{ "summary": { "snap": { "added": [], "removed": [], "diff": [ "core20", "snapd", "lxd" ] }, "deb": { "added": [ "linux-headers-5.15.0-102", "linux-headers-5.15.0-102-generic-lpae", "linux-image-5.15.0-102-generic-lpae", "linux-modules-5.15.0-102-generic-lpae" ], "removed": [ "linux-headers-5.15.0-101", "linux-headers-5.15.0-101-generic-lpae", "linux-image-5.15.0-101-generic-lpae", "linux-modules-5.15.0-101-generic-lpae" ], "diff": [ "apt", "apt-utils", "bsdextrautils", "bsdutils", "coreutils", "curl", "eject", "ethtool", "fdisk", "firmware-sof-signed", "libapt-pkg6.0:armhf", "libblkid1:armhf", "libcurl3-gnutls:armhf", "libcurl4:armhf", "libfdisk1:armhf", "libgnutls30:armhf", "libmount1:armhf", "libnspr4:armhf", "libnss3:armhf", "libsmartcols1:armhf", "libuuid1:armhf", "linux-generic-lpae", "linux-headers-generic-lpae", "linux-image-generic-lpae", "mount", "python3-update-manager", "snapd", "ubuntu-advantage-tools", "ubuntu-pro-client", "ubuntu-pro-client-l10n", "update-manager-core", "update-notifier-common", "util-linux", "uuid-runtime" ] } }, "diff": { "deb": [ { "name": "apt", "from_version": { "source_package_name": "apt", "source_package_version": "2.4.11", "version": "2.4.11" }, "to_version": { "source_package_name": "apt", "source_package_version": "2.4.12", "version": "2.4.12" }, "cves": [], "launchpad_bugs_fixed": [ 1995790, 2051181 ], "changes": [ { "cves": [], "log": [ "", " * Restore ?garbage by calling MarkAndSweep before parsing (LP: #1995790)", " * For phasing, check if current version is a security update, not just previous ones", " (LP: #2051181)", "" ], "package": "apt", "version": "2.4.12", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 1995790, 2051181 ], "author": "Julian Andres Klode ", "date": "Tue, 13 Feb 2024 16:39:04 +0100" } ], "notes": null }, { "name": "apt-utils", "from_version": { "source_package_name": "apt", "source_package_version": "2.4.11", "version": "2.4.11" }, "to_version": { "source_package_name": "apt", "source_package_version": "2.4.12", "version": "2.4.12" }, "cves": [], "launchpad_bugs_fixed": [ 1995790, 2051181 ], "changes": [ { "cves": [], "log": [ "", " * Restore ?garbage by calling MarkAndSweep before parsing (LP: #1995790)", " * For phasing, check if current version is a security update, not just previous ones", " (LP: #2051181)", "" ], "package": "apt", "version": "2.4.12", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 1995790, 2051181 ], "author": "Julian Andres Klode ", "date": "Tue, 13 Feb 2024 16:39:04 +0100" } ], "notes": null }, { "name": "bsdextrautils", "from_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3", "version": "2.37.2-4ubuntu3" }, "to_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3.4", "version": "2.37.2-4ubuntu3.4" }, "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2048092, 2019856 ], "changes": [ { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/rules: build with --disable-use-tty-group to properly remove", " setgid bit from both wall and write.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.4", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 09 Apr 2024 11:32:56 -0400" }, { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/patches/upstream/CVE-2024-28085-pre1.patch: correctly handle", " wide characters in include/carefulputc.h, login-utils/last.c,", " term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085-pre2.patch: convert homebrew", " buffering to open_memstream() in term-utils/wall.c.", " - debian/patches/upstream/CVE-2024-28085-pre3.patch: use", " fputs_careful() in include/carefulputc.h, login-utils/last.c,", " term-utils/wall.c, term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085.patch: consolidate output on", " the terminal in term-utils/wall.c.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 22 Mar 2024 08:25:19 -0400" }, { "cves": [ { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "log": [ "", " * debian/patches/upstream/CVE-2022-0563.patch: Remove readline support", " from chsh and chfn. Ubuntu does not ship these binaries, so this", " only impacts parties building them from Ubuntu source. (CVE-2022-0563)", " (LP: #2048092)", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2048092 ], "author": "dann frazier ", "date": "Thu, 04 Jan 2024 11:41:57 -0700" }, { "cves": [], "log": [ "", " * Add ARM core support for Grace systems (LP: #2019856)", " - /d/p/ubuntu/lp-2019856-add-missing-arm-cores.patch ", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.1", "urgency": "low", "distributions": "jammy", "launchpad_bugs_fixed": [ 2019856 ], "author": "Heather Lemon ", "date": "Fri, 19 May 2023 15:37:24 +0000" } ], "notes": null }, { "name": "bsdutils", "from_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3", "version": "1:2.37.2-4ubuntu3" }, "to_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3.4", "version": "1:2.37.2-4ubuntu3.4" }, "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2048092, 2019856 ], "changes": [ { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/rules: build with --disable-use-tty-group to properly remove", " setgid bit from both wall and write.