Wednesday, January 31, 2024

[USN-6619-1] runC vulnerability

==========================================================================
Ubuntu Security Notice USN-6619-1
January 31, 2024

runc vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

runC could be made to expose sensitive information or allow to escape
contianers.

Software Description:
- runc: Open Container Project

Details:

Rory McNamara discovered that runC did not properly manage internal file
descriptor while managing containers. An attacker could possibly use this
issue to obtain sensitive information or bypass container restrictions.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
runc 1.1.7-0ubuntu2.2

Ubuntu 22.04 LTS:
runc 1.1.7-0ubuntu1~22.04.2

Ubuntu 20.04 LTS:
runc 1.1.7-0ubuntu1~20.04.2

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
runc 1.1.4-0ubuntu1~18.04.2+esm1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6619-1
CVE-2024-21626

Package Information:
https://launchpad.net/ubuntu/+source/runc/1.1.7-0ubuntu2.2
https://launchpad.net/ubuntu/+source/runc/1.1.7-0ubuntu1~22.04.2
https://launchpad.net/ubuntu/+source/runc/1.1.7-0ubuntu1~20.04.2

[USN-6591-2] Postfix update

-----BEGIN PGP SIGNATURE-----
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=oX88
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6591-2
January 31, 2024

postfix update
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Postfix could allow bypass of email authentication if it received
specially crafted network traffic.

Software Description:
- postfix: High-performance mail transport agent

Details:

USN-6591-1 fixed vulnerabilities in Postfix. A fix with less risk of
regression has been made available since the last update. This update
updates the fix and aligns with the latest configuration guidelines
regarding this vulnerability.

We apologize for the inconvenience.

Original advisory details:

Timo Longin discovered that Postfix incorrectly handled certain email line
endings. A remote attacker could possibly use this issue to bypass an email
authentication mechanism, allowing domain spoofing and potential spamming.

Please note that certain configuration changes are required to address
this issue. They are not enabled by default for backward compatibility.
Information can be found athttps://www.postfix.org/smtp-smuggling.html.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
postfix 3.8.1-2ubuntu0.2

Ubuntu 22.04 LTS:
postfix 3.6.4-1ubuntu1.3

Ubuntu 20.04 LTS:
postfix 3.4.13-0ubuntu1.4

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
postfix 3.3.0-1ubuntu0.4+esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
postfix 3.1.0-3ubuntu0.4+esm3

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
postfix 2.11.0-1ubuntu1.2+esm3

After a standard system update, you need to set
"smtpd_forbid_bare_newline = normalize" in your configuration and reload
it to make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6591-2
https://ubuntu.com/security/notices/USN-6591-1
CVE-2023-51764,https://bugs.launchpad.net/ubuntu/+source/postfix/+bug/2049337,https://bugs.launchpad.net/ubuntu/+source/postfix/+bug/2050834

Package Information:
https://launchpad.net/ubuntu/+source/postfix/3.8.1-2ubuntu0.2
https://launchpad.net/ubuntu/+source/postfix/3.6.4-1ubuntu1.3
https://launchpad.net/ubuntu/+source/postfix/3.4.13-0ubuntu1.4

Tuesday, January 30, 2024

[USN-6609-2] Linux kernel (NVIDIA) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmW5aHgFAwAAAAAACgkQZ0GeRcM5nt2y
kAf/bCGMnBMnjiWEiw7ukt77sp0VEiMXDawoo2ZCQRM11C9vw7LU/gt0M32VMTxhgkbw+EDdDO3P
4ZT9HS0o2ysJCsTDi6RFHXHC4uRDnncwO5E7dCd96En27z4QRz6mxpzH9pbC3Okmfn6VDSfU3tUJ
bzN2iaIK9PRNG5e9EyrD29p7A7Oj9Cc8hcVM2MT3d13bjxnaxzEtC5r5k1mkwAVzWaNZ93L1tlGs
6JkXliCA3pmzWRYYtSP+WTFOZSINKJbdk8ycPb/9CDAiaWFNm01K9NfF49DId3+7MQzbHQUXdcDG
E94lG7P0zghgs41ht0orn2yVyC8EAxWbmA7Mxw/Qhw==
=pcdW
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6609-2
January 30, 2024

linux-nvidia vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-nvidia: Linux kernel for NVIDIA systems

Details:

Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6040)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
linux-image-5.15.0-1043-nvidia 5.15.0-1043.43
linux-image-5.15.0-1043-nvidia-lowlatency 5.15.0-1043.43
linux-image-nvidia 5.15.0.1043.43
linux-image-nvidia-lowlatency 5.15.0.1043.43

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-6609-2
https://ubuntu.com/security/notices/USN-6609-1
CVE-2023-6040, CVE-2023-6606, CVE-2023-6817, CVE-2023-6931,
CVE-2023-6932, CVE-2024-0193

Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1043.43

[USN-6617-1] libde265 vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=3mC5
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6617-1
January 30, 2024

libde265 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in libde265.

Software Description:
- libde265: Open H.265 video codec implementation

Details:

It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue only affected Ubuntu 16.04
LTS and Ubuntu 18.04 LTS. (CVE-2020-21594)

It was discovered that libde265 could be made to write out of bounds. If a
user or automated system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2020-21595, CVE-2020-21596,
CVE-2020-21599, CVE-2020-21600, CVE-2020-21601, CVE-2020-21602,
CVE-2020-21603, CVE-2020-21604, CVE-2020-21605)

It was discovered that libde265 did not properly manage memory. If a user
or automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. This issue only affected Ubuntu 20.04 LTS.
(CVE-2020-21597, CVE-2020-21598, CVE-2020-21606, CVE-2021-36408)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  libde265-0                      1.0.4-1ubuntu0.1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  libde265-0                      1.0.2-2ubuntu0.18.04.1~esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  libde265-0                      1.0.2-2ubuntu0.16.04.1~esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6617-1
  CVE-2020-21594, CVE-2020-21595, CVE-2020-21596, CVE-2020-21597,
  CVE-2020-21598, CVE-2020-21599, CVE-2020-21600, CVE-2020-21601,
  CVE-2020-21602, CVE-2020-21603, CVE-2020-21604, CVE-2020-21605,
  CVE-2020-21606, CVE-2021-36408

Package Information:
  https://launchpad.net/ubuntu/+source/libde265/1.0.4-1ubuntu0.1

[USN-6618-1] Pillow vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=n3T0
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6618-1
January 30, 2024

pillow vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Pillow.

Software Description:
- pillow: Python Imaging Library

Details:

It was discovered that Pillow incorrectly handled certain long text
arguments. An attacker could possibly use this issue to cause Pillow to
consume resources, leading to a denial of service. This issue only affected
Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2023-44271)

Duarte Santos discovered that Pillow incorrectly handled the environment
parameter to PIL.ImageMath.eval. An attacker could possibly use this issue
to execute arbitrary code. (CVE-2023-50447)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
python3-pil 10.0.0-1ubuntu0.1

Ubuntu 22.04 LTS:
python3-pil 9.0.1-1ubuntu0.2

Ubuntu 20.04 LTS:
python3-pil 7.0.0-4ubuntu0.8

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6618-1
CVE-2023-44271, CVE-2023-50447

Package Information:
https://launchpad.net/ubuntu/+source/pillow/10.0.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/pillow/9.0.1-1ubuntu0.2
https://launchpad.net/ubuntu/+source/pillow/7.0.0-4ubuntu0.8

[USN-6616-1] OpenLDAP vulnerability

-----BEGIN PGP SIGNATURE-----
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=asNt
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6616-1
January 30, 2024

openldap vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

OpenLDAP could be made to crash if it received specially crafted input.

Software Description:
- openldap: Lightweight Directory Access Protocol

Details:

It was discovered that OpenLDAP was not properly performing bounds checks
when executing functions related to LDAP URLs. An attacker could possibly
use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
slapd 2.5.16+dfsg-0ubuntu0.22.04.2

Ubuntu 20.04 LTS:
slapd 2.4.49+dfsg-2ubuntu1.10

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6616-1
CVE-2023-2953

Package Information:
https://launchpad.net/ubuntu/+source/openldap/2.5.16+dfsg-0ubuntu0.22.04.2
https://launchpad.net/ubuntu/+source/openldap/2.4.49+dfsg-2ubuntu1.10

[USN-6587-3] X.Org X Server regression

-----BEGIN PGP SIGNATURE-----
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=XqmV
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6587-3
January 30, 2024

xorg-server, xwayland regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

A regression was fixed in X.Org X Server

Software Description:
- xorg-server: X.Org X11 server
- xwayland: X server for running X clients under Wayland

Details:

USN-6587-1 fixed vulnerabilities in X.Org X Server. The fix was incomplete
resulting in a possible regression. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the DeviceFocusEvent and ProcXIQueryPointer APIs. An
attacker could possibly use this issue to cause the X Server to crash,
obtain sensitive information, or execute arbitrary code. (CVE-2023-6816)
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
reattaching to a different master device. An attacker could use this issue
to cause the X Server to crash, leading to a denial of service, or possibly
execute arbitrary code. (CVE-2024-0229)
Olivier Fourdan and Donn Seeley discovered that the X.Org X Server
incorrectly labeled GLX PBuffers when used with SELinux. An attacker could
use this issue to cause the X Server to crash, leading to a denial of
service. (CVE-2024-0408)
Olivier Fourdan discovered that the X.Org X Server incorrectly handled
the curser code when used with SELinux. An attacker could use this issue to
cause the X Server to crash, leading to a denial of service.
(CVE-2024-0409)
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
memory when processing the XISendDeviceHierarchyEvent API. An attacker
could possibly use this issue to cause the X Server to crash, or execute
arbitrary code. (CVE-2024-21885)
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
devices being disabled. An attacker could possibly use this issue to cause
the X Server to crash, or execute arbitrary code. (CVE-2024-21886)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
xserver-xorg-core 2:21.1.7-3ubuntu2.7

