Skip to content

ubuntu jammy v1.829

Choose a tag to compare

@bosh-admin-bot bosh-admin-bot released this 26 May 07:12
· 517 commits to ubuntu-jammy since this release

Metadata:

BOSH Agent Version: 2.745.0
Kernel Version: 5.15.0.140.135

USNs:

Title: USN-7510-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7510-1
Priorities: medium, low
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - Network block device driver; - Bus devices; - Character device driver; - TPM device driver; - Clock framework and drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - InfiniBand drivers; - Media drivers; - NVIDIA Tegra memory controller driver; - Network drivers; - PCI subsystem; - PPS (Pulse Per Second) driver; - PTP clock framework; - RapidIO drivers; - Real Time Clock drivers; - SLIMbus drivers; - QCOM SoC drivers; - Trusted Execution Environment drivers; - TTY drivers; - USB DSL drivers; - USB Device Class drivers; - USB core drivers; - USB Gadget drivers; - USB Host Controller drivers; - Renesas USBHS Controller drivers; - ACRN Hypervisor Service Module driver; - File systems infrastructure; - BTRFS file system; - F2FS file system; - Network file system (NFS) server daemon; - NILFS2 file system; - Overlay file system; - SMB network file system; - UBI file system; - KVM subsystem; - L3 Master device support module; - Process Accounting mechanism; - Padata parallel execution mechanism; - printk logging mechanism; - Scheduler infrastructure; - Timer subsystem; - Tracing infrastructure; - Memory management; - 802.1Q VLAN protocol; - B.A.T.M.A.N. meshing protocol; - Networking core; - IPv4 networking; - IPv6 networking; - Logical Link layer; - Multipath TCP; - Netfilter; - NFC subsystem; - Open vSwitch; - Rose network layer; - Network traffic control; - Wireless networking; - Landlock security; - Linux Security Modules (LSM) Framework; - Tomoyo security module; (CVE-2025-21731, CVE-2025-21926, CVE-2025-21830, CVE-2024-58010, CVE-2025-21745, CVE-2025-21871, CVE-2024-57980, CVE-2025-21916, CVE-2025-21735, CVE-2025-21763, CVE-2025-21799, CVE-2025-21811, CVE-2025-21814, CVE-2024-58083, CVE-2025-21922, CVE-2025-21802, CVE-2024-58034, CVE-2025-21758, CVE-2024-58069, CVE-2025-21905, CVE-2024-57986, CVE-2025-21718, CVE-2024-58020, CVE-2025-21858, CVE-2025-21749, CVE-2025-21928, CVE-2024-58085, CVE-2025-21795, CVE-2025-21744, CVE-2025-21776, CVE-2025-21804, CVE-2024-57973, CVE-2025-21848, CVE-2025-21844, CVE-2024-56721, CVE-2024-58079, CVE-2025-21781, CVE-2025-21866, CVE-2024-58052, CVE-2024-58017, CVE-2024-58071, CVE-2025-21791, CVE-2024-26982, CVE-2025-21787, CVE-2024-58090, CVE-2025-21951, CVE-2025-21846, CVE-2025-21722, CVE-2024-58001, CVE-2025-21715, CVE-2025-21919, CVE-2025-21904, CVE-2024-57977, CVE-2025-21785, CVE-2025-21950, CVE-2025-21924, CVE-2024-57979, CVE-2025-21711, CVE-2024-47726, CVE-2024-58002, CVE-2025-21914, CVE-2024-58086, CVE-2024-58005, CVE-2025-21835, CVE-2024-58051, CVE-2025-21761, CVE-2025-21760, CVE-2025-21767, CVE-2025-21766, CVE-2025-21726, CVE-2025-21865, CVE-2024-58014, CVE-2025-21878, CVE-2025-21934, CVE-2024-58007, CVE-2025-21898, CVE-2025-21806, CVE-2024-58058, CVE-2025-21779, CVE-2024-58063, CVE-2025-21708, CVE-2025-21684, CVE-2024-57834, CVE-2025-21971, CVE-2025-21762, CVE-2025-21728, CVE-2024-58076, CVE-2025-21704, CVE-2025-21719, CVE-2025-21948, CVE-2025-21707, CVE-2025-21917, CVE-2025-21782, CVE-2025-21943, CVE-2025-21765, CVE-2025-21721, CVE-2024-58016, CVE-2025-21859, CVE-2025-21909, CVE-2025-21748, CVE-2025-21912, CVE-2025-21736, CVE-2025-21862, CVE-2024-57978, CVE-2025-21826, CVE-2025-21920, CVE-2025-21772, CVE-2025-21877, CVE-2025-21935, CVE-2024-56599, CVE-2025-21820, CVE-2025-21764, CVE-2025-21796, CVE-2025-21887, CVE-2025-21753, CVE-2025-21910, CVE-2024-57981, CVE-2025-21727, CVE-2025-21875, CVE-2024-58072, CVE-2024-58055, CVE-2025-21925, CVE-2025-21823, CVE-2025-21647) Update Instructions: Run sudo pro fix USN-7510-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-cloud-tools-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-gkeop-cloud-tools-5.15.0-1066 - 5.15.0-1066.74 linux-gkeop-headers-5.15.0-1066 - 5.15.0-1066.74 linux-gkeop-tools-5.15.0-1066 - 5.15.0-1066.74 