Vulnerabilities |
118 via 480 paths |
|---|---|
Dependencies |
288 |
Source |
Docker |
Target OS |
ubuntu:22.04 |
high severity
- Vulnerable module: gnupg2/dirmngr
- Introduced through: gnupg2/dirmngr@2.2.27-3ubuntu2.4, gnupg2/gnupg@2.2.27-3ubuntu2.4 and others
- Fixed in: 2.2.27-3ubuntu2.5
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/dirmngr@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gnupg@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gnupg-l10n@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gnupg-utils@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg-agent@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg-wks-client@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg-wks-server@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpgconf@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpgsm@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpgv@2.2.27-3ubuntu2.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)
Remediation
Upgrade Ubuntu:22.04 gnupg2 to version 2.2.27-3ubuntu2.5 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-68973
- https://github.com/gpg/gnupg/blob/ff30683418695f5d2cc9e6cf8c9418e09378ebe4/g10/armor.c#L1305-L1306
- https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9
- https://github.com/gpg/gnupg/compare/gnupg-2.2.50...gnupg-2.2.51
- https://media.ccc.de/v/39c3-to-sign-or-not-to-sign-practical-vulnerabilities-i
- https://news.ycombinator.com/item?id=46403200
- https://www.openwall.com/lists/oss-security/2025/12/28/5
- http://www.openwall.com/lists/oss-security/2025/12/29/11
- https://lists.debian.org/debian-lts-announce/2026/01/msg00008.html
- https://gpg.fail/memcpy
medium severity
- Vulnerable module: glib2.0/libglib2.0-0
- Introduced through: glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5, glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5 and others
- Fixed in: 2.72.4-0ubuntu2.7
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-data@2.72.4-0ubuntu2.5
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0 package and not the glib2.0 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.
Remediation
Upgrade Ubuntu:22.04 glib2.0 to version 2.72.4-0ubuntu2.7 or higher.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.13+dfsg-1ubuntu0.7
- Fixed in: 2.9.13+dfsg-1ubuntu0.8
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libxml2@2.9.13+dfsg-1ubuntu0.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Remediation
Upgrade Ubuntu:22.04 libxml2 to version 2.9.13+dfsg-1ubuntu0.8 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-49794
- https://access.redhat.com/security/cve/CVE-2025-49794
- https://bugzilla.redhat.com/show_bug.cgi?id=2372373
- https://access.redhat.com/errata/RHSA-2025:10630
- https://access.redhat.com/errata/RHSA-2025:10698
- https://access.redhat.com/errata/RHSA-2025:10699
- https://access.redhat.com/errata/RHSA-2025:11580
- https://access.redhat.com/errata/RHSA-2025:12098
- https://access.redhat.com/errata/RHSA-2025:12099
- https://access.redhat.com/errata/RHSA-2025:12199
- https://access.redhat.com/errata/RHSA-2025:12239
- https://access.redhat.com/errata/RHSA-2025:12240
- https://access.redhat.com/errata/RHSA-2025:12241
- https://access.redhat.com/errata/RHSA-2025:12237
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:15828
- https://access.redhat.com/errata/RHSA-2025:15827
- https://access.redhat.com/errata/RHSA-2025:18219
- https://access.redhat.com/errata/RHSA-2025:15397
- https://access.redhat.com/errata/RHSA-2025:18218
- https://access.redhat.com/errata/RHSA-2025:18217
- https://access.redhat.com/errata/RHSA-2025:18240
- https://access.redhat.com/errata/RHSA-2025:19020
- https://access.redhat.com/errata/RHSA-2025:19046
- https://access.redhat.com/errata/RHSA-2025:19041
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://access.redhat.com/errata/RHSA-2025:19894
- https://access.redhat.com/errata/RHSA-2025:21913
- https://access.redhat.com/errata/RHSA-2026:0934
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.13+dfsg-1ubuntu0.7
- Fixed in: 2.9.13+dfsg-1ubuntu0.8
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libxml2@2.9.13+dfsg-1ubuntu0.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
Remediation
Upgrade Ubuntu:22.04 libxml2 to version 2.9.13+dfsg-1ubuntu0.8 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-49796
- https://access.redhat.com/security/cve/CVE-2025-49796
- https://bugzilla.redhat.com/show_bug.cgi?id=2372385
- https://access.redhat.com/errata/RHSA-2025:10630
- https://access.redhat.com/errata/RHSA-2025:10698
- https://access.redhat.com/errata/RHSA-2025:10699
- https://access.redhat.com/errata/RHSA-2025:11580
- https://access.redhat.com/errata/RHSA-2025:12098
- https://access.redhat.com/errata/RHSA-2025:12099
- https://access.redhat.com/errata/RHSA-2025:12199
- https://access.redhat.com/errata/RHSA-2025:12239
- https://access.redhat.com/errata/RHSA-2025:12240
- https://access.redhat.com/errata/RHSA-2025:12241
- https://access.redhat.com/errata/RHSA-2025:12237
- https://access.redhat.com/errata/RHSA-2025:13267
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:15828
- https://access.redhat.com/errata/RHSA-2025:15827
- https://access.redhat.com/errata/RHSA-2025:18219
- https://access.redhat.com/errata/RHSA-2025:15397
- https://access.redhat.com/errata/RHSA-2025:18218
- https://access.redhat.com/errata/RHSA-2025:18217
- https://access.redhat.com/errata/RHSA-2025:18240
- https://access.redhat.com/errata/RHSA-2025:19020
- https://access.redhat.com/errata/RHSA-2025:19046
- https://access.redhat.com/errata/RHSA-2025:19041
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://access.redhat.com/errata/RHSA-2025:19894
- https://access.redhat.com/errata/RHSA-2025:21913
- https://access.redhat.com/errata/RHSA-2026:0934
medium severity
- Vulnerable module: git
- Introduced through: git@1:2.34.1-1ubuntu1.15 and git/git-man@1:2.34.1-1ubuntu1.15
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › git@1:2.34.1-1ubuntu1.15
-
Introduced through: tensorflow/tensorflow@latest-jupyter › git/git-man@1:2.34.1-1ubuntu1.15
NVD Description
Note: Versions mentioned in the description apply only to the upstream git package and not the git package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.
Remediation
There is no fixed version for Ubuntu:22.04 git.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.10
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.45 is able to address this issue. It is recommended to upgrade the affected component.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-5244
- https://sourceware.org/bugzilla/attachment.cgi?id=16010
- https://sourceware.org/bugzilla/show_bug.cgi?id=32858
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5
- https://vuldb.com/?ctiid.310346
- https://vuldb.com/?id.310346
- https://vuldb.com/?submit.584634
- https://www.gnu.org/
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.10
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-5245
- https://sourceware.org/bugzilla/attachment.cgi?id=16004
- https://sourceware.org/bugzilla/show_bug.cgi?id=32829
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a
- https://vuldb.com/?ctiid.310347
- https://vuldb.com/?id.310347
- https://vuldb.com/?submit.584635
- https://www.gnu.org/
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.10
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-7545
- https://sourceware.org/bugzilla/attachment.cgi?id=16117
- https://sourceware.org/bugzilla/show_bug.cgi?id=33049
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944
- https://vuldb.com/?ctiid.316243
- https://vuldb.com/?id.316243
- https://vuldb.com/?submit.614355
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.10
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-11083
- https://sourceware.org/bugzilla/attachment.cgi?id=16353
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490
- https://vuldb.com/?ctiid.326124
- https://vuldb.com/?id.326124
- https://vuldb.com/?submit.661277
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33457
- https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.10
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with "[f]ixed for 2.46".
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-11082
- https://sourceware.org/bugzilla/attachment.cgi?id=16358
- https://sourceware.org/bugzilla/show_bug.cgi?id=33464
- https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8
- https://vuldb.com/?ctiid.326123
- https://vuldb.com/?id.326123
- https://vuldb.com/?submit.661276
- https://www.gnu.org/
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.13+dfsg-1ubuntu0.7
- Fixed in: 2.9.13+dfsg-1ubuntu0.10
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libxml2@2.9.13+dfsg-1ubuntu0.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.