Ubuntu 22.04 LTS:
xserver-xorg-core 2:21.1.4-2ubuntu1.7~22.04.8
xwayland 2:22.1.1-1ubuntu0.11

Ubuntu 20.04 LTS:
xserver-xorg-core 2:1.20.13-1ubuntu1~20.04.15
xwayland 2:1.20.13-1ubuntu1~20.04.15

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6587-3
https://ubuntu.com/security/notices/USN-6587-1
https://launchpad.net/bugs/2051536

Package Information:
https://launchpad.net/ubuntu/+source/xorg-server/2:21.1.7-3ubuntu2.7
https://launchpad.net/ubuntu/+source/xorg-server/2:21.1.4-2ubuntu1.7~22.04.8
https://launchpad.net/ubuntu/+source/xwayland/2:22.1.1-1ubuntu0.11
https://launchpad.net/ubuntu/+source/xorg-server/2:1.20.13-1ubuntu1~20.04.15

[USN-6615-1] MySQL vulnerabilities

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmW5CuwACgkQZWnYVadE
vpPsQw//Vg8RCW+5bRStchHkQ5bZzx8LHOBEChYiRFIZ+d1ruZWGZpZaSC0U2ZlT
sPkz/oPc1q2vm15f2WPC8HMH0TWUa7i9N0ICEBkpI0z1V0hwjDdeZQXjJKvpI5KW
JRA8Hpk5CLirPi4CWm7sJjzT9RVKvw972pNjbqpva3//P8Ph+g/5OIlaK8KulVlE
LPAE1o55yOs0XlqSTnha1DOlffr/p7Ale/h9tTkUXderpX4I1gNbBwhEmBTPh+xN
vZCRMNFzJ/NQre/11j1Vm5E+Ov/5Hlgjx19uSqzu3O4T4m1JJYJdNjeBQBbt3C8N
Ss2PfL81FqNKt59CPwIgycTC8wiGP6qjc/0gWEyAy7GltPp50W6SdFlEnnZvSlbW
wX6NDY1TYibYtFEIlXNZac/0a/KF2MPkDel/k8ZN50MaAmfCH03ltyXhMmNQCqfs
uYv/FXSVeuUF+W4c881Z/GM9eHHoej3IclQvzpz4aR4kl0fNu6z2lu7iUe5ouHk7
DPExyxegNY9zgLslxSsIi5sTjOsWpTBDm9boAhQpasor0l+aYeqQhBpUbEuFtUzi
/uaTdkd1+3DWAlKDsKsTg1pthNSSkIqgiZX+xHG7n3c4mltzDesx/rJyCEWe4wyU
MnhNnMOePx1IvUNEN0Xri7KzEo5A6Bbrap6buZhf4poCxsIpAOA=
=J7yq
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6615-1
January 30, 2024

mysql-8.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in MySQL.

Software Description:
- mysql-8.0: MySQL database

Details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.36 in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
and Ubuntu 23.10.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-36.html
https://www.oracle.com/security-alerts/cpujan2024.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
mysql-server-8.0 8.0.36-0ubuntu0.23.10.1

Ubuntu 22.04 LTS:
mysql-server-8.0 8.0.36-0ubuntu0.22.04.1

Ubuntu 20.04 LTS:
mysql-server-8.0 8.0.36-0ubuntu0.20.04.1

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References:
https://ubuntu.com/security/notices/USN-6615-1
CVE-2024-20960, CVE-2024-20961, CVE-2024-20962, CVE-2024-20963,
CVE-2024-20964, CVE-2024-20965, CVE-2024-20966, CVE-2024-20967,
CVE-2024-20969, CVE-2024-20970, CVE-2024-20971, CVE-2024-20972,
CVE-2024-20973, CVE-2024-20974, CVE-2024-20976, CVE-2024-20977,
CVE-2024-20978, CVE-2024-20981, CVE-2024-20982, CVE-2024-20983,
CVE-2024-20984, CVE-2024-20985

Package Information:
https://launchpad.net/ubuntu/+source/mysql-8.0/8.0.36-0ubuntu0.23.10.1
https://launchpad.net/ubuntu/+source/mysql-8.0/8.0.36-0ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/mysql-8.0/8.0.36-0ubuntu0.20.04.1

[USN-6614-1] amanda vulnerability

-----BEGIN PGP SIGNATURE-----
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=uvvn
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6614-1
January 30, 2024

amanda vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

amanda could be used to escalate privilege if it was provided with specially crafted arguments.

Software Description:
- amanda: Advanced Maryland Automatic Network Disk Archiver (Client)

Details:

It was discovered that amanda did not properly check certain arguments. A
local unprivileged attacker could possibly use this issue to perform a
privilege escalation attack.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
  amanda-client                   1:3.5.1-11ubuntu0.23.10.1

Ubuntu 22.04 LTS:
  amanda-client                   1:3.5.1-8ubuntu1.4

Ubuntu 20.04 LTS:
  amanda-client                   1:3.5.1-2ubuntu0.4

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  amanda-client                   1:3.5.1-1ubuntu0.3+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6614-1
  CVE-2023-30577

Package Information:
https://launchpad.net/ubuntu/+source/amanda/1:3.5.1-11ubuntu0.23.10.1
  https://launchpad.net/ubuntu/+source/amanda/1:3.5.1-8ubuntu1.4
  https://launchpad.net/ubuntu/+source/amanda/1:3.5.1-2ubuntu0.4

[USN-6612-1] TinyXML vulnerability

==========================================================================
Ubuntu Security Notice USN-6612-1
January 29, 2024

tinyxml vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

TinyXML could be made to crash if it opened a specially crafted file.

Software Description:
- tinyxml: A simple, small, minimal, C++ XML parser

Details:

It was discovered that TinyXML incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
XML file, a remote attacker could possibly use this issue to cause a
denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
libtinyxml2.6.2v5 2.6.2-6ubuntu0.23.10.1

Ubuntu 22.04 LTS:
libtinyxml2.6.2v5 2.6.2-6ubuntu0.22.04.1

Ubuntu 20.04 LTS:
libtinyxml2.6.2v5 2.6.2-4+deb10u2build0.20.04.1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libtinyxml2.6.2v5 2.6.2-4ubuntu0.18.04.1~esm2

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
libtinyxml2.6.2v5 2.6.2-3ubuntu0.1~esm2

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6612-1
CVE-2023-34194

Package Information:
https://launchpad.net/ubuntu/+source/tinyxml/2.6.2-6ubuntu0.23.10.1
https://launchpad.net/ubuntu/+source/tinyxml/2.6.2-6ubuntu0.22.04.1
https://launchpad.net/ubuntu/+source/tinyxml/2.6.2-4+deb10u2build0.20.04.1

Monday, January 29, 2024

[USN-6605-2] Linux kernel (KVM) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmW4LNkFAwAAAAAACgkQZ0GeRcM5nt0I
KQgAoSUnDknLvKyi9JLa6G6GeT5Hn1X2vh5JpkM/1i9O1mdRSMxJKQoTwODsLiesJ61Xds2/m3gN
EdHJ0EL/KOHA0x4WoofU/8BL8mUrQ3+w4HgbM4ugGqvjC7elFPXf6ZgHdRW4eBaqV9/l6k1qbJRV
JO7qhvSS8REbNe6q5zzUwhAWPXINT0fWp7D58soTqK3pkl3ZVXiRjcQT0KJ0Xj9c9Mnftmpqi3Wp
4ZLYjcXh42yV8k1mbin3wCLcvOVHb4K76z6cK4mbCOfpY+WO7Sa3imhAF4XfwGdfl6YQzvJ3bzw1
mJGlbKvDrUjow7IBcT9ZL01cehf8dG1+xvaVAeJERw==
=vA6c
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6605-2
January 29, 2024

linux-kvm vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-kvm: Linux kernel for cloud environments

Details:

Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6040)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
linux-image-5.4.0-1105-kvm 5.4.0-1105.112
linux-image-kvm 5.4.0.1105.101

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-6605-2
https://ubuntu.com/security/notices/USN-6605-1
CVE-2023-6040, CVE-2023-6606, CVE-2023-6931, CVE-2023-6932

Package Information:
https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1105.112

[USN-6604-2] Linux kernel (Azure) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmW4LM8FAwAAAAAACgkQZ0GeRcM5nt02
eAf9HCuNG5GffK6kXbJ/vLHA1q+6xCs4WJJAhxFKImH5k0+ue8tyaWq9Mi71wGg0AZeClsMGIMVd
7YARv4aMSTntqqxho4RqefelUQN5QhhHSreTiqU3N7f6AiuyVPzAUhDwl5W2yOD0lp4bOwSSaLxE
htKemMHuIlpap9bAYNeLDgHqD2RgY920Pyp4DdvvttIMUkxSy/Ldpvov4xLlVWqI+oLRXHPlzjuO
c6cTTD957SwRNw1MViFoMCqaK+5tgNHAKBmPeGz/3RK6vPx6vBJsK6zbegkEJnAGMy2+eG9VReqc
Ax1c92R7bA/1/fCi2bQiYDnozF/Iq9bGjsfZK1WH/Q==
=A6y2
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6604-2
January 29, 2024

linux-azure, linux-azure-4.15 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
- linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