linux-headers-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-image-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-image-unsigned-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-modules-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-modules-extra-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-tools-5.15.0-1066-gkeop - 5.15.0-1066.74 No subscription required linux-buildinfo-5.15.0-1076-ibm - 5.15.0-1076.79 linux-headers-5.15.0-1076-ibm - 5.15.0-1076.79 linux-ibm-cloud-tools-common - 5.15.0-1076.79 linux-ibm-headers-5.15.0-1076 - 5.15.0-1076.79 linux-ibm-source-5.15.0 - 5.15.0-1076.79 linux-ibm-tools-5.15.0-1076 - 5.15.0-1076.79 linux-ibm-tools-common - 5.15.0-1076.79 linux-image-5.15.0-1076-ibm - 5.15.0-1076.79 linux-image-unsigned-5.15.0-1076-ibm - 5.15.0-1076.79 linux-modules-5.15.0-1076-ibm - 5.15.0-1076.79 linux-modules-extra-5.15.0-1076-ibm - 5.15.0-1076.79 linux-tools-5.15.0-1076-ibm - 5.15.0-1076.79 No subscription required linux-buildinfo-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-buildinfo-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-cloud-tools-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-cloud-tools-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-headers-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-headers-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-image-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-image-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-image-unsigned-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-image-unsigned-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-modules-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-modules-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-modules-extra-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-modules-nvidia-fs-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-modules-nvidia-fs-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-nvidia-cloud-tools-5.15.0-1078 - 5.15.0-1078.79 linux-nvidia-cloud-tools-common - 5.15.0-1078.79 linux-nvidia-headers-5.15.0-1078 - 5.15.0-1078.79 linux-nvidia-tools-5.15.0-1078 - 5.15.0-1078.79 linux-nvidia-tools-common - 5.15.0-1078.79 linux-nvidia-tools-host - 5.15.0-1078.79 linux-tools-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-tools-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 No subscription required linux-buildinfo-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-cloud-tools-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-headers-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-image-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-image-unsigned-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-intel-iotg-cloud-tools-5.15.0-1079 - 5.15.0-1079.85 linux-intel-iotg-cloud-tools-common - 5.15.0-1079.85 linux-intel-iotg-headers-5.15.0-1079 - 5.15.0-1079.85 linux-intel-iotg-tools-5.15.0-1079 - 5.15.0-1079.85 linux-intel-iotg-tools-common - 5.15.0-1079.85 linux-intel-iotg-tools-host - 5.15.0-1079.85 linux-modules-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-modules-extra-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-modules-iwlwifi-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-tools-5.15.0-1079-intel-iotg - 5.15.0-1079.85 No subscription required linux-buildinfo-5.15.0-1080-kvm - 5.15.0-1080.85 linux-headers-5.15.0-1080-kvm - 5.15.0-1080.85 linux-image-5.15.0-1080-kvm - 5.15.0-1080.85 linux-image-unsigned-5.15.0-1080-kvm - 5.15.0-1080.85 linux-kvm-headers-5.15.0-1080 - 5.15.0-1080.85 linux-kvm-tools-5.15.0-1080 - 5.15.0-1080.85 linux-modules-5.15.0-1080-kvm - 5.15.0-1080.85 linux-tools-5.15.0-1080-kvm - 5.15.0-1080.85 No subscription required linux-buildinfo-5.15.0-1081-oracle - 5.15.0-1081.87 linux-headers-5.15.0-1081-oracle - 5.15.0-1081.87 linux-image-5.15.0-1081-oracle - 5.15.0-1081.87 linux-image-unsigned-5.15.0-1081-oracle - 5.15.0-1081.87 linux-modules-5.15.0-1081-oracle - 5.15.0-1081.87 linux-modules-extra-5.15.0-1081-oracle - 5.15.0-1081.87 linux-oracle-headers-5.15.0-1081 - 5.15.0-1081.87 linux-oracle-tools-5.15.0-1081 - 5.15.0-1081.87 linux-tools-5.15.0-1081-oracle - 5.15.0-1081.87 No subscription required