-locale-ja, thunderbird-locale-be, xul-ext-gdata-provider, thunderbird-locale-et, thunderbird-locale-cs, thunderbird-locale-ca, thunderbird-locale-pt-br, thunderbird-locale-es, thunderbird-locale-nb, thunderbird-locale-fa, thunderbird-locale-ga-ie, xul-ext-calendar-timezones, thunderbird-locale-pa, xul-ext-lightning, thunderbird-locale-cy, thunderbird-locale-pa-in, thunderbird-locale-ga, thunderbird-locale-vi, thunderbird-locale-sv, thunderbird-locale-br, thunderbird-locale-ro, thunderbird-locale-dsb, thunderbird-mozsymbols, thunderbird-locale-fi, thunderbird-locale-uz, thunderbird-locale-hr, thunderbird-locale-nn-no, thunderbird-locale-eu, thunderbird-locale-sk, thunderbird-locale-nl, thunderbird-locale-sl, thunderbird-locale-id, thunderbird-locale-lt, thunderbird-locale-sr, thunderbird-locale-pt-pt, thunderbird-locale-el, thunderbird-locale-es-es, thunderbird-locale-zh-tw, thunderbird-locale-fy, thunderbird-locale-nb-no, thunderbird-locale-pl - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaCFckNZI30y1K9AQifKA//brinHDu7/itdf9u7u6+8ir002dsmtQ+F wx+fk/J6eBeysbe4w2wRt9CcMnw/kufa/vvBwUPyUf1/EX/4E9VxFAFpk6frCDyM g0bbj3UKSBocb3fn5bQg+50NnNZBGMGvb3JY+3SY3325vaeWMC0WzfMV5t0p3qoT m9JL+UwQ1aN2jLC01lXoJlofemaKDzGe5wl1k9PFKjVf0WrQXlVNOBZdxGBWQk7H dQuxwr3m2Rmr43/ejUv08KoCfSlsTSoxjVeQq9ZFJ8u07+/n6aor8OMaG0nLt3wO 3or3a9+vEQduapcBmAfjReINcC1IljJyVnG53cbWb21Gr7mFA+2XY+tIARos+ZMW zq89EUYTl8DnUlCBIsfEXXpJjL6chIpxH95vFyaAekIsnSE90n7WxVhVR4DslwY1 gTUckokQhurt7MxIIfdHifd7rqlXiYMVUS3nuDoGGOghNvatet99xc+55VSbCnGn nbH0/P5e0JYv+rtWWoSvjJoCgirt3+c3lRRrIap4FaLp0hwuNhe0KXiXZ534OZYh m/Dd5W4OES506QvI0WLoYgmD7nI6u7FD+PdlVMDmqd7oHp9k+I66qpJhGNQTDCqA 3jro4638qKriHS5Cr5ueBu9VvVli2H+9SH3prioRrHTzF5XpHsiUTOkAq7VzBVER 5dFLQKIMtH0= =6ecs -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3077 - [Ubuntu] Batik: CVSS (Max): 8.2

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3077 USN-6117-1: Apache Batik vulnerabilities 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Batik Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2022-42890 CVE-2022-41704 CVE-2022-40146 CVE-2022-38648 CVE-2022-38398 CVE-2020-11987 CVE-2019-17566 Original Bulletin: https://ubuntu.com/security/notices/USN-6117-1 Comment: CVSS (Max): 8.2 CVE-2020-11987 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6117-1: Apache Batik vulnerabilities 30 May 2023 Several security issues were fixed in Apache Batik. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 22.10 o Ubuntu 22.04 LTS o Ubuntu 20.04 LTS o Ubuntu 18.04 ESM o Ubuntu 16.04 ESM o Ubuntu 14.04 ESM Packages o batik - SVG Library Details It was discovered that Apache Batik incorrectly handled certain inputs. An attacker could possibly use this to perform a cross site request forgery attack. ( CVE-2019-17566 , CVE-2020-11987 , CVE-2022-38398 , CVE-2022-38648 ) It was discovered that Apache Batik incorrectly handled Jar URLs in some situations. A remote attacker could use this issue to access files on the server. ( CVE-2022-40146 ) It was discovered that Apache Batik allowed running untrusted Java code from an SVG. An attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. ( CVE-2022-41704 , CVE-2022-42890 ) Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10 o libbatik-java - 1.14-2ubuntu0.1 Ubuntu 22.04 o libbatik-java - 1.14-1ubuntu0.2 Ubuntu 20.04 o libbatik-java - 1.12-1ubuntu0.1 Ubuntu 18.04 o libbatik-java - 1.10-2~18.04.1 Ubuntu 16.04 o libbatik-java - 1.8-3ubuntu1+esm1 Available with Ubuntu Pro Ubuntu 14.04 o libbatik-java - 1.7.ubuntu-8ubuntu2.14.04.3+esm1 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References o CVE-2022-40146 o CVE-2020-11987 o CVE-2022-41704 o CVE-2022-38648 o CVE-2022-38398 o CVE-2019-17566 o CVE-2022-42890 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaB7skNZI30y1K9AQg3/Q//UvvU0dXkaF3kobTI6iWrsWJ3OeL1P5HD PSyBgSBnhqP5YqSRJF7WmEHYJAccgonQtZOJ3EJuI3/34QJTKnkGcGSC/SXFegbr y5XnJhujs8f3sHdwFkhX/G96pO0Fl5FpMFTCDUz4CpVgHVd7/9KxSftOFlfjYiTL 1XleK4fWi05ezErod8x1BDC6GbV78dA0lPjWeLeIXUN9RcfaCjXl6tbCweRVXZr0 OszIXQZbfVXKVdUJpoxBvIc3QOqg9Rhuj3WIi2Xd3w8QI+QFg3EnmgSLiJFJW4SU rtrOUKZhE+Mgat+/86dTn5HXWrhGUxyyDMM5V3BOArLeIw4iNy0PI9hoNMKGCh9I GfBBMt9L7HEUF/2ViJxh991M5Aw8miKOuLq0u/1WwYTKUWsNqvNlKm4kMbUTgUa8 m/LB5vo7CRWV0RukGiKAcaNAH0hXtjLbPoQY5JSUi0jmonLaxNk9j9OMzGvrcPj+ AuFtfGrKmiWey6220TqiUaa2d4q/ZbbNV5LW3Oom7YKDBFkS2fTfCVa0/zAhijk9 7FHOZ5xOfsr767nwTWWYDG/603PtscN89DJlqlqXqdDCDrqyBKbuFJwKFIr9g/qJ dKQL8JIer6BEFIgOy//QcyrN8cZfKe3Ew2HiHv7DgQd1qyGzrGoKajQva1j8S/d+ p8lRl7gnpNQ= =JNo4 -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3076 - [Ubuntu] OpenSSL: CVSS (Max): 5.9

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3076 USN-6119-1: OpenSSL vulnerabilities 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: OpenSSL Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2023-2650 CVE-2023-1255 Original Bulletin: https://ubuntu.com/security/notices/USN-6119-1 Comment: CVSS (Max): 5.9 CVE-2023-1255 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: [NVD], Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6119-1: OpenSSL vulnerabilities 30 May 2023 Several security issues were fixed in OpenSSL. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 23.04 o Ubuntu 22.10 o Ubuntu 22.04 LTS o Ubuntu 20.04 LTS o Ubuntu 18.04 ESM Packages o openssl - Secure Socket Layer (SSL) cryptographic library and tools o openssl1.0 - Secure Socket Layer (SSL) cryptographic library and tools Details Matt Caswell discovered that OpenSSL incorrectly handled certain ASN.1 object identifiers. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, resulting in a denial of service. ( CVE-2023-2650 ) Anton Romanov discovered that OpenSSL incorrectly handled AES-XTS cipher decryption on 64-bit ARM platforms. An attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. ( CVE-2023-1255 ) Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04 o libssl3 - 3.0.8-1ubuntu1.2 Ubuntu 22.10 o libssl3 - 3.0.5-2ubuntu2.3 Ubuntu 22.04 o libssl3 - 3.0.2-0ubuntu1.10 Ubuntu 20.04 o libssl1.1 - 1.1.1f-1ubuntu2.19 Ubuntu 18.04 o libssl1.0.0 - 1.0.2n-1ubuntu5.13 o libssl1.1 - 1.1.1-1ubuntu2.1~18.04.23 After a standard system update you need to reboot your computer to make all the necessary changes. References o CVE-2023-1255 o CVE-2023-2650 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaBzMkNZI30y1K9AQjYChAAlx7je/2eDyBctze7N4EYDyV3fQcviPtR iNTdnhUP7yN1dt8y1szuGtmSvbYgO/IcCd0QG06/JwPzpvz3yDVcYQwTKHku+Kj+ plnMyF5wxyFmSMC02hm/uuaTozjy1y8FEz9oYfjv7vqZ3gVfWSE3mys3RGULWqLo y9oOg5G52s77Ny4DUDEsb4jLjQOO+dX9YZwHDyXfHvEVXL/1U537JXEPNrdF//CQ nsgEFEMdLJ56nOyfb7DVCeqQ9p1dSH9MYVDzNCm0VTjbHkDPsJbwpME8FTFz9UTr PNaSXYk1mSHvt4rABAZUMCLBm1+MKARtqoWWQJ5R0OSzZK5Qchf4LBxWoNBIgRRt OEZz8DRS6R1JJiUW2O6PP6pA2wAAwNUSuDER3SU/NGnVQnmNzhU+8LwLmuI46Cs1 JOOrXZTL2sdpazFfyX38M40cP4Fbmq6IfUMI+6kXqIh9F1xjRNzmHcj94lVyyQJs c0OkDIlkhQLv60VN6JGZ+eMoPQ8RBDohiZOrm43xYDJFUaE1H4hs4zRmJfLDw+dp 7THARg0ewFe1dw5PemT/JzXqAPmBVxdSd5ynt/V3ZZE8SOyQBr78jwUHRQuSMMHV Rg5dNf/4xj9g7wt43aoSwCjXzL+xFntV+XkO7kEls1LpHSLx9u3N8a43VzvKTIm2 gv1H9p6mWlM= =iWKy -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3075 - [Ubuntu] Linux kernel (Oracle): CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3075 USN-6118-1: Linux kernel (Oracle) vulnerabilities 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux kernel (Oracle) Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2023-32269 CVE-2023-2162 CVE-2023-1513 CVE-2023-1118 CVE-2023-1078 CVE-2023-1075 CVE-2023-0459 CVE-2022-3707 Original Bulletin: https://ubuntu.com/security/notices/USN-6118-1 Comment: CVSS (Max): 7.8 CVE-2023-1118 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: [NVD], SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6118-1: Linux kernel (Oracle) vulnerabilities 30 May 2023 Several security issues were fixed in the Linux kernel. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 20.04 LTS o Ubuntu 18.04 ESM Packages o linux-oracle - Linux kernel for Oracle Cloud systems o linux-oracle-5.4 - Linux kernel for Oracle Cloud systems Details Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). ( CVE-2022-3707 ) Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did not properly implement speculative execution barriers in usercopy functions in certain situations. A local attacker could use this to expose sensitive information (kernel memory). ( CVE-2023-0459 ) It was discovered that the TLS subsystem in the Linux kernel contained a type confusion vulnerability in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. ( CVE-2023-1075 ) It was discovered that the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel contained a type confusion vulnerability in some situations. An attacker could use this to cause a denial of service (system crash). ( CVE-2023-1078 ) Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel did not properly initialize some data structures. A local attacker could use this to expose sensitive information (kernel memory). ( CVE-2023-1513 ) It was discovered that a use-after-free vulnerability existed in the iSCSI TCP implementation in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash). ( CVE-2023-2162 ) It was discovered that the NET/ROM protocol implementation in the Linux kernel contained a race condition in some situations, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2023-32269 ) Duoming Zhou discovered that a race condition existed in the infrared receiver/transceiver driver in the Linux kernel, leading to a use-after- free vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. ( CVE-2023-1118 ) Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 o linux-image-5.4.0-1101-oracle - 5.4.0-1101.110 o linux-image-oracle-lts-20.04 - 5.4.0.1101.94 Ubuntu 18.04 o linux-image-oracle - 5.4.0.1101.110~18.04.73 o linux-image-5.4.0-1101-oracle - 5.4.0-1101.110~18.