SK-CERT Bezpečnostné varovanie V20241218-04

Dôležitosť Kritická
Klasifikácia Neutajované/TLP:CLEAR
CVSS Skóre
9.8
Identifikátor
Linux Ubuntu – dve kritické bezpečnostné zraniteľnosti
Popis
Vývojári Linux distribúcie Ubuntu vydali bezpečnostné aktualizácie svojho produktu, ktoré opravujú viacero bezpečnostných zraniteľností, z ktorých sú dve označené ako kritické.
Najzávažnejšia kritická bezpečnostná zraniteľnosť s identifikátorom CVE-2024-11236 sa nachádza v balíku PHP, spočíva v nedostatočnej implementácii bezpečnostných mechanizmov a umožňuje vzdialenému, neautentifikovanému útočníkovi prostredníctvom pretečenia celého čísla vykonať škodlivý kód, získať neoprávnený prístup k citlivým údajom, vykonať neoprávnené zmeny v systéme a spôsobiť zneprístupnenie služby.
Zneužitím ostatných bezpečnostných zraniteľností možno získať neoprávnený prístup k citlivým údajom, vykonať neoprávnené zmeny v systéme, spôsobiť zneprístupnenie služby, eskalovať privilégiá a vykonať škodlivý kód.
Zneužitie niektorých zraniteľností vyžaduje interakciu používateľa.
Dátum prvého zverejnenia varovania
15.12.2024
CVE
CVE-2024-8932, CVE-2024-8929, CVE-2024-52804, CVE-2024-49984, CVE-2024-47683, CVE-2024-47674, CVE-2024-47669, CVE-2024-47668, CVE-2024-47667, CVE-2024-47666, CVE-2024-47665, CVE-2024-47664, CVE-2024-47663, CVE-2024-47662, CVE-2024-47661, CVE-2024-47660, CVE-2024-47659, CVE-2024-47658, CVE-2024-46871, CVE-2024-46870, CVE-2024-46868, CVE-2024-46867, CVE-2024-46866, CVE-2024-46864, CVE-2024-46861, CVE-2024-46860, CVE-2024-46859, CVE-2024-46858, CVE-2024-46857, CVE-2024-46855, CVE-2024-46854, CVE-2024-46853, CVE-2024-46852, CVE-2024-46851, CVE-2024-46850, CVE-2024-46849, CVE-2024-46848, CVE-2024-46847, CVE-2024-46846, CVE-2024-46845, CVE-2024-46844, CVE-2024-46843, CVE-2024-46842, CVE-2024-46841, CVE-2024-46840, CVE-2024-46838, CVE-2024-46836, CVE-2024-46835, CVE-2024-46834, CVE-2024-46832, CVE-2024-46831, CVE-2024-46830, CVE-2024-46829, CVE-2024-46828, CVE-2024-46827, CVE-2024-46826, CVE-2024-46825, CVE-2024-46824, CVE-2024-46823, CVE-2024-46822, CVE-2024-46821, CVE-2024-46819, CVE-2024-46818, CVE-2024-46817, CVE-2024-46816, CVE-2024-46815, CVE-2024-46814, CVE-2024-46813, CVE-2024-46812, CVE-2024-46811, CVE-2024-46810, CVE-2024-46809, CVE-2024-46808, CVE-2024-46807, CVE-2024-46806, CVE-2024-46805, CVE-2024-46804, CVE-2024-46803, CVE-2024-46802, CVE-2024-46800, CVE-2024-46798, CVE-2024-46797, CVE-2024-46795, CVE-2024-46794, CVE-2024-46793, CVE-2024-46792, CVE-2024-46791, CVE-2024-46788, CVE-2024-46787, CVE-2024-46786, CVE-2024-46785, CVE-2024-46784, CVE-2024-46783, CVE-2024-46782, CVE-2024-46781, CVE-2024-46780, CVE-2024-46779, CVE-2024-46778, CVE-2024-46777, CVE-2024-46776, CVE-2024-46775, CVE-2024-46774, CVE-2024-46773, CVE-2024-46772, CVE-2024-46771, CVE-2024-46770, CVE-2024-46768, CVE-2024-46767, CVE-2024-46766, CVE-2024-46765, CVE-2024-46763, CVE-2024-46762, CVE-2024-46761, CVE-2024-46760, CVE-2024-46759, CVE-2024-46758, CVE-2024-46757, CVE-2024-46756, CVE-2024-46755, CVE-2024-46754, CVE-2024-46753, CVE-2024-46752, CVE-2024-46751, CVE-2024-46750, CVE-2024-46749, CVE-2024-46747, CVE-2024-46746, CVE-2024-46745, CVE-2024-46744, CVE-2024-46743, CVE-2024-46741, CVE-2024-46740, CVE-2024-46739, CVE-2024-46738, CVE-2024-46737, CVE-2024-46735, CVE-2024-46733, CVE-2024-46732, CVE-2024-46731, CVE-2024-46730, CVE-2024-46729, CVE-2024-46728, CVE-2024-46727, CVE-2024-46726, CVE-2024-46725, CVE-2024-46724, CVE-2024-46723, CVE-2024-46722, CVE-2024-46721, CVE-2024-46720, CVE-2024-46719, CVE-2024-46718, CVE-2024-46717, CVE-2024-46716, CVE-2024-46715, CVE-2024-46714, CVE-2024-46713, CVE-2024-46711, CVE-2024-46710, CVE-2024-46709, CVE-2024-46708, CVE-2024-46707, CVE-2024-46706, CVE-2024-46705, CVE-2024-46703, CVE-2024-46702, CVE-2024-46701, CVE-2024-46698, CVE-2024-46697, CVE-2024-46695, CVE-2024-46694, CVE-2024-46693, CVE-2024-46692, CVE-2024-46691, CVE-2024-46689, CVE-2024-46687, CVE-2024-46686, CVE-2024-46685, CVE-2024-46683, CVE-2024-46681, CVE-2024-46680, CVE-2024-46679, CVE-2024-46678, CVE-2024-46677, CVE-2024-46676, CVE-2024-46675, CVE-2024-46673, CVE-2024-46672, CVE-2024-45030, CVE-2024-45029, CVE-2024-45028, CVE-2024-45027, CVE-2024-45026, CVE-2024-45025, CVE-2024-45022, CVE-2024-45021, CVE-2024-45020, CVE-2024-45019, CVE-2024-45018, CVE-2024-45017, CVE-2024-45016, CVE-2024-45015, CVE-2024-45013, CVE-2024-45012, CVE-2024-45011, CVE-2024-45010, CVE-2024-45009, CVE-2024-45008, CVE-2024-45007, CVE-2024-45006, CVE-2024-45005, CVE-2024-45003, CVE-2024-45002, CVE-2024-45001, CVE-2024-45000, CVE-2024-44999, CVE-2024-44998, CVE-2024-44996, CVE-2024-44995, CVE-2024-44993, CVE-2024-44991, CVE-2024-44990, CVE-2024-44989, CVE-2024-44988, CVE-2024-44987, CVE-2024-44986, CVE-2024-44985, CVE-2024-44984, CVE-2024-44983, CVE-2024-44982, CVE-2024-44980, CVE-2024-44979, CVE-2024-44978, CVE-2024-44977, CVE-2024-44975, CVE-2024-44974, CVE-2024-44973, CVE-2024-44972, CVE-2024-44971, CVE-2024-44970, CVE-2024-44969, CVE-2024-44967, CVE-2024-44966, CVE-2024-44965, CVE-2024-44963, CVE-2024-44962, CVE-2024-44961, CVE-2024-44960, CVE-2024-44959, CVE-2024-44958, CVE-2024-44957, CVE-2024-44956, CVE-2024-44954, CVE-2024-44953, CVE-2024-44950, CVE-2024-44948, CVE-2024-44947, CVE-2024-44946, CVE-2024-44944, CVE-2024-44943, CVE-2024-44942, CVE-2024-44941, CVE-2024-44940, CVE-2024-44939, CVE-2024-44938, CVE-2024-44937, CVE-2024-44935, CVE-2024-44934, CVE-2024-44931, CVE-2024-44309, CVE-2024-44308, CVE-2024-43914, CVE-2024-43913, CVE-2024-43912, CVE-2024-43911, CVE-2024-43910, CVE-2024-43909, CVE-2024-43908, CVE-2024-43907, CVE-2024-43906, CVE-2024-43905, CVE-2024-43904, CVE-2024-43902, CVE-2024-43900, CVE-2024-43899, CVE-2024-43895, CVE-2024-43894, CVE-2024-43893, CVE-2024-43892, CVE-2024-43891, CVE-2024-43890, CVE-2024-43889, CVE-2024-43888, CVE-2024-43887, CVE-2024-43886, CVE-2024-43884, CVE-2024-43883, CVE-2024-43882, CVE-2024-43881, CVE-2024-43880, CVE-2024-43879, CVE-2024-43877, CVE-2024-43876, CVE-2024