Ubuntu 6923 Published by

Ubuntu Linux has received updates that address security vulnerabilities in Protocol Buffers, DjVuLibre, Git regression, and YAML-LibYAML:

[USN-7629-1] Protocol Buffers vulnerabilities
[USN-7631-1] DjVuLibre vulnerability
[USN-7626-2] Git regression
[USN-7632-1] YAML-LibYAML vulnerability




[USN-7629-1] Protocol Buffers vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7629-1
July 09, 2025

protobuf vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Protocol Buffers could be made to crash if it received specially crafted
input.

Software Description:
- protobuf: protocol buffers data serialization library

Details:

It was discovered that Protocol Buffers incorrectly handled memory when
receiving malicious input using the Python bindings. An attacker could
possibly use this issue to cause a denial of service. (CVE-2025-4565)

It was discovered that Protocol Buffers incorrectly handled memory when
receiving malicious input using the Java bindings. An attacker could
possibly use this issue to cause a denial of service. This issue only
affected Ubuntu 25.04. (CVE-2024-7254)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
libprotobuf-java 3.21.12-10ubuntu0.1
python3-protobuf 3.21.12-10ubuntu0.1

Ubuntu 24.04 LTS
libprotobuf-java 3.21.12-8.2ubuntu0.2
python3-protobuf 3.21.12-8.2ubuntu0.2

Ubuntu 22.04 LTS
libprotobuf-java 3.12.4-1ubuntu7.22.04.4
python3-protobuf 3.12.4-1ubuntu7.22.04.4

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7629-1
CVE-2024-7254, CVE-2025-4565

Package Information:
https://launchpad.net/ubuntu/+source/protobuf/3.21.12-10ubuntu0.1
https://launchpad.net/ubuntu/+source/protobuf/3.21.12-8.2ubuntu0.2
https://launchpad.net/ubuntu/+source/protobuf/3.12.4-1ubuntu7.22.04.4



[USN-7631-1] DjVuLibre vulnerability


==========================================================================
Ubuntu Security Notice USN-7631-1
July 09, 2025

djvulibre vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

DjVuLibre could be made to crash or run programs if it opened a specially
crafted file.

Software Description:
- djvulibre: DjVu image format library and tools

Details:

It was discovered that DjVuLibre incorrectly handled certain memory
operations. If a user or automated system were tricked into processing a
specially crafted DjVu file, a remote attacker could cause applications
to stop responding or crash, resulting in a denial of service, or possibly
execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
libdjvulibre21 3.5.28-2ubuntu0.25.04.1

Ubuntu 24.04 LTS
libdjvulibre21 3.5.28-2ubuntu0.24.04.1

Ubuntu 22.04 LTS
libdjvulibre21 3.5.28-2ubuntu0.22.04.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7631-1
CVE-2025-53367

Package Information:
https://launchpad.net/ubuntu/+source/djvulibre/3.5.28-2ubuntu0.25.04.1
https://launchpad.net/ubuntu/+source/djvulibre/3.5.28-2ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/djvulibre/3.5.28-2ubuntu0.22.04.1



[USN-7626-2] Git regression


==========================================================================
Ubuntu Security Notice USN-7626-2
July 09, 2025

git regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

USN-7626-1 introduced a regression in Git.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

USN-7626-1 fixed vulnerabilities in Git. The update introduced a regression
in gitk and git-gui. This update reverts the corresponding fixes for
CVE-2025-27613 and CVE-2025-46835 pending further investigation.

We apologize for the inconvenience.

Original advisory details:

 Avi Halachmi discovered that Git incorrectly managed file modification
 constraints with Gitk. An attacker could possibly use this issue to create
 or write to arbitrary files on the system. (CVE-2025-27613)

 Avi Halachmi discovered that Git incorrectly handled arguments when
 invoking the Gitk utility. If a user were tricked into cloning a malicious
 Git repository, an attacker could possibly use this issue to run arbitrary
 commands. This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10, and
 Ubuntu 25.04. (CVE-2025-27614)

 Johannes Sixt discovered that Git incorrectly managed file modification
 constraints with Git GUI. If a user were tricked into editing a file in a
 malicious Git repository, an attacker could possibly use this issue to
 create or write to arbitrary files on the system. (CVE-2025-46835)

 David Leadbeater discovered that Git incorrectly stripped CRLF characters
 when editing configuration files. An attacker could possibly use this
 issue to execute arbitrary code. (CVE-2025-48384)

 David Leadbeater discovered that Git incorrectly handled verification when
 fetching remote Git repositories. An attacker could possibly use this
 issue to perform protocol injection, leading to arbitrary code execution.
 This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04.
 (CVE-2025-48385)

 David Leadbeater discovered that Git incorrectly handled memory with the
 wincred credential helper. An attacker could possibly use this issue to
 cause a denial of service. (CVE-2025-48386)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
  git-gui                         1:2.34.1-1ubuntu1.14
  gitk                            1:2.34.1-1ubuntu1.14

Ubuntu 20.04 LTS
  git-gui                         1:2.25.1-1ubuntu3.14+esm2
                                  Available with Ubuntu Pro
  gitk                            1:2.25.1-1ubuntu3.14+esm2
                                  Available with Ubuntu Pro

Ubuntu 18.04 LTS
  git-gui                         1:2.17.1-1ubuntu0.18+esm3
                                  Available with Ubuntu Pro
  gitk                            1:2.17.1-1ubuntu0.18+esm3
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  git-gui                         1:2.7.4-0ubuntu1.10+esm10
                                  Available with Ubuntu Pro
  gitk                            1:2.7.4-0ubuntu1.10+esm10
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7626-2
  https://ubuntu.com/security/notices/USN-7626-1
  https://launchpad.net/bugs/2116251

Package Information:
  https://launchpad.net/ubuntu/+source/git/1:2.34.1-1ubuntu1.14



[USN-7632-1] YAML-LibYAML vulnerability


==========================================================================
Ubuntu Security Notice USN-7632-1
July 09, 2025

libyaml-libyaml-perl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

YAML-LibYAML could be made to overwrite files.

Software Description:
- libyaml-libyaml-perl: Perl interface to libyaml, a YAML implementation

Details:

It was discovered that YAML-LibYAML incorrectly handled certain file
names. An attacker could possibly use this issue to overwrite arbitrary
files.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
libyaml-libyaml-perl 0.89+ds-1ubuntu0.24.04.1

Ubuntu 22.04 LTS
libyaml-libyaml-perl 0.83+ds-1ubuntu0.22.04.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7632-1
CVE-2025-40908

Package Information:
https://launchpad.net/ubuntu/+source/libyaml-libyaml-perl/0.89+ds-1ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/libyaml-libyaml-perl/0.83+ds-1ubuntu0.22.04.1