linux-buildinfo-5.15.0-140-generic - 5.15.0-140.150 linux-buildinfo-5.15.0-140-generic-64k - 5.15.0-140.150 linux-buildinfo-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-buildinfo-5.15.0-140-lowlatency - 5.15.0-140.150 linux-buildinfo-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-cloud-tools-5.15.0-140 - 5.15.0-140.150 linux-cloud-tools-5.15.0-140-generic - 5.15.0-140.150 linux-cloud-tools-5.15.0-140-lowlatency - 5.15.0-140.150 linux-cloud-tools-common - 5.15.0-140.150 linux-doc - 5.15.0-140.150 linux-headers-5.15.0-140 - 5.15.0-140.150 linux-headers-5.15.0-140-generic - 5.15.0-140.150 linux-headers-5.15.0-140-generic-64k - 5.15.0-140.150 linux-headers-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-headers-5.15.0-140-lowlatency - 5.15.0-140.150 linux-headers-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-image-5.15.0-140-generic - 5.15.0-140.150 linux-image-5.15.0-140-generic-64k - 5.15.0-140.150 linux-image-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-image-5.15.0-140-lowlatency - 5.15.0-140.150 linux-image-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-generic - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-generic-64k - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-lowlatency - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-libc-dev - 5.15.0-140.150 linux-lowlatency-cloud-tools-5.15.0-140 - 5.15.0-140.150 linux-lowlatency-headers-5.15.0-140 - 5.15.0-140.150 linux-lowlatency-tools-5.15.0-140 - 5.15.0-140.150 linux-modules-5.15.0-140-generic - 5.15.0-140.150 linux-modules-5.15.0-140-generic-64k - 5.15.0-140.150 linux-modules-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-modules-5.15.0-140-lowlatency - 5.15.0-140.150 linux-modules-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-modules-extra-5.15.0-140-generic - 5.15.0-140.150 linux-modules-iwlwifi-5.15.0-140-generic - 5.15.0-140.150 linux-modules-iwlwifi-5.15.0-140-lowlatency - 5.15.0-140.150 linux-source-5.15.0 - 5.15.0-140.150 linux-tools-5.15.0-140 - 5.15.0-140.150 linux-tools-5.15.0-140-generic - 5.15.0-140.150 linux-tools-5.15.0-140-generic-64k - 5.15.0-140.150 linux-tools-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-tools-5.15.0-140-lowlatency - 5.15.0-140.150 linux-tools-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-tools-common - 5.15.0-140.150 linux-tools-host - 5.15.0-140.150 No subscription required linux-cloud-tools-gkeop - 5.15.0.1066.65 linux-cloud-tools-gkeop-5.15 - 5.15.0.1066.65 linux-gkeop - 5.15.0.1066.65 linux-gkeop-5.15 - 5.15.0.1066.65 linux-headers-gkeop - 5.15.0.1066.65 linux-headers-gkeop-5.15 - 5.15.0.1066.65 linux-image-gkeop - 5.15.0.1066.65 linux-image-gkeop-5.15 - 5.15.0.1066.65 linux-modules-extra-gkeop - 5.15.0.1066.65 linux-modules-extra-gkeop-5.15 - 5.15.0.1066.65 linux-tools-gkeop - 5.15.0.1066.65 linux-tools-gkeop-5.15 - 5.15.0.1066.65 No subscription required linux-headers-ibm - 5.15.0.1076.72 linux-ibm - 5.15.0.1076.72 linux-image-ibm - 5.15.0.1076.72 linux-tools-ibm - 5.15.0.1076.72 No subscription required linux-cloud-tools-nvidia - 5.15.0.1078.78 linux-cloud-tools-nvidia-lowlatency - 5.15.0.1078.78 linux-headers-nvidia - 5.15.0.1078.78 linux-headers-nvidia-lowlatency - 5.15.0.1078.78 linux-image-nvidia - 5.15.0.1078.78 linux-image-nvidia-lowlatency - 5.15.0.1078.78 linux-nvidia - 5.15.0.1078.78 linux-nvidia-lowlatency - 5.15.0.1078.78 linux-tools-nvidia - 5.15.0.1078.78 linux-tools-nvidia-lowlatency - 5.15.0.1078.78 No subscription required linux-headers-intel-iotg - 5.15.0.1079.79 linux-image-intel-iotg - 5.15.0.1079.79 linux-intel-iotg - 5.15.0.1079.79 linux-tools-intel-iotg - 5.15.0.1079.79 No subscription required linux-headers-kvm - 5.15.0.1080.76 linux-image-kvm - 5.15.0.1080.76 linux-kvm - 5.15.0.1080.76 linux-tools-kvm - 5.15.0.1080.76 No subscription required linux-headers-oracle-lts-22.04 - 5.15.0.1081.77 linux-image-oracle-lts-22.04 - 5.15.0.1081.77 linux-oracle-lts-22.04 - 5.15.0.1081.77 linux-tools-oracle-lts-22.04 - 5.15.0.1081.77 No subscription required linux-cloud-tools-lowlatency - 5.15.0.140.126 linux-cloud-tools-lowlatency-hwe-20.04 - 5.15.0.140.126 linux-cloud-tools-lowlatency-hwe-20.04-edge - 5.15.0.140.126 