-43875, CVE-2024-43873, CVE-2024-43871, CVE-2024-43870, CVE-2024-43869, CVE-2024-43868, CVE-2024-43867, CVE-2024-43866, CVE-2024-43864, CVE-2024-43863, CVE-2024-43861, CVE-2024-43860, CVE-2024-43859, CVE-2024-43858, CVE-2024-43857, CVE-2024-43856, CVE-2024-43855, CVE-2024-43854, CVE-2024-43853, CVE-2024-43852, CVE-2024-43850, CVE-2024-43849, CVE-2024-43847, CVE-2024-43846, CVE-2024-43845, CVE-2024-43843, CVE-2024-43842, CVE-2024-43841, CVE-2024-43840, CVE-2024-43839, CVE-2024-43837, CVE-2024-43835, CVE-2024-43834, CVE-2024-43833, CVE-2024-43832, CVE-2024-43831, CVE-2024-43830, CVE-2024-43829, CVE-2024-43828, CVE-2024-43827, CVE-2024-43826, CVE-2024-43825, CVE-2024-43824, CVE-2024-43823, CVE-2024-43821, CVE-2024-43820, CVE-2024-43819, CVE-2024-43818, CVE-2024-43817, CVE-2024-42322, CVE-2024-42321, CVE-2024-42320, CVE-2024-42319, CVE-2024-42318, CVE-2024-42317, CVE-2024-42316, CVE-2024-42315, CVE-2024-42314, CVE-2024-42313, CVE-2024-42312, CVE-2024-42311, CVE-2024-42310, CVE-2024-42309, CVE-2024-42307, CVE-2024-42306, CVE-2024-42305, CVE-2024-42304, CVE-2024-42303, CVE-2024-42302, CVE-2024-42301, CVE-2024-42299, CVE-2024-42298, CVE-2024-42297, CVE-2024-42296, CVE-2024-42295, CVE-2024-42294, CVE-2024-42292, CVE-2024-42291, CVE-2024-42290, CVE-2024-42289, CVE-2024-42288, CVE-2024-42287, CVE-2024-42286, CVE-2024-42285, CVE-2024-42284, CVE-2024-42283, CVE-2024-42281, CVE-2024-42280, CVE-2024-42279, CVE-2024-42278, CVE-2024-42277, CVE-2024-42276, CVE-2024-42274, CVE-2024-42273, CVE-2024-42272, CVE-2024-42271, CVE-2024-42270, CVE-2024-42269, CVE-2024-42268, CVE-2024-42267, CVE-2024-42265, CVE-2024-42264, CVE-2024-42263, CVE-2024-42262, CVE-2024-42261, CVE-2024-42260, CVE-2024-42259, CVE-2024-42258, CVE-2024-42253, CVE-2024-42252, CVE-2024-42251, CVE-2024-42250, CVE-2024-42248, CVE-2024-42247, CVE-2024-42246, CVE-2024-42245, CVE-2024-42244, CVE-2024-42243, CVE-2024-42241, CVE-2024-42240, CVE-2024-42239, CVE-2024-42238, CVE-2024-42237, CVE-2024-42236, CVE-2024-42235, CVE-2024-42234, CVE-2024-42232, CVE-2024-42231, CVE-2024-42230, CVE-2024-42229, CVE-2024-42228, CVE-2024-42227, CVE-2024-42225, CVE-2024-42224, CVE-2024-42223, CVE-2024-42161, CVE-2024-42160, CVE-2024-42159, CVE-2024-42158, CVE-2024-42157, CVE-2024-42156, CVE-2024-42155, CVE-2024-42154, CVE-2024-42153, CVE-2024-42152, CVE-2024-42151, CVE-2024-42150, CVE-2024-42149, CVE-2024-42147, CVE-2024-42146, CVE-2024-42145, CVE-2024-42144, CVE-2024-42142, CVE-2024-42141, CVE-2024-42140, CVE-2024-42138, CVE-2024-42137, CVE-2024-42136, CVE-2024-42135, CVE-2024-42133, CVE-2024-42132, CVE-2024-42131, CVE-2024-42130, CVE-2024-42129, CVE-2024-42128, CVE-2024-42127, CVE-2024-42126, CVE-2024-42124, CVE-2024-42121, CVE-2024-42120, CVE-2024-42119, CVE-2024-42118, CVE-2024-42117, CVE-2024-42115, CVE-2024-42114, CVE-2024-42113, CVE-2024-42112, CVE-2024-42111, CVE-2024-42110, CVE-2024-42109, CVE-2024-42108, CVE-2024-42106, CVE-2024-42105, CVE-2024-42104, CVE-2024-42103, CVE-2024-42102, CVE-2024-42101