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References o CVE-2023-1118 o CVE-2023-1075 o CVE-2023-0459 o CVE-2022-3707 o CVE-2023-1078 o CVE-2023-2162 o CVE-2023-32269 o CVE-2023-1513 Related notices o USN-6001-1 : linux-aws-headers-4.4.0-1155, linux-headers-aws, linux-buildinfo-4.4.0-1155-aws, linux-aws-cloud-tools-4.4.0-1155, linux-headers-4.4.0-1155-aws, linux-modules-4.4.0-1155-aws, linux-image-4.4.0-1155-aws, linux-image-aws, linux-modules-extra-aws, linux-tools-4.4.0-1155-aws, linux-aws-tools-4.4.0-1155, linux-tools-aws, linux-modules-extra-4.4.0-1155-aws, linux-aws, linux-cloud-tools-4.4.0-1155-aws o USN-6013-1 : linux-cloud-tools-4.4.0-1117-aws, linux-headers-aws, linux-modules-4.4.0-1117-aws, linux-aws-tools-4.4.0-1117, linux-image-4.4.0-1117-aws, linux-image-aws, linux-tools-aws, linux-headers-4.4.0-1117-aws, linux-tools-4.4.0-1117-aws, linux-aws, linux-aws-headers-4.4.0-1117, linux-aws-cloud-tools-4.4.0-1117, linux-buildinfo-4.4.0-1117-aws o USN-6014-1 : linux-headers-virtual-lts-vivid, linux-virtual-lts-wily, linux-buildinfo-4.4.0-239-generic, linux-image-unsigned-4.4.0-239-generic, linux-tools-generic, linux-modules-extra-4.4.0-239-generic, linux-headers-lowlatency-lts-vivid, linux-image-lowlatency-lts-utopic, linux-modules-4.4.0-1118-kvm, linux-signed-image-generic, linux-cloud-tools-virtual-lts-xenial, linux-cloud-tools-lowlatency-lts-xenial, linux-cloud-tools-4.4.0-239-lowlatency, linux-virtual-lts-utopic, linux-tools-kvm, linux-signed-generic-lts-utopic, linux-tools-virtual-lts-vivid, linux-cloud-tools-lowlatency-lts-vivid, linux-tools-4.4.0-1118-kvm, linux-tools-virtual-lts-utopic, linux-image-extra-virtual, linux-cloud-tools-virtual-lts-wily, linux-headers-4.4.0-239-lowlatency, linux-image-lowlatency, linux-lowlatency, linux-generic, linux-crashdump, linux-signed-generic-lts-xenial, linux-image-lowlatency-lts-xenial, linux-signed-image-generic-lts-utopic, linux-image-extra-virtual-lts-xenial, linux-doc, linux-signed-lowlatency, linux-headers-4.4.0-239, linux-tools-4.4.0-239, linux-tools-generic-lts-utopic, linux-image-virtual, linux-headers-virtual-lts-xenial, linux-tools-generic-lts-wily, linux-image-virtual-lts-wily, linux-cloud-tools-virtual-lts-utopic, linux-image-virtual-lts-xenial, linux-headers-virtual, linux-headers-generic-lts-wily, linux-signed-generic-lts-wily, linux-headers-lowlatency-lts-utopic, linux-cloud-tools-lowlatency-lts-utopic, linux-tools-lowlatency, linux-modules-4.4.0-239-lowlatency, linux-headers-generic-lts-utopic, linux-headers-virtual-lts-utopic, linux-image-4.4.0-239-lowlatency, linux-tools-lowlatency-lts-utopic, linux-headers-generic-lts-vivid, linux-tools-common, linux-cloud-tools-4.4.0-239-generic, linux-signed-image-lowlatency-lts-wily, linux-modules-4.4.0-239-generic, linux-headers-lowlatency-lts-xenial, linux-virtual-lts-vivid, linux-lowlatency-lts-xenial, linux-headers-generic, linux-headers-virtual-lts-wily, linux-image-hwe-generic-trusty, linux-lowlatency-lts-vivid, linux-buildinfo-4.4.0-239-lowlatency, linux-headers-4.4.0-1118-kvm, linux-image-4.4.0-1118-kvm, linux-cloud-tools-generic-lts-xenial, linux-lts-xenial-cloud-tools-4.4.0-239, linux-cloud-tools-common, linux-signed-image-lowlatency-lts-xenial, linux-tools-virtual-lts-xenial, linux-signed-generic, linux-image-hwe-virtual-trusty, linux-image-virtual-lts-utopic, linux-kvm-headers-4.4.0-1118, linux-source, linux-cloud-tools-generic-lts-wily, linux-image-generic-lts-xenial, linux-virtual-lts-xenial, linux-image-generic-lts-wily, linux-cloud-tools-lowlatency-lts-wily, linux-hwe-generic-trusty, linux-virtual, linux-cloud-tools-generic-lts-utopic, linux-cloud-tools-virtual, linux-cloud-tools-virtual-lts-vivid, linux-generic-lts-vivid, linux-tools-lts-utopic, linux-headers-lowlatency-lts-wily, linux-cloud-tools-4.4.0-1118-kvm, linux-headers-4.4.0-239-generic, linux-signed-image-generic-lts-xenial, linux-image-extra-virtual-lts-wily, linux-cloud-tools-generic, linux-image-virtual-lts-vivid, linux-image-4.4.0-239-generic, linux-buildinfo-4.4.0-1118-kvm, linux-kvm-tools-4.4.0-1118, linux-tools-4.4.0-239-lowlatency, linux-image-generic-lts-vivid, linux-signed-generic-lts-vivid, linux-tools-lowlatency-lts-xenial, linux-cloud-tools-4.4.0-239, linux-signed-image-lowlatency, linux-cloud-tools-lowlatency, linux-tools-virtual, linux-generic-lts-xenial, linux-image-extra-virtual-lts-utopic, linux-image-generic, linux-cloud-tools-generic-lts-vivid, linux, linux-tools-generic-lts-xenial, linux-kvm-cloud-tools-4.4.0-1118, linux-headers-generic-lts-xenial, linux-generic-lts-utopic, linux-signed-lowlatency-lts-xenial, linux-libc-dev, linux-headers-kvm, linux-headers-lowlatency, linux-signed-lowlatency-lts-wily, linux-generic-lts-wily, linux-image-lowlatency-lts-vivid, linux-tools-host, linux-image-extra-virtual-lts-vivid, linux-image-generic-lts-utopic, linux-lts-xenial-tools-4.4.0-239, linux-image-lowlatency-lts-wily, linux-image-kvm, linux-lowlatency-lts-utopic, linux-source-4.4.0, linux-lowlatency-lts-wily, linux-signed-image-generic-lts-wily, linux-tools-lowlatency-lts-vivid, linux-tools-virtual-lts-wily, linux-signed-image-generic-lts-vivid, linux-tools-generic-lts-vivid, linux-lts-xenial, linux-tools-4.4.0-239-generic, linux-tools-lowlatency-lts-wily, linux-image-unsigned-4.4.0-239-lowlatency, linux-hwe-virtual-trusty, linux-kvm o USN-6031-1 : linux-modules-ipu6-oem-22.04, linux-headers-oem-22.04a, linux-modules-ivsc-oem-22.04a, linux-image-unsigned-5.17.0-1030-oem, linux-modules-ipu6-oem-22.04a, linux-image-oem-22.04, linux-modules-ipu6-5.17.0-1030-oem, linux-oem-22.04, linux-modules-iwlwifi-5.17.0-1030-oem, linux-headers-5.17.0-1030-oem, linux-image-5.17.0-1030-oem, linux-image-oem-22.04a, linux-tools-5.17.0-1030-oem, linux-tools-oem-22.04, linux-oem-5.17, linux-oem-5.17-tools-host, linux-tools-oem-22.04a, linux-buildinfo-5.17.0-1030-oem, linux-modules-5.17.0-1030-oem, linux-modules-iwlwifi-oem-22.04a, linux-oem-5.17-tools-5.17.0-1030, linux-headers-oem-22.04, linux-oem-22.04a, linux-modules-ivsc-oem-22.04, linux-modules-iwlwifi-oem-22.04, linux-oem-5.17-headers-5.17.0-1030, linux-modules-ivsc-5.17.0-1030-oem o USN-6032-1 : linux-oem-6.0, linux-headers-6.0.0-1014-oem, linux-modules-iwlwifi-oem-22.04b, linux-headers-oem-22.04b, linux-oem-6.0-tools-host, linux-oem-6.0-tools-6.0.0-1014, linux-modules-ivsc-6.0.0-1014-oem, linux-modules-ivsc-oem-22.04b, linux-modules-iwlwifi-6.0.0-1014-oem, linux-tools-6.0.0-1014-oem, linux-modules-ipu6-oem-22.04b, linux-image-unsigned-6.0.0-1014-oem, linux-modules-6.0.0-1014-oem, linux-oem-6.0-headers-6.0.0-1014, linux-image-oem-22.04b, linux-modules-ipu6-6.0.0-1014-oem, linux-buildinfo-6.0.0-1014-oem, linux-oem-22.04b, linux-image-6.0.0-1014-oem, linux-tools-oem-22.04b o USN-6033-1 : linux-oem-6.1-tools-6.1.0-1009, linux-buildinfo-6.1.0-1009-oem, linux-headers-6.1.0-1009-oem, linux-image-unsigned-6.1.0-1009-oem, linux-oem-6.1-headers-6.1.0-1009, linux-headers-oem-22.04c, linux-tools-oem-22.04c, linux-oem-6.1-tools-host, linux-image-oem-22.04c, linux-oem-6.1, linux-modules-6.1.0-1009-oem, linux-modules-ivsc-6.1.0-1009-oem, linux-modules-ivsc-oem-22.04c, linux-tools-6.1.0-1009-oem, linux-modules-ipu6-6.1.0-1009-oem, linux-modules-ipu6-oem-22.04c, linux-image-6.1.0-1009-oem, linux-oem-22.04c o USN-6079-1 : linux-headers-5.19.0-42-generic, linux-modules-ivsc-5.19.0-42-generic, linux-cloud-tools-virtual-hwe-22.04-edge, linux-modules-ipu6-5.19.0-42-generic, linux-image-unsigned-5.19.0-1024-lowlatency-64k, linux-generic-lpae-hwe-22.04-edge, linux-tools-raspi-nolpae, linux-tools-generic, linux-modules-ivsc-generic, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-image-unsigned-5.19.0-1026-azure, linux-image-lowlatency-64k-hwe-22.04-edge, linux-modules-5.19.0-42-generic, linux-aws, linux-cloud-tools-5.19.0-1025-aws, linux-cloud-tools-generic-hwe-22.04, linux-tools-5.19.0-1024-lowlatency-64k, linux-tools-kvm, linux-azure-5.19-tools-5.19.0-1026, linux-modules-extra-5.19.0-1026-azure, linux-tools-lowlatency-64k-hwe-22.04, linux-lowlatency-hwe-20.04-edge, linux-tools-lowlatency-64k-hwe-20.04, linux-image-lowlatency-hwe-20.04-edge, linux-headers-5.19.0-1025-aws, linux-kvm-headers-5.19.0-1023, linux-azure-tools-5.19.0-1026, linux-image-extra-virtual, linux-cloud-tools-azure-edge, linux-image-virtual-hwe-22.04, linux-lowlatency-hwe-20.04, linux-lowlatency, linux-buildinfo-5.19.0-1018-raspi, linux-image-lowlatency, linux-tools-oem-22.04, linux-modules-ipu6-generic-hwe-22.04, linux-headers-aws, linux-generic, linux-tools-5.19.0-1018-raspi-nolpae, linux-modules-extra-5.19.0-1018-raspi, linux-crashdump, linux-modules-extra-aws, linux-tools-azure-edge, linux-modules-5.19.0-1018-raspi-nolpae, linux-tools-aws, linux-cloud-tools-azure, linux-modules-ipu6-5.19.0-1024-lowlatency, linux-modules-5.19.0-42-generic-64k, linux-aws-headers-5.19.0-1025, linux-modules-5.19.0-1018-raspi, linux-tools-generic-lpae-hwe-22.04-edge, linux-image-lowlatency-64k, linux-tools-lowlatency-64k-hwe-22.04-edge, linux-kvm-tools-5.19.0-1023, linux-cloud-tools-5.19.0-1024-lowlatency, linux-headers-raspi, linux-doc, linux-image-5.19.0-1018-raspi, linux-image-generic-64k-hwe-22.04, linux-modules-ipu6-generic, linux-headers-generic-hwe-22.04-edge, linux-modules-iwlwifi-5.19.0-42-generic, linux-image-extra-virtual-hwe-22.04, linux-headers-azure-edge, linux-buildinfo-5.19.0-1024-lowlatency, linux-image-virtual, linux-headers-5.19.0-42-generic-64k, linux-image-5.19.0-1026-azure, linux-lowlatency-hwe-22.04-edge, linux-image-lowlatency-hwe-22.04-edge, linux-tools-5.19.0-1023-kvm, linux-tools-generic-lpae-hwe-22.04, linux-image-5.19.0-1024-lowlatency, linux-tools-lowlatency-64k, linux-oem-22.04, linux-image-generic-lpae, linux-tools-5.19.0-1024-lowlatency, linux-generic-hwe-22.04-edge, linux-buildinfo-5.19.0-1018-raspi-nolpae, linux-modules-5.19.0-1024-lowlatency, linux-aws-tools-5.19.0-1025, linux-buildinfo-5.19.0-1023-kvm, linux-modules-ivsc-5.19.0-1024-lowlatency, linux-headers-5.19.0-1018-raspi, linux-lowlatency-cloud-tools-5.19.0-1024, linux-lowlatency-cloud-tools-common, linux-headers-virtual, linux-headers-lowlatency-64k-hwe-20.04, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-image-virtual-hwe-22.04-edge, linux-tools-5.19.0-42, linux-tools-lowlatency-hwe-20.04, linux-buildinfo-5.19.0-42-generic-lpae, linux-headers-5.19.0-42-generic-lpae, linux-image-5.19.0-1024-lowlatency-64k, linux-tools-lowlatency, linux-tools-virtual-hwe-22.04-edge, linux-modules-5.19.0-1023-kvm, linux-tools-generic-64k-hwe-22.04, linux-cloud-tools-lowlatency-hwe-20.04, linux-image-generic-lpae-hwe-22.04, linux-image-unsigned-5.19.0-42-generic, linux-image-lowlatency-hwe-22.04, linux-modules-extra-5.19.0-1018-raspi-nolpae, linux-tools-common, linux-headers-generic-64k-hwe-22.04, linux-modules-extra-raspi, linux-tools-5.19.0-1025-aws, linux-tools-5.19.0-42-generic-64k, linux-buildinfo-5.19.0-1025-aws, linux-generic-hwe-22.04, linux-modules-extra-5.19.0-42-generic, linux-modules-extra-azure, linux-modules-5.19.0-42-generic-lpae, linux-raspi, linux-image-lowlatency-64k-hwe-20.04, linux-headers-5.19.0-1018-raspi-nolpae, linux-headers-5.19.0-1023-kvm, linux-headers-generic, linux-cloud