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.4", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 09 Apr 2024 11:32:56 -0400" }, { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/patches/upstream/CVE-2024-28085-pre1.patch: correctly handle", " wide characters in include/carefulputc.h, login-utils/last.c,", " term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085-pre2.patch: convert homebrew", " buffering to open_memstream() in term-utils/wall.c.", " - debian/patches/upstream/CVE-2024-28085-pre3.patch: use", " fputs_careful() in include/carefulputc.h, login-utils/last.c,", " term-utils/wall.c, term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085.patch: consolidate output on", " the terminal in term-utils/wall.c.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 22 Mar 2024 08:25:19 -0400" }, { "cves": [ { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "log": [ "", " * debian/patches/upstream/CVE-2022-0563.patch: Remove readline support", " from chsh and chfn. Ubuntu does not ship these binaries, so this", " only impacts parties building them from Ubuntu source. (CVE-2022-0563)", " (LP: #2048092)", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2048092 ], "author": "dann frazier ", "date": "Thu, 04 Jan 2024 11:41:57 -0700" }, { "cves": [], "log": [ "", " * Add ARM core support for Grace systems (LP: #2019856)", " - /d/p/ubuntu/lp-2019856-add-missing-arm-cores.patch ", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.1", "urgency": "low", "distributions": "jammy", "launchpad_bugs_fixed": [ 2019856 ], "author": "Heather Lemon ", "date": "Fri, 19 May 2023 15:37:24 +0000" } ], "notes": null }, { "name": "coreutils", "from_version": { "source_package_name": "coreutils", "source_package_version": "8.32-4.1ubuntu1.1", "version": "8.32-4.1ubuntu1.1" }, "to_version": { "source_package_name": "coreutils", "source_package_version": "8.32-4.1ubuntu1.2", "version": "8.32-4.1ubuntu1.2" }, "cves": [], "launchpad_bugs_fixed": [ 2033892 ], "changes": [ { "cves": [], "log": [ "", " * Fix an issue where running 'ls -l' on an autofs mount with", " '--ghost' or 'browse_mode=yes' enabled causes the mount to be", " attempted, even when the underlying storage is not available.", " This changes behaviour of ls back to what it was previously,", " before statx was introduced in 8.32. (LP: #2033892)", " - d/p/lp2033892-01-ls-avoid-triggering-automounts.patch", " - d/p/lp2033892-02-stat-only-automount-with-cached-never.patch", "" ], "package": "coreutils", "version": "8.32-4.1ubuntu1.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2033892 ], "author": "Matthew Ruffell ", "date": "Thu, 08 Feb 2024 16:46:39 +1300" } ], "notes": null }, { "name": "curl", "from_version": { "source_package_name": "curl", "source_package_version": "7.81.0-1ubuntu1.15", "version": "7.81.0-1ubuntu1.15" }, "to_version": { "source_package_name": "curl", "source_package_version": "7.81.0-1ubuntu1.16", "version": "7.81.0-1ubuntu1.16" }, "cves": [ { "cve": "CVE-2024-2398", "url": "https://ubuntu.com/security/CVE-2024-2398", "cve_description": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.", "cve_priority": "medium", "cve_public_date": "2024-03-27 08:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-2398", "url": "https://ubuntu.com/security/CVE-2024-2398", "cve_description": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.", "cve_priority": "medium", "cve_public_date": "2024-03-27 08:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: HTTP/2 push headers memory-leak", " - debian/patches/CVE-2024-2398.patch: push headers better cleanup in", " lib/http2.c.", " - CVE-2024-2398", "" ], "package": "curl", "version": "7.81.0-1ubuntu1.16", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 19 Mar 2024 08:16:19 -0400" } ], "notes": null }, { "name": "eject", "from_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3", "version": "2.37.2-4ubuntu3" }, "to_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3.4", "version": "2.37.2-4ubuntu3.4" }, "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2048092, 2019856 ], "changes": [ { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/rules: build with --disable-use-tty-group to properly remove", " setgid bit from both wall and write.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.4", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 09 Apr 2024 11:32:56 -0400" }, { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/patches/upstream/CVE-2024-28085-pre1.patch: correctly handle", " wide characters in include/carefulputc.h, login-utils/last.c,", " term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085-pre2.patch: convert homebrew", " buffering to open_memstream() in term-utils/wall.c.", " - debian/patches/upstream/CVE-2024-28085-pre3.patch: use", " fputs_careful() in include/carefulputc.h, login-utils/last.c,", " term-utils/wall.c, term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085.patch: consolidate output on", " the terminal in term-utils/wall.c.