, CVE-2024-42100, CVE-2024-42098, CVE-2024-42097, CVE-2024-42096, CVE-2024-42095, CVE-2024-42094, CVE-2024-42093, CVE-2024-42092, CVE-2024-42091, CVE-2024-42090, CVE-2024-42089, CVE-2024-42088, CVE-2024-42087, CVE-2024-42086, CVE-2024-42085, CVE-2024-42084, CVE-2024-42082, CVE-2024-42080, CVE-2024-42079, CVE-2024-42077, CVE-2024-42076, CVE-2024-42074, CVE-2024-42073, CVE-2024-42070, CVE-2024-42069, CVE-2024-42068, CVE-2024-42067, CVE-2024-42066, CVE-2024-42065, CVE-2024-42064, CVE-2024-42063, CVE-2024-41098, CVE-2024-41097, CVE-2024-41096, CVE-2024-41095, CVE-2024-41094, CVE-2024-41093, CVE-2024-41092, CVE-2024-41091, CVE-2024-41090, CVE-2024-41089, CVE-2024-41088, CVE-2024-41087, CVE-2024-41086, CVE-2024-41085, CVE-2024-41084, CVE-2024-41083, CVE-2024-41082, CVE-2024-41081, CVE-2024-41080, CVE-2024-41079, CVE-2024-41078, CVE-2024-41077, CVE-2024-41076, CVE-2024-41075, CVE-2024-41074, CVE-2024-41073, CVE-2024-41072, CVE-2024-41071, CVE-2024-41070, CVE-2024-41069, CVE-2024-41068, CVE-2024-41067, CVE-2024-41066, CVE-2024-41065, CVE-2024-41064, CVE-2024-41063, CVE-2024-41062, CVE-2024-41061, CVE-2024-41060, CVE-2024-41059, CVE-2024-41058, CVE-2024-41057, CVE-2024-41056, CVE-2024-41055, CVE-2024-41054, CVE-2024-41053, CVE-2024-41052, CVE-2024-41051, CVE-2024-41050, CVE-2024-41049, CVE-2024-41048, CVE-2024-41047, CVE-2024-41046, CVE-2024-41045, CVE-2024-41044, CVE-2024-41042, CVE-2024-41041, CVE-2024-41039, CVE-2024-41038, CVE-2024-41037, CVE-2024-41036, CVE-2024-41035, CVE-2024-41034, CVE-2024-41033, CVE-2024-41032, CVE-2024-41031, CVE-2024-41030, CVE-2024-41029, CVE-2024-41028, CVE-2024-41027, CVE-2024-41025, CVE-2024-41023, CVE-2024-41022, CVE-2024-41021, CVE-2024-41020, CVE-2024-41019, CVE-2024-41018, CVE-2024-41017, CVE-2024-41015, CVE-2024-41012, CVE-2024-41011, CVE-2024-41010, CVE-2024-41009, CVE-2024-41007, CVE-2024-40915, CVE-2024-39487, CVE-2024-39486, CVE-2024-39472, CVE-2024-38611, CVE-2024-38602, CVE-2024-38577, CVE-2024-38560, CVE-2024-38538, CVE-2024-36484, CVE-2024-35877, CVE-2024-27397, CVE-2024-27022, CVE-2024-26893, CVE-2024-26800, CVE-2024-26675, CVE-2024-26669, CVE-2024-26668, CVE-2024-26661, CVE-2024-26636, CVE-2024-26633, CVE-2024-26607, CVE-2024-25744, CVE-2024-25741, CVE-2024-24968, CVE-2024-23984, CVE-2024-23918, CVE-2024-21853, CVE-2024-21820, CVE-2024-11236, CVE-2024-11234, CVE-2024-11233, CVE-2023-52918, CVE-2023-52889, CVE-2023-52888, CVE-2023-52887, CVE-2023-52614, CVE-2023-52599, CVE-2023-52578, CVE-2023-52531, CVE-2023-52502, CVE-2023-46750, CVE-2023-46749, CVE-2023-46446, CVE-2023-46445, CVE-2023-4235, CVE-2023-4232, CVE-2023-34478, CVE-2023-28370, CVE-2022-48943, CVE-2022-48938, CVE-2022-48733, CVE-2022-48666, CVE-2022-40468, CVE-2022-24448, CVE-2022-2414, CVE-2021-47055, CVE-2021-32719, CVE-2021-32718, CVE-2021-29063, CVE-2020-25715, CVE-2017-7537, CVE-2016-6802
IOC
Zasiahnuté systémy
Ubuntu 24.10
libapache2-mod-php8.3 – 8.3.11-0ubuntu0.24.10.4
php8.3 – 8.3.11-0ubuntu0.24.10.4