Remediation
Upgrade Ubuntu:22.04 libxml2 to version 2.9.13+dfsg-1ubuntu0.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-7425
- https://access.redhat.com/security/cve/CVE-2025-7425
- https://bugzilla.redhat.com/show_bug.cgi?id=2379274
- https://access.redhat.com/errata/RHSA-2025:12447
- https://access.redhat.com/errata/RHSA-2025:12450
- https://access.redhat.com/errata/RHSA-2025:13267
- https://access.redhat.com/errata/RHSA-2025:13313
- https://access.redhat.com/errata/RHSA-2025:13314
- https://access.redhat.com/errata/RHSA-2025:13308
- https://access.redhat.com/errata/RHSA-2025:13309
- https://access.redhat.com/errata/RHSA-2025:13310
- https://access.redhat.com/errata/RHSA-2025:13311
- https://access.redhat.com/errata/RHSA-2025:13312
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:13464
- https://access.redhat.com/errata/RHSA-2025:13622
- https://access.redhat.com/errata/RHSA-2025:14059
- https://access.redhat.com/errata/RHSA-2025:14396
- https://access.redhat.com/errata/RHSA-2025:14819
- https://access.redhat.com/errata/RHSA-2025:14818
- https://access.redhat.com/errata/RHSA-2025:14853
- https://access.redhat.com/errata/RHSA-2025:14858
- https://access.redhat.com/errata/RHSA-2025:15308
- https://access.redhat.com/errata/RHSA-2025:15828
- https://access.redhat.com/errata/RHSA-2025:15827
- https://access.redhat.com/errata/RHSA-2025:15672
- https://access.redhat.com/errata/RHSA-2025:18219
- https://lists.debian.org/debian-lts-announce/2025/09/msg00035.html
- http://seclists.org/fulldisclosure/2025/Aug/0
- http://seclists.org/fulldisclosure/2025/Jul/30
- http://seclists.org/fulldisclosure/2025/Jul/32
- http://seclists.org/fulldisclosure/2025/Jul/35
- http://seclists.org/fulldisclosure/2025/Jul/37
- http://www.openwall.com/lists/oss-security/2025/07/11/2
- https://access.redhat.com/errata/RHSA-2025:21885
- https://access.redhat.com/errata/RHSA-2025:21913
- https://access.redhat.com/errata/RHSA-2026:0934
- https://gitlab.gnome.org/GNOME/libxslt/-/issues/140
medium severity
- Vulnerable module: pam/libpam-modules
- Introduced through: pam/libpam-modules@1.4.0-11ubuntu2.6, pam/libpam-modules-bin@1.4.0-11ubuntu2.6 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › pam/libpam-modules@1.4.0-11ubuntu2.6
-
Introduced through: tensorflow/tensorflow@latest-jupyter › pam/libpam-modules-bin@1.4.0-11ubuntu2.6
-
Introduced through: tensorflow/tensorflow@latest-jupyter › pam/libpam-runtime@1.4.0-11ubuntu2.6
-
Introduced through: tensorflow/tensorflow@latest-jupyter › pam/libpam0g@1.4.0-11ubuntu2.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream pam package and not the pam package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
Remediation
There is no fixed version for Ubuntu:22.04 pam.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-8941
- https://access.redhat.com/security/cve/CVE-2025-8941
- https://bugzilla.redhat.com/show_bug.cgi?id=2388220
- https://access.redhat.com/errata/RHSA-2025:14557
- https://access.redhat.com/errata/RHSA-2025:15100
- https://access.redhat.com/errata/RHSA-2025:15104
- https://access.redhat.com/errata/RHSA-2025:15107
- https://access.redhat.com/errata/RHSA-2025:15099
- https://access.redhat.com/errata/RHSA-2025:15101
- https://access.redhat.com/errata/RHSA-2025:15102
- https://access.redhat.com/errata/RHSA-2025:15103
- https://access.redhat.com/errata/RHSA-2025:15105
- https://access.redhat.com/errata/RHSA-2025:15106
- https://access.redhat.com/errata/RHSA-2025:15709
- https://access.redhat.com/errata/RHSA-2025:15828
- https://access.redhat.com/errata/RHSA-2025:15827
- https://access.redhat.com/errata/RHSA-2025:16524
- https://access.redhat.com/errata/RHSA-2025:18219
- https://access.redhat.com/errata/RHSA-2025:17181
- https://access.redhat.com/errata/RHSA-2025:21885
medium severity
- Vulnerable module: python3.11
- Introduced through: python3.11@3.11.13-1+jammy1, python3.11/libpython3.11@3.11.13-1+jammy1 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-stdlib@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-venv@3.11.13-1+jammy1
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.11 package and not the python3.11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability has been found in the CPython venv module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
Remediation
There is no fixed version for Ubuntu:22.04 python3.11.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-9287
- https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7
- https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db
- https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8
- https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97
- https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b
- https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483
- https://github.com/python/cpython/issues/124651
- https://github.com/python/cpython/pull/124712
- https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/
- https://security.netapp.com/advisory/ntap-20250425-0006/
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: glib2.0/libglib2.0-0
- Introduced through: glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5, glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5 and others
- Fixed in: 2.72.4-0ubuntu2.7
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-data@2.72.4-0ubuntu2.5
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0 package and not the glib2.0 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
Remediation
Upgrade Ubuntu:22.04 glib2.0 to version 2.72.4-0ubuntu2.7 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-13601
- https://access.redhat.com/errata/RHSA-2026:0936
- https://access.redhat.com/errata/RHSA-2026:0975
- https://access.redhat.com/errata/RHSA-2026:0991
- https://access.redhat.com/errata/RHSA-2026:1323
- https://access.redhat.com/errata/RHSA-2026:1324
- https://access.redhat.com/errata/RHSA-2026:1326
- https://access.redhat.com/errata/RHSA-2026:1327
- https://access.redhat.com/errata/RHSA-2026:1465
- https://access.redhat.com/errata/RHSA-2026:1608
- https://access.redhat.com/errata/RHSA-2026:1624
- https://access.redhat.com/errata/RHSA-2026:1625
- https://access.redhat.com/errata/RHSA-2026:1626
- https://access.redhat.com/errata/RHSA-2026:1627
- https://access.redhat.com/errata/RHSA-2026:1652
- https://access.redhat.com/errata/RHSA-2026:1736
- https://access.redhat.com/security/cve/CVE-2025-13601
- https://bugzilla.redhat.com/show_bug.cgi?id=2416741
- https://gitlab.gnome.org/GNOME/glib/-/issues/3827
- https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
- https://access.redhat.com/errata/RHSA-2026:2485
- https://access.redhat.com/errata/RHSA-2026:2072
- https://access.redhat.com/errata/RHSA-2026:2563
- https://access.redhat.com/errata/RHSA-2026:2064
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.13+dfsg-1ubuntu0.7
- Fixed in: 2.9.13+dfsg-1ubuntu0.8
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libxml2@2.9.13+dfsg-1ubuntu0.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
Remediation
Upgrade Ubuntu:22.04 libxml2 to version 2.9.13+dfsg-1ubuntu0.8 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-6021
- https://access.redhat.com/errata/RHSA-2025:10630
- https://access.redhat.com/errata/RHSA-2025:10698
- https://access.redhat.com/errata/RHSA-2025:10699
- https://access.redhat.com/errata/RHSA-2025:11580
- https://access.redhat.com/errata/RHSA-2025:12098
- https://access.redhat.com/errata/RHSA-2025:12099
- https://access.redhat.com/errata/RHSA-2025:12199
- https://access.redhat.com/errata/RHSA-2025:12237
- https://access.redhat.com/errata/RHSA-2025:12239
- https://access.redhat.com/errata/RHSA-2025:12240
- https://access.redhat.com/errata/RHSA-2025:12241
- https://access.redhat.com/errata/RHSA-2025:13267
- https://access.redhat.com/errata/RHSA-2025:13289
- https://access.redhat.com/errata/RHSA-2025:13325
- https://access.redhat.com/errata/RHSA-2025:13335
- https://access.redhat.com/errata/RHSA-2025:13336
- https://access.redhat.com/errata/RHSA-2025:14059
- https://access.redhat.com/errata/RHSA-2025:14396
- https://access.redhat.com/errata/RHSA-2025:15308
- https://access.redhat.com/errata/RHSA-2025:15672
- https://access.redhat.com/security/cve/CVE-2025-6021
- https://bugzilla.redhat.com/show_bug.cgi?id=2372406
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/926
- https://access.redhat.com/errata/RHSA-2025:19020
- https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html
- https://access.redhat.com/errata/RHSA-2025:11673
medium severity
- Vulnerable module: python3.11
- Introduced through: python3.11@3.11.13-1+jammy1, python3.11/libpython3.11@3.11.13-1+jammy1 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-stdlib@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-venv@3.11.13-1+jammy1
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.11 package and not the python3.11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
Remediation
There is no fixed version for Ubuntu:22.04 python3.11.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-6232
- https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06
- https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4
- https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf
- https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373
- https://github.com/python/cpython/issues/121285
- https://github.com/python/cpython/pull/121286
- https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/
- https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4
- https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d
- https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877
- http://www.openwall.com/lists/oss-security/2024/09/03/5
- https://security.netapp.com/advisory/ntap-20241018-0007/
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: python3.11
- Introduced through: python3.11@3.11.13-1+jammy1, python3.11/libpython3.11@3.11.13-1+jammy1 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-stdlib@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-venv@3.11.13-1+jammy1
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.11 package and not the python3.11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.
Remediation
There is no fixed version for Ubuntu:22.04 python3.11.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-41105
- https://mail.python.org/archives/list/security-announce@python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
- https://github.com/python/cpython/issues/106242
- https://github.com/python/cpython/pull/107981
- https://github.com/python/cpython/pull/107982
- https://github.com/python/cpython/pull/107983
- https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
- https://security.netapp.com/advisory/ntap-20231006-0015/
medium severity
- Vulnerable module: glib2.0/libglib2.0-0
- Introduced through: glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5, glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5 and others
- Fixed in: 2.72.4-0ubuntu2.7
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-data@2.72.4-0ubuntu2.5
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0 package and not the glib2.0 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
Remediation
Upgrade Ubuntu:22.04 glib2.0 to version 2.72.4-0ubuntu2.7 or higher.
References
medium severity
- Vulnerable module: wget
- Introduced through: wget@1.21.2-2ubuntu1.1
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › wget@1.21.2-2ubuntu1.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream wget package and not the wget package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.
Remediation
There is no fixed version for Ubuntu:22.04 wget.
References
medium severity
new
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.13+dfsg-1ubuntu0.7
- Fixed in: 2.9.13+dfsg-1ubuntu0.11
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libxml2@2.9.13+dfsg-1ubuntu0.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.
Remediation
Upgrade Ubuntu:22.04 libxml2 to version 2.9.13+dfsg-1ubuntu0.11 or higher.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.10
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-3198
- https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d
- https://vuldb.com/?ctiid.303151
- https://vuldb.com/?id.303151
- https://vuldb.com/?submit.545773
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=32716
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.
