[USN-7556-1] Bootstrap vulnerabilities
[USN-7550-5] Linux kernel (NVIDIA) vulnerabilities
[USN-7558-1] GStreamer Bad Plugins vulnerabilities
[USN-7556-1] Bootstrap vulnerabilities
=========================================================================
Ubuntu Security Notice USN-7556-1
June 05, 2025
twitter-bootstrap3, twitter-bootstrap4 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Bootstrap.
Software Description:
- twitter-bootstrap3: Powerful, extensible, and feature-packed frontend toolkit
- twitter-bootstrap4: Powerful, extensible, and feature-packed frontend toolkit
Details:
It was discovered that Bootstrap did not correctly sanitize certain input in
the carousel component. An attacker could possibly use this issue to execute a
cross-site scripting (XSS) attack. (CVE-2024-6484, CVE-2024-6531)
It was discovered that Bootstrap did not correctly sanitize certain input in
the button plugin. An attacker could possibly use this issue to execute a
cross-site scripting (XSS) attack. (CVE-2024-6485)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.04
libjs-bootstrap 3.4.1+dfsg-3+deb12u1build0.25.04.1
Ubuntu 24.10
libjs-bootstrap 3.4.1+dfsg-3+deb12u1build0.24.10.1
libjs-bootstrap4 4.6.1+dfsg1-4+deb12u1build0.24.10.1
Ubuntu 24.04 LTS
libjs-bootstrap 3.4.1+dfsg-3+deb12u1build0.24.04.1
libjs-bootstrap4 4.6.1+dfsg1-4+deb12u1build0.24.04.1
Ubuntu 22.04 LTS
libjs-bootstrap 3.4.1+dfsg-2+deb11u2build0.22.04.1
libjs-bootstrap4 4.6.0+dfsg1-4ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
libjs-bootstrap 3.4.1+dfsg-1ubuntu0.1~esm1
Available with Ubuntu Pro
libjs-bootstrap4 4.4.1+dfsg1-2ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
libjs-bootstrap 3.3.7+dfsg-2ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libjs-bootstrap 3.3.6+dfsg-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7556-1
CVE-2024-6484, CVE-2024-6485, CVE-2024-6531
Package Information:
https://launchpad.net/ubuntu/+source/twitter-bootstrap3/3.4.1+dfsg-3+deb12u1build0.25.04.1
https://launchpad.net/ubuntu/+source/twitter-bootstrap3/3.4.1+dfsg-3+deb12u1build0.24.10.1
https://launchpad.net/ubuntu/+source/twitter-bootstrap4/4.6.1+dfsg1-4+deb12u1build0.24.10.1
https://launchpad.net/ubuntu/+source/twitter-bootstrap3/3.4.1+dfsg-3+deb12u1build0.24.04.1
https://launchpad.net/ubuntu/+source/twitter-bootstrap4/4.6.1+dfsg1-4+deb12u1build0.24.04.1
[USN-7550-5] Linux kernel (NVIDIA) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7550-5
June 05, 2025
linux-nvidia vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-nvidia: Linux kernel for NVIDIA systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- Sun RPC protocol;
(CVE-2024-56608, CVE-2024-56551, CVE-2024-53168)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1079-nvidia 5.15.0-1079.80
linux-image-5.15.0-1079-nvidia-lowlatency 5.15.0-1079.80
linux-image-nvidia 5.15.0.1079.79
linux-image-nvidia-lowlatency 5.15.0.1079.79
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7550-5
https://ubuntu.com/security/notices/USN-7550-4
https://ubuntu.com/security/notices/USN-7550-3
https://ubuntu.com/security/notices/USN-7550-2
https://ubuntu.com/security/notices/USN-7550-1
CVE-2024-53168, CVE-2024-56551, CVE-2024-56608
Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1079.80
[USN-7558-1] GStreamer Bad Plugins vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7558-1
June 05, 2025
gst-plugins-bad1.0 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in GStreamer Bad Plugins.
Software Description:
- gst-plugins-bad1.0: GStreamer plugins
Details:
It was discovered that the AV1 codec plugin in GStreamer could be made
to write out of bounds. An attacker could possibly use this issue to
cause applications using the plugin to crash, resulting in a denial of
service, or possibly execute arbitrary code. This issue only affected
Ubuntu 22.04 LTS. (CVE-2023-50186, CVE-2024-0444)
It was discovered that the H265 codec plugin in GStreamer could be made
to write out of bounds. An attacker could possibly use this issue to
cause applications using the plugin to crash, resulting in a denial of
service, or possibly execute arbitrary code. (CVE-2025-3887)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.04
gstreamer1.0-plugins-bad 1.26.0-1ubuntu2.1
libgstreamer-plugins-bad1.0-0 1.26.0-1ubuntu2.1
Ubuntu 24.10
gstreamer1.0-plugins-bad 1.24.8-2ubuntu1.1
libgstreamer-plugins-bad1.0-0 1.24.8-2ubuntu1.1
Ubuntu 24.04 LTS
gstreamer1.0-plugins-bad 1.24.2-1ubuntu4+esm1
Available with Ubuntu Pro
libgstreamer-plugins-bad1.0-0 1.24.2-1ubuntu4+esm1
Available with Ubuntu Pro
Ubuntu 22.04 LTS
gstreamer1.0-plugins-bad 1.20.3-0ubuntu1.1+esm2
Available with Ubuntu Pro
libgstreamer-plugins-bad1.0-0 1.20.3-0ubuntu1.1+esm2
Available with Ubuntu Pro
Ubuntu 20.04 LTS
gstreamer1.0-plugins-bad 1.16.3-0ubuntu1.1+esm1
Available with Ubuntu Pro
libgstreamer-plugins-bad1.0-0 1.16.3-0ubuntu1.1+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7558-1
CVE-2023-50186, CVE-2024-0444, CVE-2025-3887
Package Information:
https://launchpad.net/ubuntu/+source/gst-plugins-bad1.0/1.26.0-1ubuntu2.1
https://launchpad.net/ubuntu/+source/gst-plugins-bad1.0/1.24.8-2ubuntu1.1