Ubuntu 6923 Published by

Three security notices have been issued for Ubuntu, addressing vulnerabilities in various packages. The first notice (USN-7746-1) affects Ubuntu 25.04 to 18.04 LTS and fixes a vulnerability in the node-cipher-base package that could allow an attacker to manipulate the internal state of hash functions or cause a denial of service. The second notice (USN-7745-1) also affects Ubuntu 25.04 to 16.04 LTS and addresses vulnerabilities in the CUPS package, including issues with authentication types and deserialization and validation of printer attributes. The third notice (USN-7744-1) affects Ubuntu 25.04 to 22.04 LTS and fixes multiple vulnerabilities in the QEMU package, including issues with virtio devices, SDHCI device emulation, image files, and USB devices.

[USN-7746-1] cipher-base vulnerability
[USN-7745-1] CUPS vulnerabilities
[USN-7744-1] QEMU vulnerabilities




[USN-7746-1] cipher-base vulnerability


==========================================================================
Ubuntu Security Notice USN-7746-1
September 11, 2025

node-cipher-base vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

cipher-base could be made to stall or return incorrect hash values if it
received specially crafted input.

Software Description:
- node-cipher-base: abstract base class for crypto-streams

Details:

Nikita Skovoroda discovered that cipher-base did not properly manage
certain inputs. An attacker could possibly use this issue to manipulate
the internal state of hash functions, resulting in hash collisions,
denial of service, or other unspecified impact.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
node-cipher-base 1.0.4-6+deb13u1ubuntu0.25.04.1

Ubuntu 24.04 LTS
node-cipher-base 1.0.4-6+deb13u1ubuntu0.24.04.1

Ubuntu 22.04 LTS
node-cipher-base 1.0.4-6+deb13u1ubuntu0.22.04.1

Ubuntu 20.04 LTS
node-cipher-base 1.0.4-4ubuntu0.1~esm2
Available with Ubuntu Pro

Ubuntu 18.04 LTS
node-cipher-base 1.0.4-1ubuntu0.1~esm2
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7746-1
CVE-2025-9287

Package Information:
https://launchpad.net/ubuntu/+source/node-cipher-base/1.0.4-6+deb13u1ubuntu0.25.04.1
https://launchpad.net/ubuntu/+source/node-cipher-base/1.0.4-6+deb13u1ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/node-cipher-base/1.0.4-6+deb13u1ubuntu0.22.04.1



[USN-7745-1] CUPS vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7745-1
September 11, 2025

cups vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in CUPS.

Software Description:
- cups: Common UNIX Printing System(tm)

Details:

It was discovered that CUPS incorrectly handled authentication types other
than Basic. An attacker could possibly use this issue to bypass
authentication. (CVE-2025-58060)

It was discovered that CUPS incorrectly handled deserialization and
validation of printer attributes. An attacker could possibly use this
issue to cause a denial of service. (CVE-2025-58364)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
cups 2.4.12-0ubuntu1.1

Ubuntu 24.04 LTS
cups 2.4.7-1.2ubuntu7.4

Ubuntu 22.04 LTS
cups 2.4.1op1-1ubuntu4.12

Ubuntu 20.04 LTS
cups 2.3.1-9ubuntu1.9+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
cups 2.2.7-1ubuntu2.10+esm7
Available with Ubuntu Pro

Ubuntu 16.04 LTS
cups 2.1.3-4ubuntu0.11+esm9
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7745-1
CVE-2025-58060, CVE-2025-58364

Package Information:
https://launchpad.net/ubuntu/+source/cups/2.4.12-0ubuntu1.1
https://launchpad.net/ubuntu/+source/cups/2.4.7-1.2ubuntu7.4
https://launchpad.net/ubuntu/+source/cups/2.4.1op1-1ubuntu4.12



[USN-7744-1] QEMU vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7744-1
September 11, 2025

qemu vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in QEMU.

