Description

Ubuntu 24.04 LTS, released on April 25, 2024, introduced exciting new features but is not immune to security vulnerabilities. The Ubuntu security team has recently addressed multiple vulnerabilities that could lead to denial of service or arbitrary code execution. Notable among these is CVE-2024-32487 in the less package, where mishandling of quotes in filename.c allows OS command execution via specially crafted file names. This vulnerability is exploitable if the LESSOPEN environment variable is set, enabling attackers to execute arbitrary code by tricking users into opening malicious files. Additionally, the Glibc vulnerability (CVE-2024-2961) in GNU C Library versions 2.39 and earlier can overflow the output buffer by up to 4 bytes when converting strings to ISO-2022-CN-EXT, potentially leading to application crashes or variable overwrites. Curl also faces vulnerabilities such as CVE-2024-2004, where incorrect protocol handling could lead to resource exhaustion, and CVE-2024-2398, involving mishandled memory with HTTP/2 server push. Both vulnerabilities can result in denial-of-service conditions. GnuTLS is affected by CVE-2024-28834, a timing side-channel issue during ECDSA operations, and CVE-2024-28835, involving improper verification of PEM bundles, potentially leading to sensitive information leakage or application crashes. Libvirt's vulnerabilities (CVE-2024-1441 and CVE-2024-2494) could crash the application through specific API calls. Additionally, Pillow's CVE-2024-28219 involves inadequate bounds checks during ICC file processing, leading to potential buffer overflows. Addressing these vulnerabilities promptly is crucial to maintaining system security and preventing potential exploits.