linux-headers-lowlatency - 5.15.0.140.126 linux-headers-lowlatency-64k - 5.15.0.140.126 linux-headers-lowlatency-64k-hwe-20.04 - 5.15.0.140.126 linux-headers-lowlatency-64k-hwe-20.04-edge - 5.15.0.140.126 linux-headers-lowlatency-hwe-20.04 - 5.15.0.140.126 linux-headers-lowlatency-hwe-20.04-edge - 5.15.0.140.126 linux-image-lowlatency - 5.15.0.140.126 linux-image-lowlatency-64k - 5.15.0.140.126 linux-image-lowlatency-64k-hwe-20.04 - 5.15.0.140.126 linux-image-lowlatency-64k-hwe-20.04-edge - 5.15.0.140.126 linux-image-lowlatency-hwe-20.04 - 5.15.0.140.126 linux-image-lowlatency-hwe-20.04-edge - 5.15.0.140.126 linux-lowlatency - 5.15.0.140.126 linux-lowlatency-64k - 5.15.0.140.126 linux-lowlatency-64k-hwe-20.04 - 5.15.0.140.126 linux-lowlatency-64k-hwe-20.04-edge - 5.15.0.140.126 linux-lowlatency-hwe-20.04 - 5.15.0.140.126 linux-lowlatency-hwe-20.04-edge - 5.15.0.140.126 linux-tools-lowlatency - 5.15.0.140.126 linux-tools-lowlatency-64k - 5.15.0.140.126 linux-tools-lowlatency-64k-hwe-20.04 - 5.15.0.140.126 linux-tools-lowlatency-64k-hwe-20.04-edge - 5.15.0.140.126 linux-tools-lowlatency-hwe-20.04 - 5.15.0.140.126 linux-tools-lowlatency-hwe-20.04-edge - 5.15.0.140.126 No subscription required linux-cloud-tools-generic - 5.15.0.140.135 linux-cloud-tools-generic-hwe-20.04 - 5.15.0.140.135 linux-cloud-tools-generic-hwe-20.04-edge - 5.15.0.140.135 linux-cloud-tools-virtual - 5.15.0.140.135 linux-cloud-tools-virtual-hwe-20.04 - 5.15.0.140.135 linux-cloud-tools-virtual-hwe-20.04-edge - 5.15.0.140.135 linux-crashdump - 5.15.0.140.135 linux-generic - 5.15.0.140.135 linux-generic-64k - 5.15.0.140.135 linux-generic-64k-hwe-20.04 - 5.15.0.140.135 linux-generic-64k-hwe-20.04-edge - 5.15.0.140.135 linux-generic-hwe-20.04 - 5.15.0.140.135 linux-generic-hwe-20.04-edge - 5.15.0.140.135 linux-generic-lpae - 5.15.0.140.135 linux-generic-lpae-hwe-20.04 - 5.15.0.140.135 linux-generic-lpae-hwe-20.04-edge - 5.15.0.140.135 linux-headers-generic - 5.15.0.140.135 linux-headers-generic-64k - 5.15.0.140.135 linux-headers-generic-64k-hwe-20.04 - 5.15.0.140.135 linux-headers-generic-64k-hwe-20.04-edge - 5.15.0.140.135 linux-headers-generic-hwe-20.04 - 5.15.0.140.135 linux-headers-generic-hwe-20.04-edge - 5.15.0.140.135 linux-headers-generic-lpae - 5.15.0.140.135 linux-headers-generic-lpae-hwe-20.04 - 5.15.0.140.135 linux-headers-generic-lpae-hwe-20.04-edge - 5.15.0.140.135 linux-headers-oem-20.04 - 5.15.0.140.135 linux-headers-virtual - 5.15.0.140.135 linux-headers-virtual-hwe-20.04 - 5.15.0.140.135 linux-headers-virtual-hwe-20.04-edge - 5.15.0.140.135 linux-image-extra-virtual - 5.15.0.140.135 linux-image-extra-virtual-hwe-20.04 - 5.15.0.140.135 linux-image-extra-virtual-hwe-20.04-edge - 5.15.0.140.135 linux-image-generic - 5.15.0.140.135 linux-image-generic-64k - 5.15.0.140.135 linux-image-generic-64k-hwe-20.04 - 5.15.0.140.135 linux-image-generic-64k-hwe-20.04-edge - 5.15.0.140.135 linux-image-generic-hwe-20.04 - 5.15.0.140.135 linux-image-generic-hwe-20.04-edge - 5.15.0.140.135 linux-image-generic-lpae - 5.15.0.140.135 linux-image-generic-lpae-hwe-20.04 - 5.15.0.140.135 linux-image-generic-lpae-hwe-20.04-edge - 5.15.0.140.135 linux-image-oem-20.04 - 5.15.0.140.135 linux-image-virtual - 5.15.0.140.135 linux-image-virtual-hwe-20.04 - 5.15.0.140.135 linux-image-virtual-hwe-20.04-edge - 5.15.0.140.135 linux-modules-iwlwifi-generic - 5.15.0.140.135 linux-oem-20.04 - 5.15.0.140.135 linux-source - 5.15.0.140.135 linux-tools-generic - 5.15.0.140.135 linux-tools-generic-64k - 5.15.0.140.135 linux-tools-generic-64k-hwe-20.04 - 5.15.0.140.135 linux-tools-generic-64k-hwe-20.04-edge - 5.15.0.140.135 linux-tools-generic-hwe-20.04 - 5.15.0.140.135 linux-tools-generic-hwe-20.04-edge - 5.15.0.140.135 linux-tools-generic-lpae - 5.15.0.140.135 linux-tools-generic-lpae-hwe-20.04 - 5.15.0.140.135 linux-tools-generic-lpae-hwe-20.04-edge - 5.15.0.140.135 linux-tools-oem-20.04 - 5.15.0.140.135 linux-tools-virtual - 5.15.0.140.135 linux-tools-virtual-hwe-20.04 - 5.15.0.140.135 linux-tools-virtual-hwe-20.04-edge - 5.15.0.140.135 linux-virtual - 5.15.0.140.135 linux-virtual-hwe-20.04 - 5.15.0.140.135 linux-virtual-hwe-20.04-edge - 5.15.0.140.135 No subscription required
CVEs:

