Ubuntu 6774 Published by

The recent update for Ubuntu Linux addresses vulnerabilities found in Bootstrap, NVIDIA, and GStreamer Bad Plugins:

[USN-7556-1] Bootstrap vulnerabilities
[USN-7550-5] Linux kernel (NVIDIA) vulnerabilities
[USN-7558-1] GStreamer Bad Plugins vulnerabilities




[USN-7556-1] Bootstrap vulnerabilities


=========================================================================
Ubuntu Security Notice USN-7556-1
June 05, 2025

twitter-bootstrap3, twitter-bootstrap4 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Bootstrap.

Software Description:
- twitter-bootstrap3: Powerful, extensible, and feature-packed frontend toolkit
- twitter-bootstrap4: Powerful, extensible, and feature-packed frontend toolkit

Details:

It was discovered that Bootstrap did not correctly sanitize certain input in
the carousel component. An attacker could possibly use this issue to execute a
cross-site scripting (XSS) attack. (CVE-2024-6484, CVE-2024-6531)

It was discovered that Bootstrap did not correctly sanitize certain input in
the button plugin. An attacker could possibly use this issue to execute a
cross-site scripting (XSS) attack. (CVE-2024-6485)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
libjs-bootstrap 3.4.1+dfsg-3+deb12u1build0.25.04.1

Ubuntu 24.10
libjs-bootstrap 3.4.1+dfsg-3+deb12u1build0.24.10.1
libjs-bootstrap4 4.6.1+dfsg1-4+deb12u1build0.24.10.1

Ubuntu 24.04 LTS
libjs-bootstrap 3.4.1+dfsg-3+deb12u1build0.24.04.1
libjs-bootstrap4 4.6.1+dfsg1-4+deb12u1build0.24.04.1

Ubuntu 22.04 LTS
libjs-bootstrap 3.4.1+dfsg-2+deb11u2build0.22.04.1
libjs-bootstrap4 4.6.0+dfsg1-4ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 20.04 LTS
libjs-bootstrap 3.4.1+dfsg-1ubuntu0.1~esm1
Available with Ubuntu Pro
libjs-bootstrap4 4.4.1+dfsg1-2ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
libjs-bootstrap 3.3.7+dfsg-2ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libjs-bootstrap 3.3.6+dfsg-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7556-1
CVE-2024-6484, CVE-2024-6485, CVE-2024-6531

Package Information:
https://launchpad.net/ubuntu/+source/twitter-bootstrap3/3.4.1+dfsg-3+deb12u1build0.25.04.1
https://launchpad.net/ubuntu/+source/twitter-bootstrap3/3.4.1+dfsg-3+deb12u1build0.24.10.1
https://launchpad.net/ubuntu/+source/twitter-bootstrap4/4.6.1+dfsg1-4+deb12u1build0.24.10.1
https://launchpad.net/ubuntu/+source/twitter-bootstrap3/3.4.1+dfsg-3+deb12u1build0.24.04.1
https://launchpad.net/ubuntu/+source/twitter-bootstrap4/4.6.1+dfsg1-4+deb12u1build0.24.04.1


[USN-7550-5] Linux kernel (NVIDIA) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7550-5
June 05, 2025

linux-nvidia vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-nvidia: Linux kernel for NVIDIA systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- Sun RPC protocol;
(CVE-2024-56608, CVE-2024-56551, CVE-2024-53168)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1079-nvidia 5.15.0-1079.80
linux-image-5.15.0-1079-nvidia-lowlatency 5.15.0-1079.80
linux-image-nvidia 5.15.0.1079.79
linux-image-nvidia-lowlatency 5.15.0.1079.79

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7550-5
https://ubuntu.com/security/notices/USN-7550-4
https://ubuntu.com/security/notices/USN-7550-3
https://ubuntu.com/security/notices/USN-7550-2
https://ubuntu.com/security/notices/USN-7550-1
CVE-2024-53168, CVE-2024-56551, CVE-2024-56608

Package Information:
https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1079.80



[USN-7558-1] GStreamer Bad Plugins vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7558-1
June 05, 2025

gst-plugins-bad1.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in GStreamer Bad Plugins.

Software Description:
- gst-plugins-bad1.0: GStreamer plugins

Details:

It was discovered that the AV1 codec plugin in GStreamer could be made
to write out of bounds. An attacker could possibly use this issue to
cause applications using the plugin to crash, resulting in a denial of
service, or possibly execute arbitrary code. This issue only affected
Ubuntu 22.04 LTS. (CVE-2023-50186, CVE-2024-0444)

It was discovered that the H265 codec plugin in GStreamer could be made
to write out of bounds. An attacker could possibly use this issue to
cause applications using the plugin to crash, resulting in a denial of
service, or possibly execute arbitrary code. (CVE-2025-3887)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
  gstreamer1.0-plugins-bad        1.26.0-1ubuntu2.1
  libgstreamer-plugins-bad1.0-0   1.26.0-1ubuntu2.1

Ubuntu 24.10
  gstreamer1.0-plugins-bad        1.24.8-2ubuntu1.1
  libgstreamer-plugins-bad1.0-0   1.24.8-2ubuntu1.1

Ubuntu 24.04 LTS
  gstreamer1.0-plugins-bad        1.24.2-1ubuntu4+esm1
                                  Available with Ubuntu Pro
  libgstreamer-plugins-bad1.0-0   1.24.2-1ubuntu4+esm1
                                  Available with Ubuntu Pro

Ubuntu 22.04 LTS
  gstreamer1.0-plugins-bad        1.20.3-0ubuntu1.1+esm2
                                  Available with Ubuntu Pro
  libgstreamer-plugins-bad1.0-0   1.20.3-0ubuntu1.1+esm2
                                  Available with Ubuntu Pro

Ubuntu 20.04 LTS
  gstreamer1.0-plugins-bad        1.16.3-0ubuntu1.1+esm1
                                  Available with Ubuntu Pro
  libgstreamer-plugins-bad1.0-0   1.16.3-0ubuntu1.1+esm1
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7558-1
  CVE-2023-50186, CVE-2024-0444, CVE-2025-3887

Package Information:
https://launchpad.net/ubuntu/+source/gst-plugins-bad1.0/1.26.0-1ubuntu2.1
https://launchpad.net/ubuntu/+source/gst-plugins-bad1.0/1.24.8-2ubuntu1.1