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 22 Mar 2024 08:25:19 -0400" }, { "cves": [ { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "log": [ "", " * debian/patches/upstream/CVE-2022-0563.patch: Remove readline support", " from chsh and chfn. Ubuntu does not ship these binaries, so this", " only impacts parties building them from Ubuntu source. (CVE-2022-0563)", " (LP: #2048092)", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2048092 ], "author": "dann frazier ", "date": "Thu, 04 Jan 2024 11:41:57 -0700" }, { "cves": [], "log": [ "", " * Add ARM core support for Grace systems (LP: #2019856)", " - /d/p/ubuntu/lp-2019856-add-missing-arm-cores.patch ", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.1", "urgency": "low", "distributions": "jammy", "launchpad_bugs_fixed": [ 2019856 ], "author": "Heather Lemon ", "date": "Fri, 19 May 2023 15:37:24 +0000" } ], "notes": null }, { "name": "ethtool", "from_version": { "source_package_name": "ethtool", "source_package_version": "1:5.16-1", "version": "1:5.16-1" }, "to_version": { "source_package_name": "ethtool", "source_package_version": "1:5.16-1ubuntu0.1", "version": "1:5.16-1ubuntu0.1" }, "cves": [], "launchpad_bugs_fixed": [ 2043983 ], "changes": [ { "cves": [], "log": [ "", " * d/p/0001-Fix-ethtool-module-info-in-human-readable-mode.patch: add", " upstream patch to avoid hex dump report even in human-readable mode", " (LP: #2043983).", "" ], "package": "ethtool", "version": "1:5.16-1ubuntu0.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2043983 ], "author": "Lucas Kanashiro ", "date": "Tue, 12 Dec 2023 17:52:33 -0300" } ], "notes": null }, { "name": "fdisk", "from_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3", "version": "2.37.2-4ubuntu3" }, "to_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3.4", "version": "2.37.2-4ubuntu3.4" }, "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2048092, 2019856 ], "changes": [ { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/rules: build with --disable-use-tty-group to properly remove", " setgid bit from both wall and write.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.4", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 09 Apr 2024 11:32:56 -0400" }, { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/patches/upstream/CVE-2024-28085-pre1.patch: correctly handle", " wide characters in include/carefulputc.h, login-utils/last.c,", " term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085-pre2.patch: convert homebrew", " buffering to open_memstream() in term-utils/wall.c.", " - debian/patches/upstream/CVE-2024-28085-pre3.patch: use", " fputs_careful() in include/carefulputc.h, login-utils/last.c,", " term-utils/wall.c, term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085.patch: consolidate output on", " the terminal in term-utils/wall.c.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 22 Mar 2024 08:25:19 -0400" }, { "cves": [ { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "log": [ "", " * debian/patches/upstream/CVE-2022-0563.patch: Remove readline support", " from chsh and chfn. Ubuntu does not ship these binaries, so this", " only impacts parties building them from Ubuntu source. (CVE-2022-0563)", " (LP: #2048092)", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2048092 ], "author": "dann frazier ", "date": "Thu, 04 Jan 2024 11:41:57 -0700" }, { "cves": [], "log": [ "", " * Add ARM core support for Grace systems (LP: #2019856)", " - /d/p/ubuntu/lp-2019856-add-missing-arm-cores.patch ", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.1", "urgency": "low", "distributions": "jammy", "launchpad_bugs_fixed": [ 2019856 ], "author": "Heather Lemon ", "date": "Fri, 19 May 2023 15:37:24 +0000" } ], "notes": null }, { "name": "firmware-sof-signed", "from_version": { "source_package_name": "firmware-sof", "source_package_version": "2.0-1ubuntu4.5", "version": "2.0-1ubuntu4.5" }, "to_version": { "source_package_name": "firmware-sof", "source_package_version": "2.0-1ubuntu4.7", "version": "2.0-1ubuntu4.7" }, "cves": [], "launchpad_bugs_fixed": [ 2049569, 2049569 ], "changes": [ { "cves": [], "log": [ "", " * Enable the mic-mute led on Dell MTL laptops. LP: #2049569", " - Resotore sof-hda-generic-2ch.tplg for Intel platforms older than MTL", " - Add sof-v2.8.1 tplg for Intel Meteor Lake hardware", " - Reorder the sof-v2.8.1 patches to align with upstream", "" ], "package": "firmware-sof", "version": "2.0-1ubuntu4.7", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2049569 ], "author": "Chris Chiu ", "date": "Tue, 19 Mar 2024 19:14:54 +0800" }, { "cves": [], "log": [ "", " * Enable the mic-mute led on Dell MTL laptops. LP: #2049569", " - Update v2.8.1 sof-hda-generic-2ch.tplg for Intel MTL hardware", " - Add sof-ipc4-v2.8.1/mtl/, intel-signed + community", "" ], "package": "firmware-sof", "version": "2.0-1ubuntu4.6", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2049569 ], "author": "Chris Chiu ", "date": "Tue, 05 Mar 2024 20:27:21 +0800" } ], "notes": null }, { "name": "libapt-pkg6.0:armhf", "from_version": { "source_package_name": "apt", "source_package_version": "2.4.11", "version": "2.4.11" }, "to_version": { "source_package_name": "apt", "source_package_version": "2.4.12", "version": "2.4.12" }, "cves": [], "launchpad_bugs_fixed": [ 1995790, 2051181 ], "changes": [ { "cves": [], "log": [ "", " * Restore ?garbage by calling MarkAndSweep before parsing (LP: #1995790)", " * For phasing, check if current version is a security update, not just previous ones", " (LP: #2051181)", "" ], "package": "apt", "version": "2.4.12", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 1995790, 2051181 ], "author": "Julian Andres Klode ", "date": "Tue, 13 Feb 2024 16:39:04 +0100" } ], "notes": null }, { "name": "libblkid1:armhf", "from_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3", "version": "2.37.2-4ubuntu3" }, "to_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3.4", "version": "2.37.2-4ubuntu3.4" }, "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2048092, 2019856 ], "changes": [ { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/rules: build with --disable-use-tty-group to properly remove", " setgid bit from both wall and write.