Ubuntu 6923 Published by

Ubuntu Linux has been updated with security updates, including vulnerabilities in the Linux kernel (Oracle), MySQL, qs, and Apache HTTP Server:

[USN-7685-5] Linux kernel (Oracle) vulnerabilities
[USN-7691-1] MySQL vulnerabilities
[USN-7693-1] qs vulnerability
[USN-6885-6] Apache HTTP Server regression




[USN-7685-5] Linux kernel (Oracle) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7685-5
August 13, 2025

linux-oracle vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oracle: Linux kernel for Oracle Cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Device tree and open firmware driver;
- SCSI subsystem;
- TTY drivers;
- Ext4 file system;
- SMB network file system;
- Bluetooth subsystem;
- Network traffic control;
- Sun RPC protocol;
- USB sound devices;
(CVE-2025-37797, CVE-2024-49950, CVE-2024-56748, CVE-2023-52975,
CVE-2024-50073, CVE-2023-52885, CVE-2023-52757, CVE-2024-38541,
CVE-2024-53239, CVE-2024-49883)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS
linux-image-4.15.0-1145-oracle 4.15.0-1145.156~16.04.1
Available with Ubuntu Pro
linux-image-oracle 4.15.0.1145.156~16.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7685-5
https://ubuntu.com/security/notices/USN-7685-4
https://ubuntu.com/security/notices/USN-7685-3
https://ubuntu.com/security/notices/USN-7685-2
https://ubuntu.com/security/notices/USN-7685-1
CVE-2023-52757, CVE-2023-52885, CVE-2023-52975, CVE-2024-38541,
CVE-2024-49883, CVE-2024-49950, CVE-2024-50073, CVE-2024-53239,
CVE-2024-56748, CVE-2025-37797



[USN-7691-1] MySQL vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7691-1
August 13, 2025

mysql-8.0, mysql-8.4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in MySQL.

Software Description:
- mysql-8.4: MySQL database
- mysql-8.0: MySQL database

Details:

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.43 in Ubuntu 22.04 LTS and Ubuntu 24.04 LTS.
Ubuntu 25.04 has been updated to MySQL 8.4.6.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:

https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-43.html
https://dev.mysql.com/doc/relnotes/mysql/8.4/en/news-8-4-6.html
https://www.oracle.com/security-alerts/cpujul2025.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
mysql-server 8.4.6-0ubuntu0.25.04.1

Ubuntu 24.04 LTS
mysql-server-8.0 8.0.43-0ubuntu0.24.04.1

Ubuntu 22.04 LTS
mysql-server-8.0 8.0.43-0ubuntu0.22.04.1

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References:
https://ubuntu.com/security/notices/USN-7691-1
CVE-2025-50077, CVE-2025-50078, CVE-2025-50079, CVE-2025-50080,
CVE-2025-50081, CVE-2025-50082, CVE-2025-50083, CVE-2025-50084,
CVE-2025-50085, CVE-2025-50086, CVE-2025-50087, CVE-2025-50091,
CVE-2025-50092, CVE-2025-50093, CVE-2025-50094, CVE-2025-50096,
CVE-2025-50097, CVE-2025-50098, CVE-2025-50099, CVE-2025-50100,
CVE-2025-50101, CVE-2025-50102, CVE-2025-50104, CVE-2025-53023

Package Information:
https://launchpad.net/ubuntu/+source/mysql-8.4/8.4.6-0ubuntu0.25.04.1
https://launchpad.net/ubuntu/+source/mysql-8.0/8.0.43-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/mysql-8.0/8.0.43-0ubuntu0.22.04.1



[USN-7693-1] qs vulnerability


==========================================================================
Ubuntu Security Notice USN-7693-1
August 14, 2025

node-qs vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

qs could be made to crash if it received specially crafted network
traffic.

Software Description:
- node-qs: A querystring parsing and stringifying library

Details:

Nathanael Braun and Johan Brissaud discovered that qs was vulnerable
to prototype pollution. A remote attacker could possibly use this issue
to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
node-qs 6.9.1+ds-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7693-1
CVE-2022-24999



[USN-6885-6] Apache HTTP Server regression


=======================================================================
===
Ubuntu Security Notice USN-6885-6
August 13, 2025

apache2 regression
=======================================================================
===

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

USN-6885-1 introduced a regression in Apache HTTP Server.

Software Description:
- apache2: Apache HTTP server

Details:

USN-6885-1 fixed vulnerabilities in Apache. The patch for
CVE-2024-38474 was incomplete and caused a regression.
This update provides the fix for this issue.

Original advisory details:

 Orange Tsai discovered that the Apache HTTP Server mod_rewrite
 module incorrectly handled certain substitutions. A remote attacker
 could possibly use this issue to execute scripts in directories
 not directly reachable by any URL, or cause a denial of service.
 Some environments may require using the new UnsafeAllow3F flag
 to handle unsafe substitutions. (CVE-2024-38474)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  apache2                         2.4.58-1ubuntu8.8

Ubuntu 22.04 LTS
  apache2                         2.4.52-1ubuntu4.16

In general, a standard system update will make all the necessary
changes.

References:
  https://ubuntu.com/security/notices/USN-6885-6
  https://ubuntu.com/security/notices/USN-6885-5
  https://ubuntu.com/security/notices/USN-6885-4
  https://ubuntu.com/security/notices/USN-6885-3
  https://ubuntu.com/security/notices/USN-6885-2
  https://ubuntu.com/security/notices/USN-6885-1
  https://launchpad.net/bugs/2119395

Package Information:
  https://launchpad.net/ubuntu/+source/apache2/2.4.58-1ubuntu8.8
  https://launchpad.net/ubuntu/+source/apache2/2.4.52-1ubuntu4.16