Remediation
There is no fixed version for Ubuntu:22.04 binutils.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-11495
- https://sourceware.org/bugzilla/attachment.cgi?id=16393
- https://sourceware.org/bugzilla/show_bug.cgi?id=33502
- https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0
- https://vuldb.com/?ctiid.327620
- https://vuldb.com/?id.327620
- https://vuldb.com/?submit.668290
- https://www.gnu.org/
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.12
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was found in GNU Binutils 2.45. Impacted is the function _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is identified as b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a. A patch should be applied to remediate this issue.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.12 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-11494
- https://sourceware.org/bugzilla/attachment.cgi?id=16389
- https://sourceware.org/bugzilla/show_bug.cgi?id=33499
- https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a
- https://vuldb.com/?ctiid.327619
- https://vuldb.com/?id.327619
- https://vuldb.com/?submit.668281
- https://www.gnu.org/
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.11
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A weakness has been identified in GNU Binutils 2.45. The affected element is the function vfinfo of the file ldmisc.c. Executing manipulation can lead to out-of-bounds read. The attack can only be executed locally. The exploit has been made available to the public and could be exploited. This patch is called 16357. It is best practice to apply a patch to resolve this issue.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.11 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-11840
- https://sourceware.org/bugzilla/attachment.cgi?id=16351
- https://sourceware.org/bugzilla/attachment.cgi?id=16357
- https://sourceware.org/bugzilla/show_bug.cgi?id=33455
- https://vuldb.com/?ctiid.328775
- https://vuldb.com/?id.328775
- https://vuldb.com/?submit.661281
- https://www.gnu.org/
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.12
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability has been found in GNU Binutils 2.45. This impacts the function bfd_elf_gc_record_vtentry of the file bfd/elflink.c of the component Linker. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 047435dd988a3975d40c6626a8f739a0b2e154bc. To fix this issue, it is recommended to deploy a patch.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.12 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-11412
- https://sourceware.org/bugzilla/attachment.cgi?id=16378
- https://sourceware.org/bugzilla/show_bug.cgi?id=33452#c8
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc
- https://vuldb.com/?ctiid.327348
- https://vuldb.com/?id.327348
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33452
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.12
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was determined in GNU Binutils 2.45. Affected by this vulnerability is the function get_link_hash_entry of the file bfd/elflink.c of the component Linker. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.46 addresses this issue. Patch name: aeaaa9af6359c8e394ce9cf24911fec4f4d23703. It is advisable to upgrade the affected component.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.12 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-11414
- https://sourceware.org/bugzilla/attachment.cgi?id=16361
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703
- https://vuldb.com/?ctiid.327350
- https://vuldb.com/?id.327350
- https://vuldb.com/?submit.665591
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33450
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.12
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.12 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-11413
- https://sourceware.org/bugzilla/attachment.cgi?id=16362
- https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0
- https://vuldb.com/?ctiid.327349
- https://vuldb.com/?id.327349
- https://vuldb.com/?submit.665587
- https://www.gnu.org/
- https://sourceware.org/bugzilla/show_bug.cgi?id=33452
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.11
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be exploited.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.11 or higher.
References
medium severity
- Vulnerable module: expat/libexpat1
- Introduced through: expat/libexpat1@2.4.7-1ubuntu0.6 and expat/libexpat1-dev@2.4.7-1ubuntu0.6
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › expat/libexpat1@2.4.7-1ubuntu0.6
-
Introduced through: tensorflow/tensorflow@latest-jupyter › expat/libexpat1-dev@2.4.7-1ubuntu0.6
NVD Description
Note: Versions mentioned in the description apply only to the upstream expat package and not the expat package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.
Remediation
There is no fixed version for Ubuntu:22.04 expat.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.13+dfsg-1ubuntu0.7
- Fixed in: 2.9.13+dfsg-1ubuntu0.9
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libxml2@2.9.13+dfsg-1ubuntu0.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions xmlXPathRunEval, xmlXPathCtxtCompile, and xmlXPathEvalExpr were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.
Remediation
Upgrade Ubuntu:22.04 libxml2 to version 2.9.13+dfsg-1ubuntu0.9 or higher.
References
medium severity
- Vulnerable module: python-apt/python-apt-common
- Introduced through: python-apt/python-apt-common@2.4.0ubuntu4 and python-apt/python3-apt@2.4.0ubuntu4
- Fixed in: 2.4.0ubuntu4.1
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python-apt/python-apt-common@2.4.0ubuntu4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python-apt/python3-apt@2.4.0ubuntu4
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-apt package and not the python-apt package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
NULL pointer dereference in TagSection.keys() in python-apt on APT-based Linux systems allows a local attacker to cause a denial of service (process crash) via a crafted deb822 file with a malformed non-UTF-8 key.
Remediation
Upgrade Ubuntu:22.04 python-apt to version 2.4.0ubuntu4.1 or higher.
References
medium severity
new
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.14
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-13837
- https://github.com/python/cpython/commit/5a8b19677d818fb41ee55f310233772e15aa1a2b
- https://github.com/python/cpython/commit/694922cf40aa3a28f898b5f5ee08b71b4922df70
- https://github.com/python/cpython/commit/71fa8eb8233b37f16c88b6e3e583b461b205d1ba
- https://github.com/python/cpython/commit/b64441e4852383645af5b435411a6f849dd1b4cb
- https://github.com/python/cpython/issues/119342
- https://github.com/python/cpython/pull/119343
- https://mail.python.org/archives/list/security-announce@python.org/thread/2X5IBCJXRQAZ5PSERLHMSJFBHFR3QM2C/
medium severity
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.12
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.12 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-6075
- https://github.com/python/cpython/commit/2e6150adccaaf5bd95d4c19dfd04a36e0b325d8c
- https://github.com/python/cpython/commit/5dceb93486176e6b4a6d9754491005113eb23427
- https://github.com/python/cpython/commit/631ba3407e3348ccd56ce5160c4fb2c5dc5f4d84
- https://github.com/python/cpython/commit/892747b4cf0f95ba8beb51c0d0658bfaa381ebca
- https://github.com/python/cpython/commit/9ab89c026aa9611c4b0b67c288b8303a480fe742
- https://github.com/python/cpython/commit/c8a5f3435c342964e0a432cc9fb448b7dbecd1ba
- https://github.com/python/cpython/commit/f029e8db626ddc6e3a3beea4eff511a71aaceb5c
- https://github.com/python/cpython/issues/136065
- https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/
medium severity
new
- Vulnerable module: glib2.0/libglib2.0-0
- Introduced through: glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5, glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5 and others
- Fixed in: 2.72.4-0ubuntu2.9
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-data@2.72.4-0ubuntu2.5
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0 package and not the glib2.0 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
Remediation
Upgrade Ubuntu:22.04 glib2.0 to version 2.72.4-0ubuntu2.9 or higher.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.10
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-1147
- https://sourceware.org/bugzilla/attachment.cgi?id=15881
- https://sourceware.org/bugzilla/show_bug.cgi?id=32556
- https://vuldb.com/?ctiid.295051
- https://vuldb.com/?id.295051
- https://www.gnu.org/
- https://security.netapp.com/advisory/ntap-20250404-0003/
- https://vuldb.com/?submit.485254
medium severity
new
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.14
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-12084
- https://github.com/python/cpython/commit/027f21e417b26eed4505ac2db101a4352b7c51a0
- https://github.com/python/cpython/commit/08d8e18ad81cd45bc4a27d6da478b51ea49486e4
- https://github.com/python/cpython/commit/ddcd2acd85d891a53e281c773b3093f9db953964
- https://github.com/python/cpython/issues/142145
- https://github.com/python/cpython/pull/142146
- https://github.com/python/cpython/commit/27648a1818749ef44c420afe6173af6868715437
- https://github.com/python/cpython/commit/8d2d7bb2e754f8649a68ce4116271a4932f76907
- https://github.com/python/cpython/commit/9c9dda6625a2a90d2a06c657eee021d6be19842d
- https://github.com/python/cpython/commit/a696ba8b4d42fd632afc9bc88ad830a2e4cceed8
- https://github.com/python/cpython/commit/41f468786762348960486c166833a218a0a436af
- https://github.com/python/cpython/commit/57937a8e5e293f0dcba5115f7b7a11b1e0c9a273
- https://github.com/python/cpython/commit/e91c11449cad34bac3ea55ee09ca557691d92b53
- https://github.com/python/cpython/commit/a46c10ec9d4050ab67b8a932e0859a2ea60c3cb8
- https://github.com/python/cpython/commit/c97e87593063d84a2bd9fe7068b30eb44de23dc0
medium severity
- Vulnerable module: python3.11
- Introduced through: python3.11@3.11.13-1+jammy1, python3.11/libpython3.11@3.11.13-1+jammy1 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-stdlib@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-venv@3.11.13-1+jammy1
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.11 package and not the python3.11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
Remediation
There is no fixed version for Ubuntu:22.04 python3.11.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-40217
- https://mail.python.org/archives/list/security-announce@python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
- https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
- https://security.netapp.com/advisory/ntap-20231006-0014/
- https://www.python.org/dev/security/
medium severity
- Vulnerable module: python3.11
- Introduced through: python3.11@3.11.13-1+jammy1, python3.11/libpython3.11@3.11.13-1+jammy1 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-stdlib@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-venv@3.11.13-1+jammy1
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.11 package and not the python3.11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
Remediation
There is no fixed version for Ubuntu:22.04 python3.11.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-27043
- http://python.com
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
- http://seclists.org/fulldisclosure/2025/Apr/8
- https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- http://python.org
- https://github.com/python/cpython/issues/102988
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
- https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
- https://security.netapp.com/advisory/ntap-20230601-0003/
medium severity
new
- Vulnerable module: gnupg2/dirmngr
- Introduced through: gnupg2/dirmngr@2.2.27-3ubuntu2.4, gnupg2/gnupg@2.2.27-3ubuntu2.4 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/dirmngr@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gnupg@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gnupg-l10n@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gnupg-utils@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg-agent@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg-wks-client@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg-wks-server@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpgconf@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpgsm@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpgv@2.2.27-3ubuntu2.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.
Remediation
There is no fixed version for Ubuntu:22.04 gnupg2.
References
medium severity
new
- Vulnerable module: glib2.0/libglib2.0-0
- Introduced through: glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5, glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5 and others
- Fixed in: 2.72.4-0ubuntu2.9
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-data@2.72.4-0ubuntu2.5
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0 package and not the glib2.0 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
Remediation
Upgrade Ubuntu:22.04 glib2.0 to version 2.72.4-0ubuntu2.9 or higher.
References
medium severity
new
- Vulnerable module: glib2.0/libglib2.0-0
- Introduced through: glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5, glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5 and others
- Fixed in: 2.72.4-0ubuntu2.8
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-data@2.72.4-0ubuntu2.5
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0 package and not the glib2.0 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
Remediation
Upgrade Ubuntu:22.04 glib2.0 to version 2.72.4-0ubuntu2.8 or higher.