It was discovered that the ASUS HID driver in the Linux kernel did not
properly handle device removal, leading to a use-after-free vulnerability.
A local attacker with physical access could plug in a specially crafted USB
device to cause a denial of service (system crash). (CVE-2023-1079)

Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii
Oleksenko discovered that some AMD processors could leak stale data from
division operations in certain situations. A local attacker could possibly
use this to expose sensitive information. (CVE-2023-20588)

It was discovered that a race condition existed in the Linux kernel when
performing operations with kernel objects, leading to an out-of-bounds
write. A local attacker could use this to cause a denial of service (system
crash) or execute arbitrary code. (CVE-2023-45863)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
linux-image-4.15.0-1173-azure 4.15.0-1173.188
linux-image-azure-lts-18.04 4.15.0.1173.141

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
linux-image-4.15.0-1173-azure 4.15.0-1173.188~16.04.1
linux-image-azure 4.15.0.1173.157

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
linux-image-4.15.0-1173-azure 4.15.0-1173.188~14.04.1
linux-image-azure 4.15.0.1173.139

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-6604-2
https://ubuntu.com/security/notices/USN-6604-1
CVE-2023-1079, CVE-2023-20588, CVE-2023-45863, CVE-2023-6606,
CVE-2023-6931, CVE-2023-6932

[USN-6613-1] Ceph vulnerability

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEE5rkwSLC9ntq84w397Dtram9gyMMFAmW38V8FAwAAAAAACgkQ7Dtram9gyMNU
gQf/fh8fz6oUrto8sDbuN4QNZOhvCtRrPBOVyRgp1RQiio21MmFB0TLnGYQCrtu00pJuJOKUCyoI
UoiN4rNeUDLvDmdfzNM0SfD0LYcpCiG1+/VkZD8e+kYmxvoQAH+2fEhbIxPDfFfDsjwVm6MzFPZC
naqjBebeHfRmoLulNfpxLe3s04QIITl2/p+vNSebfk4fyYf/b0/x9CLYiHeR8n7xU6AatIj9vmTE
7OkgnNoMd9aN3uXFX1TKSivmQa/w+RYIOPBHQLWUQkHTs7FXmpbS6a6jsmO0dPZuL3ee9/VbNfBk
tu4DMn3bZT5YKIuzsH0YFMMEqaK9X+b61SHvW4oEGg==
=TTAS
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6613-1
January 29, 2024

ceph vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Ceph could be made to bypass authorization checks if it received a
specially crafted request.

Software Description:
- ceph: distributed storage and file system

Details:

Lucas Henry discovered that Ceph incorrectly handled specially
crafted POST requests. An uprivileged user could use this to
bypass Ceph's authorization checks and upload a file to any bucket.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
ceph 18.2.0-0ubuntu3.1
ceph-base 18.2.0-0ubuntu3.1
ceph-common 18.2.0-0ubuntu3.1

Ubuntu 22.04 LTS:
ceph 17.2.6-0ubuntu0.22.04.3
ceph-base 17.2.6-0ubuntu0.22.04.3
ceph-common 17.2.6-0ubuntu0.22.04.3

Ubuntu 20.04 LTS:
ceph 15.2.17-0ubuntu0.20.04.6
ceph-base 15.2.17-0ubuntu0.20.04.6
ceph-common 15.2.17-0ubuntu0.20.04.6

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
ceph 12.2.13-0ubuntu0.18.04.11+esm1
ceph-base 12.2.13-0ubuntu0.18.04.11+esm1
ceph-common 12.2.13-0ubuntu0.18.04.11+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
ceph 10.2.11-0ubuntu0.16.04.3+esm1
ceph-common 10.2.11-0ubuntu0.16.04.3+esm1

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
ceph 0.80.11-0ubuntu1.14.04.4+esm2
ceph-common 0.80.11-0ubuntu1.14.04.4+esm2

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6613-1
CVE-2023-43040

Package Information:
https://launchpad.net/ubuntu/+source/ceph/18.2.0-0ubuntu3.1
https://launchpad.net/ubuntu/+source/ceph/17.2.6-0ubuntu0.22.04.3
https://launchpad.net/ubuntu/+source/ceph/15.2.17-0ubuntu0.20.04.6

Fedora Linux 40 Mass Rebuild Finished

Hi all,

Per the Fedora Linux f40 schedule and the challenges [1], we started a
mass rebuild for Fedora Linux f40 on 2024-01-22. We did a mass
rebuild for Fedora Linux f40 for changes like:

- https://fedoraproject.org/wiki/Changes/GNUToolchainF40
- https://fedoraproject.org/wiki/Changes/Java21
check the tracker for more details:
https://pagure.io/releng/issues?status=Open&tags=mass+rebuild&tags=f40&tags=changes

The mass rebuild was done in a side tag (f40-rebuild) and moved over to
f40. Failures can be seen
at https://kojipkgs.fedoraproject.org/mass-rebuild/f40-failures.html
Things still needing rebuilding
https://kojipkgs.fedoraproject.org/mass-rebuild/f40-need-rebuild.html

21971 builds have been tagged into f40, there are currently 991 failed builds
that need to be addressed by the package maintainers. FTBFS bugs will be
filed shortly. Please be sure to let releng know if you see any bugs in
the reporting. You can contact releng by dropping an email to our list [2], or
joining #releng:fedoraproject.org on Matrix, or filing an issue in pagure [3].

Regards,
Samyak Jain
Fedora Release Engineering

[1] https://fedorapeople.org/groups/schedule/f-40/f-40-key-tasks.html
[2] https://lists.fedoraproject.org/admin/lists/rel-eng.lists.fedoraproject.org/
[3] https://pagure.io/releng/
--
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

[USN-6610-1] Firefox vulnerabilities

==========================================================================
Ubuntu Security Notice USN-6610-1
January 29, 2024

firefox vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Firefox.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2024-0741,
CVE-2024-0742, CVE-2024-0743, CVE-2024-0744, CVE-2024-0745, CVE-2024-0747,
CVE-2024-0748, CVE-2024-0749, CVE-2024-0750, CVE-2024-0751, CVE-2024-0753,
CVE-2024-0754, CVE-2024-0755)

Cornel Ionce discovered that Firefox did not properly manage memory when
opening the print preview dialog. An attacker could potentially exploit
this issue to cause a denial of service. (CVE-2024-0746)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
firefox 122.0+build2-0ubuntu0.20.04.1

After a standard system update you need to restart Firefox to make all the
necessary changes.

References:
https://ubuntu.com/security/notices/USN-6610-1
CVE-2024-0741, CVE-2024-0742, CVE-2024-0743, CVE-2024-0744,
CVE-2024-0745, CVE-2024-0746, CVE-2024-0747, CVE-2024-0748,
CVE-2024-0749, CVE-2024-0750, CVE-2024-0751, CVE-2024-0753,
CVE-2024-0754, CVE-2024-0755

Package Information:
https://launchpad.net/ubuntu/+source/firefox/122.0+build2-0ubuntu0.20.04.1

[USN-6611-1] Exim vulnerability

==========================================================================
Ubuntu Security Notice USN-6611-1
January 29, 2024

exim4 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Exim could be made to bypass an SPF protection mechanism if it received
a specially crafted request.

Software Description:
- exim4: Exim is a mail transport agent

Details:

It was discovered that Exim incorrectly handled certain requests.
A remote attacker could possibly use a published exploitation technique
to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass
of an SPF protection mechanism.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
exim4 4.96-17ubuntu2.2
exim4-base 4.96-17ubuntu2.2
eximon4 4.96-17ubuntu2.2

Ubuntu 22.04 LTS:
exim4 4.95-4ubuntu2.5
exim4-base 4.95-4ubuntu2.5
eximon4 4.95-4ubuntu2.5

Ubuntu 20.04 LTS:
exim4 4.93-13ubuntu1.10
exim4-base 4.93-13ubuntu1.10
eximon4 4.93-13ubuntu1.10

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
exim4 4.90.1-1ubuntu1.10+esm3
exim4-base 4.90.1-1ubuntu1.10+esm3
eximon4 4.90.1-1ubuntu1.10+esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
exim4 4.86.2-2ubuntu2.6+esm6
exim4-base 4.86.2-2ubuntu2.6+esm6
eximon4 4.86.2-2ubuntu2.6+esm6

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6611-1
CVE-2023-51766

Package Information:
https://launchpad.net/ubuntu/+source/exim4/4.96-17ubuntu2.2
https://launchpad.net/ubuntu/+source/exim4/4.95-4ubuntu2.5
https://launchpad.net/ubuntu/+source/exim4/4.93-13ubuntu1.10

Sunday, January 28, 2024

Spin / Lab Keepalive for F40 Request

Good evening folks,

FESco previously approved a requirement[1] that Spin/Labs owners send a keepalive request in order to keep building the spin or lab. I have opened Pagure issues[2] for all Spins and Labs for this release[3]. If you are the owner of one of those spins and labs, please reply in the appropriate ticket by Friday February 2nd 2024 to indicate the spin should continue to be produced. If there is a spin or lab that does not have an open ticket, please create one[4]. The reasoning for this is to not ship spins that are not actively maintained. Future improvements to the release process that will allow for teams to self-publish solutions will eventually remove the need for these keepalives.