php8.3-cgi – 8.3.11-0ubuntu0.24.10.4
php8.3-cli – 8.3.11-0ubuntu0.24.10.4
php8.3-fpm – 8.3.11-0ubuntu0.24.10.4
php8.3-mysql – 8.3.11-0ubuntu0.24.10.4
ofono – 1.31-3ubuntu3.24.10.2
python3-tornado – 6.4.1-2ubuntu0.1
intel-microcode – 3.20241112.0ubuntu0.24.10.1
libshiro-java – 1.3.2-5ubuntu0.24.10.1
libjavascriptcoregtk-4.1-0 – 2.46.4-0ubuntu0.24.10.1
libjavascriptcoregtk-6.0-1 – 2.46.4-0ubuntu0.24.10.1
libwebkit2gtk-4.1-0 – 2.46.4-0ubuntu0.24.10.1
libwebkitgtk-6.0-4 – 2.46.4-0ubuntu0.24.10.1

Ubuntu 24.04
libapache2-mod-php8.3 – 8.3.6-0ubuntu0.24.04.3
php8.3 – 8.3.6-0ubuntu0.24.04.3
php8.3-cgi – 8.3.6-0ubuntu0.24.04.3
php8.3-cli – 8.3.6-0ubuntu0.24.04.3
php8.3-fpm – 8.3.6-0ubuntu0.24.04.3
php8.3-mysql – 8.3.6-0ubuntu0.24.04.3
linux-image-6.8.0-1002-gkeop – 6.8.0-1002.4
linux-image-gkeop – 6.8.0-1002.4
linux-image-gkeop-6.8 – 6.8.0-1002.4
linux-image-6.8.0-1019-nvidia – 6.8.0-1019.21
linux-image-6.8.0-1019-nvidia-64k – 6.8.0-1019.21
linux-image-6.8.0-1019-nvidia-lowlatency – 6.8.0-1019.21.1
linux-image-6.8.0-1019-nvidia-lowlatency-64k – 6.8.0-1019.21.1
linux-image-nvidia – 6.8.0-1019.21
linux-image-nvidia-64k – 6.8.0-1019.21
linux-image-nvidia-lowlatency – 6.8.0-1019.21.1
linux-image-nvidia-lowlatency-64k – 6.8.0-1019.21.1
linux-image-6.8.0-1015-gke – 6.8.0-1015.19
linux-image-6.8.0-1016-raspi – 6.8.0-1016.18
linux-image-6.8.0-1017-ibm – 6.8.0-1017.17
linux-image-6.8.0-1017-oracle – 6.8.0-1017.18
linux-image-6.8.0-1017-oracle-64k – 6.8.0-1017.18
linux-image-6.8.0-1018-oem – 6.8.0-1018.18
linux-image-6.8.0-1019-gcp – 6.8.0-1019.21
linux-image-6.8.0-1020-aws – 6.8.0-1020.22
linux-image-6.8.0-50-generic – 6.8.0-50.51
linux-image-6.8.0-50-generic-64k – 6.8.0-50.51
linux-image-6.8.0-50-lowlatency – 6.8.0-50.51.1
linux-image-6.8.0-50-lowlatency-64k – 6.8.0-50.51.1
linux-image-aws – 6.8.0-1020.22
linux-image-gcp – 6.8.0-1019.21
linux-image-generic – 6.8.0-50.51
linux-image-generic-64k – 6.8.0-50.51
linux-image-generic-64k-hwe-24.04 – 6.8.0-50.51
linux-image-generic-hwe-24.04 – 6.8.0-50.51
linux-image-generic-lpae – 6.8.0-50.51
linux-image-gke – 6.8.0-1015.19
linux-image-ibm – 6.8.0-1017.17
linux-image-ibm-classic – 6.8.0-1017.17
linux-image-ibm-lts-24.04 – 6.8.0-1017.17
linux-image-kvm – 6.8.0-50.51
linux-image-lowlatency – 6.8.0-50.51.1
linux-image-lowlatency-64k – 6.8.0-50.51.1
linux-image-lowlatency-64k-hwe-24.04 – 6.8.0-50.51.1
linux-image-lowlatency-hwe-24.04 – 6.8.0-50.51.1
linux-image-oem-24.04 – 6.8.0-1018.18
linux-image-oem-24.04a – 6.8.0-1018.18
linux-image-oracle – 6.8.0-1017.18
linux-image-oracle-64k – 6.8.0-1017.18
linux-image-raspi – 6.8.0-1016.18
linux-image-virtual – 6.8.0-50.51
linux-image-virtual-hwe-24.04 – 6.8.0-50.51
ofono – 1.31-3ubuntu3.24.04.2
python3-tornado – 6.4.0-1ubuntu0.1
intel-microcode – 3.20241112.0ubuntu0.24.04.1
libshiro-java – 1.3.2-5ubuntu0.24.04.1~esm1 (dostupné pre Ubuntu Pro)
libjavascriptcoregtk-4.1-0 – 2.46.4-0ubuntu0.24.04.1
libjavascriptcoregtk-6.0-1 – 2.46.4-0ubuntu0.24.04.1
libwebkit2gtk-4.1-0 – 2.46.4-0ubuntu0.24.04.1