References
medium severity
new
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.13+dfsg-1ubuntu0.7
- Fixed in: 2.9.13+dfsg-1ubuntu0.11
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libxml2@2.9.13+dfsg-1ubuntu0.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.
Remediation
Upgrade Ubuntu:22.04 libxml2 to version 2.9.13+dfsg-1ubuntu0.11 or higher.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.10
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was found in GNU Binutils 2.44 and classified as problematic. This issue affects the function process_debug_info of the file binutils/dwarf.c of the component DWARF Section Handler. The manipulation leads to memory leak. Attacking locally is a requirement. The identifier of the patch is e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4. It is recommended to apply a patch to fix this issue.
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.10 or higher.
References
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
- Fixed in: 2.38-4ubuntu2.10
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was found in GNU Binutils 2.43 and classified as problematic. Affected by this issue is the function link_order_scan of the file ld/ldelfgen.c of the component ld. The manipulation leads to memory leak. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
Remediation
Upgrade Ubuntu:22.04 binutils to version 2.38-4ubuntu2.10 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-1148
- https://sourceware.org/bugzilla/attachment.cgi?id=15887
- https://sourceware.org/bugzilla/show_bug.cgi?id=32576
- https://vuldb.com/?ctiid.295052
- https://vuldb.com/?id.295052
- https://vuldb.com/?submit.485747
- https://www.gnu.org/
- https://security.netapp.com/advisory/ntap-20250404-0004/
medium severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability classified as problematic has been found in GNU Binutils 2.43. This affects the function _bfd_elf_write_section_eh_frame of the file bfd/elf-eh-frame.c of the component ld. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
Remediation
There is no fixed version for Ubuntu:22.04 binutils.
References
medium severity
new
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.13+dfsg-1ubuntu0.7
- Fixed in: 2.9.13+dfsg-1ubuntu0.11
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libxml2@2.9.13+dfsg-1ubuntu0.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.
Remediation
Upgrade Ubuntu:22.04 libxml2 to version 2.9.13+dfsg-1ubuntu0.11 or higher.
References
medium severity
new
- Vulnerable module: glib2.0/libglib2.0-0
- Introduced through: glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5, glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5 and others
- Fixed in: 2.72.4-0ubuntu2.9
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-data@2.72.4-0ubuntu2.5
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0 package and not the glib2.0 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
Remediation
Upgrade Ubuntu:22.04 glib2.0 to version 2.72.4-0ubuntu2.9 or higher.
References
medium severity
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.13+dfsg-1ubuntu0.7
- Fixed in: 2.9.13+dfsg-1ubuntu0.8
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libxml2@2.9.13+dfsg-1ubuntu0.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
Remediation
Upgrade Ubuntu:22.04 libxml2 to version 2.9.13+dfsg-1ubuntu0.8 or higher.
References
medium severity
new
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.10, glibc/libc-dev-bin@2.35-0ubuntu3.10 and others
- Fixed in: 2.35-0ubuntu3.13
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc-bin@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc-dev-bin@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc6@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc6-dev@2.35-0ubuntu3.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
Remediation
Upgrade Ubuntu:22.04 glibc to version 2.35-0ubuntu3.13 or higher.
References
medium severity
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.10, glibc/libc-dev-bin@2.35-0ubuntu3.10 and others
- Fixed in: 2.35-0ubuntu3.11
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc-bin@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc-dev-bin@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc6@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc6-dev@2.35-0ubuntu3.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.
Remediation
Upgrade Ubuntu:22.04 glibc to version 2.35-0ubuntu3.11 or higher.
References
medium severity
new
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.10, glibc/libc-dev-bin@2.35-0ubuntu3.10 and others
- Fixed in: 2.35-0ubuntu3.13
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc-bin@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc-dev-bin@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc6@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc6-dev@2.35-0ubuntu3.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.
Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc.
Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.
Remediation
Upgrade Ubuntu:22.04 glibc to version 2.35-0ubuntu3.13 or higher.
References
medium severity
new
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.10, glibc/libc-dev-bin@2.35-0ubuntu3.10 and others
- Fixed in: 2.35-0ubuntu3.13
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc-bin@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc-dev-bin@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc6@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc6-dev@2.35-0ubuntu3.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
Remediation
Upgrade Ubuntu:22.04 glibc to version 2.35-0ubuntu3.13 or higher.
References
medium severity
new
- Vulnerable module: libtasn1-6
- Introduced through: libtasn1-6@4.18.0-4ubuntu0.1
- Fixed in: 4.18.0-4ubuntu0.2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libtasn1-6@4.18.0-4ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtasn1-6 package and not the libtasn1-6 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
Remediation
Upgrade Ubuntu:22.04 libtasn1-6 to version 4.18.0-4ubuntu0.2 or higher.
References
medium severity
new
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.19 and openssl/libssl3@3.0.2-0ubuntu1.19
- Fixed in: 3.0.2-0ubuntu1.21
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl@3.0.2-0ubuntu1.19
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl/libssl3@3.0.2-0ubuntu1.19
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow.
Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution.
When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk.
The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.
OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.
OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.
Remediation
Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.21 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-15467
- https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703
- https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9
- https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3
- https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e
- https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc
- https://openssl-library.org/news/secadv/20260127.txt
- http://www.openwall.com/lists/oss-security/2026/01/27/10
- https://github.com/guiimoraes/CVE-2025-15467
medium severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.19 and openssl/libssl3@3.0.2-0ubuntu1.19
- Fixed in: 3.0.2-0ubuntu1.20
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl@3.0.2-0ubuntu1.19
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl/libssl3@3.0.2-0ubuntu1.19
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.
Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.
Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy.
The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.
Remediation
Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.20 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-9230
- https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45
- https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280
- https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def
- https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd
- https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482
- https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3
- https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba
- https://openssl-library.org/news/secadv/20250930.txt
- https://lists.debian.org/debian-lts-announce/2025/10/msg00001.html
- http://www.openwall.com/lists/oss-security/2025/09/30/5
medium severity
new
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.14
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-11468
- https://github.com/python/cpython/issues/143935
- https://github.com/python/cpython/pull/143936
- https://mail.python.org/archives/list/security-announce@python.org/thread/FELSEOLBI2QR6YLG6Q7VYF7FWSGQTKLI/
- https://github.com/python/cpython/commit/17d1490aa97bd6b98a42b1a9b324ead84e7fd8a2
- https://github.com/python/cpython/commit/61614a5e5056e4f61ced65008d4576f3df34acb6
- https://github.com/python/cpython/commit/e9970f077240c7c670e8a6fc6662f2b30d3b6ad0
- https://github.com/python/cpython/commit/f738386838021c762efea6c9802c82de65e87796
- https://github.com/python/cpython/commit/a76e4cd62dd68e7cbe86e37e6ed988495a646b66
medium severity
new
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.14
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-15282
- https://github.com/python/cpython/issues/143925
- https://github.com/python/cpython/pull/143926
- https://mail.python.org/archives/list/security-announce@python.org/thread/X66HL7SISGJT33J53OHXMZT4DFLMHVKF/
- https://github.com/python/cpython/commit/f25509e78e8be6ea73c811ac2b8c928c28841b9f
- https://github.com/python/cpython/commit/05356b1cc153108aaf27f3b72ce438af4aa218c0
- https://github.com/python/cpython/commit/34d76b00dabde81a793bd06dd8ecb057838c4b38
- https://github.com/python/cpython/commit/3f396ca9d7bbe2a50ea6b8c9b27c0082884d9f80
- https://github.com/python/cpython/commit/4ed11d3cd288e6b90196a15c5a825a45d318fe47
- https://github.com/python/cpython/commit/a35ca3be5842505dab74dc0b90b89cde0405017a
medium severity
new
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.14
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-15366
- https://github.com/python/cpython/issues/143921
- https://github.com/python/cpython/pull/143922
- https://mail.python.org/archives/list/security-announce@python.org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/
- https://github.com/python/cpython/commit/6262704b134db2a4ba12e85ecfbd968534f28b45
medium severity
new
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.14
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-15367
- https://github.com/python/cpython/issues/143923
- https://github.com/python/cpython/pull/143924
- https://mail.python.org/archives/list/security-announce@python.org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/
- https://github.com/python/cpython/commit/b234a2b67539f787e191d2ef19a7cbdce32874e7
medium severity
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.11
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.11 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-6069
- https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949
- https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41
- https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b
- https://github.com/python/cpython/issues/135462
- https://github.com/python/cpython/pull/135464
- https://mail.python.org/archives/list/security-announce@python.org/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/
- https://github.com/python/cpython/commit/8d1b3dfa09135affbbf27fb8babcf3c11415df49
- https://github.com/python/cpython/commit/ab0893fd5c579d9cea30841680e6d35fc478afb5
- https://github.com/python/cpython/commit/f3c6f882cddc8dc30320d2e73edf019e201394fc
- https://github.com/python/cpython/commit/fdc9d214c01cb4588f540cfa03726bbf2a33fc15
medium severity
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.11
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives.
This vulnerability can be mitigated by including the following patch after importing the “tarfile” module: https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.11 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-8194
- https://github.com/python/cpython/issues/130577
- https://github.com/python/cpython/pull/137027
- https://mail.python.org/archives/list/security-announce@python.org/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
- https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
- https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
- https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
- https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
- https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
- https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
- https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
- https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
- http://www.openwall.com/lists/oss-security/2025/07/28/1
- http://www.openwall.com/lists/oss-security/2025/07/28/2
medium severity
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.12
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compared to other ZIP implementations.
Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.12 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-8291
- https://github.com/python/cpython/pull/139702
- https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/
- https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267
- https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6
- https://github.com/python/cpython/issues/139700
- https://github.com/python/cpython/commit/1d29afb0d6218aa8fb5e1e4a6133a4778d89bb46
- https://github.com/python/cpython/commit/76437ac248ad8ca44e9bf697b02b1e2241df2196
- https://github.com/python/cpython/commit/8392b2f0d35678407d9ce7d95655a5b77de161b4
- https://github.com/python/cpython/commit/bca11ae7d575d87ed93f5dd6a313be6246e3e388
- https://github.com/python/cpython/commit/d11e69d6203080e3ec450446bfed0516727b85c3
- https://github.com/google/security-research/security/advisories/GHSA-hhv7-p4pg-wm6p
- https://github.com/psf/advisory-database/blob/main/advisories/python/PSF-2025-12.json
medium severity
new
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.14
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2026-0672
- https://github.com/python/cpython/issues/143919
- https://github.com/python/cpython/pull/143920
- https://mail.python.org/archives/list/security-announce@python.org/thread/6VFLQQEIX673KXKFUZXCUNE5AZOGZ45M/
- https://github.com/python/cpython/commit/95746b3a13a985787ef53b977129041971ed7f70
- https://github.com/python/cpython/commit/712452e6f1d4b9f7f8c4c92ebfcaac1705faa440
- https://github.com/python/cpython/commit/62700107418eb2cca3fc88da036a243ea975f172
- https://github.com/python/cpython/commit/7852d72b653fea0199acf5fc2a84f6f8b84eba8d
- https://github.com/python/cpython/commit/918387e4912d12ffc166c8f2a38df92b6ec756ca
- https://github.com/python/cpython/commit/b1869ff648bbee0717221d09e6deff46617f3e85
medium severity
new
- Vulnerable module: python3.10
- Introduced through: python3.10@3.10.12-1~22.04.10, python3.10/libpython3.10-minimal@3.10.12-1~22.04.10 and others
- Fixed in: 3.10.12-1~22.04.14
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-minimal@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/libpython3.10-stdlib@3.10.12-1~22.04.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.10/python3.10-minimal@3.10.12-1~22.04.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.10 package and not the python3.10 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
User-controlled header names and values containing newlines can allow injecting HTTP headers.
Remediation
Upgrade Ubuntu:22.04 python3.10 to version 3.10.12-1~22.04.14 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2026-0865
- https://github.com/python/cpython/issues/143916
- https://github.com/python/cpython/pull/143917
- https://mail.python.org/archives/list/security-announce@python.org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/
- https://github.com/python/cpython/commit/22e4d55285cee52bc4dbe061324e5f30bd4dee58
- https://github.com/python/cpython/commit/23e3c0ae867cca0130e441e776c9955b9027c510
- https://github.com/python/cpython/commit/2f840249550e082dc351743f474ba56da10478d2
- https://github.com/python/cpython/commit/4802b96a2cde58570c24c13ef3289490980961c5
- https://github.com/python/cpython/commit/e4846a93ac07a8ae9aa18203af0dd13d6e7a6995
- https://github.com/python/cpython/commit/f7fceed79ca1bceae8dbe5ba5bc8928564da7211
- https://github.com/python/cpython/commit/66da7bf6fe7b81e3ecc9c0a25bd47d4616c8d1a6
medium severity
- Vulnerable module: python3.11
- Introduced through: python3.11@3.11.13-1+jammy1, python3.11/libpython3.11@3.11.13-1+jammy1 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-stdlib@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-venv@3.11.13-1+jammy1
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.11 package and not the python3.11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
An issue was found in the CPython tempfile.TemporaryDirectory class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.
The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.
Remediation
There is no fixed version for Ubuntu:22.04 python3.11.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-6597
- http://www.openwall.com/lists/oss-security/2024/03/20/5
- https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a
- https://github.com/python/cpython/commit/5585334d772b253a01a6730e8202ffb1607c3d25
- https://github.com/python/cpython/commit/6ceb8aeda504b079fef7a57b8d81472f15cdd9a5
- https://github.com/python/cpython/commit/81c16cd94ec38d61aa478b9a452436dc3b1b524d
- https://github.com/python/cpython/commit/8eaeefe49d179ca4908d052745e3bb8b6f238f82
- https://github.com/python/cpython/commit/d54e22a669ae6e987199bb5d2c69bb5a46b0083b
- https://github.com/python/cpython/issues/91133
- https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
- https://mail.python.org/archives/list/security-announce@python.org/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/
medium severity
- Vulnerable module: python3.11
- Introduced through: python3.11@3.11.13-1+jammy1, python3.11/libpython3.11@3.11.13-1+jammy1 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-stdlib@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-venv@3.11.13-1+jammy1
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.11 package and not the python3.11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
An issue was found in the CPython zipfile module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.
The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.
Remediation
There is no fixed version for Ubuntu:22.04 python3.11.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-0450
- https://security.netapp.com/advisory/ntap-20250411-0005/
- http://www.openwall.com/lists/oss-security/2024/03/20/5
- https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85
- https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
- https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675
- https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51
- https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549
- https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183
- https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b
- https://github.com/python/cpython/issues/109858
- https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
- https://lists.debian.org/debian-lts-announce/2024/11/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
- https://mail.python.org/archives/list/security-announce@python.org/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
- https://www.bamsoftware.com/hacks/zipbomb/
medium severity
- Vulnerable module: python3.11
- Introduced through: python3.11@3.11.13-1+jammy1, python3.11/libpython3.11@3.11.13-1+jammy1 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/libpython3.11-stdlib@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-dev@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-minimal@3.11.13-1+jammy1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python3.11/python3.11-venv@3.11.13-1+jammy1
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.11 package and not the python3.11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts ([]), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
Remediation
There is no fixed version for Ubuntu:22.04 python3.11.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-11168
- https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5
- https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550
- https://github.com/python/cpython/issues/103848
- https://github.com/python/cpython/pull/103849
- https://mail.python.org/archives/list/security-announce@python.org/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/
- https://github.com/python/cpython/commit/634ded45545ce8cbd6fd5d49785613dd7fa9b89e
- https://github.com/python/cpython/commit/ddca2953191c67a12b1f19d6bca41016c6ae7132
- https://security.netapp.com/advisory/ntap-20250411-0004/
- https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html
medium severity
- Vulnerable module: tar
- Introduced through: tar@1.34+dfsg-1ubuntu0.1.22.04.2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › tar@1.34+dfsg-1ubuntu0.1.22.04.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar package and not the tar package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which "tar xf" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each "tar xf" in its Security Rules of Thumb; however, third-party advice leads users to run "tar xf" more than once into the same directory.
Remediation
There is no fixed version for Ubuntu:22.04 tar.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-45582
- https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md
- https://www.gnu.org/software/tar/
- https://lists.gnu.org/archive/html/bug-tar/2025-08/msg00012.html
- https://www.gnu.org/software/tar/manual/html_node/Integrity.html
- https://www.gnu.org/software/tar/manual/html_node/Security-rules-of-thumb.html
- http://www.openwall.com/lists/oss-security/2025/11/01/6
low severity
new
- Vulnerable module: libtasn1-6
- Introduced through: libtasn1-6@4.18.0-4ubuntu0.1
- Fixed in: 4.18.0-4ubuntu0.2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libtasn1-6@4.18.0-4ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtasn1-6 package and not the libtasn1-6 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
Remediation
Upgrade Ubuntu:22.04 libtasn1-6 to version 4.18.0-4ubuntu0.2 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2021-46848
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/
- https://bugs.gentoo.org/866237
- https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5
- https://gitlab.com/gnutls/libtasn1/-/issues/32
- https://lists.debian.org/debian-lts-announce/2023/01/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/
- https://security.netapp.com/advisory/ntap-20221118-0006/
low severity
- Vulnerable module: policykit-1
- Introduced through: policykit-1@0.105-33, policykit-1/libpolkit-agent-1-0@0.105-33 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › policykit-1@0.105-33
-
Introduced through: tensorflow/tensorflow@latest-jupyter › policykit-1/libpolkit-agent-1-0@0.105-33
-
Introduced through: tensorflow/tensorflow@latest-jupyter › policykit-1/libpolkit-gobject-1-0@0.105-33
-
Introduced through: tensorflow/tensorflow@latest-jupyter › policykit-1/pkexec@0.105-33
-
Introduced through: tensorflow/tensorflow@latest-jupyter › policykit-1/polkitd@0.105-33
NVD Description
Note: Versions mentioned in the description apply only to the upstream policykit-1 package and not the policykit-1 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
pkexec, when used with --user nonpriv, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Remediation
There is no fixed version for Ubuntu:22.04 policykit-1.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2568
- https://security-tracker.debian.org/tracker/CVE-2016-2568
- https://access.redhat.com/security/cve/cve-2016-2568
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
- https://ubuntu.com/security/CVE-2016-2568
- http://www.openwall.com/lists/oss-security/2016/02/26/3
- https://bugzilla.redhat.com/show_bug.cgi?id=1300746
low severity
- Vulnerable module: elfutils/libdw1
- Introduced through: elfutils/libdw1@0.186-1ubuntu0.1 and elfutils/libelf1@0.186-1ubuntu0.1
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › elfutils/libdw1@0.186-1ubuntu0.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › elfutils/libelf1@0.186-1ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils package and not the elfutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability has been found in GNU elfutils 0.192 and classified as critical. This vulnerability affects the function __libdw_thread_tail in the library libdw_alloc.c of the component eu-readelf. The manipulation of the argument w leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 2636426a091bd6c6f7f02e49ab20d4cdc6bfc753. It is recommended to apply a patch to fix this issue.
Remediation
There is no fixed version for Ubuntu:22.04 elfutils.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-1352
- https://sourceware.org/bugzilla/attachment.cgi?id=15923
- https://sourceware.org/bugzilla/show_bug.cgi?id=32650
- https://sourceware.org/bugzilla/show_bug.cgi?id=32650#c2
- https://vuldb.com/?ctiid.295960
- https://vuldb.com/?id.295960
- https://vuldb.com/?submit.495965
- https://www.gnu.org/
low severity
- Vulnerable module: glibc/libc-bin
- Introduced through: glibc/libc-bin@2.35-0ubuntu3.10, glibc/libc-dev-bin@2.35-0ubuntu3.10 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc-bin@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc-dev-bin@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc6@2.35-0ubuntu3.10
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glibc/libc6-dev@2.35-0ubuntu3.10
NVD Description
Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.
Remediation
There is no fixed version for Ubuntu:22.04 glibc.