Apologies for the lateness of this request and I appreciate your help confirming.


Kindest regards,

Aoife

[1] https://pagure.io/fesco/issue/1972 [2] https://pagure.io/fedora-pgm/schedule/issues?status=Open&tags=spins+keepalive [3] https://docs.fedoraproject.org/en-US/releases/f40/spins/ [4] https://pagure.io/fedora-pgm/schedule/new_issue

--

Aoife Moloney

Fedora Operations Architect

Fedora Project

Matrix: @amoloney:fedora.im

IRC: amoloney


Orphaned packages looking for new maintainers

Report started at 2024-01-28 16:04:44 UTC

The following packages are orphaned and will be retired when they
are orphaned for six weeks, unless someone adopts them. If you know for sure
that the package should be retired, please do so now with a proper reason:
https://fedoraproject.org/wiki/How_to_remove_a_package_at_end_of_life

Note: If you received this mail directly you (co)maintain one of the affected
packages or a package that depends on one. Please adopt the affected package or
retire your depending package to avoid broken dependencies, otherwise your
package will be retired when the affected package gets retired.

Request package ownership via the *Take* button in he left column on
https://src.fedoraproject.org/rpms/<pkgname>

Full report available at:
https://a.gtmx.me/orphans/orphans.txt
grep it for your FAS username and follow the dependency chain.

For human readable dependency chains,
see https://packager-dashboard.fedoraproject.org/
For all orphaned packages,
see https://packager-dashboard.fedoraproject.org/orphan

Package (co)maintainers Status Change
================================================================================
3proxy orphan 3 weeks ago
applet-window-buttons @kde-sig, orphan 0 weeks ago
bismuth @kde-sig, orphan 0 weeks ago
cdsclient @astro-sig, orphan 4 weeks ago
csmith orphan 4 weeks ago
drumstick0 orphan, yanqiyu 1 weeks ago
elpa @scitech_sig, orphan 3 weeks ago
kpipewire5 @kde-sig, orphan 2 weeks ago
lightly orphan 0 weeks ago
php-PHP-CSS-Parser orphan 3 weeks ago
plasma-bigscreen @kde-sig, orphan 0 weeks ago
python-GridDataFormats @scitech_sig, orphan 3 weeks ago
python-compressed-rtf orphan 4 weeks ago
python-extractcode @python-packagers-sig, orphan 0 weeks ago
python-flit @epel-packagers-sig, @python- 0 weeks ago
packagers-sig, orphan, salimma
python-jupyter-collaboration orphan 2 weeks ago
python-jupyter-server-fileid orphan 2 weeks ago
python-jupyter-ydoc orphan 2 weeks ago
python-kaitaistruct orphan 3 weeks ago
python-maya @neuro-sig, orphan 5 weeks ago
python-mmtf @scitech_sig, orphan 3 weeks ago
python-mrcfile orphan 3 weeks ago
python-red-black-tree-mod orphan 4 weeks ago
python-represent orphan 0 weeks ago
python-y-py @python-packagers-sig, orphan 2 weeks ago
python-ypy-websocket orphan 2 weeks ago
qterm orphan 4 weeks ago
rubygem-hrx jcpunk, orphan, tdawson 5 weeks ago
rubygem-linked-list jcpunk, orphan, tdawson 5 weeks ago
rubygem-rubygems-mirror @ruby-packagers-sig, orphan 1 weeks ago
rust-lib0 @rust-sig, orphan 2 weeks ago
rust-yrs @rust-sig, orphan 2 weeks ago
scamp @astro-sig, orphan 4 weeks ago
sphinxbase @epel-packagers-sig, orphan 0 weeks ago
tachyon @scitech_sig, orphan 3 weeks ago
virtme orphan 3 weeks ago
xdrawchem @scitech_sig, orphan 3 weeks ago

The following packages require above mentioned packages:
Depending on: applet-window-buttons (1), status change: 2024-01-24 (0 weeks ago)
maui-mauikit (maintained by: thunderbirdtr)
maui-mauikit-2.1.1-4.fc39.i686 requires applet-window-buttons = 0.11.1-7.fc39
maui-mauikit-2.1.1-4.fc39.x86_64 requires applet-window-buttons = 0.11.1-7.fc39

Depending on: cdsclient (1), status change: 2023-12-29 (4 weeks ago)
scamp (maintained by: @astro-sig, orphan)
scamp-2.10.0-5.fc38.src requires cdsclient = 3.84-16.fc39
scamp-2.10.0-5.fc38.x86_64 requires cdsclient = 3.84-16.fc39

Depending on: drumstick0 (1), status change: 2024-01-18 (1 weeks ago)
kmid2 (maintained by: cheeselee, kkofler)
kmid2-2.4.0-27.fc39.src requires drumstick0-devel = 0.5.0-34.fc39
kmid2-2.4.0-27.fc39.x86_64 requires drumstick0 = 0.5.0-34.fc39, libdrumstick-alsa.so.0()(64bit), libdrumstick-file.so.0()(64bit)

Depending on: elpa (1), status change: 2024-01-05 (3 weeks ago)
cp2k (maintained by: @scitech_sig, jussilehtola, lecris, tomspur)
cp2k-2024.1-2.fc40.src requires elpa-mpich-devel = 2023.11.001-1.fc40

Depending on: python-flit (4), status change: 2024-01-25 (0 weeks ago)
python-perky (maintained by: @python-packagers-sig, gotmax23)
python-perky-0.8.2-3.fc39.src requires python3dist(flit) = 3.9

python-pyrpm (maintained by: eclipseo, vtrefny)
python-pyrpm-0.14.1-3.fc39.src requires python3dist(flit) = 3.9

python-vecrec (maintained by: music)
python-vecrec-0.3.1-14.fc40.src requires python3dist(flit) = 3.9

python-fontrpmspec (maintained by: tagoh)
python-fontrpmspec-0.12-3.fc39.src requires python3dist(python-rpm-spec) = 0.14.1
python3-fontrpmspec-0.12-3.fc39.noarch requires python3.12dist(python-rpm-spec) = 0.14.1

Depending on: python-jupyter-server-fileid (1), status change: 2024-01-12 (2 weeks ago)
python-jupyter-collaboration (maintained by: orphan)
python-jupyter-collaboration-1.2.0-2.fc40.src requires python3dist(jupyter-server-fileid) = 0.9.1
python3-jupyter-collaboration-1.2.0-2.fc40.noarch requires python3.12dist(jupyter-server-fileid) = 0.9.1

Depending on: python-jupyter-ydoc (1), status change: 2024-01-12 (2 weeks ago)
python-jupyter-collaboration (maintained by: orphan)
python-jupyter-collaboration-1.2.0-2.fc40.src requires python3dist(jupyter-ydoc) = 1.1.1
python3-jupyter-collaboration-1.2.0-2.fc40.noarch requires python3.12dist(jupyter-ydoc) = 1.1.1

Depending on: python-mmtf (1), status change: 2024-01-05 (3 weeks ago)
pymol (maintained by: sagitter, sergiomb)
pymol-2.5.0-8.fc39.src requires python3-mmtf = 1.1.3-1.fc40
pymol-2.5.0-8.fc39.x86_64 requires python3-mmtf = 1.1.3-1.fc40

Depending on: python-mrcfile (1), status change: 2024-01-05 (3 weeks ago)
python-GridDataFormats (maintained by: @scitech_sig, orphan)
python-GridDataFormats-1.0.2-1.fc40.src requires python3-mrcfile = 1.4.3-2.fc39
python3-GridDataFormats-1.0.2-1.fc40.noarch requires python3.12dist(mrcfile) = 1.4.3

Depending on: python-y-py (3), status change: 2024-01-12 (2 weeks ago)
python-jupyter-ydoc (maintained by: orphan)
python-jupyter-ydoc-1.1.1-1.fc40.src requires python3dist(y-py) = 0.6.2
python3-jupyter-ydoc-1.1.1-1.fc40.noarch requires python3.12dist(y-py) = 0.6.2

python-ypy-websocket (maintained by: orphan)
python-ypy-websocket-0.12.4-1.fc40.src requires python3dist(y-py) = 0.6.2
python3-ypy-websocket-0.12.4-1.fc40.noarch requires python3.12dist(y-py) = 0.6.2

python-jupyter-collaboration (maintained by: orphan)
python-jupyter-collaboration-1.2.0-2.fc40.src requires python3dist(jupyter-ydoc) = 1.1.1, python3dist(ypy-websocket) = 0.12.4
python3-jupyter-collaboration-1.2.0-2.fc40.noarch requires python3.12dist(jupyter-ydoc) = 1.1.1, python3.12dist(ypy-websocket) = 0.12.4

Depending on: python-ypy-websocket (1), status change: 2024-01-12 (2 weeks ago)
python-jupyter-collaboration (maintained by: orphan)
python-jupyter-collaboration-1.2.0-2.fc40.src requires python3dist(ypy-websocket) = 0.12.4
python3-jupyter-collaboration-1.2.0-2.fc40.noarch requires python3.12dist(ypy-websocket) = 0.12.4

Depending on: rubygem-linked-list (1), status change: 2023-12-18 (5 weeks ago)
rubygem-hrx (maintained by: jcpunk, orphan, tdawson)
rubygem-hrx-1.0.0-9.fc39.noarch requires rubygem(linked-list) = 0.0.16
rubygem-hrx-1.0.0-9.fc39.src requires rubygem(linked-list) = 0.0.16

