Ubuntu 6906 Published by

Ubuntu has issued security notices (USN) for several vulnerabilities affecting various packages and versions. The issues include a vulnerability in GStreamer Good Plugins (USN-7837-1) that could cause a crash or denial of service if an attacker crafts a malicious file, a vulnerability in strongSwan (USN-7841-1) that could lead to code execution or denial of service if an attacker sends specially crafted network traffic, and multiple vulnerabilities in Ruby (USN-7840-1) and the Linux kernel (USN-7829-4) that could result in denial of service or other security risks.

[USN-7837-1] GStreamer Good Plugins vulnerability
[USN-7841-1] strongSwan vulnerability
[USN-7840-1] Ruby vulnerabilities
[USN-7829-4] Linux kernel (AWS) vulnerabilities




[USN-7837-1] GStreamer Good Plugins vulnerability


==========================================================================
Ubuntu Security Notice USN-7837-1
October 22, 2025

gst-plugins-good1.0 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

GStreamer Good Plugins could be made to crash as your login if it opened a
specially crafted file.

Software Description:
- gst-plugins-good1.0: GStreamer plugins

Details:

Shaun Mirani discovered that GStreamer Good Plugins incorrectly handled
certain malformed media files. An attacker could possibly use this issue to
cause GStreamer Good Plugins to crash, resulting in a denial of service, or
disclose sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
gstreamer1.0-gtk3 1.16.3-0ubuntu1.3+esm1
Available with Ubuntu Pro
gstreamer1.0-plugins-good 1.16.3-0ubuntu1.3+esm1
Available with Ubuntu Pro
gstreamer1.0-pulseaudio 1.16.3-0ubuntu1.3+esm1
Available with Ubuntu Pro
gstreamer1.0-qt5 1.16.3-0ubuntu1.3+esm1
Available with Ubuntu Pro
libgstreamer-plugins-good1.0-0 1.16.3-0ubuntu1.3+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
gstreamer1.0-gtk3 1.14.5-0ubuntu1~18.04.3+esm1
Available with Ubuntu Pro
gstreamer1.0-plugins-good 1.14.5-0ubuntu1~18.04.3+esm1
Available with Ubuntu Pro
gstreamer1.0-pulseaudio 1.14.5-0ubuntu1~18.04.3+esm1
Available with Ubuntu Pro
gstreamer1.0-qt5 1.14.5-0ubuntu1~18.04.3+esm1
Available with Ubuntu Pro
libgstreamer-plugins-good1.0-0 1.14.5-0ubuntu1~18.04.3+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7837-1
CVE-2025-47219



[USN-7841-1] strongSwan vulnerability


==========================================================================
Ubuntu Security Notice USN-7841-1
October 27, 2025

strongswan vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

strongSwan client could be made to crash or run programs if it received
specially crafted network traffic.

Software Description:
- strongswan: IPsec VPN solution

Details:

Xu Biang discovered that the strongSwan client incorrectly handled
EAP-MSCHAPv2 failure requests. If a user or automated system were tricked
into connecting to a malicious server, a remote attacker could use this
issue to cause strongSwan to crash, resulting in a denial of service, or
possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
libstrongswan 6.0.1-6ubuntu4.1
strongswan 6.0.1-6ubuntu4.1

Ubuntu 25.04
libstrongswan 5.9.13-2ubuntu4.25.04.1
strongswan 5.9.13-2ubuntu4.25.04.1

Ubuntu 24.04 LTS
libstrongswan 5.9.13-2ubuntu4.24.04.1
strongswan 5.9.13-2ubuntu4.24.04.1

Ubuntu 22.04 LTS
libstrongswan 5.9.5-2ubuntu2.4
strongswan 5.9.5-2ubuntu2.4

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7841-1
CVE-2025-62291

Package Information:
https://launchpad.net/ubuntu/+source/strongswan/6.0.1-6ubuntu4.1
https://launchpad.net/ubuntu/+source/strongswan/5.9.13-2ubuntu4.25.04.1
https://launchpad.net/ubuntu/+source/strongswan/5.9.13-2ubuntu4.24.04.1
https://launchpad.net/ubuntu/+source/strongswan/5.9.5-2ubuntu2.4



[USN-7840-1] Ruby vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7840-1
October 27, 2025

ruby2.3, ruby2.5, ruby2.7 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Ruby.

Software Description:
- ruby2.7: Object-oriented scripting language
- ruby2.5: Object-oriented scripting language
- ruby2.3: Object-oriented scripting language

Details:

It was discovered that the REXML module bunded into Ruby incorrectly
handled parsing XML documents with repeated instances of certain
characters. An attacker could possibly use this issue to cause REXML to
consume excessive resources, leading to a denial of service. Ubuntu 18.04
LTS and Ubuntu 20.04 LTS were previously addressed in USN-7256-1 and
USN-7734-1. This update addresses the issue in Ubuntu 16.04 LTS.
(CVE-2024-35176)

It was discovered that the REXML module bunded into Ruby incorrectly
handled parsing XML documents with repeated instances of certain
characters. An attacker could possibly use this issue to cause REXML to
consume excessive resources, leading to a denial of service. Ubuntu 20.04
LTS was previously addressed in USN-7256-1. This update addresses the issue
in Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2024-39908, CVE-2024-41123)

It was discovered that the REXML module bunded into Ruby incorrectly
handled parsing XML documents with many entity expansions. An attacker
could possibly use this issue to cause REXML to consume excessive
resources, leading to a denial of service. Ubuntu 20.04 LTS was previously
addressed in USN-7091-2. This update addresses the issue in Ubuntu 16.04
LTS and Ubuntu 18.04 LTS. (CVE-2024-41946)

It was discovered that the WEBrick module bundled into Ruby incorrectly
handled having both a Content-Length header and a Transfer-Encoding header.
A remote attacker could possibly use this issue to perform a HTTP request
smuggling attack. (CVE-2024-47220)

It was discovered that the WEBrick module bundled into Ruby incorrectly
parsed HTTP headers. In configurations where the WEBrick module is placed
behind an HTTP proxy, a remote attacker could possibly use this issue to
perform an HTTP Request Smuggling attack. (CVE-2025-6442)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
libruby2.7 2.7.0-5ubuntu1.18+esm3
Available with Ubuntu Pro

Ubuntu 18.04 LTS
libruby2.5 2.5.1-1ubuntu1.16+esm6
Available with Ubuntu Pro
ruby2.5 2.5.1-1ubuntu1.16+esm6
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libruby2.3 2.3.1-2~ubuntu16.04.16+esm11
Available with Ubuntu Pro
ruby2.3 2.3.1-2~ubuntu16.04.16+esm11
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7840-1
CVE-2024-35176, CVE-2024-39908, CVE-2024-41123, CVE-2024-41946,
CVE-2024-47220, CVE-2025-6442



[USN-7829-4] Linux kernel (AWS) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7829-4
October 27, 2025

linux-aws-5.15 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPU drivers;
- Network drivers;
- Netlink;
(CVE-2024-26700, CVE-2025-38727, CVE-2023-52593, CVE-2024-26896)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.15.0-1095-aws 5.15.0-1095.102~20.04.1
Available with Ubuntu Pro
linux-image-aws 5.15.0.1095.102~20.04.1
Available with Ubuntu Pro
linux-image-aws-5.15 5.15.0.1095.102~20.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7829-4
https://ubuntu.com/security/notices/USN-7829-3
https://ubuntu.com/security/notices/USN-7829-2
https://ubuntu.com/security/notices/USN-7829-1
CVE-2023-52593, CVE-2024-26700, CVE-2024-26896, CVE-2025-38727