References
low severity
- Vulnerable module: libzstd/libzstd1
- Introduced through: libzstd/libzstd1@1.4.8+dfsg-3build1
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libzstd/libzstd1@1.4.8+dfsg-3build1
NVD Description
Note: Versions mentioned in the description apply only to the upstream libzstd package and not the libzstd package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.
Remediation
There is no fixed version for Ubuntu:22.04 libzstd.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-4899
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
- https://github.com/facebook/zstd/issues/3200
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
- https://security.netapp.com/advisory/ntap-20230725-0005/
low severity
new
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.19 and openssl/libssl3@3.0.2-0ubuntu1.19
- Fixed in: 3.0.2-0ubuntu1.21
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl@3.0.2-0ubuntu1.19
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl/libssl3@3.0.2-0ubuntu1.19
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function.
Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files.
The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When called from PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can be NULL, causing a crash. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure.
Exploiting this issue requires an attacker to provide a malformed PKCS#12 file to an application that processes it. For that reason the issue was assessed as Low severity according to our Security Policy.
The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.
OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
Remediation
Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.21 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-69421
- https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b
- https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7
- https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd
- https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3
- https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c
- https://openssl-library.org/news/secadv/20260127.txt
low severity
- Vulnerable module: patch
- Introduced through: patch@2.7.6-7build2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › patch@2.7.6-7build2
NVD Description
Note: Versions mentioned in the description apply only to the upstream patch package and not the patch package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.
Remediation
There is no fixed version for Ubuntu:22.04 patch.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2018-6952
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
- https://security-tracker.debian.org/tracker/CVE-2018-6952
- https://security.gentoo.org/glsa/201904-17
- https://savannah.gnu.org/bugs/index.php?53133
- https://access.redhat.com/errata/RHSA-2019:2033
- http://www.securityfocus.com/bid/103047
low severity
- Vulnerable module: pcre2/libpcre2-8-0
- Introduced through: pcre2/libpcre2-8-0@10.39-3ubuntu0.1
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › pcre2/libpcre2-8-0@10.39-3ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre2 package and not the pcre2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.
Remediation
There is no fixed version for Ubuntu:22.04 pcre2.
References
low severity
- Vulnerable module: pcre3/libpcre3
- Introduced through: pcre3/libpcre3@2:8.39-13ubuntu0.22.04.1
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › pcre3/libpcre3@2:8.39-13ubuntu0.22.04.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre3 package and not the pcre3 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.
Remediation
There is no fixed version for Ubuntu:22.04 pcre3.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-11164
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
- https://security-tracker.debian.org/tracker/CVE-2017-11164
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://openwall.com/lists/oss-security/2017/07/11/3
- http://www.securityfocus.com/bid/99575
- http://www.openwall.com/lists/oss-security/2023/04/11/1
- http://www.openwall.com/lists/oss-security/2023/04/12/1
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: python-httplib2/python3-httplib2
- Introduced through: python-httplib2/python3-httplib2@0.20.2-2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › python-httplib2/python3-httplib2@0.20.2-2
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-httplib2 package and not the python-httplib2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
httplib2 is a comprehensive HTTP client library for Python. In httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.
Remediation
There is no fixed version for Ubuntu:22.04 python-httplib2.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2021-21240
- https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m
- https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc
- https://github.com/httplib2/httplib2/pull/182
- https://pypi.org/project/httplib2
low severity
- Vulnerable module: icu/libicu70
- Introduced through: icu/libicu70@70.1-2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › icu/libicu70@70.1-2
NVD Description
Note: Versions mentioned in the description apply only to the upstream icu package and not the icu package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.
Remediation
There is no fixed version for Ubuntu:22.04 icu.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-5222
- https://access.redhat.com/errata/RHSA-2025:11888
- https://access.redhat.com/errata/RHSA-2025:12083
- https://access.redhat.com/errata/RHSA-2025:12331
- https://access.redhat.com/errata/RHSA-2025:12332
- https://access.redhat.com/errata/RHSA-2025:12333
- https://access.redhat.com/security/cve/CVE-2025-5222
- https://bugzilla.redhat.com/show_bug.cgi?id=2368600
- https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html
low severity
- Vulnerable module: coreutils
- Introduced through: coreutils@8.32-4.1ubuntu1.2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › coreutils@8.32-4.1ubuntu1.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream coreutils package and not the coreutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Remediation
There is no fixed version for Ubuntu:22.04 coreutils.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2781
- https://security-tracker.debian.org/tracker/CVE-2016-2781
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- http://www.openwall.com/lists/oss-security/2016/02/28/2
- http://www.openwall.com/lists/oss-security/2016/02/28/3
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
low severity
- Vulnerable module: dbus
- Introduced through: dbus@1.12.20-2ubuntu4.1 and dbus/libdbus-1-3@1.12.20-2ubuntu4.1
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › dbus@1.12.20-2ubuntu4.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › dbus/libdbus-1-3@1.12.20-2ubuntu4.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream dbus package and not the dbus package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.
Remediation
There is no fixed version for Ubuntu:22.04 dbus.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-34969
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
- https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
- https://security.netapp.com/advisory/ntap-20231208-0007/
low severity
- Vulnerable module: gcc-11
- Introduced through: gcc-11@11.4.0-1ubuntu1~22.04, gcc-11/cpp-11@11.4.0-1ubuntu1~22.04 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/cpp-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/g++-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/gcc-11-base@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libasan6@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libgcc-11-dev@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libstdc++-11-dev@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libtsan0@11.4.0-1ubuntu1~22.04
NVD Description
Note: Versions mentioned in the description apply only to the upstream gcc-11 package and not the gcc-11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
Remediation
There is no fixed version for Ubuntu:22.04 gcc-11.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2021-3826
- https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
- https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
- https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
low severity
- Vulnerable module: ncurses/libncurses6
- Introduced through: ncurses/libncurses6@6.3-2ubuntu0.1, ncurses/libncursesw6@6.3-2ubuntu0.1 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › ncurses/libncurses6@6.3-2ubuntu0.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › ncurses/libncursesw6@6.3-2ubuntu0.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › ncurses/libtinfo6@6.3-2ubuntu0.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › ncurses/ncurses-base@6.3-2ubuntu0.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › ncurses/ncurses-bin@6.3-2ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().
Remediation
There is no fixed version for Ubuntu:22.04 ncurses.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-50495
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
- https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
- https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
- https://security.netapp.com/advisory/ntap-20240119-0008/
low severity
- Vulnerable module: systemd
- Introduced through: systemd@249.11-0ubuntu3.16, systemd/libnss-systemd@249.11-0ubuntu3.16 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › systemd@249.11-0ubuntu3.16
-
Introduced through: tensorflow/tensorflow@latest-jupyter › systemd/libnss-systemd@249.11-0ubuntu3.16
-
Introduced through: tensorflow/tensorflow@latest-jupyter › systemd/libpam-systemd@249.11-0ubuntu3.16
-
Introduced through: tensorflow/tensorflow@latest-jupyter › systemd/libsystemd0@249.11-0ubuntu3.16
-
Introduced through: tensorflow/tensorflow@latest-jupyter › systemd/libudev1@249.11-0ubuntu3.16
-
Introduced through: tensorflow/tensorflow@latest-jupyter › systemd/systemd-sysv@249.11-0ubuntu3.16
-
Introduced through: tensorflow/tensorflow@latest-jupyter › systemd/systemd-timesyncd@249.11-0ubuntu3.16
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd package and not the systemd package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.
Remediation
There is no fixed version for Ubuntu:22.04 systemd.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-7008
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMDEG5PKONWNHOEYSUDRT6JEOISRMN2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHNBXGKJWISJETTTDTZKTBFIBJUOSLKL/
- https://security.netapp.com/advisory/ntap-20241122-0004/
- https://access.redhat.com/errata/RHSA-2024:2463
- https://access.redhat.com/errata/RHSA-2024:3203
- https://access.redhat.com/security/cve/CVE-2023-7008
- https://bugzilla.redhat.com/show_bug.cgi?id=2222261
- https://bugzilla.redhat.com/show_bug.cgi?id=2222672
- https://github.com/systemd/systemd/issues/25676
- https://lists.debian.org/debian-lts-announce/2024/09/msg00001.html
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd).
Remediation
There is no fixed version for Ubuntu:22.04 binutils.
References
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.
Remediation
There is no fixed version for Ubuntu:22.04 binutils.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-48064
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8f2c64de86bc3d7556121fe296dd679000283931
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/
- https://security.netapp.com/advisory/ntap-20231006-0008/
- https://sourceware.org/bugzilla/show_bug.cgi?id=29922
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.
Remediation
There is no fixed version for Ubuntu:22.04 binutils.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2019-1010204
- https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
- https://security-tracker.debian.org/tracker/CVE-2019-1010204
- https://sourceware.org/bugzilla/show_bug.cgi?id=23765
- https://security.netapp.com/advisory/ntap-20190822-0001/
- https://support.f5.com/csp/article/K05032915?utm_source=f5support&%3Butm_medium=RSS
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
Remediation
There is no fixed version for Ubuntu:22.04 binutils.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-27943
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28995
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
low severity
- Vulnerable module: gcc-11
- Introduced through: gcc-11@11.4.0-1ubuntu1~22.04, gcc-11/cpp-11@11.4.0-1ubuntu1~22.04 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/cpp-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/g++-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/gcc-11-base@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libasan6@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libgcc-11-dev@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libstdc++-11-dev@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libtsan0@11.4.0-1ubuntu1~22.04
NVD Description
Note: Versions mentioned in the description apply only to the upstream gcc-11 package and not the gcc-11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.
Remediation
There is no fixed version for Ubuntu:22.04 gcc-11.