Depending on: rust-lib0 (5), status change: 2024-01-12 (2 weeks ago)
python-y-py (maintained by: @python-packagers-sig, orphan)
python-y-py-0.6.2-1.fc40.src requires crate(lib0/default) = 0.12.2, crate(yrs/default) = 0.12.2

rust-yrs (maintained by: @rust-sig, orphan)
rust-yrs-0.12.2-2.fc39.src requires crate(lib0/default) = 0.12.2
rust-yrs-devel-0.12.2-2.fc39.noarch requires crate(lib0/default) = 0.12.2

python-jupyter-ydoc (maintained by: orphan)
python-jupyter-ydoc-1.1.1-1.fc40.src requires python3dist(y-py) = 0.6.2
python3-jupyter-ydoc-1.1.1-1.fc40.noarch requires python3.12dist(y-py) = 0.6.2

python-ypy-websocket (maintained by: orphan)
python-ypy-websocket-0.12.4-1.fc40.src requires python3dist(y-py) = 0.6.2
python3-ypy-websocket-0.12.4-1.fc40.noarch requires python3.12dist(y-py) = 0.6.2

python-jupyter-collaboration (maintained by: orphan)
python-jupyter-collaboration-1.2.0-2.fc40.src requires python3dist(jupyter-ydoc) = 1.1.1, python3dist(ypy-websocket) = 0.12.4
python3-jupyter-collaboration-1.2.0-2.fc40.noarch requires python3.12dist(jupyter-ydoc) = 1.1.1, python3.12dist(ypy-websocket) = 0.12.4

Depending on: rust-yrs (4), status change: 2024-01-12 (2 weeks ago)
python-y-py (maintained by: @python-packagers-sig, orphan)
python-y-py-0.6.2-1.fc40.src requires crate(yrs/default) = 0.12.2

python-jupyter-ydoc (maintained by: orphan)
python-jupyter-ydoc-1.1.1-1.fc40.src requires python3dist(y-py) = 0.6.2
python3-jupyter-ydoc-1.1.1-1.fc40.noarch requires python3.12dist(y-py) = 0.6.2

python-ypy-websocket (maintained by: orphan)
python-ypy-websocket-0.12.4-1.fc40.src requires python3dist(y-py) = 0.6.2
python3-ypy-websocket-0.12.4-1.fc40.noarch requires python3.12dist(y-py) = 0.6.2

python-jupyter-collaboration (maintained by: orphan)
python-jupyter-collaboration-1.2.0-2.fc40.src requires python3dist(jupyter-ydoc) = 1.1.1, python3dist(ypy-websocket) = 0.12.4
python3-jupyter-collaboration-1.2.0-2.fc40.noarch requires python3.12dist(jupyter-ydoc) = 1.1.1, python3.12dist(ypy-websocket) = 0.12.4

Affected (co)maintainers
@astro-sig: cdsclient, scamp
@epel-packagers-sig: sphinxbase, python-flit
@kde-sig: kpipewire5, bismuth, plasma-bigscreen, applet-window-buttons
@neuro-sig: python-maya
@python-packagers-sig: python-extractcode, rust-yrs, python-flit, rust-lib0, python-y-py
@ruby-packagers-sig: rubygem-rubygems-mirror
@rust-sig: rust-yrs, rust-lib0
@scitech_sig: python-mmtf, xdrawchem, python-GridDataFormats, tachyon, python-mrcfile, elpa
cheeselee: drumstick0
eclipseo: python-flit
gotmax23: python-flit
jcpunk: rubygem-hrx, rubygem-linked-list
jussilehtola: elpa
kkofler: drumstick0
lecris: elpa
music: python-flit
sagitter: python-mmtf
salimma: python-flit
sergiomb: python-mmtf
tagoh: python-flit
tdawson: rubygem-hrx, rubygem-linked-list
thunderbirdtr: applet-window-buttons
tomspur: elpa
vtrefny: python-flit
yanqiyu: drumstick0

Orphans (37): 3proxy applet-window-buttons bismuth cdsclient csmith
drumstick0 elpa kpipewire5 lightly php-PHP-CSS-Parser
plasma-bigscreen python-GridDataFormats python-compressed-rtf
python-extractcode python-flit python-jupyter-collaboration
python-jupyter-server-fileid python-jupyter-ydoc
python-kaitaistruct python-maya python-mmtf python-mrcfile
python-red-black-tree-mod python-represent python-y-py
python-ypy-websocket qterm rubygem-hrx rubygem-linked-list
rubygem-rubygems-mirror rust-lib0 rust-yrs scamp sphinxbase
tachyon virtme xdrawchem


Orphans (dependend on) (14): applet-window-buttons cdsclient
drumstick0 elpa python-flit python-jupyter-server-fileid
python-jupyter-ydoc python-mmtf python-mrcfile python-y-py
python-ypy-websocket rubygem-linked-list rust-lib0 rust-yrs


Orphans (rawhide) for at least 6 weeks (dependend on) (0):


Orphans (rawhide) (not depended on) (23): 3proxy bismuth csmith
kpipewire5 lightly php-PHP-CSS-Parser plasma-bigscreen
python-GridDataFormats python-compressed-rtf python-extractcode
python-jupyter-collaboration python-kaitaistruct python-maya
python-red-black-tree-mod python-represent qterm rubygem-hrx
rubygem-rubygems-mirror scamp sphinxbase tachyon virtme xdrawchem


Orphans (rawhide) for at least 6 weeks (not dependend on) (0):


Depending packages (rawhide) (16): cp2k kmid2 maui-mauikit pymol
python-GridDataFormats python-fontrpmspec
python-jupyter-collaboration python-jupyter-ydoc python-perky
python-pyrpm python-vecrec python-y-py python-ypy-websocket
rubygem-hrx rust-yrs scamp


Packages depending on packages orphaned (rawhide) for more than 6
weeks (0):

--
The script creating this output is run and developed by Fedora
Release Engineering. Please report issues at its pagure instance:
https://pagure.io/releng/
The sources of this script can be found at:
https://pagure.io/releng/blob/main/f/scripts/find_unblocked_orphans.py

Report finished at 2024-01-28 16:08:03 UTC

Orphaned packages looking for new maintainers

Orphaned packages looking for new maintainers

Friday, January 26, 2024

[CentOS-announce] CESA-2024:0232 Important CentOS 7 java-11-openjdk Security Update

CentOS Errata and Security Advisory 2024:0232 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2024:0232

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
ff8272f92c772a5d757bacb85570f4468e0c2c40956746d49494f1daa5041086 java-11-openjdk-11.0.22.0.7-1.el7_9.i686.rpm
134406c95bb0e98bfe18a35cc06ff8a3deca7248e9196efcee6eb05a7a0dcd55 java-11-openjdk-11.0.22.0.7-1.el7_9.x86_64.rpm
db87f894acc24775904c7b50e997fa12818c4c6368e17139307fd37433372e1e java-11-openjdk-demo-11.0.22.0.7-1.el7_9.i686.rpm
d64ee0696017c879c9cac304b66dad0523eafec9464a87a647d5b5c2a19e2466 java-11-openjdk-demo-11.0.22.0.7-1.el7_9.x86_64.rpm
72866ddd3fc9bb8286ebd7b4f6c5d977fc3e7925268a253cfefe4511c6e90150 java-11-openjdk-devel-11.0.22.0.7-1.el7_9.i686.rpm
3603a5475d52875262a18bc253888633c218b9df5c6fbdfad0972c07da32b981 java-11-openjdk-devel-11.0.22.0.7-1.el7_9.x86_64.rpm
e87677e240924426b72cfef3f1ea5a1e88a7a4f5e9fd2f778a2cc3fa1a10069a java-11-openjdk-headless-11.0.22.0.7-1.el7_9.i686.rpm
226ad3151c609e6c6ae4f2fcadec7bd71f08fdb6c976380ebc8d8c0eac5afbfd java-11-openjdk-headless-11.0.22.0.7-1.el7_9.x86_64.rpm
c538ef407bc0967b16f615b25eb59fae617d84051826819aa6837e85e7ff4db9 java-11-openjdk-javadoc-11.0.22.0.7-1.el7_9.i686.rpm
f17e881111b5bdf792e8c6c4ebf56c864fe82ead7236e9d1714054bb3577b4c1 java-11-openjdk-javadoc-11.0.22.0.7-1.el7_9.x86_64.rpm
89988277f04bdfb0831030270ba38286c5de52d83e5c015250fa99a89d9f5a47 java-11-openjdk-javadoc-zip-11.0.22.0.7-1.el7_9.i686.rpm
483c0e526fee490fe5e387d8f466ba9336f13e99e38a22801656db9f0ef6fdbf java-11-openjdk-javadoc-zip-11.0.22.0.7-1.el7_9.x86_64.rpm
9a2538ebee1a09c61de1b04f3ce4e0727b75e499fc1cbe6df0a72d5507871c0e java-11-openjdk-jmods-11.0.22.0.7-1.el7_9.i686.rpm
f8d95a99893e9265f3f6125f684c56c23afa3834653a04d0e9dbe9360a6aaf5d java-11-openjdk-jmods-11.0.22.0.7-1.el7_9.x86_64.rpm
dab70d9c3e9d60e9a4331d2ccb0d2d3dacfe1d41e355572961045f2ce2c22a34 java-11-openjdk-src-11.0.22.0.7-1.el7_9.i686.rpm
5a103d4f3b121195638cf61cb91fbc034b9c2a6deee845296612dfb590ef0859 java-11-openjdk-src-11.0.22.0.7-1.el7_9.x86_64.rpm
22b2f7582ba663c4bb9f008bce4f7a80e69654b30b05c0571864b3b8292f8ff5 java-11-openjdk-static-libs-11.0.22.0.7-1.el7_9.i686.rpm
1b6f592d463f10e592cc2b035e409be816bd6dc189d7457574d5641fdcf767bc java-11-openjdk-static-libs-11.0.22.0.7-1.el7_9.x86_64.rpm

