<?xml version='1.0' encoding='UTF-8'?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0"><channel><title>Ubuntu security notices</title><link>https://ubuntu.com/security/notices/rss.xml</link><description>Recent content on Ubuntu security notices</description><atom:link href="https://ubuntu.com/security/notices/rss.xml" rel="self"/><copyright>2024 Canonical Ltd. Ubuntu and Canonical are registered trademarks of Canonical Ltd.</copyright><docs>http://www.rssboard.org/rss-specification</docs><generator>Feedgen</generator><lastBuildDate>Mon, 30 Sep 2024 02:15:12 +0000</lastBuildDate><item><title>USN-7045-1: libppd vulnerability</title><link>https://ubuntu.com/security/notices/USN-7045-1</link><description>Simone Margaritelli discovered that libppd incorrectly sanitized IPP data
when creating PPD files. A remote attacker could possibly use this issue to
manipulate PPD files and execute arbitrary code when a printer is used.
</description><guid isPermaLink="false">https://ubuntu.com/security/notices/USN-7045-1</guid><pubDate>Thu, 26 Sep 2024 20:40:34 +0000</pubDate></item><item><title>USN-7044-1: libcupsfilters vulnerability</title><link>https://ubuntu.com/security/notices/USN-7044-1</link><description>Simone Margaritelli discovered that libcupsfilters incorrectly sanitized
IPP data when creating PPD files. A remote attacker could possibly use this
issue to manipulate PPD files and execute arbitrary code when a printer is
used.
</description><guid isPermaLink="false">https://ubuntu.com/security/notices/USN-7044-1</guid><pubDate>Thu, 26 Sep 2024 20:35:22 +0000</pubDate></item><item><title>USN-7043-1: cups-filters vulnerabilities</title><link>https://ubuntu.com/security/notices/USN-7043-1</link><description>Simone Margaritelli discovered that the cups-filters cups-browsed component
could be used to create arbitrary printers from outside the local network.
In combination with issues in other printing components, a remote attacker
could possibly use this issue to connect to a system, created manipulated
PPD files, and execute arbitrary code when a printer is used. This update
disables support for the legacy CUPS printer discovery protocol.
(CVE-2024-47176)

Simone Margaritelli discovered that cups-filters incorrectly sanitized IPP
data when creating PPD files. A remote attacker could possibly use this
issue to manipulate PPD files and execute arbitrary code when a printer is
used. (CVE-2024-47076)
</description><guid isPermaLink="false">https://ubuntu.com/security/notices/USN-7043-1</guid><pubDate>Thu, 26 Sep 2024 20:30:49 +0000</pubDate></item><item><title>USN-7042-1: cups-browsed vulnerability</title><link>https://ubuntu.com/security/notices/USN-7042-1</link><description>Simone Margaritelli discovered that cups-browsed could be used to create
arbitrary printers from outside the local network. In combination with
issues in other printing components, a remote attacker could possibly use
this issue to connect to a system, created manipulated PPD files, and
execute arbitrary code when a printer is used. This update disables support
for the legacy CUPS printer discovery protocol.
</description><guid isPermaLink="false">https://ubuntu.com/security/notices/USN-7042-1</guid><pubDate>Thu, 26 Sep 2024 20:24:02 +0000</pubDate></item><item><title>USN-7041-1: CUPS vulnerability</title><link>https://ubuntu.com/security/notices/USN-7041-1</link><description>Simone Margaritelli discovered that CUPS incorrectly sanitized IPP
data when creating PPD files. A remote attacker could possibly use this
issue to manipulate PPD files and execute arbitrary code when a printer is
used.
</description><guid isPermaLink="false">https://ubuntu.com/security/notices/USN-7041-1</guid><pubDate>Thu, 26 Sep 2024 20:12:01 +0000</pubDate></item><item><title>USN-7040-1: ConfigObj vulnerability</title><link>https://ubuntu.com/security/notices/USN-7040-1</link><description>It was discovered that ConfigObj contains regex that is susceptible to
catastrophic backtracking. An attacker could possibly use this issue to
cause a regular expression denial of service.
</description><guid isPermaLink="false">https://ubuntu.com/security/notices/USN-7040-1</guid><pubDate>Thu, 26 Sep 2024 16:19:18 +0000</pubDate></item><item><title>USN-7039-1: Linux kernel vulnerabilities</title><link>https://ubuntu.com/security/notices/USN-7039-1</link><description>Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
  - GPU drivers;
  - Input Device (Tablet) drivers;
  - Modular ISDN driver;
  - Multiple devices driver;
  - Network drivers;
  - Near Field Communication (NFC) drivers;
  - SCSI drivers;
  - GCT GDM724x LTE driver;
  - USB subsystem;
  - VFIO drivers;
  - GFS2 file system;
  - JFS file system;
  - NILFS2 file system;
  - Networking core;
  - IPv4 networking;
  - L2TP protocol;
  - Netfilter;
  - RxRPC session sockets;
(CVE-2024-26651, CVE-2024-38583, CVE-2023-52527, CVE-2024-26880,
CVE-2022-48850, CVE-2024-26733, CVE-2021-47188, CVE-2024-42154,
CVE-2023-52809, CVE-2024-42228, CVE-2022-48863, CVE-2022-48836,
CVE-2022-48838, CVE-2024-26677, CVE-2024-27437, CVE-2022-48857,
CVE-2022-48791, CVE-2021-47181, CVE-2024-26851, CVE-2024-40902,
CVE-2022-48851, CVE-2024-38570)
</description><guid isPermaLink="false">https://ubuntu.com/security/notices/USN-7039-1</guid><pubDate>Thu, 26 Sep 2024 11:58:55 +0000</pubDate></item><item><title>USN-7021-3: Linux kernel vulnerabilities</title><link>https://ubuntu.com/security/notices/USN-7021-3</link><description>Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
  - GPU drivers;
  - BTRFS file system;
  - F2FS file system;
  - GFS2 file system;
  - BPF subsystem;
  - Netfilter;
  - RxRPC session sockets;
  - Integrity Measurement Architecture(IMA) framework;
(CVE-2024-39494, CVE-2024-38570, CVE-2024-27012, CVE-2024-39496,
CVE-2024-42160, CVE-2024-41009, CVE-2024-42228, CVE-2024-26677)
</description><guid isPermaLink="false">https://ubuntu.com/security/notices/USN-7021-3</guid><pubDate>Thu, 26 Sep 2024 11:24:20 +0000</pubDate></item><item><title>USN-7020-3: Linux kernel vulnerabilities</title><link>https://ubuntu.com/security/notices/USN-7020-3</link><description>Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
  - GPU drivers;
  - Network drivers;
  - SCSI drivers;
  - F2FS file system;
  - BPF subsystem;
  - IPv4 networking;
(CVE-2024-42160, CVE-2024-42159, CVE-2024-42224, CVE-2024-41009,
CVE-2024-42154, CVE-2024-42228)
</description><guid isPermaLink="false">https://ubuntu.com/security/notices/USN-7020-3</guid><pubDate>Thu, 26 Sep 2024 10:57:17 +0000</pubDate></item><item><title>USN-7034-2: ca-certificates update</title><link>https://ubuntu.com/security/notices/USN-7034-2</link><description>USN-7034-1 updated ca-certificates. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

 The ca-certificates package contained outdated CA certificates.
 This update refreshes the included certificates to those contained
 in the 2.64 version of the Mozilla certificate authority bundle.
</description><guid isPermaLink="false">https://ubuntu.com/security/notices/USN-7034-2</guid><pubDate>Thu, 26 Sep 2024 10:09:27 +0000</pubDate></item></channel></rss>