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.4", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 09 Apr 2024 11:32:56 -0400" }, { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/patches/upstream/CVE-2024-28085-pre1.patch: correctly handle", " wide characters in include/carefulputc.h, login-utils/last.c,", " term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085-pre2.patch: convert homebrew", " buffering to open_memstream() in term-utils/wall.c.", " - debian/patches/upstream/CVE-2024-28085-pre3.patch: use", " fputs_careful() in include/carefulputc.h, login-utils/last.c,", " term-utils/wall.c, term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085.patch: consolidate output on", " the terminal in term-utils/wall.c.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 22 Mar 2024 08:25:19 -0400" }, { "cves": [ { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "log": [ "", " * debian/patches/upstream/CVE-2022-0563.patch: Remove readline support", " from chsh and chfn. Ubuntu does not ship these binaries, so this", " only impacts parties building them from Ubuntu source. (CVE-2022-0563)", " (LP: #2048092)", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2048092 ], "author": "dann frazier ", "date": "Thu, 04 Jan 2024 11:41:57 -0700" }, { "cves": [], "log": [ "", " * Add ARM core support for Grace systems (LP: #2019856)", " - /d/p/ubuntu/lp-2019856-add-missing-arm-cores.patch ", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.1", "urgency": "low", "distributions": "jammy", "launchpad_bugs_fixed": [ 2019856 ], "author": "Heather Lemon ", "date": "Fri, 19 May 2023 15:37:24 +0000" } ], "notes": null }, { "name": "libcurl3-gnutls:armhf", "from_version": { "source_package_name": "curl", "source_package_version": "7.81.0-1ubuntu1.15", "version": "7.81.0-1ubuntu1.15" }, "to_version": { "source_package_name": "curl", "source_package_version": "7.81.0-1ubuntu1.16", "version": "7.81.0-1ubuntu1.16" }, "cves": [ { "cve": "CVE-2024-2398", "url": "https://ubuntu.com/security/CVE-2024-2398", "cve_description": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.", "cve_priority": "medium", "cve_public_date": "2024-03-27 08:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-2398", "url": "https://ubuntu.com/security/CVE-2024-2398", "cve_description": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.", "cve_priority": "medium", "cve_public_date": "2024-03-27 08:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: HTTP/2 push headers memory-leak", " - debian/patches/CVE-2024-2398.patch: push headers better cleanup in", " lib/http2.c.", " - CVE-2024-2398", "" ], "package": "curl", "version": "7.81.0-1ubuntu1.16", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 19 Mar 2024 08:16:19 -0400" } ], "notes": null }, { "name": "libcurl4:armhf", "from_version": { "source_package_name": "curl", "source_package_version": "7.81.0-1ubuntu1.15", "version": "7.81.0-1ubuntu1.15" }, "to_version": { "source_package_name": "curl", "source_package_version": "7.81.0-1ubuntu1.16", "version": "7.81.0-1ubuntu1.16" }, "cves": [ { "cve": "CVE-2024-2398", "url": "https://ubuntu.com/security/CVE-2024-2398", "cve_description": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.", "cve_priority": "medium", "cve_public_date": "2024-03-27 08:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-2398", "url": "https://ubuntu.com/security/CVE-2024-2398", "cve_description": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.", "cve_priority": "medium", "cve_public_date": "2024-03-27 08:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: HTTP/2 push headers memory-leak", " - debian/patches/CVE-2024-2398.patch: push headers better cleanup in", " lib/http2.c.", " - CVE-2024-2398", "" ], "package": "curl", "version": "7.81.0-1ubuntu1.16", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 19 Mar 2024 08:16:19 -0400" } ], "notes": null }, { "name": "libfdisk1:armhf", "from_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3", "version": "2.37.2-4ubuntu3" }, "to_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3.4", "version": "2.37.2-4ubuntu3.4" }, "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2048092, 2019856 ], "changes": [ { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/rules: build with --disable-use-tty-group to properly remove", " setgid bit from both wall and write.