-tools-generic-hwe-22.04-edge, linux-headers-generic-lpae-hwe-22.04, linux-headers-lowlatency-hwe-22.04, linux-azure-edge, linux-image-unsigned-5.19.0-1024-lowlatency, linux-image-azure-edge, linux-cloud-tools-5.19.0-1026-azure, linux-headers-azure, linux-headers-generic-hwe-22.04, linux-tools-generic-64k, linux-image-5.19.0-42-generic-64k, linux-azure-5.19-headers-5.19.0-1026, linux-cloud-tools-common, linux-headers-generic-lpae-hwe-22.04-edge, linux-modules-extra-azure-edge, linux-modules-5.19.0-1026-azure, linux-cloud-tools-5.19.0-42, linux-image-5.19.0-1023-kvm, linux-virtual-hwe-22.04, linux-cloud-tools-lowlatency-hwe-22.04-edge, linux-virtual-hwe-22.04-edge, linux-source, linux-lowlatency-tools-host, linux-tools-5.19.0-1026-azure, linux-image-extra-virtual-hwe-22.04-edge, linux-lowlatency-tools-common, linux-tools-generic-hwe-22.04-edge, linux-image-unsigned-5.19.0-1023-kvm, linux-image-raspi, linux-modules-extra-5.19.0-1025-aws, linux-tools-generic-64k-hwe-22.04-edge, linux-image-lowlatency-64k-hwe-20.04-edge, linux-virtual, linux-cloud-tools-virtual, linux-raspi-tools-5.19.0-1018, linux-modules-ipu6-generic-hwe-22.04-edge, linux-modules-ivsc-generic-hwe-22.04, linux-image-generic-lpae-hwe-22.04-edge, linux-headers-virtual-hwe-22.04, linux-buildinfo-5.19.0-42-generic-64k, linux-headers-generic-lpae, linux-image-generic-hwe-22.04-edge, linux-image-aws, linux-modules-extra-raspi-nolpae, linux-headers-lowlatency-hwe-22.04-edge, linux-modules-iwlwifi-generic, linux-lowlatency-64k-hwe-22.04, linux-tools-5.19.0-42-generic, linux-modules-iwlwifi-generic-hwe-22.04, linux-image-azure, linux-generic-lpae, linux-headers-5.19.0-42, linux-headers-oem-22.04, linux-cloud-tools-generic, linux-lowlatency-64k-hwe-20.04-edge, linux-headers-virtual-hwe-22.04-edge, linux-tools-azure, linux-cloud-tools-5.19.0-42-generic, linux-modules-5.19.0-1025-aws, linux-modules-ivsc-generic-hwe-22.04-edge, linux-raspi-nolpae, linux-tools-generic-hwe-22.04, linux-buildinfo-5.19.0-1026-azure, linux-azure, linux-image-5.19.0-42-generic, linux-headers-lowlatency-64k-hwe-22.04, linux-headers-lowlatency-64k, linux-generic-lpae-hwe-22.04, linux-image-generic-64k, linux-cloud-tools-lowlatency, linux-azure-cloud-tools-5.19.0-1026, linux-lowlatency-hwe-22.04, linux-cloud-tools-lowlatency-hwe-22.04, linux-image-lowlatency-hwe-20.04, linux-buildinfo-5.19.0-42-generic, linux-image-5.19.0-1018-raspi-nolpae, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-tools-virtual, linux-image-unsigned-5.19.0-1025-aws, linux-tools-virtual-hwe-22.04, linux-lowlatency-64k-hwe-20.04, linux-tools-5.19.0-42-generic-lpae, linux-image-oem-22.04, linux-image-generic, linux, linux-azure-5.19-cloud-tools-5.19.0-1026, linux-source-5.19.0, linux-tools-lowlatency-hwe-20.04-edge, linux-headers-5.19.0-1024-lowlatency, linux-tools-generic-lpae, linux-image-lowlatency-64k-hwe-22.04, linux-image-5.19.0-1025-aws, linux-lowlatency-headers-5.19.0-1024, linux-image-raspi-nolpae, linux-generic-64k, linux-headers-generic-64k-hwe-22.04-edge, linux-headers-5.19.0-1024-lowlatency-64k, linux-azure-5.19, linux-raspi-headers-5.19.0-1018, linux-libc-dev, linux-generic-64k-hwe-22.04, linux-cloud-tools-virtual-hwe-22.04, linux-headers-kvm, linux-image-unsigned-5.19.0-42-generic-64k, linux-headers-lowlatency, linux-azure-headers-5.19.0-1026, linux-headers-raspi-nolpae, linux-image-generic-64k-hwe-22.04-edge, linux-modules-iwlwifi-5.19.0-1024-lowlatency, linux-tools-lowlatency-hwe-22.04-edge, linux-tools-host, linux-image-generic-hwe-22.04, linux-image-5.19.0-42-generic-lpae, linux-buildinfo-5.19.0-1024-lowlatency-64k, linux-headers-lowlatency-hwe-20.04-edge, linux-image-kvm, linux-lowlatency-tools-5.19.0-1024, linux-tools-raspi, linux-aws-cloud-tools-5.19.0-1025, linux-tools-lowlatency-hwe-22.04, linux-headers-lowlatency-64k-hwe-22.04-edge, linux-headers-5.19.0-1026-azure, linux-headers-lowlatency-hwe-20.04, linux-lowlatency-64k, linux-lowlatency-64k-hwe-22.04-edge, linux-modules-iwlwifi-generic-hwe-22.04-edge, linux-tools-5.19.0-1018-raspi, linux-modules-5.19.0-1024-lowlatency-64k, linux-headers-generic-64k, linux-generic-64k-hwe-22.04-edge, linux-kvm o USN-6080-1 : linux-image-ibm, linux-headers-aws-edge, linux-generic-lpae-hwe-20.04, linux-headers-5.15.0-1036-aws, linux-tools-generic, linux-cloud-tools-5.15.0-72-generic, linux-headers-lowlatency-64k-hwe-20.04-edge, linux-image-unsigned-5.15.0-1036-aws, linux-modules-5.15.0-1036-aws, linux-headers-azure-cvm, linux-headers-oracle, linux-aws, linux-modules-5.15.0-72-generic, linux-tools-generic-hwe-20.04, linux-tools-generic-lpae-hwe-20.04, linux-buildinfo-5.15.0-72-lowlatency-64k, linux-cloud-tools-virtual-hwe-20.04-edge, linux-tools-kvm, linux-generic-lpae-hwe-20.04-edge, linux-lowlatency-hwe-5.15, linux-modules-extra-5.15.0-1035-oracle, linux-image-oem-20.04d, linux-ibm-tools-common, linux-oracle-tools-5.15.0-1035, linux-tools-virtual-hwe-20.04-edge, linux-lowlatency-hwe-20.04-edge, linux-tools-lowlatency-64k-hwe-20.04, linux-image-lowlatency-hwe-20.04-edge, linux-image-oem-20.04c, linux-image-generic-lpae-hwe-20.04, linux-hwe-5.15-headers-5.15.0-72, linux-image-extra-virtual, linux-cloud-tools-azure-edge, linux-image-generic-lpae-hwe-20.04-edge, linux-image-extra-virtual-hwe-20.04-edge, linux-image-virtual-hwe-20.04-edge, linux-lowlatency-headers-5.15.0-72, linux-lowlatency, linux-image-lowlatency, linux-lowlatency-hwe-20.04, linux-kvm-tools-5.15.0-1033, linux-headers-aws, linux-generic, linux-crashdump, linux-modules-extra-aws, linux-image-unsigned-5.15.0-1035-oracle, linux-tools-aws, linux-tools-azure-edge, linux-oem-20.04b, linux-azure-cloud-tools-5.15.0-1038, linux-aws-tools-5.15.0-1036, linux-cloud-tools-azure, linux-modules-5.15.0-72-lowlatency-64k, linux-tools-5.15.0-72, linux-aws-lts-22.04, linux-headers-generic-lpae-hwe-20.04-edge, linux-cloud-tools-virtual-hwe-20.04, linux-image-lowlatency-64k, linux-ibm, linux-tools-aws-edge, linux-tools-azure-cvm, linux-image-generic-64k-hwe-20.04-edge, linux-aws-5.15-cloud-tools-5.15.0-1036, linux-doc, linux-image-azure-fde-edge, linux-tools-generic-hwe-20.04-edge, linux-headers-generic-64k-hwe-20.04-edge, linux-headers-5.15.0-1030-ibm, linux-modules-iwlwifi-5.15.0-72-lowlatency, linux-modules-5.15.0-1033-kvm, linux-tools-5.15.0-1038-azure, linux-headers-azure-edge, linux-headers-generic-lpae-hwe-20.04, linux-tools-oem-20.04, linux-cloud-tools-5.15.0-72, linux-tools-generic-lpae-hwe-20.04-edge, linux-image-virtual, linux-headers-generic-hwe-20.04, linux-oracle, linux-cloud-tools-azure-fde, linux-headers-5.15.0-72-generic-64k, linux-image-5.15.0-72-generic, linux-aws-edge, linux-headers-aws-lts-22.04, linux-ibm-cloud-tools-common, linux-ibm-tools-5.15.0-1030, linux-modules-extra-5.15.0-1030-ibm, linux-modules-iwlwifi-generic-hwe-20.04, linux-oem-20.04c, linux-tools-lowlatency-64k, linux-tools-5.15.0-72-generic-64k, linux-lowlatency-hwe-5.15-tools-5.15.0-72, linux-hwe-5.15-cloud-tools-common, linux-image-5.15.0-1038-azure-fde, linux-image-generic-lpae, linux-modules-extra-azure-fde-edge, linux-headers-generic-64k-hwe-20.04, linux-tools-oem-20.04d, linux-azure-5.15-headers-5.15.0-1038, linux-lowlatency-cloud-tools-common, linux-tools-generic-64k-hwe-20.04, linux-headers-virtual, linux-buildinfo-5.15.0-1035-oracle, linux-headers-lowlatency-64k-hwe-20.04, linux-headers-5.15.0-72-generic, linux-cloud-tools-lowlatency-hwe-20.04-edge, linux-tools-lowlatency-hwe-20.04, linux-cloud-tools-generic-hwe-20.04-edge, linux-modules-extra-5.15.0-72-generic, linux-modules-extra-azure-cvm, linux-virtual-hwe-20.04-edge, linux-modules-5.15.0-72-generic-64k, linux-image-virtual-hwe-20.04, linux-image-5.15.0-1036-aws, linux-tools-lowlatency, linux-headers-virtual-hwe-20.04-edge, linux-tools-5.15.0-72-lowlatency-64k, linux-azure-fde-5.15, linux-cloud-tools-lowlatency-hwe-20.04, linux-headers-5.15.0-1038-azure, linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-72, linux-image-oem-20.04, linux-hwe-5.15-tools-5.15.0-72, linux-aws-cloud-tools-5.15.0-1036, linux-image-5.15.0-1033-kvm, linux-lowlatency-cloud-tools-5.15.0-72, linux-tools-common, linux-buildinfo-5.15.0-72-generic-lpae, linux-azure-fde-edge, linux-image-unsigned-5.15.0-72-lowlatency, linux-image-unsigned-5.15.0-72-generic, linux-tools-5.15.0-72-generic-lpae, linux-headers-oem-20.04b, linux-azure-lts-22.04, linux-modules-extra-5.15.0-1036-aws, linux-modules-extra-azure, linux-hwe-5.15-source-5.15.0, linux-lowlatency-hwe-5.15-tools-host, linux-oem-20.04, linux-image-oracle, linux-image-lowlatency-64k-hwe-20.04, linux-oem-20.04d, linux-headers-5.15.0-72-generic-lpae, linux-image-5.15.0-72-lowlatency, linux-image-extra-virtual-hwe-20.04, linux-kvm-headers-5.15.0-1033, linux-headers-generic, linux-tools-5.15.0-1036-aws, linux-tools-azure-fde-edge, linux-generic-hwe-20.04, linux-azure-edge, linux-azure-cvm, linux-hwe-5.15-tools-host, linux-image-azure-edge, linux-modules-iwlwifi-5.15.0-72-generic, linux-lowlatency-hwe-5.15-headers-5.15.0-72, linux-image-oem-20.04b, linux-tools-5.15.0-72-lowlatency, linux-headers-azure, linux-tools-generic-64k, linux-cloud-tools-generic-hwe-20.04, linux-ibm-headers-5.15.0-1030, linux-image-aws-lts-22.04, linux-cloud-tools-common, linux-image-5.15.0-1038-azure, linux-modules-iwlwifi-oem-20.04, linux-modules-extra-azure-edge, linux-virtual-hwe-20.04, linux-hwe-5.15-tools-common, linux-image-5.15.0-1035-oracle, linux-tools-azure-lts-22.04, linux-source, linux-lowlatency-tools-host, linux-hwe-5.15, linux-tools-virtual-hwe-20.04, linux-modules-5.15.0-1030-ibm, linux-lowlatency-tools-common, linux-modules-5.15.0-72-generic-lpae, linux-headers-azure-fde-edge, linux-tools-oem-20.04c, linux-headers-5.15.0-1033-kvm, linux-aws-5.15-headers-5.15.0-1036, linux-aws-5.15, linux-image-lowlatency-64k-hwe-20.04-edge, linux-virtual, linux-cloud-tools-virtual, linux-headers-5.15.0-72-lowlatency-64k, linux-modules-extra-azure-fde, linux-headers-5.15.0-1035-oracle, linux-buildinfo-5.15.0-72-generic-64k, linux-cloud-tools-azure-fde-edge, linux-modules-extra-azure-lts-22.04, linux-azure-5.15-tools-5.15.0-1038, linux-tools-oem-20.04b, linux-headers-5.15.0-72, linux-image-unsigned-5.15.0-1038-azure-fde, linux-modules-iwlwifi-generic, linux-headers-azure-fde, linux-headers-generic-lpae, linux-image-aws, linux-modules-5.15.0-1038-azure, linux-tools-5.15.0-1033-kvm, linux-lowlatency-tools-5.15.0-72, linux-image-azure, linux-buildinfo-5.15.0-1033-kvm, linux-generic-lpae, linux-headers-5.15.0-72-lowlatency, linux-modules-extra-aws-edge, linux-cloud-tools-generic, linux-lowlatency-64k-hwe-20.04-edge, linux-tools-azure, linux-azure-5.15-cloud-tools-5.15.0-1038, linux-buildinfo-5.15.0-1038-azure, linux-headers-generic-hwe-20.04-edge, linux-image-azure-fde, linux-image-unsigned-5.15.0-1030-ibm, linux-tools-5.15.0-72-generic, linux-oracle-headers-5.15.0-1035, linux-azure, linux-hwe-5.15-cloud-tools-5.15.0-72, linux-image-5.15.0-72-generic-lpae, linux-headers-lowlatency-64k, linux-image-unsigned-5.15.0-1033-kvm, linux-image-generic-64k, linux-image-unsigned-5.15.0-72-lowlatency-64k, linux-lowlatency-hwe-5.15-cloud-tools-common, linux-buildinfo-5.15.0-1036-aws, linux-cloud-tools-lowlatency, linux-headers-virtual-hwe-20.04, linux-modules-5.15.0-72-lowlatency, linux-image-lowlatency-hwe-20.04, linux-tools-5.15.0-1035-oracle, linux-tools-lowlatency-64k-hwe-20.04-edge, linux-cloud-tools-azure-lts-22.04, linux-tools-virtual, linux-azure-tools-5.15.0-1038, linux-modules-extra-aws-lts-22.04, linux-lowlatency-64k-hwe-20.04, linux-azure-fde, linux-image-azure-cvm, linux-headers-ibm, linux-azure-headers-5.15.0-1038, linux-cloud-tools-5.15.0-1036-aws, linux-image-generic, linux-modules-5.15.0-1035-oracle, linux, linux-headers-oem-20.04, linux-tools-lowlatency-hwe-20.04-edge, linux-modules-iwlwifi-oem-20.04d, linux-image-5.15.0-72-generic-64k, linux-tools-generic-64k-hwe-20.04-edge, linux-tools-generic-lpae, linux-image-generic-64k-hwe-20.04, linux-modules-extra-5.15.0-1038-azure, linux-generic-64k, linux-generic-64k-hwe-20.04-edge, linux-buildinfo-5.15.0-72-lowlatency, linux-modules-iwlwifi-generic-hwe-20.04-edge, linux-tools-oracle, linux-cloud-tools-5.15.0-72-lowlatency, linux-tools-azure-fde, linux-headers-oem-20.04c, linux-libc-dev, linux-image-generic-hwe-20.04-edge, linux-headers-kvm, linux-headers-lowlatency, linux-headers-oem-20.04d, linux-aws-headers-5.15.0-1036, linux-image-5.15.0-72-lowlatency-64k, linux-tools-host, linux-image-generic-hwe-20.04, linux-tools-ibm, linux-aws-5.15-tools-5.15.0-1036, linux-tools-aws-lts-22.04, linux-azure-5.15, linux-headers-lowlatency-hwe-20.04-edge, linux-image-kvm, linux-cloud-tools-5.15.0-1038-azure, linux-image-unsigned-5.15.0-72-generic-64k, linux-generic-64k-hwe-20.04, linux-image-5.15.0-1030-ibm, linux-image-azure-lts-22.04, linux-buildinfo-5.15.0-1030-ibm, linux-headers-lowlatency-hwe-20.04, linux-lowlatency-64k, linux-image-unsigned-5.15.0-1038-azure, linux-buildinfo-5.15.0-72-generic, linux-lowlatency-hwe-5.15-tools-common, linux-tools-5.15.0-1030-ibm, linux-image-aws-edge, linux-generic-hwe-20.04-edge, linux-headers-azure-lts-22.04, linux-headers-generic-64k, linux-ibm-source-5.15.0, linux-kvm, linux-cloud-tools-azure-cvm, linux-source-5.15.0 o USN-6081-1 : linux-virtual-hwe-16.04, linux-modules-4.15.0-1140-kvm, linux-tools-4.15.0-211-generic, linux-cloud-tools-virtual-hwe-16.04, linux-generic-hwe-16.04-edge, linux-image-lowlatency-hwe-16.04-edge, linux-tools-generic, linux-buildinfo-4.15.0-211-generic-lpae, linux-cloud-tools-lowlatency-hwe-16.04-edge, linux-signed-image-generic, linux-aws, linux-generic-hwe-16.04, linux-tools-kvm, linux-headers-generic-hwe-16.04, linux-cloud-tools-4.15.0-211-generic, linux-cloud-tools-generic-hwe-16.04-edge, linux-cloud-tools-virtual-hwe-16.04-edge, linux-headers-lowlatency-hwe-16.04-edge, linux-image-extra-virtual, linux-headers-aws-hwe, linux-headers-4.15.0-1140-kvm, linux-lowlatency, linux-image-lowlatency, linux-modules-extra-4.15.0-211-generic, linux-tools-aws-hwe, linux-generic, linux-image-generic-lpae-hwe-16.04, linux-crashdump, linux-headers-virtual-hwe-16.04-edge, linux-buildinfo-4.15.0-1156-aws, linux-tools-lowlatency-hwe-16.04-edge, linux-signed-image-lowlatency-hwe-16.04, linux-aws-hwe-tools-4.15.0-1156, linux-doc, linux-tools-virtual-hwe-16.04, linux-image-4.15.0-211-generic-lpae, linux-image-generic-hwe-16.04-edge, linux-signed-lowlatency, linux-signed-image-lowlatency-hwe-16.04-edge, linux-tools-4.15.0-211-lowlatency, linux-cloud-tools-generic-hwe-16.04, linux-generic-lpae-hwe-16.04, linux-image-virtual, linux-signed-lowlatency-hwe-16.04-edge, linux-image-virtual-hwe-16.04, linux-lowlatency-hwe-16.04-edge, linux-aws-edge, linux-aws-hwe, linux-image-generic-lpae, linux-generic-lpae-hwe-16.04-edge, linux-image-unsigned-4.15.0-211-generic, linux-headers-aws-lts-18.04, linux-headers-virtual, linux-aws-lts-18.04, linux-aws-hwe-cloud-tools-4.15.0-1156, linux-source-4.15.0, linux-tools-lowlatency, linux-modules-extra-aws-lts-18.04, linux-image-unsigned-4.15.0-1156-aws, linux-tools-common, linux-tools-generic-lpae-hwe-16.04, linux-modules-extra-aws-hwe, linux-tools-4.15.0-211-generic-lpae, linux-tools-generic-hwe-16.04-edge, linux-headers-generic, linux-signed-generic-hwe-16.04-edge, linux-image-unsigned-4.15.0-211-lowlatency, linux-tools-4.15.0-211, linux-modules-4.15.0-211-lowlatency, linux-headers-generic-lpae-hwe-16.04-edge, linux-cloud-tools-common, linux-cloud-tools-lowlatency-hwe-16.04, linux-aws-headers-4.15.0-1156, linux-image-4.15.0-211-lowlatency, linux-signed-generic, linux-tools-aws-lts-18.04, linux-headers-4.15.0-211-generic, linux-buildinfo-4.15.0-211-generic, linux-signed-image-generic-hwe-16.04-edge, linux-tools-4.15.0-1156-aws, linux-virtual-hwe-16.04-edge, linux-image-4.15.0-1140-kvm, linux-virtual, linux-tools-generic-hwe-16.04, linux-modules-extra-4.15.0-1156-aws, linux-cloud-tools-virtual, linux-image-4.15.0-211-generic, linux-headers-lowlatency-hwe-16.04, linux-image-generic-hwe-16.04, linux-headers-generic-lpae, linux-image-virtual-hwe-16.04-edge, linux-modules-4.15.0-211-generic, linux-headers-4.15.0-1156-aws, linux-image-4.15.0-1156-aws, linux-headers-generic-lpae-hwe-16.04, linux-generic-lpae, linux-signed-image-generic-hwe-16.04, linux-cloud-tools-generic, linux-headers-generic-hwe-16.04-edge, linux-tools-virtual-hwe-16.04-edge, linux-image-extra-virtual-hwe-16.04, linux-tools-4.15.0-1140-kvm, linux-signed-image-lowlatency, linux-headers-4.15.0-211, linux-cloud-tools-lowlatency, linux-tools-generic-lpae-hwe-16.04-edge, linux-lowlatency-hwe-16.04, linux-tools-virtual, linux-image-aws-hwe, linux-kvm-tools-4.15.0-1140, linux-image-generic, linux-aws-cloud-tools-4.15.0-1156, linux, linux-cloud-tools-4.15.0-1156-aws, linux-tools-generic-lpae, linux-cloud-tools-4.15.0-211, linux-buildinfo-4.15.0-211-lowlatency, linux-modules-4.15.0-211-generic-lpae, linux-libc-dev, linux-headers-4.15.0-211-generic-lpae, linux-headers-kvm, linux-image-extra-virtual-hwe-16.04-edge, linux-headers-lowlatency, linux-image-generic-lpae-hwe-16.04-edge, linux-image-lowlatency-hwe-16.04, linux-signed-generic-hwe-16.04, linux-aws-tools-4.15.0-1156, linux-tools-host, linux-cloud-tools-4.15.0-211-lowlatency, linux-image-kvm, linux-image-aws-lts-18.04, linux-buildinfo-4.15.0-1140-kvm, linux-kvm-headers-4.15.0-1140, linux-tools-lowlatency-hwe-16.04, linux-headers-4.15.0-211-lowlatency, linux-headers-virtual-hwe-16.04, linux-modules-4.15.0-1156-aws, linux-signed-lowlatency-hwe-16.04, linux-source, linux-kvm o USN-6084-1 : linux-buildinfo-4.15.0-1119-oracle, linux-headers-4.15.0-1119-oracle, linux-image-4.15.0-1150-gcp, linux-image-unsigned-4.15.0-1150-gcp, linux-oracle, linux-signed-oracle-lts-18.04, linux-modules-extra-4.15.0-1119-oracle, linux-headers-oracle, linux-signed-oracle, linux-oracle-lts-18.04, linux-image-4.15.0-1119-oracle, linux-modules-extra-gcp-lts-18.04, linux-tools-4.15.0-1119-oracle, linux-oracle-headers-4.15.0-1119, linux-gcp-4.15-headers-4.15.0-1150, linux-modules-4.15.0-1150-gcp, linux-signed-image-oracle, linux-headers-4.15.0-1150-gcp, linux-tools-oracle, linux-tools-gcp-lts-18.04, linux-buildinfo-4.15.0-1150-gcp, linux-gcp-4.15, linux-signed-image-oracle-lts-18.04, linux-oracle-tools-4.15.0-1119, linux-headers-oracle-lts-18.04, linux-image-gcp-lts-18.04, linux-modules-4.15.0-1119-oracle, linux-image-unsigned-4.15.0-1119-oracle, linux-modules-extra-4.15.0-1150-gcp, linux-tools-oracle-lts-18.04, linux-tools-4.15.0-1150-gcp, linux-gcp-lts-18.04, linux-image-oracle-lts-18.04, linux-gcp-4.15-tools-4.15.0-1150, linux-image-oracle, linux-headers-gcp-lts-18.04 o USN-6085-1 : linux-tools-raspi-nolpae, linux-tools-5.15.0-1029-raspi-nolpae, linux-modules-5.15.0-1029-raspi, linux-modules-extra-5.15.0-1029-raspi-nolpae, linux-image-raspi-nolpae, linux-buildinfo-5.15.0-1029-raspi, linux-image-5.15.0-1029-raspi, linux-image-raspi, linux-raspi-tools-5.15.0-1029, linux-headers-raspi-nolpae, linux-modules-extra-raspi-nolpae, linux-headers-5.15.0-1029-raspi, linux-modules-extra-5.15.0-1029-raspi, linux-image-5.15.0-1029-raspi-nolpae, linux-tools-raspi, linux-modules-extra-raspi, linux-tools-5.15.0-1029-raspi, linux-headers-raspi, linux-modules-5.15.0-1029-raspi-nolpae, linux-raspi-headers-5.15.0-1029, linux-raspi-nolpae, linux-raspi, linux-headers-5.15.0-1029-raspi-nolpae, linux-buildinfo-5.15.0-1029-raspi-nolpae o USN-6090-1 : linux-image-5.15.0-1020-gkeop, linux-headers-5.15.0-1020-gkeop, linux-cloud-tools-gkeop, linux-headers-oracle, linux-image-oracle-edge, linux-modules-extra-5.15.0-1035-oracle, linux-modules-extra-gcp-lts-22.04, linux-modules-extra-gkeop, linux-image-5.15.0-1033-gke, linux-gcp-5.15-tools-5.15.0-1034, linux-image-unsigned-5.15.0-1035-oracle, linux-headers-gcp-edge, linux-modules-extra-5.15.0-1033-gke, linux-oracle-5.15-headers-5.15.0-1035, linux-modules-extra-gkeop-5.15, linux-gke-5.15-headers-5.15.0-1033, linux-image-unsigned-5.15.0-1033-gke, linux-gke-edge, linux-gkeop, linux-gcp-edge, linux-headers-gcp-lts-22.04, linux-tools-gke, linux-image-unsigned-5.15.0-1034-gcp, linux-gke-tools-5.15.0-1033, linux-oracle, linux-image-unsigned-5.15.0-1020-gkeop, linux-tools-gke-edge, linux-gkeop-cloud-tools-5.15.0-1020, linux-image-gkeop, linux-modules-extra-gcp-edge, linux-modules-5.15.0-1033-gke, linux-image-gkeop-5.15, linux-headers-gke, linux-gke, linux-buildinfo-5.15.0-1035-oracle, linux-buildinfo-5.15.0-1033-gke, linux-tools-5.15.0-1020-gkeop, linux-modules-extra-5.15.0-1034-gcp, linux-image-gcp-edge, linux-image-5.15.0-1034-gcp, linux-image-oracle, linux-cloud-tools-5.15.0-1020-gkeop, linux-gcp-5.15-headers-5.15.0-1034, linux-tools-gke-5.15, linux-tools-oracle-edge, linux-gcp-lts-22.04, linux-headers-gke-edge, linux-headers-5.15.0-1034-gcp, linux-gke-5.15-tools-5.15.0-1033, linux-gcp-5.15, linux-image-5.15.0-1035-oracle, linux-image-gcp-lts-22.04, linux-oracle-edge, linux-gkeop-headers-5.15.0-1020, linux-modules-iwlwifi-5.15.0-1034-gcp, linux-tools-gcp-lts-22.04, linux-tools-5.15.0-1033-gke, linux-headers-gke-5.15, linux-modules-5.15.0-1020-gkeop, linux-headers-5.15.0-1035-oracle, linux-tools-5.15.0-1034-gcp, linux-modules-5.15.0-1034-gcp, linux-headers-oracle-edge, linux-headers-gkeop-5.15, linux-image-gcp, linux-gcp-headers-5.15.0-1034, linux-gke-5.15, linux-modules-extra-gcp, linux-buildinfo-5.15.0-1020-gkeop, linux-oracle-5.15, linux-image-gke, linux-gcp-tools-5.15.0-1034, linux-tools-gkeop-5.15, linux-image-gke-edge, linux-headers-gcp, linux-gkeop-5.15, linux-headers-gkeop, linux-tools-gkeop, linux-tools-5.15.0-1035-oracle, linux-modules-5.15.0-1035-oracle, linux-tools-gcp, linux-cloud-tools-gkeop-5.15, linux-tools-oracle, linux-gkeop-tools-5.15.0-1020, linux-modules-iwlwifi-5.15.0-1033-gke, linux-headers-5.15.0-1033-gke, linux-oracle-5.15-tools-5.15.0-1035, linux-image-gke-5.15, linux-tools-gcp-edge, linux-gke-headers-5.15.0-1033, linux-modules-extra-5.15.0-1020-gkeop, linux-gcp, linux-buildinfo-5.15.0-1034-gcp