References
low severity
- Vulnerable module: gcc-11
- Introduced through: gcc-11@11.4.0-1ubuntu1~22.04, gcc-11/cpp-11@11.4.0-1ubuntu1~22.04 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/cpp-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/g++-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/gcc-11-base@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libasan6@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libgcc-11-dev@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libstdc++-11-dev@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libtsan0@11.4.0-1ubuntu1~22.04
NVD Description
Note: Versions mentioned in the description apply only to the upstream gcc-11 package and not the gcc-11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
Remediation
There is no fixed version for Ubuntu:22.04 gcc-11.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-27943
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28995
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
low severity
- Vulnerable module: gcc-12/gcc-12-base
- Introduced through: gcc-12/gcc-12-base@12.3.0-1ubuntu1~22.04, gcc-12/libatomic1@12.3.0-1ubuntu1~22.04 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/gcc-12-base@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libatomic1@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libcc1-0@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libgcc-s1@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libgomp1@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libitm1@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/liblsan0@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libquadmath0@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libstdc++6@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libubsan1@12.3.0-1ubuntu1~22.04
NVD Description
Note: Versions mentioned in the description apply only to the upstream gcc-12 package and not the gcc-12 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
Remediation
There is no fixed version for Ubuntu:22.04 gcc-12.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-27943
- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28995
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
low severity
- Vulnerable module: patch
- Introduced through: patch@2.7.6-7build2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › patch@2.7.6-7build2
NVD Description
Note: Versions mentioned in the description apply only to the upstream patch package and not the patch package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.
Remediation
There is no fixed version for Ubuntu:22.04 patch.
References
low severity
- Vulnerable module: gcc-11
- Introduced through: gcc-11@11.4.0-1ubuntu1~22.04, gcc-11/cpp-11@11.4.0-1ubuntu1~22.04 and others
- Fixed in: 11.4.0-1ubuntu1~22.04.2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/cpp-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/g++-11@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/gcc-11-base@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libasan6@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libgcc-11-dev@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libstdc++-11-dev@11.4.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-11/libtsan0@11.4.0-1ubuntu1~22.04
NVD Description
Note: Versions mentioned in the description apply only to the upstream gcc-11 package and not the gcc-11 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables.
The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.
Remediation
Upgrade Ubuntu:22.04 gcc-11 to version 11.4.0-1ubuntu1~22.04.2 or higher.
References
low severity
- Vulnerable module: gcc-12/gcc-12-base
- Introduced through: gcc-12/gcc-12-base@12.3.0-1ubuntu1~22.04, gcc-12/libatomic1@12.3.0-1ubuntu1~22.04 and others
- Fixed in: 12.3.0-1ubuntu1~22.04.2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/gcc-12-base@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libatomic1@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libcc1-0@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libgcc-s1@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libgomp1@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libitm1@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/liblsan0@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libquadmath0@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libstdc++6@12.3.0-1ubuntu1~22.04
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gcc-12/libubsan1@12.3.0-1ubuntu1~22.04
NVD Description
Note: Versions mentioned in the description apply only to the upstream gcc-12 package and not the gcc-12 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables.
The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.
Remediation
Upgrade Ubuntu:22.04 gcc-12 to version 12.3.0-1ubuntu1~22.04.2 or higher.
References
low severity
- Vulnerable module: elfutils/libdw1
- Introduced through: elfutils/libdw1@0.186-1ubuntu0.1 and elfutils/libelf1@0.186-1ubuntu0.1
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › elfutils/libdw1@0.186-1ubuntu0.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › elfutils/libelf1@0.186-1ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream elfutils package and not the elfutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability classified as problematic was found in GNU elfutils 0.192. This vulnerability affects the function elf_strptr in the library /libelf/elf_strptr.c of the component eu-strip. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is b16f441cca0a4841050e3215a9f120a6d8aea918. It is recommended to apply a patch to fix this issue.
Remediation
There is no fixed version for Ubuntu:22.04 elfutils.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-1376
- https://sourceware.org/bugzilla/attachment.cgi?id=15940
- https://sourceware.org/bugzilla/show_bug.cgi?id=32672
- https://sourceware.org/bugzilla/show_bug.cgi?id=32672#c3
- https://vuldb.com/?ctiid.295984
- https://vuldb.com/?id.295984
- https://vuldb.com/?submit.497538
- https://www.gnu.org/
low severity
- Vulnerable module: libssh/libssh-4
- Introduced through: libssh/libssh-4@0.9.6-2ubuntu0.22.04.4
- Fixed in: 0.9.6-2ubuntu0.22.04.5
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libssh/libssh-4@0.9.6-2ubuntu0.22.04.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream libssh package and not the libssh package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cause the client or server to crash.
Remediation
Upgrade Ubuntu:22.04 libssh to version 0.9.6-2ubuntu0.22.04.5 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-8114
- https://access.redhat.com/security/cve/CVE-2025-8114
- https://bugzilla.redhat.com/show_bug.cgi?id=2383220
- https://git.libssh.org/projects/libssh.git/commit/?id=53ac23ded4cb2c5463f6c4cd1525331bd578812d
- https://www.libssh.org/security/advisories/CVE-2025-8114.txt
- https://git.libssh.org/projects/libssh.git/commit/?id=65f363c9
low severity
- Vulnerable module: binutils
- Introduced through: binutils@2.38-4ubuntu2.8, binutils/binutils-common@2.38-4ubuntu2.8 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-common@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/binutils-x86-64-linux-gnu@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libbinutils@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf-nobfd0@2.38-4ubuntu2.8
-
Introduced through: tensorflow/tensorflow@latest-jupyter › binutils/libctf0@2.38-4ubuntu2.8
NVD Description
Note: Versions mentioned in the description apply only to the upstream binutils package and not the binutils package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability classified as problematic has been found in GNU Binutils 2.43. Affected is the function xstrdup of the file xstrdup.c of the component ld. The manipulation leads to memory leak. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
Remediation
There is no fixed version for Ubuntu:22.04 binutils.
References
low severity
- Vulnerable module: glib2.0/libglib2.0-0
- Introduced through: glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5, glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5 and others
- Fixed in: 2.72.4-0ubuntu2.7
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-data@2.72.4-0ubuntu2.5
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0 package and not the glib2.0 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
Remediation
Upgrade Ubuntu:22.04 glib2.0 to version 2.72.4-0ubuntu2.7 or higher.
References
low severity
- Vulnerable module: glib2.0/libglib2.0-0
- Introduced through: glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5, glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5 and others
- Fixed in: 2.72.4-0ubuntu2.7
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-0@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-bin@2.72.4-0ubuntu2.5
-
Introduced through: tensorflow/tensorflow@latest-jupyter › glib2.0/libglib2.0-data@2.72.4-0ubuntu2.5
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2.0 package and not the glib2.0 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.
Remediation
Upgrade Ubuntu:22.04 glib2.0 to version 2.72.4-0ubuntu2.7 or higher.
References
low severity
- Vulnerable module: gnupg2/dirmngr
- Introduced through: gnupg2/dirmngr@2.2.27-3ubuntu2.4, gnupg2/gnupg@2.2.27-3ubuntu2.4 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/dirmngr@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gnupg@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gnupg-l10n@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gnupg-utils@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg-agent@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg-wks-client@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpg-wks-server@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpgconf@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpgsm@2.2.27-3ubuntu2.4
-
Introduced through: tensorflow/tensorflow@latest-jupyter › gnupg2/gpgv@2.2.27-3ubuntu2.4
NVD Description
Note: Versions mentioned in the description apply only to the upstream gnupg2 package and not the gnupg2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
Remediation
There is no fixed version for Ubuntu:22.04 gnupg2.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2022-3219
- https://access.redhat.com/security/cve/CVE-2022-3219
- https://bugzilla.redhat.com/show_bug.cgi?id=2127010
- https://dev.gnupg.org/D556
- https://dev.gnupg.org/T5993
- https://marc.info/?l=oss-security&m=165696590211434&w=4
- https://security.netapp.com/advisory/ntap-20230324-0001/
low severity
new
- Vulnerable module: libxml2
- Introduced through: libxml2@2.9.13+dfsg-1ubuntu0.7
- Fixed in: 2.9.13+dfsg-1ubuntu0.11
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libxml2@2.9.13+dfsg-1ubuntu0.7
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains, that "[t]he issue can only be triggered with untrusted SGML catalogs and it makes absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at all."
Remediation
Upgrade Ubuntu:22.04 libxml2 to version 2.9.13+dfsg-1ubuntu0.11 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-8732
- https://drive.google.com/file/d/1woIeYVcSQB_NwfEhaVnX6MedpWJ_nqWl/view?usp=drive_link
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/958
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/958#note_2505853
- https://vuldb.com/?ctiid.319228
- https://vuldb.com/?id.319228
- https://vuldb.com/?submit.622285
low severity
- Vulnerable module: shadow/login
- Introduced through: shadow/login@1:4.8.1-2ubuntu2.2 and shadow/passwd@1:4.8.1-2ubuntu2.2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › shadow/login@1:4.8.1-2ubuntu2.2
-
Introduced through: tensorflow/tensorflow@latest-jupyter › shadow/passwd@1:4.8.1-2ubuntu2.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream shadow package and not the shadow package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
Remediation
There is no fixed version for Ubuntu:22.04 shadow.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-29383
- https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d
- https://github.com/shadow-maint/shadow/pull/687
- https://lists.debian.org/debian-lts-announce/2025/04/msg00026.html
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797
low severity
- Vulnerable module: curl
- Introduced through: curl@7.81.0-1ubuntu1.20, curl/libcurl3-gnutls@7.81.0-1ubuntu1.20 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl@7.81.0-1ubuntu1.20
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl/libcurl3-gnutls@7.81.0-1ubuntu1.20
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl/libcurl4@7.81.0-1ubuntu1.20
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
When asked to use a .netrc file for credentials and to follow HTTP
redirects, curl could leak the password used for the first host to the
followed-to host under certain circumstances.
This flaw only manifests itself if the netrc file has a default entry that
omits both login and password. A rare circumstance.
Remediation
There is no fixed version for Ubuntu:22.04 curl.
References
low severity
- Vulnerable module: curl
- Introduced through: curl@7.81.0-1ubuntu1.20, curl/libcurl3-gnutls@7.81.0-1ubuntu1.20 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl@7.81.0-1ubuntu1.20
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl/libcurl3-gnutls@7.81.0-1ubuntu1.20
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl/libcurl4@7.81.0-1ubuntu1.20
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts not present in the specified file if they were added as recognized in the libssh global known_hosts file.