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.4", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 09 Apr 2024 11:32:56 -0400" }, { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/patches/upstream/CVE-2024-28085-pre1.patch: correctly handle", " wide characters in include/carefulputc.h, login-utils/last.c,", " term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085-pre2.patch: convert homebrew", " buffering to open_memstream() in term-utils/wall.c.", " - debian/patches/upstream/CVE-2024-28085-pre3.patch: use", " fputs_careful() in include/carefulputc.h, login-utils/last.c,", " term-utils/wall.c, term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085.patch: consolidate output on", " the terminal in term-utils/wall.c.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 22 Mar 2024 08:25:19 -0400" }, { "cves": [ { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "log": [ "", " * debian/patches/upstream/CVE-2022-0563.patch: Remove readline support", " from chsh and chfn. Ubuntu does not ship these binaries, so this", " only impacts parties building them from Ubuntu source. (CVE-2022-0563)", " (LP: #2048092)", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2048092 ], "author": "dann frazier ", "date": "Thu, 04 Jan 2024 11:41:57 -0700" }, { "cves": [], "log": [ "", " * Add ARM core support for Grace systems (LP: #2019856)", " - /d/p/ubuntu/lp-2019856-add-missing-arm-cores.patch ", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.1", "urgency": "low", "distributions": "jammy", "launchpad_bugs_fixed": [ 2019856 ], "author": "Heather Lemon ", "date": "Fri, 19 May 2023 15:37:24 +0000" } ], "notes": null }, { "name": "libgnutls30:armhf", "from_version": { "source_package_name": "gnutls28", "source_package_version": "3.7.3-4ubuntu1.4", "version": "3.7.3-4ubuntu1.4" }, "to_version": { "source_package_name": "gnutls28", "source_package_version": "3.7.3-4ubuntu1.5", "version": "3.7.3-4ubuntu1.5" }, "cves": [ { "cve": "CVE-2024-28834", "url": "https://ubuntu.com/security/CVE-2024-28834", "cve_description": "A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.", "cve_priority": "medium", "cve_public_date": "2024-03-21 14:15:00 UTC" }, { "cve": "CVE-2024-28835", "url": "https://ubuntu.com/security/CVE-2024-28835", "cve_description": "A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \"certtool --verify-chain\" command.", "cve_priority": "medium", "cve_public_date": "2024-03-21 06:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-28834", "url": "https://ubuntu.com/security/CVE-2024-28834", "cve_description": "A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.", "cve_priority": "medium", "cve_public_date": "2024-03-21 14:15:00 UTC" }, { "cve": "CVE-2024-28835", "url": "https://ubuntu.com/security/CVE-2024-28835", "cve_description": "A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \"certtool --verify-chain\" command.", "cve_priority": "medium", "cve_public_date": "2024-03-21 06:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: side-channel leak via Minerva attack", " - debian/patches/CVE-2024-28834.patch: avoid normalization of mpz_t in", " deterministic ECDSA in lib/nettle/int/dsa-compute-k.c,", " lib/nettle/int/dsa-compute-k.h, lib/nettle/int/ecdsa-compute-k.c,", " lib/nettle/int/ecdsa-compute-k.h, lib/nettle/pk.c,", " tests/sign-verify-deterministic.c.", " - CVE-2024-28834", " * SECURITY UPDATE: crash via specially-crafted cert bundle", " - debian/patches/CVE-2024-28835.patch: remove length limit of input in", " lib/gnutls_int.h, lib/x509/common.c, lib/x509/verify-high.c,", " tests/test-chains.h.", " - CVE-2024-28835", "" ], "package": "gnutls28", "version": "3.7.3-4ubuntu1.5", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 12 Apr 2024 09:51:00 -0400" } ], "notes": null }, { "name": "libmount1:armhf", "from_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3", "version": "2.37.2-4ubuntu3" }, "to_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3.4", "version": "2.37.2-4ubuntu3.4" }, "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2048092, 2019856 ], "changes": [ { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/rules: build with --disable-use-tty-group to properly remove", " setgid bit from both wall and write.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.4", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 09 Apr 2024 11:32:56 -0400" }, { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/patches/upstream/CVE-2024-28085-pre1.patch: correctly handle", " wide characters in include/carefulputc.h, login-utils/last.c,", " term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085-pre2.patch: convert homebrew", " buffering to open_memstream() in term-utils/wall.c.", " - debian/patches/upstream/CVE-2024-28085-pre3.patch: use", " fputs_careful() in include/carefulputc.h, login-utils/last.c,", " term-utils/wall.c, term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085.patch: consolidate output on", " the terminal in term-utils/wall.c.