Source:
aa9713890e6cf16b63853ffdfe0ce657ff24e5342d317ed86013eb5a853e83c9 java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@libera.chat
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2024:0223 Important CentOS 7 java-1.8.0-openjdk Security Update

CentOS Errata and Security Advisory 2024:0223 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2024:0223

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
04a4cfccd1c263a0f3de420c2200f1e9d5485e3f5734a0c08f2c01c3be01b144 java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.i686.rpm
339e96b8a52bc311433f3ed0ce535dd62f4808232fb75bf0eaf2b4f0cd82f726 java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.x86_64.rpm
be2cf27ae12e4ffcf8e8d79ef82ec36c4c7d67299d1b3bf9e1ceb0325e08de8b java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.i686.rpm
6c8d7f6e3e1e16170883c18ddcbe50ef6eb86c9a8222fb7fe4f75b91670adc57 java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.x86_64.rpm
985cd3c30e1357c60af6a5b4425c5d16eca3e6970da5871aca65ecca4c468cd1 java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.i686.rpm
a18aeb73905ede9c9bd2f5ab9736372813b7662678482ea5ad4990ce21b77ae9 java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.x86_64.rpm
42867004de7a228cf85955e79762cca11cfedcace4742b7caa46109e8131839a java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.i686.rpm
7b1c52bbe226abacf3c7479ca52c3d631af47e215754ccfb2ad53c6226e13392 java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.x86_64.rpm
61ce4b03660d33874c07cc8931ddbfe63af33129c020331fef0850ec847167e3 java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.i686.rpm
60f47d3d5a4d59ab230916a44b7ecff881116a21de176de5276bd96e52ac5c3e java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.x86_64.rpm
f707cfc509f1fd8d7d482b5937245f4dbfc078d16c4defb7fef772d41daac079 java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9.noarch.rpm
fa816cfd764e59f3d6af36d6fe658eaf2ad7d0af0472a9bef2ab112995965b1f java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9.noarch.rpm
9984ba09f2a5bb2165cfe6589c4861a4ae3214b1932e9978e0648e075937b182 java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.i686.rpm
1a8bb6d0d5d3a9bbd2452e189a4bddbc5fb7dd910ae645de886896daf57d324b java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.x86_64.rpm

Source:
3a85a65de3b1f0cc5a70cfc099f166377be1bd46a738b2e2520d0aaca3675db1 java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@libera.chat
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2024:0350 CentOS 7 net-snmp BugFix Update

CentOS Errata and Bugfix Advisory 2024:0350

Upstream details at : https://access.redhat.com/errata/RHBA-2024:0350

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
27aff6d12be971449c18fbddaf62e746dbde00a72186da96eeb19d8af6a3783c net-snmp-5.7.2-49.el7_9.4.x86_64.rpm
9384178dce07e0ac299086cce68e4bb80df8f3f7a7fbb3157138f9c5959fefa1 net-snmp-agent-libs-5.7.2-49.el7_9.4.i686.rpm
e1da241785b81fa88a78902772f84fe8352a55fdf1c3e24e75f1489f0ed6c85e net-snmp-agent-libs-5.7.2-49.el7_9.4.x86_64.rpm
003d6e4f36c75c96397d74a2057705deb39e076f3fc1a18799709b07c8140187 net-snmp-devel-5.7.2-49.el7_9.4.i686.rpm
729bff77f6c7fc23bab8a062cad450e4fec1ed72327936a033ec519b4a1f1a5d net-snmp-devel-5.7.2-49.el7_9.4.x86_64.rpm
d85313c82ec7673519a211411e459e2105de52fc4111ca7c8f5993153e516415 net-snmp-gui-5.7.2-49.el7_9.4.x86_64.rpm
eaffff0c99bd293104ff77f035145a5872da50599d8f1b26609f145f305e2df4 net-snmp-libs-5.7.2-49.el7_9.4.i686.rpm
f9934db5cc1113b572f8e7b163ba8385a71464f8594e0a39efcdf885afab2e39 net-snmp-libs-5.7.2-49.el7_9.4.x86_64.rpm
6e3ec45785f4e53b2ba5cb144820351bce901ac38bbe5bfece3b71293c84197a net-snmp-perl-5.7.2-49.el7_9.4.x86_64.rpm
eb2b61c0a574c0e3c540083c4f4f8009c0832616ae48554fa6f402b145b77bb0 net-snmp-python-5.7.2-49.el7_9.4.x86_64.rpm
da833fcbf72323a7a85e0da6ba8c9336419447f7d6dab0d5107ab974425ae951 net-snmp-sysvinit-5.7.2-49.el7_9.4.x86_64.rpm
bb6c4bb2a43504110b58abd968a896a9cb28e447e17abd926b4366f43bb50835 net-snmp-utils-5.7.2-49.el7_9.4.x86_64.rpm

Source:
bba67b871e016ee3629fcc494b3d6a900ffa18f3728a08e0a09bbbb09be444ec net-snmp-5.7.2-49.el7_9.4.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@libera.chat
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2024:0320 Important CentOS 7 xorg-x11-server Security Update

CentOS Errata and Security Advisory 2024:0320 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2024:0320

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
878bd3f432c1a1de0ae5f44ae295f84e0ba2eb10d8864b4c35eb61a0a324b21e xorg-x11-server-common-1.20.4-27.el7_9.x86_64.rpm
df2ac268f02376356b5c4723b8c369c8593c63db05b25c52b9d0d0cfa7b0299b xorg-x11-server-devel-1.20.4-27.el7_9.i686.rpm
8ace9615be81aa1aef785201bea8d1d530ab9d51947834eb409d60ec032e56d0 xorg-x11-server-devel-1.20.4-27.el7_9.x86_64.rpm
145b9d5084c2fedb67f97a86a7a34cb159ed3eb46792eea9e063b1c632fde672 xorg-x11-server-source-1.20.4-27.el7_9.noarch.rpm
730e3f511d99634857cb8c6d1d6a2bb0aeab30962a144cde1567228df8e3ff7c xorg-x11-server-Xdmx-1.20.4-27.el7_9.x86_64.rpm
e4982c6de18a9fd5a9baa26a2ae8d32a5e2474516998095e06a900fc16cecb18 xorg-x11-server-Xephyr-1.20.4-27.el7_9.x86_64.rpm
c7b6417b605af3adcca501eb73c1898aa00b4691197c4567e74e721dcb034436 xorg-x11-server-Xnest-1.20.4-27.el7_9.x86_64.rpm
dfe2f972771603f046f22e69e38741bf6dc94baeaec867665169bb3e9b9b8eac xorg-x11-server-Xorg-1.20.4-27.el7_9.x86_64.rpm
303a240bc1792e6c5e9c0d96992a7156a5d867e461081ec7d99fc535e81cb3a2 xorg-x11-server-Xvfb-1.20.4-27.el7_9.x86_64.rpm
701c51272a786e3642f50a00d1af86a89ff81297f2f58e485eecd9a7ff5bfe96 xorg-x11-server-Xwayland-1.20.4-27.el7_9.x86_64.rpm

Source:
4d494980e857c66ba7488188944da8cb8bc865bb10087e36dfd8b85ada765b0c xorg-x11-server-1.20.4-27.el7_9.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@libera.chat
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2024:0344 CentOS 7 sssd BugFix Update

CentOS Errata and Bugfix Advisory 2024:0344

Upstream details at : https://access.redhat.com/errata/RHBA-2024:0344

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
388aba1b0bdea4684f1db472cbd84cc4331e3d51543a84e076c8c8209113539e libipa_hbac-1.16.5-10.el7_9.16.i686.rpm
ecf00639a05e5928c699eb7451b91c04ef62ea4e3ada1c96ee6c9ba35c065f28 libipa_hbac-1.16.5-10.el7_9.16.x86_64.rpm
f035504bb52e167428211e66d8d1e6057ea84e13f5eb03edf9c7d58b26a52b99 libipa_hbac-devel-1.16.5-10.el7_9.16.i686.rpm
beeb913c932963a0d8888e51c12b07a6993454a38f7ef567a5a56da4208e5949 libipa_hbac-devel-1.16.5-10.el7_9.16.x86_64.rpm
a271a288a9e5d486a7d0633c7bc2cacdc437a5653257949d7aea3b6090eebd74 libsss_autofs-1.16.5-10.el7_9.16.x86_64.rpm
11b4c218357ae653cc94b8f934d6cb161e9887b9f18ebd5184628d644e2ec02f libsss_certmap-1.16.5-10.el7_9.16.i686.rpm
41f4c18963dcef2f45ef879ee1b029b4d4e655031847de4f3052176ca15d7892 libsss_certmap-1.16.5-10.el7_9.16.x86_64.rpm
8faaf8f128a420775ca80ce1a715e9558ae61ebfead1106052e080d3192d7162 libsss_certmap-devel-1.16.5-10.el7_9.16.i686.rpm
d9a010b778f886239f2f727be22f6e054b2c499ecf8ad2846b7837ce3764547b libsss_certmap-devel-1.16.5-10.el7_9.16.x86_64.rpm
ee029bb52291786cac00074d77fa338a3cdf2968607a5e85ffd05a69b46ebcdd libsss_idmap-1.16.5-10.el7_9.16.i686.rpm
263b13ff1007ce0f1a2b919dcc679eaee72fb8105b37c94235f23c5f710eb42d libsss_idmap-1.16.5-10.el7_9.16.x86_64.rpm
1b9318b477ed42cea383e924a42367b049b54e29451b58ab4f7761a1c26052d4 libsss_idmap-devel-1.16.5-10.el7_9.16.i686.rpm
97b86b131c407c89d83051cf1a4f98e0807a3198b30346ee90104748242d3bc2 libsss_idmap-devel-1.16.5-10.el7_9.16.x86_64.rpm
dd26f40a18d45abe032d5e12209ca47ece3291fb0c9b2777688d685549c62407 libsss_nss_idmap-1.16.5-10.el7_9.16.i686.rpm
4aca2e6c6e4faa4ced065ea161be76f436ab64e5f16cd84c5a0378ab451f1d80 libsss_nss_idmap-1.16.5-10.el7_9.16.x86_64.rpm
7db76247917b09c13f39c3f19f3ecbd478e5c46584b6d8ff68a51268b0251871 libsss_nss_idmap-devel-1.16.5-10.el7_9.16.i686.rpm
6bd554a06d2cacb7334035a74ef3a0a10379a000a628cc964aba4a5a4c8d82e8 libsss_nss_idmap-devel-1.16.5-10.el7_9.16.x86_64.rpm
5b9aa9d2efdec945a27722458f45fc65a0105bf5378594552fe8bc991a4e86e1 libsss_simpleifp-1.16.5-10.el7_9.16.i686.rpm
e70fc2d0e61c7e1f8c65da239c406fae5141f1efae29ff4e2ded90e4f2271ac7 libsss_simpleifp-1.16.5-10.el7_9.16.x86_64.rpm
053bab8c7482789ca2a4d26eacb17ea07e87c7b88691ebeea4df085b8ee8b0c4 libsss_simpleifp-devel-1.16.5-10.el7_9.16.i686.rpm
32f371a2fb734b59d724e7f158a6b7786a4e7608c6e9200aacc4b1624c2d55fe libsss_simpleifp-devel-1.16.5-10.el7_9.16.x86_64.rpm
f424072382650daa052fcb9ac01eb3fc0209eb1d8f2bc0d18f3bf1bebd42dc39 libsss_sudo-1.16.5-10.el7_9.16.x86_64.rpm
ba60b418779a0e59ca05c44a8a4e59cf92572aec1f631f59c0e2f6cdc8e7d1fa python-libipa_hbac-1.16.5-10.el7_9.16.x86_64.rpm
511bc16b7002a23d4c2365e7a369074e23ce6ac569f14b967ca4c8b20d29400a python-libsss_nss_idmap-1.16.5-10.el7_9.16.x86_64.rpm
0d7905c384f2eb08286c9eaf8161f50db1d1312363a1fe8b484962d4ed6e149b python-sss-1.16.5-10.el7_9.16.x86_64.rpm
f5d06a0438f7a24578bc611af20cbc9e52844b6cfbb52579826da412b7050eaf python-sssdconfig-1.16.5-10.el7_9.16.noarch.rpm
dd6b1ad5b433b7d1f74b7dd91b9b5cb0f241de67b3ac6e130a4577c5fcbfb7db python-sss-murmur-1.16.5-10.el7_9.16.x86_64.rpm
3bbbdec13d548901746ce3f8e2bf282000598614b5b70523edb80f329ec935e0 sssd-1.16.5-10.el7_9.16.x86_64.rpm
90d24b11f08fa24d41c2102a917044b252760ee28a2d70c68a1ff4f9043c7464 sssd-ad-1.16.5-10.el7_9.16.x86_64.rpm
c3b34b85ae893b22977e8dfafa61a01dd6b4c787c7b37cab2e89df863cc94330 sssd-client-1.16.5-10.el7_9.16.i686.rpm
db24348500eb9dbf5298596dfe2e37ca3bc54a7bacc1db758d4a433d37f486a4 sssd-client-1.16.5-10.el7_9.16.x86_64.rpm
a2766b83b6a876469856708425fef7119bad6779d4b9ed448fcb9ea454b97420 sssd-common-1.16.5-10.el7_9.16.x86_64.rpm
d13238ab1217026e026ff8cdb5a027315b909e6962176287bb83b326f33c5f80 sssd-common-pac-1.16.5-10.el7_9.16.x86_64.rpm
70d4d64cd1a4bf0b8b9ccc8e2cb0e8bc239ffd0632a796d2c869f55b6626defe sssd-dbus-1.16.5-10.el7_9.16.x86_64.rpm
ab5ba7db71da82b8f11f7725428c46b6cf857fa74755c8a4626182781ec2a388 sssd-ipa-1.16.5-10.el7_9.16.x86_64.rpm
7c35e147b314a2db86256a9a76e58c2eb54bc2c62f2acdbcc0dafe986f0caff8 sssd-kcm-1.16.5-10.el7_9.16.x86_64.rpm
61d2fe31693bd543dd103cf15e107e060b04ebfad13d914865e704aef9a7bfbc sssd-krb5-1.16.5-10.el7_9.16.x86_64.rpm
af95b47579ae105bbe84721bd483e536b8a004d3301c4efd6dc43296bb5dc441 sssd-krb5-common-1.16.5-10.el7_9.16.x86_64.rpm
82cc32e8088438f5d4fc7f78b91aff778d193cc5d296a1afeec04f69ee1134a3 sssd-ldap-1.16.5-10.el7_9.16.x86_64.rpm
21f326e5f1282a6a5e71862e6a10e53257b80f7942532b86fc740c5060bd5d66 sssd-libwbclient-1.16.5-10.el7_9.16.x86_64.rpm
39eda1390e30c1d89d4a235798a2680748e9b2b95ad2b6a7c76d547977b8afa3 sssd-libwbclient-devel-1.16.5-10.el7_9.16.i686.rpm
bea336c1c8f050927b1a639ba83b0ad350d97d65f1c37c25a38e1418af07f9e4 sssd-libwbclient-devel-1.16.5-10.el7_9.16.x86_64.rpm
48a43cbf24e5cc56899ebdd66e5c0f3d2fe213629ce3c7debc96435077102d8d sssd-polkit-rules-1.16.5-10.el7_9.16.x86_64.rpm
fa23e5ba8d9b56049a550f17e94cd3178b35786e85c7098ea8f409f9cd1bd8c2 sssd-proxy-1.16.5-10.el7_9.16.x86_64.rpm
0e9f601a50df8e60748b538e0a74fbb3fe326ce3a54a551b7a254c64afcf272f sssd-tools-1.16.5-10.el7_9.16.x86_64.rpm
8eb970d9067e83d78cc7fabc26ab7bd356ac7bdd924f37cc65f1880942065026 sssd-winbind-idmap-1.16.5-10.el7_9.16.x86_64.rpm

Source:
82234d6239ef9d5dea5ca5b61ab24419ee1b82f197a1cc41faa75da9af116d44 sssd-1.16.5-10.el7_9.16.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@libera.chat
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2024:0345 Moderate CentOS 7 python-pillow Security Update

CentOS Errata and Security Advisory 2024:0345 Moderate

Upstream details at : https://access.redhat.com/errata/RHSA-2024:0345

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
248b2b0bfb0de8b031b61088bfef62e0c0553e6fbfbf409774f977e6aa73b58e python-pillow-2.0.0-24.gitd1c6db8.el7_9.i686.rpm
6ead86e81280d56c02e90e7af54080a1b332b55814bf405227418471a84c582d python-pillow-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm
11baa7d4bdd8079b0a48c38698900636641b8648bcc0beed5948a501e512c0a8 python-pillow-devel-2.0.0-24.gitd1c6db8.el7_9.i686.rpm
375c6aec9492dfeb3bf49e8ed7cde201a8d10e0a725c713f6131c221f187519a python-pillow-devel-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm
4ebc55a9954ac2afcab8fb9d5afd7de1ac28a66e18e635767c73d22ff0bb53ea python-pillow-doc-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm
b5816382d23e2c39a1010248b904a92618f9140583546a2750585d023b31a97f python-pillow-qt-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm
587d17ef9061cf41b72bf1d3a0c8b1ef5bd5fd3f8fcb45fcc0b4af9023587f45 python-pillow-sane-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm
9359973256508b24175ed9887851616fac8f922f2e55231ced8c44ff757ef828 python-pillow-tk-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm

Source:
31bbf3f90db1c55e0791df46ad83259fbb8205de1d3c1513920f963a1d83f964 python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@libera.chat
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2024:0343 Moderate CentOS 7 LibRaw Security Update

