0% found this document useful (0 votes)
33 views3 pages

42VA

This is also a vA point

Uploaded by

ankit.biyani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views3 pages

42VA

This is also a vA point

Uploaded by

ankit.biyani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

42VA.

md 2024-11-23

VA points of 42 server.
VA3:- Ubuntu 18.04 ESM / 20.04 LTS / 22.04 LTS : Vim vulnerabilities (USN-6420-1)

Ensure the version of the Vim. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep vim
Else run the following command:-
apt install --only-upgrade vim
Atlast verify the version.

VA4:- Ubuntu 20.04 LTS / 22.04 LTS : Linux kernel vulnerabilities (USN-6974-1)

Step1: Check the current the kernel image version.

uname -r

Step2: First check your system is up to date.

apt update
apt upgrade

Step3: Check the kernel images available.

dpkg --list | grep linux-image

Step4: Now search the kernel image you want to download.

apt search <linux-generic-image-name> | grep <desired linux-image version>


eg. apt search linux-image-5.15*. This will search all the linux images available of 5.15....
version.

Step5: Now install the desired linux image you want.

apt install <linux-image>


eg. For here. apt install linux-image-5.15.0-119-generic

Step6: Ensure you have the desired linux image install inside the /boot directory.

Step7: Now there are two ways to switch to the new kernel either you can use kexec-tools or by making
entry in side the grub file.

Method_1: Using kexec-tools:


Step1: Install the kexec-tools package.
apt install kexec-tools
Step2: Load the New Kernel.
kexec -l /boot/vmlinuz-<kernel_version> --initrd=/boot/initrd.img-
<kernel_version> --reuse-cmdline
eg. kexec -l /boot/vmlinuz-5.15.0-119-generic --
initrd=/boot/initrd.img-5.15.0-119-generic --reuse-cmdline
Step3: Now reboot the system using the kexec tool.
kexec -e

1/3
42VA.md 2024-11-23

Method_2: Using Entry inside the grub file.


Step1: Make first grub file backup and then open the grub file.
cp -rp /etc/default/grub
vi grub
Step2: Now find the entry inside grub and edit according to below.
GRUB_DEFAULT="Advanced options for Ubuntu>Ubuntu, with Linux <image
version or name>"
eg.GRUB_DEFAULT="Advanced options for Ubuntu>Ubuntu, with Linux
5.15.0-119-generic"
Step3: Now update the grub.
update-grub
Step4: Finally reboot the system.
reboot

Step8: Now check the kernel version.

uname -r

V5:Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 24.04 LTS : Intel Microcode
vulnerabilities (USN-6967-1).

Ensure the version of the Vim. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep intel-microcode
Else run the following command:-
apt install --only-upgrade intel-microcode
Atlast verify the version.

V6:Ubuntu 20.04 LTS / 22.04 LTS / 23.10 / 24.04 LTS : SSSD vulnerability (USN-6836-1)

This point contains multiple package to upgrade just take their names from VA sheet, from the
description box and upgrade them using below command.
apt install --only-upgrade <package_name>

V7: Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 : Vim vulnerability
(USN-6698-1).

Same as V4.

V8: Ubuntu 20.04 LTS / 22.04 LTS / 23.04 / 23.10 : Open VM Tools vulnerabilities (USN-6463-1)

Ensure the version of the Vim. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep open-vm-tools
Else run the following command:-
apt install --only-upgrade open-vm-tools
Atlast verify the version.

V9: Ubuntu 18.04 LTS / 20.04 LTS / 22.04 LTS : NTFS-3G vulnerability (USN-5711-1)

Ensure the version of the NTFS-3G. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep ntfs-3g
2/3
42VA.md 2024-11-23

Else run the following command:-


apt install --only-upgrade ntfs-3g
Atlast verify the version.

V10:Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 / 24.04 LTS : Jinja2
vulnerability (USN-6787-1).

Ensure the version of the Jinja2. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep python3-jinja2
Else run the following command:-
apt install --only-upgrade python3-jinja2
Atlast verify the version.

V11:Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 : shadow
vulnerability (USN-6640-1)

Ensure the version of the passwd. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep passwd
Else run the following command:-
apt install --only-upgrade passwd
Atlast verify the version.

V12: Ubuntu 20.04 LTS / 22.04 LTS / 23.04 : Samba vulnerabilities (USN-6425-1)

Ensure the version of the Samba. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep -E "libsmbclient|libwbclient0|samba-libs"
Else run the following command:-
apt install --only-upgrade libsmbclient libwbclient0 samba-libs
Atlast verify the version.

V13: Ubuntu 20.04 LTS / 22.04 LTS : ldb vulnerability (USN-5992-1).

Ensure the version of the ldb. If it's already upgraded according to the requirement, then leave it.
dpkg -l | grep ldb
Else run the following command:-
apt install --only-upgrade libldb2 python3-ldb
Atlast verify the version.

V14: The ldb vulnerability in Ubuntu 20.04 LTS and 22.04 LTS (USN-5992-1) could allow local
attackers to escalate privileges, potentially compromising system security.

V15: Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 : Open VM Tools
vulnerability (USN-6257-1)

Same as V8.

V16: PostgreSQL 14.x < 14.12 / 15.x < 15.7 / 16.x < 16.3 Missing Authorization Check

3/3

You might also like