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 22 Mar 2024 08:25:19 -0400" }, { "cves": [ { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "log": [ "", " * debian/patches/upstream/CVE-2022-0563.patch: Remove readline support", " from chsh and chfn. Ubuntu does not ship these binaries, so this", " only impacts parties building them from Ubuntu source. (CVE-2022-0563)", " (LP: #2048092)", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2048092 ], "author": "dann frazier ", "date": "Thu, 04 Jan 2024 11:41:57 -0700" }, { "cves": [], "log": [ "", " * Add ARM core support for Grace systems (LP: #2019856)", " - /d/p/ubuntu/lp-2019856-add-missing-arm-cores.patch ", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.1", "urgency": "low", "distributions": "jammy", "launchpad_bugs_fixed": [ 2019856 ], "author": "Heather Lemon ", "date": "Fri, 19 May 2023 15:37:24 +0000" } ], "notes": null }, { "name": "libnspr4:armhf", "from_version": { "source_package_name": "nspr", "source_package_version": "2:4.32-3build1", "version": "2:4.32-3build1" }, "to_version": { "source_package_name": "nspr", "source_package_version": "2:4.35-0ubuntu0.22.04.1", "version": "2:4.35-0ubuntu0.22.04.1" }, "cves": [], "launchpad_bugs_fixed": [], "changes": [ { "cves": [], "log": [ "", " * Update to 4.35 to support nss security update.", " - debian/patches/ac_config_aux_dir: removed, included in new version.", " - debian/libnspr3.symbols: added new symbol.", "" ], "package": "nspr", "version": "2:4.35-0ubuntu0.22.04.1", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Thu, 21 Mar 2024 08:18:35 -0400" } ], "notes": null }, { "name": "libnss3:armhf", "from_version": { "source_package_name": "nss", "source_package_version": "2:3.68.2-0ubuntu1.2", "version": "2:3.68.2-0ubuntu1.2" }, "to_version": { "source_package_name": "nss", "source_package_version": "2:3.98-0ubuntu0.22.04.2", "version": "2:3.98-0ubuntu0.22.04.2" }, "cves": [ { "cve": "CVE-2023-5388", "url": "https://ubuntu.com/security/CVE-2023-5388", "cve_description": "NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9.", "cve_priority": "medium", "cve_public_date": "2024-03-19 12:15:00 UTC" }, { "cve": "CVE-2023-6135", "url": "https://ubuntu.com/security/CVE-2023-6135", "cve_description": "Multiple NSS NIST curves were susceptible to a side-channel attack known as \"Minerva\". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox < 121.", "cve_priority": "medium", "cve_public_date": "2023-12-19 14:15:00 UTC" }, { "cve": "CVE-2022-34480", "url": "https://ubuntu.com/security/CVE-2022-34480", "cve_description": "Within the lg_init() function, if several allocations succeed but then one fails, an uninitialized pointer would have been freed despite never being allocated. This vulnerability affects Firefox < 102.", "cve_priority": "medium", "cve_public_date": "2022-12-22 20:15:00 UTC" }, { "cve": "CVE-2023-0767", "url": "https://ubuntu.com/security/CVE-2023-0767", "cve_description": "An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.", "cve_priority": "medium", "cve_public_date": "2023-06-02 17:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2060906 ], "changes": [ { "cves": [], "log": [ "", " * SECURITY REGRESSION: failure to open modules (LP: #2060906)", " - debian/patches/85_security_load.patch: fix broken patch preventing", " module loading.", "" ], "package": "nss", "version": "2:3.98-0ubuntu0.22.04.2", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [ 2060906 ], "author": "Marc Deslauriers ", "date": "Thu, 11 Apr 2024 10:19:22 -0400" }, { "cves": [ { "cve": "CVE-2023-5388", "url": "https://ubuntu.com/security/CVE-2023-5388", "cve_description": "NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9.", "cve_priority": "medium", "cve_public_date": "2024-03-19 12:15:00 UTC" }, { "cve": "CVE-2023-6135", "url": "https://ubuntu.com/security/CVE-2023-6135", "cve_description": "Multiple NSS NIST curves were susceptible to a side-channel attack known as \"Minerva\". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox < 121.", "cve_priority": "medium", "cve_public_date": "2023-12-19 14:15:00 UTC" }, { "cve": "CVE-2022-34480", "url": "https://ubuntu.com/security/CVE-2022-34480", "cve_description": "Within the lg_init() function, if several allocations succeed but then one fails, an uninitialized pointer would have been freed despite never being allocated. This vulnerability affects Firefox < 102.", "cve_priority": "medium", "cve_public_date": "2022-12-22 20:15:00 UTC" }, { "cve": "CVE-2023-0767", "url": "https://ubuntu.com/security/CVE-2023-0767", "cve_description": "An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.", "cve_priority": "medium", "cve_public_date": "2023-06-02 17:15:00 UTC" } ], "log": [ "", " * Updated to upstream 3.98 to fix security issues and get a new CA", " certificate bundle.", " - CVE-2023-5388: timing issue in RSA operations", " - CVE-2023-6135: side-channel in multiple NSS NIST curves", " * Removed patches included in new version:", " - debian/patches/set-tls1.2-as-minimum.patch", " - debian/patches/CVE-2022-34480.patch", " - debian/patches/CVE-2023-0767.patch", " * Updated patches for new version:", " - debian/patches/38_hppa.patch", " - debian/patches/85_security_load.patch", " - debian/patches/disable_fips_enabled_read.patch", " - debian/patches/fix-ftbfs-s390x.patch", " * debian/control: bump libnspr version to 2:4.34.", " * debian/libnss3.symbols: added new symbols.", "" ], "package": "nss", "version": "2:3.98-0ubuntu0.22.04.1", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Thu, 21 Mar 2024 09:44:10 -0400" } ], "notes": null }, { "name": "libsmartcols1:armhf", "from_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3", "version": "2.37.2-4ubuntu3" }, "to_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3.4", "version": "2.37.2-4ubuntu3.4" }, "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2048092, 2019856 ], "changes": [ { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/rules: build with --disable-use-tty-group to properly remove", " setgid bit from both wall and write.