libwebkitgtk-6.0-4 – 2.46.4-0ubuntu0.24.04.1

Ubuntu 22.04
libapache2-mod-php7.4 – 8.1.2-1ubuntu2.20
libapache2-mod-php8.0 – 8.1.2-1ubuntu2.20
libapache2-mod-php8.1 – 8.1.2-1ubuntu2.20
php8.1 – 8.1.2-1ubuntu2.20
php8.1-cgi – 8.1.2-1ubuntu2.20
php8.1-cli – 8.1.2-1ubuntu2.20
php8.1-enchant – 8.1.2-1ubuntu2.20
php8.1-fpm – 8.1.2-1ubuntu2.20
php8.1-mysql – 8.1.2-1ubuntu2.20
linux-image-6.8.0-1019-nvidia – 6.8.0-1019.21~22.04.1
linux-image-6.8.0-1019-nvidia-64k – 6.8.0-1019.21~22.04.1
linux-image-nvidia-6.8 – 6.8.0-1019.21~22.04.1
linux-image-nvidia-64k-6.8 – 6.8.0-1019.21~22.04.1
linux-image-nvidia-64k-hwe-22.04 – 6.8.0-1019.21~22.04.1
linux-image-nvidia-hwe-22.04 – 6.8.0-1019.21~22.04.1
linux-image-6.8.0-1017-oracle – 6.8.0-1017.18~22.04.1
linux-image-6.8.0-1017-oracle-64k – 6.8.0-1017.18~22.04.1
linux-image-6.8.0-1019-gcp – 6.8.0-1019.21~22.04.1
linux-image-6.8.0-1020-aws – 6.8.0-1020.22~22.04.1
linux-image-6.8.0-50-lowlatency – 6.8.0-50.51.1~22.04.1
linux-image-6.8.0-50-lowlatency-64k – 6.8.0-50.51.1~22.04.1
linux-image-aws – 6.8.0-1020.22~22.04.1
linux-image-gcp – 6.8.0-1019.21~22.04.1
linux-image-lowlatency-64k-hwe-22.04 – 6.8.0-50.51.1~22.04.1
linux-image-lowlatency-hwe-22.04 – 6.8.0-50.51.1~22.04.1
linux-image-oracle – 6.8.0-1017.18~22.04.1
linux-image-oracle-64k – 6.8.0-1017.18~22.04.1
ofono – 1.31-3ubuntu1.2
python3-tornado – 6.1.0-3ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
intel-microcode – 3.20241112.0ubuntu0.22.04.1
dogtag-pki – 11.0.0-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
pki-base – 11.0.0-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
pki-base-java – 11.0.0-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
pki-ca – 11.0.0-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
pki-server – 11.0.0-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
linux-image-5.15.0-1067-intel-iotg – 5.15.0-1067.73
linux-image-intel-iotg – 5.15.0.1067.67
libjavascriptcoregtk-4.0-18 – 2.46.4-0ubuntu0.22.04.1
libjavascriptcoregtk-4.1-0 – 2.46.4-0ubuntu0.22.04.1
libjavascriptcoregtk-6.0-1 – 2.46.4-0ubuntu0.22.04.1
libwebkit2gtk-4.0-37 – 2.46.4-0ubuntu0.22.04.1
libwebkit2gtk-4.1-0 – 2.46.4-0ubuntu0.22.04.1
libwebkitgtk-6.0-4 – 2.46.4-0ubuntu0.22.04.1
tinyproxy – 1.11.0-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
tinyproxy-bin – 1.11.0-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)

Ubuntu 20.04
python3-mpmath – 1.1.0-2ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
libapache2-mod-php7.4 – 7.4.3-4ubuntu2.28
php7.4 – 7.4.3-4ubuntu2.28
php7.4-cgi – 7.4.3-4ubuntu2.28
php7.4-cli – 7.4.3-4ubuntu2.28
php7.4-ldap – 7.4.3-4ubuntu2.28
libapache2-mod-php7.4 – 7.4.3-4ubuntu2.28
php7.4 – 7.4.3-4ubuntu2.28
php7.4-cgi – 7.4.3-4ubuntu2.28
php7.4-cli – 7.4.3-4ubuntu2.28
php7.4-fpm – 7.4.3-4ubuntu2.28
php7.4-mysql – 7.4.3-4ubuntu2.28
ofono – 1.31-2ubuntu1+esm2 (dostupné pre Ubuntu Pro)
python3-tornado – 6.0.3+really5.1.1-3ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
