Ubuntu 6923 Published by

Ubuntu Linux has received updates focused on security enhancements, addressing vulnerabilities in Nix, GnuTLS, GNU C Library, and an Apport regression:

[USN-7633-1] Nix vulnerabilities
[USN-7635-1] GnuTLS vulnerabilities
[USN-7634-1] GNU C Library vulnerabilities
[USN-7545-3] Apport regression




[USN-7633-1] Nix vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7633-1
July 14, 2025

nix vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in Nix.

Software Description:
- nix: Cross-platform package manager

Details:

Linus Heckemann discovered that Nix did not correctly handle certain
binaries. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2024-38531)

Pierre-Etienne Meunier discovered that Nix did not correctly handle TLS
certificates. A remote attacker could possibly use this issue to leak
sensitive information. (CVE-2024-47174)

It was discovered that Nix did not correctly handle Unix sockets. An
attacker could possibly use this issue execute arbitrary code. This issue
only affected Ubuntu 24.04 LTS. (CVE-2024-27297)

It was discovered that Nix did not correctly handle unpacking Nix
archives (NARS). If a user or automated system were tricked into opening
a specially crafted file, an attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2024-45593)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
nix-bin 2.18.1+dfsg-1ubuntu5+esm2
Available with Ubuntu Pro

Ubuntu 22.04 LTS
nix-bin 2.6.0+dfsg-3ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7633-1
CVE-2024-27297, CVE-2024-38531, CVE-2024-45593, CVE-2024-47174



[USN-7635-1] GnuTLS vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7635-1
July 14, 2025

gnutls28 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in GnuTLS.

Software Description:
- gnutls28: GNU TLS library

Details:

It was discovered that GnuTLS incorrectly handled exporting Subject
Alternative Name (SAN) entries containing an otherName. A remote attacker
could use this issue to cause GnuTLS to crash, resulting in a denial of
service, or possibly execute arbitrary code. (CVE-2025-32988)

It was discovered that GnuTLS incorrectly handled parsing the Certificate
Transparency (CT) Signed Certificate Timestamp (SCT) extension. A remote
attacker could use this issue to cause GnuTLS to crash, resulting in a
denial of service, or possibly obtain sensitive information.
(CVE-2025-32989)

It was discovered that the GnuTLS certtool utility incorrectly handled
parsing certain template files. An attacker could use this issue to cause
GnuTLS to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2025-32990)

Stefan Bühler discovered that GnuTLS incorrectly handled parsing certain
template files. An attacker could possibly use this issue to cause GnuTLS
to crash, resulting in a denial of service. (CVE-2025-6395)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
libgnutls30t64 3.8.9-2ubuntu3.1

Ubuntu 24.04 LTS
libgnutls30t64 3.8.3-1.1ubuntu3.4

Ubuntu 22.04 LTS
libgnutls30 3.7.3-4ubuntu1.7

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7635-1
CVE-2025-32988, CVE-2025-32989, CVE-2025-32990, CVE-2025-6395

Package Information:
https://launchpad.net/ubuntu/+source/gnutls28/3.8.9-2ubuntu3.1
https://launchpad.net/ubuntu/+source/gnutls28/3.8.3-1.1ubuntu3.4
https://launchpad.net/ubuntu/+source/gnutls28/3.7.3-4ubuntu1.7



[USN-7634-1] GNU C Library vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7634-1
July 14, 2025

glibc vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in GNU C Library.

Software Description:
- glibc: GNU C Library

Details:

It was discovered that the GNU C Library incorrectly handled the strcmp
implementation optimized for Power10 processors. This could cause
applications to crash, compute wrong results, or leak confidential
information. (CVE-2025-5702)

It was discovered that the GNU C Library incorrectly handled the strncmp
implementation optimized for Power10 processors. This could cause
applications to crash, compute wrong results, or leak confidential
information. This issue only affected Ubuntu 25.04. (CVE-2025-5745)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
libc6 2.41-6ubuntu1.1

Ubuntu 24.04 LTS
libc6 2.39-0ubuntu8.5

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7634-1
CVE-2025-5702, CVE-2025-5745

Package Information:
https://launchpad.net/ubuntu/+source/glibc/2.41-6ubuntu1.1
https://launchpad.net/ubuntu/+source/glibc/2.39-0ubuntu8.5



[USN-7545-3] Apport regression


==========================================================================
Ubuntu Security Notice USN-7545-3
July 14, 2025

apport regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

USN-7545-1 introduced a regression in Apport

Software Description:
- apport: automatically generate crash reports for debugging

Details:

USN-7545-1 fixed vulnerabilities in Apport. The update introduced a
regression that raised an error if a crashing process was killed while
Apport was analyzing it. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Qualys discovered that Apport incorrectly handled metadata when
processing application crashes. An attacker could possibly use this issue
to leak sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
apport 2.32.0-0ubuntu5.3
python3-apport 2.32.0-0ubuntu5.3

Ubuntu 24.04 LTS
apport 2.28.1-0ubuntu3.8
python3-apport 2.28.1-0ubuntu3.8

Ubuntu 22.04 LTS
apport 2.20.11-0ubuntu82.9
python3-apport 2.20.11-0ubuntu82.9

Ubuntu 20.04 LTS
apport 2.20.11-0ubuntu27.30
python3-apport 2.20.11-0ubuntu27.30

Ubuntu 18.04 LTS
apport 2.20.9-0ubuntu7.29+esm3
Available with Ubuntu Pro
python-apport 2.20.9-0ubuntu7.29+esm3
Available with Ubuntu Pro
python3-apport 2.20.9-0ubuntu7.29+esm3
Available with Ubuntu Pro

Ubuntu 16.04 LTS
apport 2.20.1-0ubuntu2.30+esm7
Available with Ubuntu Pro
python-apport 2.20.1-0ubuntu2.30+esm7
Available with Ubuntu Pro
python3-apport 2.20.1-0ubuntu2.30+esm7
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

Package Information:
https://launchpad.net/ubuntu/+source/apport/2.32.0-0ubuntu5.3
https://launchpad.net/ubuntu/+source/apport/2.28.1-0ubuntu3.8
https://launchpad.net/ubuntu/+source/apport/2.20.11-0ubuntu82.9
https://launchpad.net/ubuntu/+source/apport/2.20.11-0ubuntu27.30