o USN-6091-1 : linux-ibm-headers-5.19.0-1022, linux-image-5.19.0-1023-oracle, linux-image-ibm, linux-headers-5.19.0-1022-ibm, linux-oracle, linux-ibm-cloud-tools-common, linux-headers-oracle, linux-image-5.19.0-1022-ibm, linux-headers-ibm, linux-modules-5.19.0-1023-oracle, linux-tools-5.19.0-1022-ibm, linux-modules-extra-5.19.0-1022-ibm, linux-oracle-headers-5.19.0-1023, linux-ibm-tools-common, linux-headers-5.19.0-1023-oracle, linux-modules-5.19.0-1022-ibm, linux-oracle-tools-5.19.0-1023, linux-image-unsigned-5.19.0-1022-ibm, linux-tools-oracle, linux-buildinfo-5.19.0-1023-oracle, linux-buildinfo-5.19.0-1022-ibm, linux-ibm-tools-5.19.0-1022, linux-image-unsigned-5.19.0-1023-oracle, linux-tools-5.19.0-1023-oracle, linux-ibm-source-5.19.0, linux-modules-extra-5.19.0-1023-oracle, linux-tools-ibm, linux-ibm, linux-image-oracle o USN-6092-1 : linux-signed-azure-edge, linux-cloud-tools-4.15.0-1165-azure, linux-image-azure-edge, linux-signed-image-azure-lts-18.04, linux-azure-4.15-cloud-tools-4.15.0-1165, linux-headers-azure, linux-azure-4.15-headers-4.15.0-1165, linux-headers-4.15.0-1165-azure, linux-image-azure-lts-18.04, linux-cloud-tools-azure-lts-18.04, linux-modules-extra-azure-edge, linux-azure-headers-4.15.0-1165, linux-image-4.15.0-1165-azure, linux-modules-4.15.0-1165-azure, linux-azure-4.15, linux-cloud-tools-azure-edge, linux-modules-extra-azure-lts-18.04, linux-headers-azure-lts-18.04, linux-azure-4.15-tools-4.15.0-1165, linux-signed-image-azure-edge, linux-image-unsigned-4.15.0-1165-azure, linux-tools-azure-edge, linux-modules-extra-4.15.0-1165-azure, linux-azure-cloud-tools-4.15.0-1165, linux-cloud-tools-azure, linux-signed-azure, linux-image-azure, linux-azure-tools-4.15.0-1165, linux-signed-image-azure, linux-tools-azure-lts-18.04, linux-tools-azure, linux-modules-extra-azure, linux-azure-lts-18.04, linux-azure, linux-signed-azure-lts-18.04, linux-buildinfo-4.15.0-1165-azure, linux-tools-4.15.0-1165-azure, linux-azure-edge, linux-headers-azure-edge o USN-6094-1 : linux-modules-extra-gcp-lts-20.04, linux-signed-azure-edge, linux-image-virtual-hwe-18.04-edge, linux-image-ibm, linux-image-generic-hwe-18.04, linux-tools-5.4.0-149-generic-lpae, linux-cloud-tools-gkeop, linux-tools-generic, linux-headers-oem-osp1, linux-cloud-tools-generic-hwe-18.04-edge, linux-cloud-tools-lowlatency-hwe-18.04, linux-generic-hwe-18.04-edge, linux-image-5.4.0-149-generic-lpae, linux-oem, linux-aws, linux-gkeop-5.4, linux-ibm-headers-5.4.0-1049, linux-cloud-tools-5.4.0-1108-azure, linux-image-gcp-lts-20.04, linux-tools-kvm, linux-tools-generic-hwe-18.04, linux-cloud-tools-azure-lts-20.04, linux-headers-virtual-hwe-18.04, linux-aws-tools-5.4.0-1102, linux-ibm-tools-common, linux-image-extra-virtual-hwe-18.04-edge, linux-azure-5.4, linux-gcp-lts-20.04, linux-snapdragon-hwe-18.04-edge, linux-modules-extra-gkeop, linux-image-extra-virtual, linux-cloud-tools-azure-edge, linux-headers-5.4.0-1091-kvm, linux-modules-5.4.0-1105-gcp, linux-modules-extra-5.4.0-1099-gke, linux-tools-aws-lts-20.04, linux-lowlatency, linux-cloud-tools-virtual-hwe-18.04, linux-buildinfo-5.4.0-1099-gke, linux-headers-5.4.0-1105-gcp, linux-image-lowlatency, linux-azure-cloud-tools-5.4.0-1108, linux-ibm-5.4-source-5.4.0, linux-kvm-headers-5.4.0-1091, linux-generic, linux-crashdump, linux-tools-azure-edge, linux-headers-gcp-edge, linux-cloud-tools-lowlatency-hwe-18.04-edge, linux-azure-5.4-cloud-tools-5.4.0-1108, linux-cloud-tools-generic-hwe-18.04, linux-gcp-5.4, linux-headers-gcp-lts-20.04, linux-cloud-tools-azure, linux-headers-5.4.0-1099-gke, linux-image-gkeop-5.4, linux-signed-azure, linux-gcp-5.4-tools-5.4.0-1105, linux-tools-ibm-lts-20.04, linux-image-ibm-lts-20.04, linux-tools-5.4.0-1099-gke, linux-image-extra-virtual-hwe-18.04, linux-headers-oem, linux-image-ibm-edge, linux-tools-generic-lpae-hwe-18.04-edge, linux-ibm, linux-gkeop, linux-doc, linux-hwe-5.4-tools-5.4.0-149, linux-gcp-edge, linux-modules-extra-gke, linux-tools-virtual-hwe-18.04, linux-hwe-5.4-headers-5.4.0-149, linux-tools-generic-hwe-18.04-edge, linux-tools-gke, linux-gke-5.4, linux-headers-azure-edge, linux-image-oem, linux-source-5.4.0, linux-image-virtual, linux-buildinfo-5.4.0-149-lowlatency, linux-image-unsigned-5.4.0-1108-azure, linux-modules-extra-5.4.0-149-generic, linux-modules-5.4.0-1108-azure, linux-tools-lowlatency-hwe-18.04-edge, linux-image-unsigned-5.4.0-1102-aws, linux-modules-extra-virtual-hwe-18.04, linux-cloud-tools-5.4.0-149-lowlatency, linux-ibm-cloud-tools-common, linux-cloud-tools-5.4.0-1102-aws, linux-headers-5.4.0-149-lowlatency, linux-ibm-5.4-headers-5.4.0-1049, linux-image-generic-lpae, linux-image-gkeop, linux-modules-extra-azure-lts-20.04, linux-headers-azure-lts-20.04, linux-image-unsigned-5.4.0-1069-gkeop, linux-modules-extra-gcp-edge, linux-image-5.4.0-149-generic, linux-modules-extra-ibm, linux-aws-headers-5.4.0-1102, linux-tools-snapdragon-hwe-18.04-edge, linux-tools-lowlatency-hwe-18.04, linux-headers-gke, linux-oem-tools-host, linux-gke, linux-headers-virtual, linux-hwe-5.4-tools-common, linux-modules-extra-5.4.0-1108-azure, linux-tools-generic-lpae-hwe-18.04, linux-virtual-hwe-18.04, linux-virtual-hwe-18.04-edge, linux-modules-extra-5.4.0-1049-ibm, linux-image-unsigned-5.4.0-1091-kvm, linux-headers-lowlatency-hwe-18.04, linux-azure-headers-5.4.0-1108, linux-image-generic-lpae-hwe-18.04-edge, linux-modules-extra-gkeop-5.4, linux-modules-5.4.0-149-generic, linux-headers-gkeop-5.4, linux-buildinfo-5.4.0-1069-gkeop, linux-tools-ibm-edge, linux-headers-5.4.0-149, linux-modules-extra-ibm-lts-20.04, linux-tools-lowlatency, linux-modules-5.4.0-149-generic-lpae, linux-buildinfo-5.4.0-149-generic, linux-headers-ibm-lts-20.04, linux-headers-lowlatency-hwe-18.04-edge, linux-modules-extra-virtual-hwe-18.04-edge, linux-tools-virtual-hwe-18.04-edge, linux-headers-gke-5.4, linux-tools-5.4.0-149-generic, linux-tools-common, linux-hwe-5.4-cloud-tools-common, linux-image-gcp-edge, linux-aws-lts-20.04, linux-modules-extra-azure, linux-tools-5.4.0-149, linux-ibm-5.4-tools-common, linux-ibm-5.4, linux-image-5.4.0-149-lowlatency, linux-tools-gkeop-5.4, linux-gkeop-cloud-tools-5.4.0-1069, linux-headers-generic, linux-azure-edge, linux-image-azure-edge, linux-tools-5.4.0-1105-gcp, linux-azure-5.4-tools-5.4.0-1108, linux-headers-azure, linux-image-unsigned-5.4.0-149-generic, linux-modules-5.4.0-149-lowlatency, linux-modules-extra-aws-lts-20.04, linux-headers-generic-hwe-18.04, linux-modules-5.4.0-1049-ibm, linux-buildinfo-5.4.0-1091-kvm, linux-cloud-tools-common, linux-image-5.4.0-1091-kvm, linux-hwe-5.4-cloud-tools-5.4.0-149, linux-modules-extra-azure-edge, linux-headers-ibm-edge, linux-image-5.4.0-1108-azure, linux-image-5.4.0-1105-gcp, linux-image-azure-lts-20.04, linux-image-unsigned-5.4.0-1105-gcp, linux-ibm-source-5.4.0, linux-tools-gke-5.4, linux-headers-5.4.0-149-generic-lpae, linux-tools-5.4.0-1069-gkeop, linux-ibm-tools-5.4.0-1049, linux-aws-cloud-tools-5.4.0-1102, linux-ibm-edge, linux-image-snapdragon-hwe-18.04, linux-image-unsigned-5.4.0-1049-ibm, linux-virtual, linux-image-5.4.0-1049-ibm, linux-cloud-tools-virtual, linux-signed-image-azure-edge, linux-modules-5.4.0-1069-gkeop, linux-headers-aws-lts-20.04, linux-tools-5.4.0-1091-kvm, linux-headers-generic-lpae, linux-image-gcp, linux-image-5.4.0-1069-gkeop, linux-buildinfo-5.4.0-1108-azure, linux-headers-5.4.0-1049-ibm, linux-image-azure, linux-generic-lpae, linux-kvm-tools-5.4.0-1091, linux-gkeop-headers-5.4.0-1069, linux-image-snapdragon-hwe-18.04-edge, linux-cloud-tools-generic, linux-image-unsigned-5.4.0-149-lowlatency, linux-snapdragon-hwe-18.04, linux-tools-azure, linux-azure-5.4-headers-5.4.0-1108, linux-tools-gcp-lts-20.04, linux-buildinfo-5.4.0-1049-ibm, linux-modules-extra-gcp, linux-image-generic-hwe-18.04-edge, linux-generic-lpae-hwe-18.04, linux-hwe-5.4-source-5.4.0, linux-azure, linux-generic-hwe-18.04, linux-gcp-tools-5.4.0-1105, linux-image-gke, linux-headers-5.4.0-1102-aws, linux-gke-headers-5.4.0-1099, linux-headers-snapdragon-hwe-18.04, linux-tools-5.4.0-149-lowlatency, linux-cloud-tools-lowlatency, linux-buildinfo-5.4.0-1102-aws, linux-headers-gcp, linux-headers-gkeop, linux-tools-gkeop, linux-gkeop-tools-5.4.0-1069, linux-image-oem-osp1, linux-image-unsigned-5.4.0-1099-gke, linux-modules-extra-5.4.0-1105-gcp, linux-cloud-tools-5.4.0-149-generic, linux-tools-virtual, linux-headers-5.4.0-149-generic, linux-gcp-5.4-headers-5.4.0-1105, linux-buildinfo-5.4.0-1105-gcp, linux-headers-5.4.0-1069-gkeop, linux-image-aws-lts-20.04, linux-headers-ibm, linux-image-generic, linux-cloud-tools-virtual-hwe-18.04-edge, linux-headers-generic-hwe-18.04-edge, linux-modules-5.4.0-1099-gke, linux-ibm-lts-20.04, linux, linux-tools-5.4.0-1102-aws, linux-cloud-tools-gkeop-5.4, linux-image-5.4.0-1102-aws, linux-lowlatency-hwe-18.04, linux-modules-extra-5.4.0-1069-gkeop, linux-modules-extra-5.4.0-1102-aws, linux-tools-gcp, linux-tools-generic-lpae, linux-image-gke-5.4, linux-oem-osp1, linux-tools-5.4.0-1108-azure, linux-tools-oem, linux-tools-oem-osp1, linux-libc-dev, linux-ibm-5.4-tools-5.4.0-1049, linux-cloud-tools-5.4.0-149, linux-headers-kvm, linux-image-lowlatency-hwe-18.04, linux-headers-lowlatency, linux-gcp-headers-5.4.0-1105, linux-lowlatency-hwe-18.04-edge, linux-tools-azure-lts-20.04, linux-modules-extra-ibm-edge, linux-headers-virtual-hwe-18.04-edge, linux-headers-generic-lpae-hwe-18.04, linux-headers-5.4.0-1108-azure, linux-modules-extra-gke-5.4, linux-buildinfo-5.4.0-149-generic-lpae, linux-tools-host, linux-image-5.4.0-1099-gke, linux-gkeop-source-5.4.0, linux-tools-ibm, linux-image-generic-lpae-hwe-18.04, linux-ibm-5.4-cloud-tools-common, linux-image-virtual-hwe-18.04, linux-azure-tools-5.4.0-1108, linux-modules-5.4.0-1102-aws, linux-image-kvm, linux-signed-image-azure, linux-generic-lpae-hwe-18.04-edge, linux-cloud-tools-5.4.0-1069-gkeop, linux-tools-5.4.0-1049-ibm, linux-modules-5.4.0-1091-kvm, linux-tools-snapdragon-hwe-18.04, linux-image-lowlatency-hwe-18.04-edge, linux-headers-snapdragon-hwe-18.04-edge, linux-tools-gcp-edge, linux-hwe-5.4, linux-headers-generic-lpae-hwe-18.04-edge, linux-gcp, linux-azure-lts-20.04, linux-source, linux-kvm, linux-gke-tools-5.4.0-1099, linux-oem-osp1-tools-host