Title: USN-7528-1 -- SQLite vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7528-1
Priorities: medium
Description:
It was discovered that SQLite incorrectly handled the concat_ws() function. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-29087, CVE-2025-3277) It was discovered that SQLite incorrectly handled certain argument values to sqlite3_db_config(). An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-29088) Update Instructions: Run sudo pro fix USN-7528-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: lemon - 3.37.2-2ubuntu0.4 libsqlite3-0 - 3.37.2-2ubuntu0.4 libsqlite3-dev - 3.37.2-2ubuntu0.4 libsqlite3-tcl - 3.37.2-2ubuntu0.4 sqlite3 - 3.37.2-2ubuntu0.4 sqlite3-doc - 3.37.2-2ubuntu0.4 sqlite3-tools - 3.37.2-2ubuntu0.4 No subscription required
CVEs:

Title: USN-7302-1 -- libxml2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7302-1
Priorities: medium, low
Description:
It was discovered that libxml2 incorrectly handled certain memory
operations. A remote attacker could use this issue to cause libxml2 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and
Ubuntu 18.04 LTS. (CVE-2022-49043)

It was discovered that the libxml2 xmllint tool incorrectly handled
certain memory operations. If a user or automated system were tricked into
running xmllint on a specially crafted xml file, a remote attacker could
cause xmllint to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.
(CVE-2024-34459)

It was discovered that libxml2 did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2024-56171)

It was discovered that libxml2 could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2025-24928)

It was discovered that libxml2 could be made to dereference invalid memory.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2025-27113)
CVEs: