42VA.
md 2024-11-23
VA points of 42 server.
VA3:- Ubuntu 18.04 ESM / 20.04 LTS / 22.04 LTS : Vim vulnerabilities (USN-6420-1)
Ensure the version of the Vim. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep vim
Else run the following command:-
apt install --only-upgrade vim
Atlast verify the version.
VA4:- Ubuntu 20.04 LTS / 22.04 LTS : Linux kernel vulnerabilities (USN-6974-1)
Step1: Check the current the kernel image version.
uname -r
Step2: First check your system is up to date.
apt update
apt upgrade
Step3: Check the kernel images available.
dpkg --list | grep linux-image
Step4: Now search the kernel image you want to download.
apt search <linux-generic-image-name> | grep <desired linux-image version>
eg. apt search linux-image-5.15*. This will search all the linux images available of 5.15....
version.
Step5: Now install the desired linux image you want.
apt install <linux-image>
eg. For here. apt install linux-image-5.15.0-119-generic
Step6: Ensure you have the desired linux image install inside the /boot directory.
Step7: Now there are two ways to switch to the new kernel either you can use kexec-tools or by making
entry in side the grub file.
Method_1: Using kexec-tools:
Step1: Install the kexec-tools package.
apt install kexec-tools
Step2: Load the New Kernel.
kexec -l /boot/vmlinuz-<kernel_version> --initrd=/boot/initrd.img-
<kernel_version> --reuse-cmdline
eg. kexec -l /boot/vmlinuz-5.15.0-119-generic --
initrd=/boot/initrd.img-5.15.0-119-generic --reuse-cmdline
Step3: Now reboot the system using the kexec tool.
kexec -e
1/3
42VA.md 2024-11-23
Method_2: Using Entry inside the grub file.
Step1: Make first grub file backup and then open the grub file.
cp -rp /etc/default/grub
vi grub
Step2: Now find the entry inside grub and edit according to below.
GRUB_DEFAULT="Advanced options for Ubuntu>Ubuntu, with Linux <image
version or name>"
eg.GRUB_DEFAULT="Advanced options for Ubuntu>Ubuntu, with Linux
5.15.0-119-generic"
Step3: Now update the grub.
update-grub
Step4: Finally reboot the system.
reboot
Step8: Now check the kernel version.
uname -r
V5:Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 24.04 LTS : Intel Microcode
vulnerabilities (USN-6967-1).
Ensure the version of the Vim. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep intel-microcode
Else run the following command:-
apt install --only-upgrade intel-microcode
Atlast verify the version.
V6:Ubuntu 20.04 LTS / 22.04 LTS / 23.10 / 24.04 LTS : SSSD vulnerability (USN-6836-1)
This point contains multiple package to upgrade just take their names from VA sheet, from the
description box and upgrade them using below command.
apt install --only-upgrade <package_name>
V7: Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 : Vim vulnerability
(USN-6698-1).
Same as V4.
V8: Ubuntu 20.04 LTS / 22.04 LTS / 23.04 / 23.10 : Open VM Tools vulnerabilities (USN-6463-1)
Ensure the version of the Vim. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep open-vm-tools
Else run the following command:-
apt install --only-upgrade open-vm-tools
Atlast verify the version.
V9: Ubuntu 18.04 LTS / 20.04 LTS / 22.04 LTS : NTFS-3G vulnerability (USN-5711-1)
Ensure the version of the NTFS-3G. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep ntfs-3g
2/3
42VA.md 2024-11-23
Else run the following command:-
apt install --only-upgrade ntfs-3g
Atlast verify the version.
V10:Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 / 24.04 LTS : Jinja2
vulnerability (USN-6787-1).
Ensure the version of the Jinja2. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep python3-jinja2
Else run the following command:-
apt install --only-upgrade python3-jinja2
Atlast verify the version.
V11:Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 : shadow
vulnerability (USN-6640-1)
Ensure the version of the passwd. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep passwd
Else run the following command:-
apt install --only-upgrade passwd
Atlast verify the version.
V12: Ubuntu 20.04 LTS / 22.04 LTS / 23.04 : Samba vulnerabilities (USN-6425-1)
Ensure the version of the Samba. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep -E "libsmbclient|libwbclient0|samba-libs"
Else run the following command:-
apt install --only-upgrade libsmbclient libwbclient0 samba-libs
Atlast verify the version.
V13: Ubuntu 20.04 LTS / 22.04 LTS : ldb vulnerability (USN-5992-1).
Ensure the version of the ldb. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep ldb
Else run the following command:-
apt install --only-upgrade libldb2 python3-ldb
Atlast verify the version.
V14: The ldb vulnerability in Ubuntu 20.04 LTS and 22.04 LTS (USN-5992-1) could allow local
attackers to escalate privileges, potentially compromising system security.
V15: Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 : Open VM Tools
vulnerability (USN-6257-1)
Same as V8.
V16: PostgreSQL 14.x < 14.12 / 15.x < 15.7 / 16.x < 16.3 Missing Authorization Check
3/3