intel-microcode – 3.20241112.0ubuntu0.20.04.1
linux-image-5.15.0-1067-intel-iotg – 5.15.0-1067.73~20.04.1
linux-image-intel – 5.15.0.1067.73~20.04.1
linux-image-intel-iotg – 5.15.0.1067.73~20.04.1
rabbitmq-server – 3.8.3-0ubuntu0.2
tinyproxy – 1.10.0-4ubuntu0.1
tinyproxy-bin – 1.10.0-4ubuntu0.1

Ubuntu 18.04
python-mpmath – 1.0.0-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
python3-mpmath – 1.0.0-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
libapache2-mod-php7.2 – 7.2.24-0ubuntu0.18.04.17+esm7 (dostupné pre Ubuntu Pro)
libphp7.2-embed – 7.2.24-0ubuntu0.18.04.17+esm7 (dostupné pre Ubuntu Pro)
php7.2 – 7.2.24-0ubuntu0.18.04.17+esm7 (dostupné pre Ubuntu Pro)
php7.2-common – 7.2.24-0ubuntu0.18.04.17+esm7 (dostupné pre Ubuntu Pro)
php7.2-dev – 7.2.24-0ubuntu0.18.04.17+esm7 (dostupné pre Ubuntu Pro)
php7.2-interbase – 7.2.24-0ubuntu0.18.04.17+esm7 (dostupné pre Ubuntu Pro)
php7.2-mysql – 7.2.24-0ubuntu0.18.04.17+esm7 (dostupné pre Ubuntu Pro)
php7.2-pgsql – 7.2.24-0ubuntu0.18.04.17+esm7 (dostupné pre Ubuntu Pro)
php7.2-sqlite3 – 7.2.24-0ubuntu0.18.04.17+esm7 (dostupné pre Ubuntu Pro)
python3-asyncssh – 1.11.1-1ubuntu0.1~esm2 (dostupné pre Ubuntu Pro)
ofono – 1.21-1ubuntu1+esm2 (dostupné pre Ubuntu Pro)
python-tornado – 4.5.3-1ubuntu0.2+esm1 (dostupné pre Ubuntu Pro)
python3-tornado – 4.5.3-1ubuntu0.2+esm1 (dostupné pre Ubuntu Pro)
intel-microcode – 3.20241112.0ubuntu0.18.04.1+esm1 (dostupné pre Ubuntu Pro)
tinyproxy – 1.8.4-5ubuntu0.1~esm2 (dostupné pre Ubuntu Pro)
tinyproxy-bin – 1.8.4-5ubuntu0.1~esm2 (dostupné pre Ubuntu Pro)

Ubuntu 16.04
python-mpmath – 0.19-3ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
python3-mpmath – 0.19-3ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
libapache2-mod-php7.0 – 7.0.33-0ubuntu0.16.04.16+esm13 (dostupné pre Ubuntu Pro)
libphp7.0-embed – 7.0.33-0ubuntu0.16.04.16+esm13 (dostupné pre Ubuntu Pro)
php7.0 – 7.0.33-0ubuntu0.16.04.16+esm13 (dostupné pre Ubuntu Pro)
php7.0-common – 7.0.33-0ubuntu0.16.04.16+esm13 (dostupné pre Ubuntu Pro)
php7.0-dev – 7.0.33-0ubuntu0.16.04.16+esm13 (dostupné pre Ubuntu Pro)
php7.0-interbase – 7.0.33-0ubuntu0.16.04.16+esm13 (dostupné pre Ubuntu Pro)
php7.0-mysql – 7.0.33-0ubuntu0.16.04.16+esm13 (dostupné pre Ubuntu Pro)
php7.0-pgsql – 7.0.33-0ubuntu0.16.04.16+esm13 (dostupné pre Ubuntu Pro)
php7.0-sqlite3 – 7.0.33-0ubuntu0.16.04.16+esm13 (dostupné pre Ubuntu Pro)
ofono – 1.17.bzr6912+16.04.20160314.3-0ubuntu1+esm2 (dostupné pre Ubuntu Pro)
intel-microcode – 3.20241112.0ubuntu0.16.04.1+esm1 (dostupné pre Ubuntu Pro)
linux-image-4.4.0-1139-kvm – 4.4.0-1139.149 (dostupné pre Ubuntu Pro)
linux-image-4.4.0-1176-aws – 4.4.0-1176.191 (dostupné pre Ubuntu Pro)
linux-image-4.4.0-261-generic – 4.4.0-261.295 (dostupné pre Ubuntu Pro)
linux-image-4.4.0-261-lowlatency – 4.4.0-261.295 (dostupné pre Ubuntu Pro)
linux-image-aws – 4.4.0.1176.180 (dostupné pre Ubuntu Pro)
linux-image-generic – 4.4.0.261.267 (dostupné pre Ubuntu Pro)