Remediation
There is no fixed version for Ubuntu:22.04 curl.
References
low severity
- Vulnerable module: curl
- Introduced through: curl@7.81.0-1ubuntu1.20, curl/libcurl3-gnutls@7.81.0-1ubuntu1.20 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl@7.81.0-1ubuntu1.20
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl/libcurl3-gnutls@7.81.0-1ubuntu1.20
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl/libcurl4@7.81.0-1ubuntu1.20
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.
Remediation
There is no fixed version for Ubuntu:22.04 curl.
References
low severity
- Vulnerable module: curl
- Introduced through: curl@7.81.0-1ubuntu1.20, curl/libcurl3-gnutls@7.81.0-1ubuntu1.20 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl@7.81.0-1ubuntu1.20
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl/libcurl3-gnutls@7.81.0-1ubuntu1.20
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl/libcurl4@7.81.0-1ubuntu1.20
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.
Remediation
There is no fixed version for Ubuntu:22.04 curl.
References
low severity
- Vulnerable module: curl
- Introduced through: curl@7.81.0-1ubuntu1.20, curl/libcurl3-gnutls@7.81.0-1ubuntu1.20 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl@7.81.0-1ubuntu1.20
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl/libcurl3-gnutls@7.81.0-1ubuntu1.20
-
Introduced through: tensorflow/tensorflow@latest-jupyter › curl/libcurl4@7.81.0-1ubuntu1.20
NVD Description
Note: Versions mentioned in the description apply only to the upstream curl package and not the curl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
- A cookie is set using the
securekeyword forhttps://target - curl is redirected to or otherwise made to speak with
http://target(same hostname, but using clear text HTTP) using the same cookie set - The same cookie name is set - but with just a slash as path (
path=\"/\",). Since this site is not secure, the cookie should just be ignored. - A bug in the path comparison logic makes curl read outside a heap buffer boundary
The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.
The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
Remediation
There is no fixed version for Ubuntu:22.04 curl.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-9086
- https://curl.se/docs/CVE-2025-9086.html
- https://curl.se/docs/CVE-2025-9086.json
- https://hackerone.com/reports/3294999
- http://www.openwall.com/lists/oss-security/2025/09/10/1
- https://lists.debian.org/debian-lts-announce/2026/01/msg00002.html
low severity
- Vulnerable module: dpkg
- Introduced through: dpkg@1.21.1ubuntu2.3, dpkg/dpkg-dev@1.21.1ubuntu2.3 and others
- Fixed in: 1.21.1ubuntu2.6
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › dpkg@1.21.1ubuntu2.3
-
Introduced through: tensorflow/tensorflow@latest-jupyter › dpkg/dpkg-dev@1.21.1ubuntu2.3
-
Introduced through: tensorflow/tensorflow@latest-jupyter › dpkg/libdpkg-perl@1.21.1ubuntu2.3
NVD Description
Note: Versions mentioned in the description apply only to the upstream dpkg package and not the dpkg package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
Remediation
Upgrade Ubuntu:22.04 dpkg to version 1.21.1ubuntu2.6 or higher.
References
low severity
- Vulnerable module: libgcrypt20
- Introduced through: libgcrypt20@1.9.4-3ubuntu3
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › libgcrypt20@1.9.4-3ubuntu3
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt20 package and not the libgcrypt20 package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
Remediation
There is no fixed version for Ubuntu:22.04 libgcrypt20.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2024-2236
- https://access.redhat.com/errata/RHSA-2024:9404
- https://bugzilla.redhat.com/show_bug.cgi?id=2268268
- https://access.redhat.com/errata/RHSA-2025:3534
- https://access.redhat.com/errata/RHSA-2025:3530
- https://access.redhat.com/security/cve/CVE-2024-2236
- https://bugzilla.redhat.com/show_bug.cgi?id=2245218
low severity
- Vulnerable module: ncurses/libncurses6
- Introduced through: ncurses/libncurses6@6.3-2ubuntu0.1, ncurses/libncursesw6@6.3-2ubuntu0.1 and others
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › ncurses/libncurses6@6.3-2ubuntu0.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › ncurses/libncursesw6@6.3-2ubuntu0.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › ncurses/libtinfo6@6.3-2ubuntu0.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › ncurses/ncurses-base@6.3-2ubuntu0.1
-
Introduced through: tensorflow/tensorflow@latest-jupyter › ncurses/ncurses-bin@6.3-2ubuntu0.1
NVD Description
Note: Versions mentioned in the description apply only to the upstream ncurses package and not the ncurses package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Remediation
There is no fixed version for Ubuntu:22.04 ncurses.
References
low severity
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.19 and openssl/libssl3@3.0.2-0ubuntu1.19
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl@3.0.2-0ubuntu1.19
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl/libssl3@3.0.2-0ubuntu1.19
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
Remediation
There is no fixed version for Ubuntu:22.04 openssl.
References
low severity
new
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.19 and openssl/libssl3@3.0.2-0ubuntu1.19
- Fixed in: 3.0.2-0ubuntu1.21
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl@3.0.2-0ubuntu1.19
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl/libssl3@3.0.2-0ubuntu1.19
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write.
Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application.
The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity.
The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the BIO implementation is outside the OpenSSL FIPS module boundary.
OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
Remediation
Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.21 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-68160
- https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad
- https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6
- https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c
- https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0
- https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096
- https://openssl-library.org/news/secadv/20260127.txt
low severity
new
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.19 and openssl/libssl3@3.0.2-0ubuntu1.19
- Fixed in: 3.0.2-0ubuntu1.21
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl@3.0.2-0ubuntu1.19
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl/libssl3@3.0.2-0ubuntu1.19
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP and provider OCB implementations split inputs so that full<br>blocks and trailing partial blocks are processed in separate calls, avoiding<br>the problematic code path. Additionally, TLS does not use OCB ciphersuites.<br>The vulnerability only affects applications that call the low-level<br>CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with<br>non-block-aligned lengths in a single call on hardware-accelerated builds.<br>For these reasons the issue was assessed as Low severity.<br><br>The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected<br>by this issue, as OCB mode is not a FIPS-approved algorithm.<br><br>OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.<br><br>OpenSSL 1.0.2 is not affected by this issue.
Remediation
Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.21 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-69418
- https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc
- https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8
- https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347
- https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae
- https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977
- https://openssl-library.org/news/secadv/20260127.txt
low severity
new
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.19 and openssl/libssl3@3.0.2-0ubuntu1.19
- Fixed in: 3.0.2-0ubuntu1.21
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl@3.0.2-0ubuntu1.19
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl/libssl3@3.0.2-0ubuntu1.19
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer.
Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service.
The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer.
The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy.
The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.
OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
OpenSSL 1.0.2 is not affected by this issue.
Remediation
Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.21 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-69419
- https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296
- https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb
- https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2
- https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015
- https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535
- https://openssl-library.org/news/secadv/20260127.txt
low severity
new
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.19 and openssl/libssl3@3.0.2-0ubuntu1.19
- Fixed in: 3.0.2-0ubuntu1.21
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl@3.0.2-0ubuntu1.19
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl/libssl3@3.0.2-0ubuntu1.19
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file.
Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service.
The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.
Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity.
The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary.
OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
OpenSSL 1.0.2 is not affected by this issue.
Remediation
Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.21 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2025-69420
- https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9
- https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a
- https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e
- https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b
- https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085
- https://openssl-library.org/news/secadv/20260127.txt
low severity
new
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.19 and openssl/libssl3@3.0.2-0ubuntu1.19
- Fixed in: 3.0.2-0ubuntu1.21
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl@3.0.2-0ubuntu1.19
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl/libssl3@3.0.2-0ubuntu1.19
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file.
Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service.
A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid pointer read.
The location is constrained to a 1-byte address space, meaning any attempted pointer manipulation can only target addresses between 0x00 and 0xFF. This range corresponds to the zero page, which is unmapped on most modern operating systems and will reliably result in a crash, leading only to a Denial of Service. Exploiting this issue also requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For these reasons, the issue was assessed as Low severity.
The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS12 implementation is outside the OpenSSL FIPS module boundary.
OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
OpenSSL 1.0.2 is not affected by this issue.
Remediation
Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.21 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2026-22795
- https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4
- https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49
- https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12
- https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e
- https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2
- https://openssl-library.org/news/secadv/20260127.txt
low severity
new
- Vulnerable module: openssl
- Introduced through: openssl@3.0.2-0ubuntu1.19 and openssl/libssl3@3.0.2-0ubuntu1.19
- Fixed in: 3.0.2-0ubuntu1.21
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl@3.0.2-0ubuntu1.19
-
Introduced through: tensorflow/tensorflow@latest-jupyter › openssl/libssl3@3.0.2-0ubuntu1.19
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl package and not the openssl package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data.
Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service.
The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash.
Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be using the CMS API instead. For these reasons the issue was assessed as Low severity.
The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module boundary.
OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
Remediation
Upgrade Ubuntu:22.04 openssl to version 3.0.2-0ubuntu1.21 or higher.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2026-22796
- https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4
- https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49
- https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12
- https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e
- https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2
- https://openssl-library.org/news/secadv/20260127.txt
low severity
- Vulnerable module: shadow/login
- Introduced through: shadow/login@1:4.8.1-2ubuntu2.2 and shadow/passwd@1:4.8.1-2ubuntu2.2
Detailed paths
-
Introduced through: tensorflow/tensorflow@latest-jupyter › shadow/login@1:4.8.1-2ubuntu2.2
-
Introduced through: tensorflow/tensorflow@latest-jupyter › shadow/passwd@1:4.8.1-2ubuntu2.2
NVD Description
Note: Versions mentioned in the description apply only to the upstream shadow package and not the shadow package as distributed by Ubuntu.
See How to fix? for Ubuntu:22.04 relevant fixed versions and status.
shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
Remediation
There is no fixed version for Ubuntu:22.04 shadow.