CentOS Errata and Security Advisory 2024:0343 Moderate

Upstream details at : https://access.redhat.com/errata/RHSA-2024:0343

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
53cb4b1814b006d5822769285fafe984c2312ad59f2a1efd65a648bf4d1f6df1 LibRaw-0.19.4-2.el7_9.i686.rpm
20385107dd6a4623cd7aaccc57b216a7fd04a22b8f56bf7e874d9fbe49095bf1 LibRaw-0.19.4-2.el7_9.x86_64.rpm
82770f241e9bdc035784ea9189503fbe592d5c29147b6f0860949963afbefbe1 LibRaw-devel-0.19.4-2.el7_9.i686.rpm
b73a625e6724b514380e5393dc8ac1ff68137ee32e63057c82c80eb5439701ba LibRaw-devel-0.19.4-2.el7_9.x86_64.rpm
da671c2234ad85d7898dc39cf7cbbe3f81c92f9de8153ed656a948fe022cc14b LibRaw-static-0.19.4-2.el7_9.i686.rpm
d85c7c7044bb25d459d1d3377a16e6bc25cd16ea3a67985795886527085aca81 LibRaw-static-0.19.4-2.el7_9.x86_64.rpm

Source:
9ba92341ee711beb679ac90d1d8e8f0b24f12b0a003ec849e1af11a107f1f5af LibRaw-0.19.4-2.el7_9.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@libera.chat
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2024:0279 Important CentOS 7 gstreamer-plugins-bad-free Security Update

CentOS Errata and Security Advisory 2024:0279 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2024:0279

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
13c2180392f13ede0d3e45cf8895eb123d78ede2ff65fcaf4c05232a7cba595b gstreamer-plugins-bad-free-0.10.23-24.el7_9.i686.rpm
251baa632d0d33e46681b76fba3f93cc9ea07b9084a6dbc7bb018c50a1abb9b1 gstreamer-plugins-bad-free-0.10.23-24.el7_9.x86_64.rpm
d9821c48f2918944061117f3ab8c87a78a29d2649124aeb7f47f886ec7903dd6 gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9.i686.rpm
3704909dce1c80a6e3fa47ea59c51797dbe73c34511a242cf1e0756e078fba23 gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9.x86_64.rpm
53f42f617e8184218d75676860dfcd10bd810905d61d6d241b88ff372c208b42 gstreamer-plugins-bad-free-devel-docs-0.10.23-24.el7_9.x86_64.rpm

Source:
766f5ef1f8da7e1bf31c833686140b1bd43ec88d3b6ed13450a6cee0cfd7d8ec gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@libera.chat
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2024:0346 Important CentOS 7 kernel Security Update

CentOS Errata and Security Advisory 2024:0346 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2024:0346

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
9e472e05a5fca129f0efc2c81b7fc14f5daa96935b5c693cead447474422f17f bpftool-3.10.0-1160.108.1.el7.x86_64.rpm
c95477083d786f35fe049b4cf228df007b60410ff81fc37b0e6dd8bd2124cdcc kernel-3.10.0-1160.108.1.el7.x86_64.rpm
8cdf3d0ccf31842dffcd39b5f3b05819fc442a375c03a3212e7b51db17f53e29 kernel-abi-whitelists-3.10.0-1160.108.1.el7.noarch.rpm
3fd85597715ed99be96dcdbcfa10bedfcca32a7ad600f9ebf609b83a2c6d481a kernel-debug-3.10.0-1160.108.1.el7.x86_64.rpm
e357af06726c5602fad5542ef0502f94391737c732c9fbf6706f80fb6757f197 kernel-debug-devel-3.10.0-1160.108.1.el7.x86_64.rpm
a2341873756b6756d7b18967c3dd2b6ce12fff550f0837ea9361171291c42397 kernel-devel-3.10.0-1160.108.1.el7.x86_64.rpm
2041fb62286ddc1875cdc0396db816edd188bd1beeb362b3e99a3166a7bf8179 kernel-doc-3.10.0-1160.108.1.el7.noarch.rpm
c1a6b5c7d510c383e4cd61ceed4ca28f3f378bc0b62830d40f4fcb14f147b555 kernel-headers-3.10.0-1160.108.1.el7.x86_64.rpm
c29c2680928459b5247e613db52774e62b9696ce64b4b85f878cdfd4775a8f05 kernel-tools-3.10.0-1160.108.1.el7.x86_64.rpm
b59e577acfd79936a81667c77131d1327e4ad70bde597f697884a4eaf7e3a7ec kernel-tools-libs-3.10.0-1160.108.1.el7.x86_64.rpm
b1471a49f356e514174b94e92dfc8993323e25a2de938cda266f9cd7d5850665 kernel-tools-libs-devel-3.10.0-1160.108.1.el7.x86_64.rpm
5bee4fc25b489a427e91f9972dc2c6116c2159fb420fda53da7e793376b51ff1 perf-3.10.0-1160.108.1.el7.x86_64.rpm
10d9cd406a9424d6ffedd18a738deca45a4e4eb8b3d7040d57bae575915dce5e python-perf-3.10.0-1160.108.1.el7.x86_64.rpm

Source:
0eb8de9644797bbfdecb365290fda18fb0bea353a7fe41f6d5ff6a86761f4f53 kernel-3.10.0-1160.108.1.el7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@libera.chat
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2024:0348 CentOS 7 389-ds-base BugFix Update

CentOS Errata and Bugfix Advisory 2024:0348

Upstream details at : https://access.redhat.com/errata/RHBA-2024:0348

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
a746522986b0afca052c56bfe30e019392742f4feb4722768d2eb43b4babeac8 389-ds-base-1.3.11.1-4.el7_9.x86_64.rpm
aa0fe451ab8753df55722f121169c9aca26ca19a8b763c4d7f831af3bf826a26 389-ds-base-devel-1.3.11.1-4.el7_9.x86_64.rpm
eef2f7ac436c0d23750d0d428880ec5d58260342fcb7de2587122eea70893429 389-ds-base-libs-1.3.11.1-4.el7_9.x86_64.rpm
4cae2658d6c984132e253fc1cb8af035251a3acc79acc7957fc3c92111b0f643 389-ds-base-snmp-1.3.11.1-4.el7_9.x86_64.rpm

Source:
47fd6065196c6534b434dcb858a8c5037dbb72d33ede2763cc6807cb436fa5de 389-ds-base-1.3.11.1-4.el7_9.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@libera.chat
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

Thursday, January 25, 2024

[USN-6607-1] Linux kernel (Azure) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmWy+f0FAwAAAAAACgkQZ0GeRcM5nt2C
HAf/TWixpkCNkpsEv5VR2VA0hKLQTZdfEs/TzwKRhpTEABUStb4F8BujJPpYWAsVRjAxD72HwlLD
1oB/1tGskeF7gQLGQ4SIiCIzSeVwvQJ02PHap4PQZQ/QvuwZccXz+MIyKZG0iAa7cXY6FusJzWkE
bZeE/+ZR7mt6efEL4eBGTpAPzUlKhE4j9AgWQwPSGnfobnlOtPlgLftgOO5qXauL3QGc3Bl76tnB
QGqC9v7+J9NSScwUScqWWC/O9B+pI/jImsHFwfRseHWtr8IQ66culDnQkyH5tznWmbNC3V7DW1Dj
LTnEGYmCZo0mdrOZKWFYG5ocW+pCWrDOGqLvjCjNsA==
=v7kQ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6607-1
January 25, 2024

linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15
vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems
- linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems
- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems
- linux-azure-fde-5.15: Linux kernel for Microsoft Azure CVM cloud systems

Details:

It was discovered that the SMB network file sharing protocol implementation
in the Linux kernel did not properly handle certain error conditions,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2023-5345)

Lin Ma discovered that the netfilter subsystem in the Linux kernel did not
properly validate network family support while creating a new netfilter
table. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2023-6040)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly validate the server frame size in certain
situation, leading to an out-of-bounds read vulnerability. An attacker
could use this to construct a malicious CIFS image that, when operated on,
could cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2023-6606)

Xingyuan Mo discovered that the netfilter subsystem in the Linux kernel did
not properly handle inactive elements in its PIPAPO data structure, leading
to a use-after-free vulnerability. A local attacker could use this to cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2023-6817)

Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf
subsystem in the Linux kernel did not properly validate all event sizes
when attaching new events, leading to an out-of-bounds write vulnerability.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6931)

It was discovered that the IGMP protocol implementation in the Linux kernel
contained a race condition, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-6932)

Kevin Rich discovered that the netfilter subsystem in the Linux kernel did
not properly check deactivated elements in certain situations, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-0193)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
linux-image-5.15.0-1054-azure 5.15.0-1054.62
linux-image-5.15.0-1054-azure-fde 5.15.0-1054.62.1
linux-image-azure-fde-lts-22.04 5.15.0.1054.62.32
linux-image-azure-lts-22.04 5.15.0.1054.50

Ubuntu 20.04 LTS:
linux-image-5.15.0-1054-azure 5.15.0-1054.62~20.04.1
linux-image-5.15.0-1054-azure-fde 5.15.0-1054.62~20.04.1.1
linux-image-azure 5.15.0.1054.62~20.04.43
linux-image-azure-cvm 5.15.0.1054.62~20.04.43
linux-image-azure-fde 5.15.0.1054.62~20.04.1.32

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-6607-1
CVE-2023-5345, CVE-2023-6040, CVE-2023-6606, CVE-2023-6817,
CVE-2023-6931, CVE-2023-6932, CVE-2024-0193

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1054.62
https://launchpad.net/ubuntu/+source/linux-azure-fde/5.15.0-1054.62.1
https://launchpad.net/ubuntu/+source/linux-azure-5.15/5.15.0-1054.62~20.04.1

https://launchpad.net/ubuntu/+source/linux-azure-fde-5.15/5.15.0-1054.62~20.04.1.1