linux-image-generic-lts-xenial – 4.4.0.261.267 (dostupné pre Ubuntu Pro)
linux-image-kvm – 4.4.0.1139.136 (dostupné pre Ubuntu Pro)
linux-image-lowlatency – 4.4.0.261.267 (dostupné pre Ubuntu Pro)
linux-image-lowlatency-lts-xenial – 4.4.0.261.267 (dostupné pre Ubuntu Pro)
linux-image-virtual – 4.4.0.261.267 (dostupné pre Ubuntu Pro)
linux-image-virtual-lts-xenial – 4.4.0.261.267 (dostupné pre Ubuntu Pro)
libshiro-java – 1.2.4-1ubuntu0.1~esm2 (dostupné pre Ubuntu Pro)
dogtag-pki – 10.2.6+git20160317-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
pki-base – 10.2.6+git20160317-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
pki-ca – 10.2.6+git20160317-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
pki-server – 10.2.6+git20160317-1ubuntu0.1~esm1 (dostupné pre Ubuntu Pro)
tinyproxy – 1.8.3-3ubuntu16.04.1~esm2 (dostupné pre Ubuntu Pro)

Ubuntu 14.04
linux-image-4.4.0-1138-aws – 4.4.0-1138.144 (dostupné pre Ubuntu Pro)
linux-image-4.4.0-261-generic – 4.4.0-261.295~14.04.1 (dostupné pre Ubuntu Pro)
linux-image-4.4.0-261-lowlatency – 4.4.0-261.295~14.04.1 (dostupné pre Ubuntu Pro)
linux-image-aws – 4.4.0.1138.135 (dostupné pre Ubuntu Pro)
linux-image-generic-lts-xenial – 4.4.0.261.295~14.04.1 (dostupné pre Ubuntu Pro)
linux-image-lowlatency-lts-xenial – 4.4.0.261.295~14.04.1 (dostupné pre Ubuntu Pro)
linux-image-virtual-lts-xenial – 4.4.0.261.295~14.04.1 (dostupné pre Ubuntu Pro)

Následky
Vykonanie škodlivého kódu
Eskalácia privilégií
Neoprávnený prístup k citlivým údajom
Neoprávnená zmena v systéme
Zneprístupnenie služby
Odporúčania
Administrátorom a používateľom odporúčame bezodkladne vykonať aktualizáciu zasiahnutých systémov.
Po odstránení zraniteľností, ktoré mohli spôsobiť vzdialené vykonanie kódu, je dobrou praxou kontrola systému a zmena všetkých hesiel a kľúčov na dotknutom systéme a aj na iných systémoch, kde sa používalo rovnaké heslo či kľúč.
Taktiež odporúčame poučiť používateľov, aby neotvárali neoverené e-mailové správy, prílohy z neznámych zdrojov a nenavštevovali nedôveryhodné webové stránky.
Zdroje
https://ubuntu.com/security/notices/USN-7157-1
https://ubuntu.com/security/notices/USN-7153-1
https://ubuntu.com/security/CVE-2024-11236
https://ubuntu.com/security/notices/USN-7147-1
https://ubuntu.com/security/CVE-2023-34478
https://ubuntu.com/security/notices/USN-7160-1
https://ubuntu.com/security/notices/USN-7157-2
https://ubuntu.com/security/notices/USN-7156-1
https://ubuntu.com/security/notices/USN-7155-1
https://ubuntu.com/security/notices/USN-7154-1
https://ubuntu.com/security/notices/USN-7108-2
https://ubuntu.com/security/notices/USN-7151-1
https://ubuntu.com/security/notices/USN-7150-1
https://ubuntu.com/security/notices/USN-7149-1
https://ubuntu.com/security/notices/USN-7148-1
https://ubuntu.com/security/notices/USN-7146-1
https://ubuntu.com/security/notices/USN-7144-1
https://ubuntu.com/security/notices/USN-7143-1
https://ubuntu.com/security/notices/USN-7142-1
https://ubuntu.com/security/notices/USN-7140-1

« Späť na zoznam