o USN-6095-1 : linux-virtual-hwe-16.04, linux-headers-raspi2, linux-headers-4.15.0-1132-raspi2, linux-tools-4.15.0-211-generic, linux-cloud-tools-virtual-hwe-16.04, linux-generic-hwe-16.04-edge, linux-image-lowlatency-hwe-16.04-edge, linux-cloud-tools-lowlatency-hwe-16.04-edge, linux-oem, linux-generic-hwe-16.04, linux-raspi2-tools-4.15.0-1132, linux-modules-4.15.0-1150-gcp, linux-headers-generic-hwe-16.04, linux-cloud-tools-4.15.0-211-generic, linux-headers-4.15.0-1150-snapdragon, linux-snapdragon-tools-4.15.0-1150, linux-cloud-tools-generic-hwe-16.04-edge, linux-cloud-tools-virtual-hwe-16.04-edge, linux-headers-lowlatency-hwe-16.04-edge, linux-headers-4.15.0-1150-gcp, linux-modules-extra-4.15.0-211-generic, linux-buildinfo-4.15.0-1150-gcp, linux-image-snapdragon, linux-headers-virtual-hwe-16.04-edge, linux-modules-extra-4.15.0-1150-gcp, linux-raspi2, linux-tools-lowlatency-hwe-16.04-edge, linux-tools-4.15.0-1150-gcp, linux-headers-oem, linux-signed-image-lowlatency-hwe-16.04, linux-gcp-tools-4.15.0-1150, linux-tools-virtual-hwe-16.04, linux-signed-oem, linux-tools-4.15.0-1150-snapdragon, linux-image-generic-hwe-16.04-edge, linux-modules-extra-gke, linux-raspi2-headers-4.15.0-1132, linux-signed-image-lowlatency-hwe-16.04-edge, linux-tools-gke, linux-headers-snapdragon, linux-tools-4.15.0-211-lowlatency, linux-image-oem, linux-cloud-tools-generic-hwe-16.04, linux-signed-lowlatency-hwe-16.04-edge, linux-image-virtual-hwe-16.04, linux-lowlatency-hwe-16.04-edge, linux-image-4.15.0-1132-raspi2, linux-hwe-cloud-tools-4.15.0-211, linux-image-unsigned-4.15.0-211-generic, linux-headers-gke, linux-gke, linux-image-4.15.0-1150-snapdragon, linux-buildinfo-4.15.0-1132-raspi2, linux-source-4.15.0, linux-snapdragon-headers-4.15.0-1150, linux-tools-generic-hwe-16.04-edge, linux-image-raspi2, linux-signed-generic-hwe-16.04-edge, linux-image-unsigned-4.15.0-211-lowlatency, linux-modules-4.15.0-211-lowlatency, linux-snapdragon, linux-image-unsigned-4.15.0-1150-gcp, linux-cloud-tools-lowlatency-hwe-16.04, linux-image-4.15.0-211-lowlatency, linux-gcp-headers-4.15.0-1150, linux-headers-4.15.0-211-generic, linux-buildinfo-4.15.0-211-generic, linux-tools-raspi2, linux-signed-image-generic-hwe-16.04-edge, linux-virtual-hwe-16.04-edge, linux-tools-generic-hwe-16.04, linux-image-4.15.0-211-generic, linux-headers-lowlatency-hwe-16.04, linux-image-generic-hwe-16.04, linux-image-virtual-hwe-16.04-edge, linux-modules-4.15.0-211-generic, linux-image-gcp, linux-signed-image-generic-hwe-16.04, linux-headers-generic-hwe-16.04-edge, linux-modules-extra-gcp, linux-tools-virtual-hwe-16.04-edge, linux-image-extra-virtual-hwe-16.04, linux-image-gke, linux-headers-4.15.0-211, linux-headers-gcp, linux-lowlatency-hwe-16.04, linux-image-4.15.0-1150-gcp, linux-modules-4.15.0-1132-raspi2, linux-buildinfo-4.15.0-1150-snapdragon, linux-tools-gcp, linux-tools-oem, linux-buildinfo-4.15.0-211-lowlatency, linux-image-extra-virtual-hwe-16.04-edge, linux-image-lowlatency-hwe-16.04, linux-signed-generic-hwe-16.04, linux-modules-4.15.0-1150-snapdragon, linux-cloud-tools-4.15.0-211-lowlatency, linux-signed-image-oem, linux-tools-lowlatency-hwe-16.04, linux-headers-4.15.0-211-lowlatency, linux-headers-virtual-hwe-16.04, linux-tools-snapdragon, linux-tools-4.15.0-1132-raspi2, linux-signed-lowlatency-hwe-16.04, linux-hwe, linux-gcp, linux-hwe-tools-4.15.0-211 o USN-6096-1 : linux-headers-5.19.0-42-generic, linux-modules-ivsc-5.19.0-42-generic, linux-cloud-tools-virtual-hwe-22.04-edge, linux-modules-ipu6-5.19.0-42-generic, linux-tools-5.19.0-1024-gcp, linux-generic-lpae-hwe-22.04-edge, linux-modules-5.19.0-42-generic, linux-cloud-tools-generic-hwe-22.04, linux-hwe-5.19-tools-5.19.0-42, linux-image-5.19.0-1024-gcp, linux-image-virtual-hwe-22.04, linux-modules-ipu6-generic-hwe-22.04, linux-modules-5.19.0-42-generic-64k, linux-tools-generic-lpae-hwe-22.04-edge, linux-headers-5.19.0-1024-gcp, linux-image-generic-64k-hwe-22.04, linux-headers-generic-hwe-22.04-edge, linux-modules-iwlwifi-5.19.0-42-generic, linux-image-extra-virtual-hwe-22.04, linux-headers-5.19.0-42-generic-64k, linux-tools-generic-lpae-hwe-22.04, linux-hwe-5.19-cloud-tools-common, linux-generic-hwe-22.04-edge, linux-image-virtual-hwe-22.04-edge, linux-buildinfo-5.19.0-42-generic-lpae, linux-headers-5.19.0-42-generic-lpae, linux-tools-virtual-hwe-22.04-edge, linux-modules-extra-5.19.0-1024-gcp, linux-tools-generic-64k-hwe-22.04, linux-image-generic-lpae-hwe-22.04, linux-image-unsigned-5.19.0-42-generic, linux-headers-generic-64k-hwe-22.04, linux-tools-5.19.0-42-generic-64k, linux-generic-hwe-22.04, linux-modules-extra-5.19.0-42-generic, linux-modules-5.19.0-42-generic-lpae, linux-cloud-tools-generic-hwe-22.04-edge, linux-headers-generic-lpae-hwe-22.04, linux-headers-generic-hwe-22.04, linux-image-5.19.0-42-generic-64k, linux-headers-generic-lpae-hwe-22.04-edge, linux-virtual-hwe-22.04, linux-virtual-hwe-22.04-edge, linux-image-extra-virtual-hwe-22.04-edge, linux-tools-generic-hwe-22.04-edge, linux-gcp-headers-5.19.0-1024, linux-tools-generic-64k-hwe-22.04-edge, linux-gcp-tools-5.19.0-1024, linux-modules-ipu6-generic-hwe-22.04-edge, linux-modules-ivsc-generic-hwe-22.04, linux-image-generic-lpae-hwe-22.04-edge, linux-headers-virtual-hwe-22.04, linux-buildinfo-5.19.0-42-generic-64k, linux-image-generic-hwe-22.04-edge, linux-image-gcp, linux-tools-5.19.0-42-generic, linux-modules-iwlwifi-generic-hwe-22.04, linux-hwe-5.19-headers-5.19.0-42, linux-headers-virtual-hwe-22.04-edge, linux-cloud-tools-5.19.0-42-generic, linux-modules-extra-gcp, linux-modules-ivsc-generic-hwe-22.04-edge, linux-tools-generic-hwe-22.04, linux-image-5.19.0-42-generic, linux-generic-lpae-hwe-22.04, linux-hwe-5.19, linux-headers-gcp, linux-modules-5.19.0-1024-gcp, linux-buildinfo-5.19.0-42-generic, linux-tools-virtual-hwe-22.04, linux-tools-5.19.0-42-generic-lpae, linux-source-5.19.0, linux-tools-gcp, linux-hwe-5.19-cloud-tools-5.19.0-42, linux-headers-generic-64k-hwe-22.04-edge, linux-generic-64k-hwe-22.04, linux-cloud-tools-virtual-hwe-22.04, linux-image-unsigned-5.19.0-42-generic-64k, linux-hwe-5.19-tools-common, linux-image-generic-64k-hwe-22.04-edge, linux-hwe-5.19-tools-host, linux-image-generic-hwe-22.04, linux-image-5.19.0-42-generic-lpae, linux-buildinfo-5.19.0-1024-gcp, linux-modules-iwlwifi-generic-hwe-22.04-edge, linux-gcp, linux-generic-64k-hwe-22.04-edge, linux-image-unsigned-5.19.0-1024-gcp o USN-6109-1 : linux-headers-raspi2, linux-raspi2-hwe-18.04-edge, linux-tools-raspi2-hwe-18.04, linux-raspi-5.4, linux-image-raspi-hwe-18.04, linux-headers-raspi2-hwe-18.04, linux-image-raspi-hwe-18.04-edge, linux-raspi-tools-5.4.0-1085, linux-tools-raspi-hwe-18.04, linux-modules-5.4.0-1085-raspi, linux-raspi2-hwe-18.04, linux-image-raspi2-hwe-18.04-edge, linux-raspi-headers-5.4.0-1085, linux-tools-raspi2, linux-image-5.4.0-1085-raspi, linux-headers-5.4.0-1085-raspi, linux-image-raspi, linux-raspi-5.4-headers-5.4.0-1085, linux-buildinfo-5.4.0-1085-raspi, linux-image-raspi2-hwe-18.04, linux-tools-5.4.0-1085-raspi, linux-raspi-hwe-18.04-edge, linux-raspi-hwe-18.04, linux-raspi2, linux-tools-raspi, linux-headers-raspi, linux-headers-raspi-hwe-18.04, linux-image-raspi2, linux-raspi, linux-raspi-5.4-tools-5.4.0-1085, linux-headers-raspi-hwe-18.04-edge, linux-tools-raspi2-hwe-18.04-edge, linux-tools-raspi-hwe-18.04-edge, linux-headers-raspi2-hwe-18.04-edge o USN-5978-1 : linux-image-6.1.0-1008-oem, linux-modules-ipu6-oem-22.04c, linux-modules-ivsc-6.1.0-1008-oem, linux-buildinfo-6.1.0-1008-oem, linux-headers-oem-22.04c, linux-tools-oem-22.04c, linux-oem-6.1-tools-host, linux-tools-6.1.0-1008-oem, linux-image-oem-22.04c, linux-modules-ipu6-6.1.0-1008-oem, linux-oem-6.1, linux-modules-ivsc-oem-22.04c, linux-headers-6.1.0-1008-oem, linux-oem-6.1-tools-6.1.0-1008, linux-image-unsigned-6.1.0-1008-oem, linux-modules-6.1.0-1008-oem, linux-oem-6.1-headers-6.1.0-1008, linux-oem-22.04c o USN-5915-1 : linux-tools-oem-22.04c, linux-headers-oem-22.04c, linux-modules-ipu6-6.1.0-1007-oem, linux-modules-6.1.0-1007-oem, linux-oem-6.1-tools-host, linux-oem-6.1-headers-6.1.0-1007, linux-oem-6.1-tools-6.1.0-1007, linux-tools-6.1.0-1007-oem, linux-image-oem-22.04c, linux-oem-6.1, linux-headers-6.1.0-1007-oem, linux-modules-ivsc-oem-22.04c, linux-image-6.1.0-1007-oem, linux-modules-ivsc-6.1.0-1007-oem, linux-image-unsigned-6.1.0-1007-oem, linux-modules-ipu6-oem-22.04c, linux-buildinfo-6.1.0-1007-oem, linux-oem-22.04c - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaBo8kNZI30y1K9AQhKmg/9FPtTn2QNM+zVITJ2OSToB6aE0mXfhftT XBi+h+hACavSH0LfRTp/dWwhFBfMZl9nHKj1to8mbGWGorphVPVrtMEaTM2TkRSa vu1tiCmOG17yl5DBYq0ZdnakmXqPp0xm7+86/K1q0GGSWPxWfRCle+PZJSEntcUV n4GsR3ruZ+WhwOEPvYMB0dnJdDq9No8Tkgj5edJAbhdaMNDWHzyy+XVoEck68L6f SG/h7nrsUCMPrCfw6+VpMBQZedry5xDOD4FipO3GgeDxZXoFZQdq6BQACKNP6BYD /IRPH7q2Z0skbFzcZH2v9wyTJDPX7v3cJ71vKB/GZvDZ5Z5GbUj2xjbkyfUvC4FC /iIPXOpqkqfVDM/z7X55hc4v6h7QIcLlCBRR1vt7MnCB5I3cDW3hSvZQxVYn/r1i vD1f3TllnjbubFbls8cdPRHFGqiVcF0ePahtRHE/wCePk0qKzbyh8Ome0M8iWqlw 3m/1oRj/RTSd+12JDT548tAji0KfQs45iKC468hLBjfqOiCzcYGph9FEiQjNySvC xwcLrv2vmsF3YCF6D5hxBWkwrzCEUkNFps8JmTFBzz8VJZwcPAwBoviP+y4hER6M 4oy8ut3PN54schkwX77eeCz8X2mo99IXMD61gx76XBrNqsKrOkXUNIGli9ltJKfb S2ygcnL/GQ8= =cxtz -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3074 - [Ubuntu] LuaTeX (TeX Live): CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3074 USN-6115-1: TeX Live vulnerability 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: LuaTeX (TeX Live) Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2023-32700 Original Bulletin: https://ubuntu.com/security/notices/USN-6115-1 Comment: CVSS (Max): 7.8 CVE-2023-32700 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6115-1: TeX Live vulnerability 30 May 2023 LuaTeX (TeX Live) could be made to run programs as your login if it compiled a specially crafted TeX file. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 23.04 o Ubuntu 22.10 o Ubuntu 22.04 LTS o Ubuntu 20.04 LTS o Ubuntu 18.04 ESM Packages o texlive-bin - Binaries for TeX Live Details Max Chernoff discovered that LuaTeX (TeX Live) did not properly disable shell escape. An attacker could possibly use this issue to execute arbitrary shell commands. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04 o texlive-binaries - 2022.20220321.62855-5ubuntu0.1 Ubuntu 22.10 o texlive-binaries - 2022.20220321.62855-4ubuntu0.1 Ubuntu 22.04 o texlive-binaries - 2021.20210626.59705-1ubuntu0.1 Ubuntu 20.04 o texlive-binaries - 2019.20190605.51237-3ubuntu0.1 Ubuntu 18.04 o texlive-binaries - 2017.20170613.44572-8ubuntu0.2 In general, a standard system update will make all the necessary changes. References o CVE-2023-32700 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaBf8kNZI30y1K9AQgRpA/9ECrE0IN5oOilYy97reZjecjnxd/d3rqQ CU3Y1pqM3Uflc84c9O6H2oYd0U7vhGTmumfD+HGTUz7pswfgU9BrIlgmRQ0yyOfc TYlgQmCutMq0cuiWnqEaCvgGb49JLIQZpEgd5lZEqkrOO1qiJOhahR00TU++tVT7 jRyUeLnOtliuZbYgjTsw0sn0y7xe6LpRXi5+7axZjGbpYWzjmcaoS4i+3+gCXtXR dfDc3/Pr02n26cVkZ74tEtSOnffeRSjTxSfgHAnk76fzVsoe1tum7M72IxPi/JlW Yk0vLmLDl8rEbVeQZBGwc/0RpfnP/u6SxpVKCnB4aMqaQ+MvQQlyBiojtoiW8he4 1QLBSdnpx9BgxsSwM87jV1rdFNaDEOb5NmZJQyVQj6yxMX0i9m+V2qFBoiZruHCK rXeeT5c4dYj+m5LcPH7F1ORxzYFR5Q/AIMYm6BCrUm5yR4QVPKNdeaeerUH/YCdj k2sVcOPHtgQIKxmGg1UXxw/SfYASs3v3My+C6tA3yNrU+qtycmxHEryNMFbceKNl pNk5anGPXENSOkGUg4C7XeuhFayyk4eVidFK6msSJLYeoVXFd4waoaZin8Ea7WbL YX/0GTpLwCgW1y4qWtyUW0YHErah2/58J+FAHJEdmbsMttZf493cPTwVUf6FEvT1 Ur73+4h5aek= =KD+7 -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3073 - [Ubuntu] hawk: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3073 USN-6116-1: hawk vulnerability 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: hawk Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2022-29167 Original Bulletin: https://ubuntu.com/security/notices/USN-6116-1 Comment: CVSS (Max): 7.5 CVE-2022-29167 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6116-1: hawk vulnerability 30 May 2023 hawk could be made to crash if it opened a specially crafted file. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 22.10 o Ubuntu 22.04 LTS o Ubuntu 20.04 LTS o Ubuntu 18.04 ESM Packages o node-hawk - HTTP Holder-Of-Key Authentication Scheme Details It was discovered that hawk incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10 o node-hawk - 8.0.1+dfsg-1ubuntu0.22.10.1 Ubuntu 22.04 o node-hawk - 8.0.1+dfsg-1ubuntu0.22.04.1 Ubuntu 20.04 o node-hawk - 7.1.2+dfsg-1ubuntu0.1 Ubuntu 18.04 o node-hawk - 6.0.1+dfsg-1+deb10u1build0.18.04.1 In general, a standard system update will make all the necessary changes. References o CVE-2022-29167 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaBXckNZI30y1K9AQh55BAAntXbhQMuPwiY7cPGh4v7mnOoGxxagDJk jpW3xIug8XLNe8V3P+II6PZpEk5boWOLmOZArvOuJSrHLiLtSt7PwOXTS+APDWff VhFGmPw0JKspIwtHMA+5MzZyqOU/efHdxf/QaAOLryNL5WUfh3BI47ovCYdzw093 QrUsuxSdtP+yP/TMWzX/TAF65pQ37jsW5EwjV74w7h1AqOXLIvxwlosJEGLPdev6 drzYAgV00GiMOTKUfat02eP7j427VjAs9dBTMM0wtfgr74PB4gtly0ftApJRnFT2 G0WGaDRsVBOqXJjFlTOi2PtSUSzCcNt7wWOwIF9MNA+qUKx0cwaF7S8MVvibf9lu oS8KKXKfOr/HYol48kftZGQHglxrLAluuXbto7GNyiniFPxStIoel3eNI1iNWv7L F5ujkM+WlY6psBHMT93Ys1wsI0Qb41X0PhA4sDb0q5bitYSCploFZSZoiXG2sIx2 a5DMCI7+ikGt7m15NpPn7ubMAI4fy7+PM7NhSEmka/q1uCQfDdXQ6TvT7fMOpEQf MYKD8qKXV7xIaHTntZO7PZStXOPq7dvsX1Sev9IHqvVKRUxOB8yN+nk/8e5V5Ir6 xhedooUkzkwR9NZqkTnj+UWyOUKlFhVS/xXErNoNQUpnrZv6CTEhHYyuEzdJr5I7 WzgSfDDPUKA= =zvw3 -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.3072 - [Ubuntu] Jhead: CVSS (Max): 5.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3072 USN-6113-1: Jhead vulnerability 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Jhead Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2018-6612 Original Bulletin: https://ubuntu.com/security/notices/USN-6113-1 Comment: CVSS (Max): 5.5 CVE-2018-6612 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6113-1: Jhead vulnerability 30 May 2023 Jhead could be made to crash if it opened a specially crafted file. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 16.04 ESM o Ubuntu 14.04 ESM Packages o jhead - Manipulate the non-image part of Exif compliant JPEG files Details It was discovered that Jhead did not properly handle certain crafted images while processing the Exif markers. An attacker could possibly use this issue to crash Jhead, resulting in a denial of service. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 o jhead - 1:3.00-4+deb9u1ubuntu0.1~esm4 Available with Ubuntu Pro Ubuntu 14.04 o jhead - 1:2.97-1+deb8u2ubuntu0.1~esm4 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References o CVE-2018-6612 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaBNckNZI30y1K9AQjvCRAAtdLAIcfuCrdj8SiMs4C8DJfRyt9xUg6v 0iWYjtGmArOT7A4Rny4pB6ESJHnvcT2nYgaFHTpNrQdKURhRnS1hV1oKsve+BhiU WZ5uRx8PSTx2L2Sc7UhVHoDRxH2LlzWQjSOS1CY6oLCG8Kkt7X30/FYfjYEI7BIr RAFiRaAqUTOLjBCYJnEgfuZOfqzPcdRJiJtlJgxW3RYih6oasL3DOMxt8+ee4Mt9 HMwny/K7cHDTqq53xQS6tzm1R+GRe2CjNC2GX5l3xZhqKAIC3ssplj7qz02znZ2Z RaYxBW2zRjJZGqwffcZ3SYyJuJSPRUL13xJGdZZDzcwpmh59YvQKxZo6upnpLxxx +lYJ0bm8sSC1uEi8sTWHDh0jWordY6Xcyh2aX2MorJHgSPlbm3UKfp3xXwgXRsBX A5XANaZCkwNsqLvew7+nOtFRKARMVtS16gzTNvqC2IejU7PUWcrkiclBjSJYgI4H RNmtw+6isBZkGteFdClOqG0QhJ0mc3TBuiLvNR+NlEzSt2wCqCtn6LtDsy2TfuA4 fsGOueNWjutbaJGvkba1sMEkdeNfep2+Sx9z6jEOtFSAVclkitPqqf5clH8eR3Fx +3gt/rAfqimb608Sng4WyQ9MC1Yt01qJhEFGNodc7u/JE9AHLX+67j3htOwSde2e NjVSpMWdmS8= =NA/O -----END PGP SIGNATURE-----
58 perc 29 másodperc

ESB-2023.0180.3 - UPDATE [Cisco] Cisco Unified Intelligence Center: CVSS (Max): 6.1

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.0180.3 Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability 31 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Unified Intelligence Center Publisher: Cisco Systems Operating System: Cisco Resolution: Patch/Upgrade CVE Names: CVE-2023-20058 Original Bulletin: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-xss-Omm8jyBX Comment: CVSS (Max): 6.1 CVE-2023-20058 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) CVSS Source: Cisco Systems Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Revision History: May 31 2023: Updated fixed release information May 30 2023: Vendor updated fixed release information January 12 2023: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability Priority: Medium Advisory ID: cisco-sa-cuis-xss-Omm8jyBX First Published: 2023 January 11 16:00 GMT Last Updated: 2023 May 30 14:22 GMT Version 1.2: Final Workarounds: No workarounds available Cisco Bug IDs: CSCwc84104 CVE Names: CVE-2023-20058 CVSS Score: 6.1 AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X Summary o A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-xss-Omm8jyBX Affected Products o Vulnerable Products At the time of publication, this vulnerability affected Cisco Unified Intelligence Center. The following Cisco products that may be bundled with Cisco Unified Intelligence Center are also affected by this vulnerability: Packaged Contact Center Enterprise (CCE) Unified CCE Unified Contact Center Express (CCX) For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, the release information in the following table (s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability described in this advisory and which release included the fix for this vulnerability. Cisco Unified Intelligence Center Release First Fixed Release 12.0(1) ^1 and earlier Migrate to a fixed release. 12.5(1) 12.5(1) SU ES02 12.6(1) 12.6(1) ES06 12.6(1) ES2 12.6(1) ES06 1. Cisco Unified Intelligence Center Release 12.0(1) has reached End of Software Maintenance . Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco Packaged CCE Release First Fixed Release 12.0(1) ^1 and earlier Migrate to a fixed release. 12.5(1) 12.5(1) SU2 ES05 12.5(1) SU2 12.5(1) SU2 ES05 1. Cisco Packaged CCE Release 12.0(1) has reached End of Software Maintenance . Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco Unified CCE Release First Fixed Release 12.0(1) ^1 and earlier Migrate to a fixed release. 12.5(1) 12.5(1) ES02 12.5(2) 12.6(1) ES06 12.6(1) 12.6(1) ES06 1. Cisco Unified CCE Release 12.0(1) has reached End of Software Maintenance . Customers are advised to migrate to a supported release that includes the fix for this vulnerability. Cisco Unified CCX Release First Fixed Release 12.0(1) ^1 and earlier Migrate to a fixed release. 12.5(1) 12.5(1) SU3 12.5(1) SU2 12.5(1) SU3 1. Cisco Unified CCX Release 12.0(1) has reached End of Software Maintenance . Customers are advised to migrate to a supported release that includes the fix for this vulnerability. The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory. Exploitation and Public Announcements o The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Subscribe to Cisco Security Notifications o Subscribe Related to This Advisory o Cross-Site Scripting URL o https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-xss-Omm8jyBX Revision History o +---------+---------------------------+------------+--------+-------------+ | Version | Description | Section | Status | Date | +---------+---------------------------+------------+--------+-------------+ | 1.2 | Updated fixed release | Fixed | Final | 2023-MAY-30 | | | information. | Releases | | | +---------+---------------------------+------------+--------+-------------+ | 1.1 | Updated fixed release | Fixed | Final | 2023-MAY-09 | | | information. | Releases | | | +---------+---------------------------+------------+--------+-------------+ | 1.0 | Initial public release. | - | Final | 2023-JAN-11 | +---------+---------------------------+------------+--------+-------------+ Legal Disclaimer o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHaIyskNZI30y1K9AQhFBBAAubc/eIgjaDpcdVcAYmdARTO+sqZoVEBN vp2STwAXWLIF0p+k3HPnRC+OBQe76AN3ksx3+SdEL1FT8wUXNKbRzyedxR3133G4 mN2lakPAxgnER5m1oNBha5Ton1qzxWE1TaUmshQdByypbaAt6PzrX1j3i9M46qdu esCNCqmNScb0xHYiwiDe3UdqmdNc0cUx89ykT5VO7wATkBUcC7hkteOyo51VDNoC j0xQ7hdk4JwDvGV4U+5droKeT5ioIyOQzEt6wySD2eLVpAG2V5EEoVqWq3yvFfuB 4e9vr8+OB3S5tj0hMg7nku+pGqIXQ7PrBZmHlA4FfxJtnmYkjWgCR8vDBIe0DUxu Pkrvb3EyJ+TZOWpfHZ0fWGJA17iJka706ckJXiTA9RtV8tE2tVpWNfMXN/XaWGLP dUkq3T8q6aD1LkxKmPY2vHz0pbhkIHDFAzY+BhDO7+OwQYdl7WBCKfhp4te/ckUY B5rYA/ZEZxEA7OzTE4hr5Jo8q9bKMtu08zzZaicbB+vggLVLMwSszrqdDiQCaFqR 8SFLyVCq5I32sGm+XHsTE2KLouDLWBpBLTSJxg44mEmlTgDzy/GJSR7hDGMKqeCo SQVs+irmzIX8JiHP0zNIwc1lWB1l6NwnVOom35LZFYyzVDfToofkGDwzQTB5PeUm fMi0GKt+IVw= =UAwy -----END PGP SIGNATURE-----
2023. május 30.

ESB-2023.3071 - [Debian] sssd: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3071 sssd security update 30 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: sssd Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2022-4254 CVE-2021-3621 CVE-2019-3811 CVE-2018-16838 Original Bulletin: https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html Comment: CVSS (Max): 8.8 CVE-2022-4254 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3436-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Guilhem Moulin May 29, 2023 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : sssd Version : 1.16.3-3.2+deb10u1 CVE ID : CVE-2018-16838 CVE-2019-3811 CVE-2021-3621 CVE-2022-4254 Debian Bug : 919051 931432 992710 Multiple vulnerabilities were found in sssd, a set of daemons to manage access to remote directories and authentication mechanisms, which could lead to privilege escalation. CVE-2018-16838 It was discovered that when the Group Policy Objects (GPO) are not readable by SSSD due to a too strict permission settings on the server side, SSSD allows all authenticated users to login instead of denying access. A new boolean setting (defaulting to False) is introduced for environments where attributes in the groupPolicyContainer are not readable and changing the permissions on the GPO objects is not possible or desirable. See sssd-ad(5). CVE-2019-3811 It was discovered that if a user was configured with no home directory set, then sssd(8) returns (i.e., the root directory) instead of the empty string (meaning no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() or similar. CVE-2021-3621 It was discovered that the sssctl(8) command was vulnerable to shell command injection via the subcommands. This flaw could allows an attacker to trick the root user into running a specially crafted sssctl(8) command, such as via sudo, in order to gain root privileges. CVE-2022-4254 It was discovered that libsss_certmap failed to sanitize certificate data used in LDAP filters. PKINIT enables a client to authenticate to the KDC using an X.509 certificate and the corresponding private key, rather than a passphrase or keytab. Mapping rules are used in order to map the certificate presented during a PKINIT authentication request to the corresponding principal. However the mapping filter was found to be vulnerable to LDAP filter injection. As the search result is be influenced by values in the certificate, which may be attacker controlled, this flaw could allow an attacker to gain control of the admin account, leading to full domain takeover. For Debian 10 buster, these problems have been fixed in version 1.16.3-3.2+deb10u1. We recommend that you upgrade your sssd packages. For the detailed security status of sssd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sssd Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEERpy6p3b9sfzUdbME05pJnDwhpVIFAmR0rBcACgkQ05pJnDwh pVL+Xw//YEW3PRadnAhjhXDPIyVqDaEal6sZWX+D30NDfagg7/ISMSz5XyKlXS1H 2NwKR8T5xckNsuI2YIds+TCKTJvqLr5JkOO9B6AufLi9zKJMulIWSt56KRBb2TKq rSZQPJPl6h/lJfj7t1mjHqIR7XXXfUXqCeD8zZChrwxXS0nQDLGpYYH3eKDIHKG9 VmaPXegmDqAFqKu6M4fMoFDBn+EJ5cFHnJ4qIOXhskd/8sv9hm+JF+5bAIu3K5S2 8qwcjx70UCwhy8I2iXsSaBRwcNgw4Ir/EfPIzUcvKLmCmD2Ww+hnFuvqiOhpSOqK Zq0godlvq/yTpcVYFwKb1sEu9aprTADJbp+8c3avZNU68DXh4RhkbW2qPFVL0Qmg B3IpoUiGOp2W3CdhUpiIjJk2WIinoc1YJfhUtHLV9JvCUlxgfNdCISd6buNk7Bnk w9JyX5ueGNpUxpxiKoRdd06ujFNXkNAddzV9ZNQsnJ6vUYofQ5eoLzUz92o+TYv0 0aFoUW48sgIUzFZDzpEycXvM0La5XBC+ZMIANmei3AEnUi2MaaOQvjI1pyZz8nuT TimaEMoLh9jcJ6/cjc9xnhKi4zqbduwzMSkxfBWUH14ZgHmX7YpNEZIeuTOn7nfg 4LhuSUgGJNczV0GIe2LwlfTvlprXmpfsd52JpzUMXYd96qbEDMw= =x5Zd - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHVmn8kNZI30y1K9AQiCRxAAsQ7770hnTI3Fe2nrM6mvDWT0wBZKNOC0 qFVREaf961Q5DpQSKFWPrGKGu8sBV162dZJmBXwArNzTATcmjgXVflTR1+jMIivP WHBRgEvJAsfpCxFwSb2SCUvmCNckQP94+VVlie52ADUo5d3mC0RkBWDvlidcSw5s rd0GT3k1iyQAf858BOB80ZQs0Rt/P3tPqK/3AlxPlJLUR3s/1Y4A3fTtCm9kweKD nwIgbfgdA3EOWECevcrayeYmWlTMGZPW+HMwwtZT+wBk9qgT01doXUQ+zro+P6Hv dcNIGDzBaoJQnzk28SGUlx7zSmmMDVdBaju5n9HOGp3OxhLWEGbISkOaQB8Lx3Ki eE//h3jjbE8p8O0Ql2+gSTfX1GBZGawFPwgQAbIysFGGoQ5WqBR24uH9A+jyfX67 I3dxTq4jYHuo026jXoPnkQZz5XlxhJ2UfluNB2hIWI+T73fSKVHFABeX/ukLtPne kE0vYYBMwBzntWhoIoUInT79ZGMxBo1vIiF3WE3r5WSuITHBP2yRDB4AV2CsW5Ap MZfhTik+fCzPSqvSHeWPbbHPEQMKHnrHBz4oQFvmNxOVC3WWI52H4uD+z3Mvc3RQ kUSf0Vl5LkZgXjkeyv1flY5pVGZaq1fMEmedjeGGA8JaDQSMdCbIlRhHcIjKUDlo gq6+pT5++cI= =1QuI -----END PGP SIGNATURE-----
2023. május 30.

ESB-2023.3070 - [Ubuntu] Linux PTP: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3070 USN-6097-1: Linux PTP vulnerability 30 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux PTP Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2021-3570 Original Bulletin: https://ubuntu.com/security/notices/USN-6097-1 Comment: CVSS (Max): 8.8 CVE-2021-3570 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6097-1: Linux PTP vulnerability 29 May 2023 Linux PTP could be made to crash, run arbitrary code, or expose sensitive information if it received specially crafted input. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 20.04 LTS o Ubuntu 18.04 ESM o Ubuntu 16.04 ESM Packages o linuxptp - Precision Time Protocol (PTP, IEEE1588) implementation for Linux Details It was discovered that Linux PTP did not properly perform a length check when forwarding a PTP message between ports. A remote attacker could possibly use this issue to access sensitive information, execute arbitrary code, or cause a denial of service. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 o linuxptp - 1.9.2-1ubuntu0.1 Ubuntu 18.04 o linuxptp - 1.8-1ubuntu0.1 Ubuntu 16.04 o linuxptp - 1.6-1ubuntu0.1~esm1 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References o CVE-2021-3570 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHVmmMkNZI30y1K9AQj4qw//ROqj3BznHmoSPOhz4EaexZW5N4jSvAhz lUr4/E0FNJ1SVQ171EBQs05oJcU0oCq3fWMabCZ8F54wembTrnJguLUQkHn25N5W NwPDAMt1j7lDd/RqUiGKtwwb0t3Voz6RfEK1Ta2CEAi/e0MfQDrxdmGP6ARTPv/T uY7Tued7oJeUIOH+XUiGUWmq3ViyRu2umTQi2wgg29Ja79wZBbdBJYrkKKs+jdby DZwM6Bzf6jVKdaXmx09mX2E4yXDjKp++ZeSknhPVf6ik6Zyw2mRStsg7b+tvvJX1 Tg5lwWxjVbIzDAufYYQ+97GPzJpKwfPkix7QpVguTiMpk4cUlmC2xBAdB79+gVii Bw5+TinZpiHDP7Wp43uWrroA1TzGgcbM7L2fzGo5hrJ+u/EEI3HslK7Wtcbud+DA WFFHPSz4foJfRVtI4vjrHgm5tYSbHziCYwvLfhEWy+4OcYTrvGvCGHQFvV4g2RRU 4PpW1GZ8udTnprGpM+H7pmNioa+Ku9MxwPW/gWPbwyyLF3805oJaXE2Jd5u6Aymc IqxILHyjZn8TN0tzkkMf7VxFcOLrlylkZH8zlkfy/jOhTAR9G9SZqW7ppsgrPBOI gFnKgfQHnQjYIqqQFz73aYGdkK+6RNNeVjebw9kuP+qIiILrs0x0l3LdOfusCMR5 vAedyPav0Zk= =rzo0 -----END PGP SIGNATURE-----
2023. május 30.

ESB-2023.3069 - [Debian] libssh: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3069 libssh security update 30 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: libssh Publisher: Debian Operating System: Debian GNU/Linux Resolution: Patch/Upgrade CVE Names: CVE-2023-1667 CVE-2019-14889 Original Bulletin: https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html Comment: CVSS (Max): 8.8 CVE-2019-14889 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: [NVD], Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3437-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Tobias Frost May 29, 2023 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : libssh Version : 0.8.7-1+deb10u2 CVE ID : CVE-2019-14889 CVE-2023-1667 Debian Bug : 946548 1035832 Two security issues have been discovered in libssh, a tiny C SSH library, which may allows an remote authenticated user to cause a denial of service or inject arbitrary commands. CVE-2019-14889 A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target. CVE-2023-1667 A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service. For Debian 10 buster, these problems have been fixed in version 0.8.7-1+deb10u2. We recommend that you upgrade your libssh packages. For the detailed security status of libssh please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libssh Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEE/d0M/zhkJ3YwohhskWT6HRe9XTYFAmR1IK8ACgkQkWT6HRe9 XTZfVRAApgbHqHpwjKPlHEw35hiSiUnk6hBy7wQDi1DIEq5aclOtN9HDJpoo4G7Q Wec6QB8W1FhN/IAzm5pPIz1klt59cEDpX9H7RTLRxZ157IlPDvrGYq3OlK+DyBcq al8ylPBBQ5FdR/N5iS9w4LEzqZN9s+GFOxzNIRWBcBBlcSXxiSPkRh7TpoFflYzy djJCP2AfoOYfSmAvV4OV/0THKUZDx+JEAvZgWsrimORZHB4vQudG8AYA4pMEmWDp KSwkG637rKoP8klHwZz2Ymghb/4skpaYQLa8moR0ywy5T1LR5MqdyqClURm62UZ2 ijkWVMBZvGqse8KMtUqeSo9cs6cD2t50j19MewHaGf8PzoJbgbwWN6tdB/to7dL6 DTFGILKyAsv2f7fVkrML8xnjhQTnCBk6d35lO8WQuj1jj3OOwdPWusuW4GeRcC5F KCnCxxwuUJamaLqM+3VBWPKU/AIeNUNQ3I4iyNVx6GsVZHJMj/dVgiW4MjJ3jr0K E8pMCgYYzz/V7b+rpEfTni6SciOe5YWoLP50NC2G9RpAPTgTDmM3liMnUXcoHilo yKzGbeJ7alcj/K3GSSvp0n0fXMsRnreukcyT8VA3A3pGkFLpndzaXkyuT8YILyKL mlvUmI/KiAl0OOMz/WKhnVwHb39PToKyrCoQ/0DNfZdtdjOIzlI= =CDOK - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHVmkskNZI30y1K9AQg7BQ/+PPJ7MNFHd9RSE3dFiAuzAhsoahWnDuvW +/h5Ld0oRnWSW5uttmU/uHTVyI2VS3q1pdO4x1DwUrf6iilkn2eU2aFiiNBfxzC0 kI1ZrJBWaD0ToAWYVZtT51PQ+93a/KyWudkQ3ObVZrlevX4sevbkki0pXGFAZv4K JhQVw9IKPnWJE5nqWDJXJ3mGwNz8VS5K5P3OSm4Gmyct+vyqsQr6Taiti+ydHpEE NsGH2o3WiqMpQyjjIDwgafWIJgffY8HYRQdbwlmU/NfTOo0NBRNo1LeC09PGG+OZ NiLivIn8H11V7A7ieTg5Pu8ePxL9fngjAxUmMpDFEACUfk6+iQtbOCG8xvGMXoRS AZ35ivTiQeRb9FWtY7kGHzawuAgYKGvBjlL6rKlGb4K8qel9xZ72Z7rzyOwRV58Y bNGyKgeX5KAYXoXuF9NnbYz+Nix8fWUVDs9bFB9d5M4Mq6FI797hK+B7vRMHJdfA OnNB3wCR8iOSRsjcoXduFPRul2gAtzqmGltHNdgry/uUXoPyMvXWKkk1whcro1rB jGLpkRxRRoekV3Lh/tDqrLOiQ97oVQOqYE/XIa3Xs2iMVNy00mS62Ijm/2zyUw7G Pt3LJZBHAYNH5YGKRhko2FOtBrcjLpRCmnfmWjjS3qK2B5UtdOsQydusRWYaV+UI b9TjklOsRck= =Shsk -----END PGP SIGNATURE-----
2023. május 30.

ESB-2023.3068 - [Ubuntu] Jhead: CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.3068 USN-6110-1: Jhead vulnerabilities 30 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Jhead Publisher: Ubuntu Operating System: Ubuntu Resolution: Patch/Upgrade CVE Names: CVE-2021-28277 CVE-2021-28275 CVE-2021-3496 Original Bulletin: https://ubuntu.com/security/notices/USN-6110-1 Comment: CVSS (Max): 7.8 CVE-2021-3496 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: NVD Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- USN-6110-1: Jhead vulnerabilities 29 May 2023 Jhead could be made to crash if it opened a specially crafted file. Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Releases o Ubuntu 23.04 o Ubuntu 22.10 o Ubuntu 22.04 LTS o Ubuntu 20.04 LTS o Ubuntu 18.04 ESM o Ubuntu 16.04 ESM o Ubuntu 14.04 ESM Packages o jhead - Manipulate the non-image part of Exif compliant JPEG files Details It was discovered that Jhead did not properly handle certain crafted Canon images when processing them. An attacker could possibly use this issue to crash Jhead, resulting in a denial of service. ( CVE-2021-3496 ) It was discovered that Jhead did not properly handle certain crafted images when printing Canon-specific information. An attacker could possibly use this issue to crash Jhead, resulting in a denial of service. ( CVE-2021-28275 ) It was discovered that Jhead did not properly handle certain crafted images when removing unknown sections. An attacker could possibly use this issue to crash Jhead, resulting in a denial of service. ( CVE-2021-28275 ) Kyle Brown discovered that Jhead did not properly handle certain crafted images when editing their comments. An attacker could possibly use this to crash Jhead, resulting in a denial of service. (LP: #2020068) Reduce your security exposure Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines. Learn more about Ubuntu Pro Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04 o jhead - 1:3.06.0.1-6ubuntu0.23.04.1 Ubuntu 22.10 o jhead - 1:3.06.0.1-2ubuntu0.22.10.2 Ubuntu 22.04 o jhead - 1:3.06.0.1-2ubuntu0.22.04.1+esm1 Available with Ubuntu Pro Ubuntu 20.04 o jhead - 1:3.04-1ubuntu0.2+esm1 Available with Ubuntu Pro Ubuntu 18.04 o jhead - 1:3.00-8~ubuntu0.2+esm1 Available with Ubuntu Pro Ubuntu 16.04 o jhead - 1:3.00-4+deb9u1ubuntu0.1~esm3 Available with Ubuntu Pro Ubuntu 14.04 o jhead - 1:2.97-1+deb8u2ubuntu0.1~esm3 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References o CVE-2021-28277 o CVE-2021-28275 o CVE-2021-3496 o https://launchpad.net/bugs/2020068 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZHVmjMkNZI30y1K9AQjkoQ//WLO4kLh79v8HkKeFLqwTMzQbE9xk4dux Wx8k897BHkWJID8BglCbEdnldhD8CwWmA2aWO9kQBMSdubd45URNKoG5MarhDy4y McPWmNlIeN6vI5fEKZU0bJ/+oJ4T578R49mJpWsXnxlydw++rnqduT9s4OBe8tZ5 9w8O4V5HgiP4f8DDMta0kg0cAJst86oWkwNtU3r7sqga+rl7hSw4CEpV77vuigik fE8yGAaZY6s6xtko4vdLfhjpK4wRtLXaURPRKMBbHXTUE6VfF+iBeojJqxDMoBLZ 90hN4srDDtMW36PkBiPBrbm9bbX1H02U8zSoPny6cZPs3z+xaQZI3QQqPei0IXG+ ETduLGkDdY9YI2wr5KYHhAV86hLpctMeozLn1VphfxNt9cXbeMB8U41IQiEmg8ea xAz82pmZoq4Ljn26vGtPMauNuvtFcuMHTXnjGwrxw4v6jNTPbi0qTBmOU6uP8LYk u9CDP5qVEvJ6jH9bMr8ty2pkzVqczNLaCtHYjUWcBNVVuvX8Rr++P04PDY/EQ2XB ipHo4FrpdQ6fgKkG5cNLreNC1XXYso44+18J2qI54q54IF6HU61+yYAkm8LHn6tx 0XbDCDE/CTXvEYvQqMwXVl/ExGl6gO+dyT9jMNdKwwSm5VrockvHXuI83QKRH+Bp +AwjMOJA44A= =Gem2 -----END PGP SIGNATURE-----