Software Description:
- qemu: Machine emulator and virtualizer

Details:

It was discovered that QEMU incorrectly handled certain virtio devices. A
privileged guest attacker could use this issue to cause QEMU to crash,
leading to a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-3446)

It was discovered that QEMU incorrectly handled SDHCI device emulation. A
guest attacker could possibly use this issue to cause QEMU to crash,
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS
and Ubuntu 24.04 LTS. (CVE-2024-3447)

It was discovered that QEMU incorrectly handled calculating the checksum
of a short-sized fragmented packet. A guest attacker could possibly use
this issue to cause QEMU to crash, leading to a denial of service. This
issue only affected Ubuntu 24.04 LTS. (CVE-2024-3567)

It was discovered that the QEMU qemu-img utility incorrectly handled
certain crafted image files. An attacker could use this issue to cause QEMU
to consume resources, leading to a denial of service, or possibly read and
write to an existing external file. This issue only affected Ubuntu 22.04
LTS and Ubuntu 24.04 LTS. (CVE-2024-4467)

It was discovered that QEMU incorrectly handled the RSS feature on
virtio-net devices. A privileged guest attacker could possibly use this
issue to cause QEMU to crash, leading to a denial of service. This
issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-6505)

It was discovered that QEMU incorrectly handled the NBD server. An attacker
could use this issue to cause QEMU to consume resources, leading to a
denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu
24.04 LTS. (CVE-2024-7409)

It was discovered that QEMU incorrectly handled certain USB devices. A
guest attacker could possibly use this issue to cause QEMU to crash,
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS
and Ubuntu 24.04 LTS. (CVE-2024-8354)

It was discovered that the QEMU package incorrectly set up a binfmt_misc
registration with the C (Credential) flag. A local attacker could use this
with a suid/sgid binary to escalate privileges. This update will no longer
run foreign-architecture binaries with suid/sgid with elevated privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
qemu-system 1:9.2.1+ds-1ubuntu5.2
qemu-system-arm 1:9.2.1+ds-1ubuntu5.2
qemu-system-mips 1:9.2.1+ds-1ubuntu5.2
qemu-system-misc 1:9.2.1+ds-1ubuntu5.2
qemu-system-ppc 1:9.2.1+ds-1ubuntu5.2
qemu-system-riscv 1:9.2.1+ds-1ubuntu5.2
qemu-system-s390x 1:9.2.1+ds-1ubuntu5.2
qemu-system-sparc 1:9.2.1+ds-1ubuntu5.2
qemu-system-x86 1:9.2.1+ds-1ubuntu5.2
qemu-system-x86-xen 1:9.2.1+ds-1ubuntu5.2
qemu-system-xen 1:9.2.1+ds-1ubuntu5.2

Ubuntu 24.04 LTS
qemu-system 1:8.2.2+ds-0ubuntu1.10
qemu-system-arm 1:8.2.2+ds-0ubuntu1.10
qemu-system-mips 1:8.2.2+ds-0ubuntu1.10
qemu-system-misc 1:8.2.2+ds-0ubuntu1.10
qemu-system-ppc 1:8.2.2+ds-0ubuntu1.10
qemu-system-s390x 1:8.2.2+ds-0ubuntu1.10
qemu-system-sparc 1:8.2.2+ds-0ubuntu1.10
qemu-system-x86 1:8.2.2+ds-0ubuntu1.10
qemu-system-x86-xen 1:8.2.2+ds-0ubuntu1.10
qemu-system-xen 1:8.2.2+ds-0ubuntu1.10

Ubuntu 22.04 LTS
qemu-system 1:6.2+dfsg-2ubuntu6.27
qemu-system-arm 1:6.2+dfsg-2ubuntu6.27
qemu-system-mips 1:6.2+dfsg-2ubuntu6.27
qemu-system-misc 1:6.2+dfsg-2ubuntu6.27
qemu-system-ppc 1:6.2+dfsg-2ubuntu6.27
qemu-system-s390x 1:6.2+dfsg-2ubuntu6.27
qemu-system-sparc 1:6.2+dfsg-2ubuntu6.27
qemu-system-x86 1:6.2+dfsg-2ubuntu6.27
qemu-system-x86-microvm 1:6.2+dfsg-2ubuntu6.27
qemu-system-x86-xen 1:6.2+dfsg-2ubuntu6.27

After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7744-1
CVE-2024-3446, CVE-2024-3447, CVE-2024-3567, CVE-2024-4467,
CVE-2024-6505, CVE-2024-7409, CVE-2024-8354, https://bugs.launchpad.net/bugs/2120814

Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:9.2.1+ds-1ubuntu5.2
https://launchpad.net/ubuntu/+source/qemu/1:8.2.2+ds-0ubuntu1.10
https://launchpad.net/ubuntu/+source/qemu/1:6.2+dfsg-2ubuntu6.27