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.4", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 09 Apr 2024 11:32:56 -0400" }, { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/patches/upstream/CVE-2024-28085-pre1.patch: correctly handle", " wide characters in include/carefulputc.h, login-utils/last.c,", " term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085-pre2.patch: convert homebrew", " buffering to open_memstream() in term-utils/wall.c.", " - debian/patches/upstream/CVE-2024-28085-pre3.patch: use", " fputs_careful() in include/carefulputc.h, login-utils/last.c,", " term-utils/wall.c, term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085.patch: consolidate output on", " the terminal in term-utils/wall.c.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 22 Mar 2024 08:25:19 -0400" }, { "cves": [ { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "log": [ "", " * debian/patches/upstream/CVE-2022-0563.patch: Remove readline support", " from chsh and chfn. Ubuntu does not ship these binaries, so this", " only impacts parties building them from Ubuntu source. (CVE-2022-0563)", " (LP: #2048092)", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2048092 ], "author": "dann frazier ", "date": "Thu, 04 Jan 2024 11:41:57 -0700" }, { "cves": [], "log": [ "", " * Add ARM core support for Grace systems (LP: #2019856)", " - /d/p/ubuntu/lp-2019856-add-missing-arm-cores.patch ", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.1", "urgency": "low", "distributions": "jammy", "launchpad_bugs_fixed": [ 2019856 ], "author": "Heather Lemon ", "date": "Fri, 19 May 2023 15:37:24 +0000" } ], "notes": null }, { "name": "libuuid1:armhf", "from_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3", "version": "2.37.2-4ubuntu3" }, "to_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3.4", "version": "2.37.2-4ubuntu3.4" }, "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2048092, 2019856 ], "changes": [ { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/rules: build with --disable-use-tty-group to properly remove", " setgid bit from both wall and write.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.4", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 09 Apr 2024 11:32:56 -0400" }, { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/patches/upstream/CVE-2024-28085-pre1.patch: correctly handle", " wide characters in include/carefulputc.h, login-utils/last.c,", " term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085-pre2.patch: convert homebrew", " buffering to open_memstream() in term-utils/wall.c.", " - debian/patches/upstream/CVE-2024-28085-pre3.patch: use", " fputs_careful() in include/carefulputc.h, login-utils/last.c,", " term-utils/wall.c, term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085.patch: consolidate output on", " the terminal in term-utils/wall.c.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 22 Mar 2024 08:25:19 -0400" }, { "cves": [ { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "log": [ "", " * debian/patches/upstream/CVE-2022-0563.patch: Remove readline support", " from chsh and chfn. Ubuntu does not ship these binaries, so this", " only impacts parties building them from Ubuntu source. (CVE-2022-0563)", " (LP: #2048092)", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2048092 ], "author": "dann frazier ", "date": "Thu, 04 Jan 2024 11:41:57 -0700" }, { "cves": [], "log": [ "", " * Add ARM core support for Grace systems (LP: #2019856)", " - /d/p/ubuntu/lp-2019856-add-missing-arm-cores.patch ", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.1", "urgency": "low", "distributions": "jammy", "launchpad_bugs_fixed": [ 2019856 ], "author": "Heather Lemon ", "date": "Fri, 19 May 2023 15:37:24 +0000" } ], "notes": null }, { "name": "linux-generic-lpae", "from_version": { "source_package_name": "linux-meta", "source_package_version": "5.15.0.101.98", "version": "5.15.0.101.98" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "5.15.0.102.99", "version": "5.15.0.102.99" }, "cves": [], "launchpad_bugs_fixed": [ 1786013 ], "changes": [ { "cves": [], "log": [ "", " * Bump ABI 5.15.0-102", "", " * Packaging resync (LP: #1786013)", " - [Packaging] remove update-version script", "", " * Miscellaneous Ubuntu changes", " - debian/dkms-versions -- update from main", "" ], "package": "linux-meta", "version": "5.15.0.102.99", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 1786013 ], "author": "Stefan Bader ", "date": "Tue, 05 Mar 2024 17:33:39 +0100" } ], "notes": null }, { "name": "linux-headers-generic-lpae", "from_version": { "source_package_name": "linux-meta", "source_package_version": "5.15.0.101.98", "version": "5.15.0.101.98" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "5.15.0.102.99", "version": "5.15.0.102.99" }, "cves": [], "launchpad_bugs_fixed": [ 1786013 ], "changes": [ { "cves": [], "log": [ "", " * Bump ABI 5.15.0-102", "", " * Packaging resync (LP: #1786013)", " - [Packaging] remove update-version script", "", " * Miscellaneous Ubuntu changes", " - debian/dkms-versions -- update from main", "" ], "package": "linux-meta", "version": "5.15.0.102.99", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 1786013 ], "author": "Stefan Bader ", "date": "Tue, 05 Mar 2024 17:33:39 +0100" } ], "notes": null }, { "name": "linux-image-generic-lpae", "from_version": { "source_package_name": "linux-meta", "source_package_version": "5.15.0.101.98", "version": "5.15.0.101.98" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "5.15.0.102.99", "version": "5.15.0.102.99" }, "cves": [], "launchpad_bugs_fixed": [ 1786013 ], "changes": [ { "cves": [], "log": [ "", " * Bump ABI 5.15.0-102", "", " * Packaging resync (LP: #1786013)", " - [Packaging] remove update-version script", "", " * Miscellaneous Ubuntu changes", " - debian/dkms-versions -- update from main", "" ], "package": "linux-meta", "version": "5.15.0.102.99", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 1786013 ], "author": "Stefan Bader ", "date": "Tue, 05 Mar 2024 17:33:39 +0100" } ], "notes": null }, { "name": "mount", "from_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3", "version": "2.37.2-4ubuntu3" }, "to_version": { "source_package_name": "util-linux", "source_package_version": "2.37.2-4ubuntu3.4", "version": "2.37.2-4ubuntu3.4" }, "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" }, { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2048092, 2019856 ], "changes": [ { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/rules: build with --disable-use-tty-group to properly remove", " setgid bit from both wall and write.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.4", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Tue, 09 Apr 2024 11:32:56 -0400" }, { "cves": [ { "cve": "CVE-2024-28085", "url": "https://ubuntu.com/security/CVE-2024-28085", "cve_description": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.", "cve_priority": "medium", "cve_public_date": "2024-03-27 19:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Improper neutralization of escape sequences in wall", " - debian/patches/upstream/CVE-2024-28085-pre1.patch: correctly handle", " wide characters in include/carefulputc.h, login-utils/last.c,", " term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085-pre2.patch: convert homebrew", " buffering to open_memstream() in term-utils/wall.c.", " - debian/patches/upstream/CVE-2024-28085-pre3.patch: use", " fputs_careful() in include/carefulputc.h, login-utils/last.c,", " term-utils/wall.c, term-utils/write.c.", " - debian/patches/upstream/CVE-2024-28085.patch: consolidate output on", " the terminal in term-utils/wall.c.", " - CVE-2024-28085", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Fri, 22 Mar 2024 08:25:19 -0400" }, { "cves": [ { "cve": "CVE-2022-0563", "url": "https://ubuntu.com/security/CVE-2022-0563", "cve_description": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "cve_priority": "medium", "cve_public_date": "2022-02-21 19:15:00 UTC" } ], "log": [ "", " * debian/patches/upstream/CVE-2022-0563.patch: Remove readline support", " from chsh and chfn. Ubuntu does not ship these binaries, so this", " only impacts parties building them from Ubuntu source. (CVE-2022-0563)", " (LP: #2048092)", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.2", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2048092 ], "author": "dann frazier ", "date": "Thu, 04 Jan 2024 11:41:57 -0700" }, { "cves": [], "log": [ "", " * Add ARM core support for Grace systems (LP: #2019856)", " - /d/p/ubuntu/lp-2019856-add-missing-arm-cores.patch ", "" ], "package": "util-linux", "version": "2.37.2-4ubuntu3.1", "urgency": "low", "distributions": "jammy", "launchpad_bugs_fixed": [ 2019856 ], "author": "Heather Lemon ", "date": "Fri, 19 May 2023 15:37:24 +0000" } ], "notes": null }, { "name": "python3-update-manager", "from_version": { "source_package_name": "update-manager", "source_package_version": "1:22.04.19", "version": "1:22.04.19" }, "to_version": { "source_package_name": "update-manager", "source_package_version": "1:22.04.20", "version": "1:22.04.20" }, "cves": [], "launchpad_bugs_fixed": [ 2058133 ], "changes": [ { "cves": [], "log": [ "", " * Replace Popen to 'ua security-status --format=json' by the Ubuntu Pro API.", " The former is not stable enough and would break the program once in a", " while when something unrelated to Update Manager (Livepatch, for instance)", " went awry. The updates() end point from the API, on the other hand,", " does not raise exceptions. LP: #2058133.", "" ], "package": "update-manager", "version": "1:22.04.20", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2058133 ], "author": "Nathan Pratta Teodosio ", "date": "Fri, 22 Mar 2024 08:24:04 +0100" } ], "notes": null }, { "name": "snapd", "from_version": { "source_package_name": "snapd", "source_package_version": "2.58+22.04.1", "version": "2.58+22.04.1" }, "to_version": { "source_package_name": "snapd", "source_package_version": "2.61.3+22.04", "version": "2.61.3+22.04" }, "cves": [ { "cve": "CVE-2022-28948", "url": "https://ubuntu.com/security/CVE-2022-28948", "cve_description": "An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.", "cve_priority": "medium", "cve_public_date": "2022-05-19 20:15:00 UTC" }, { "cve": "CVE-2023-1523", "url": "https://ubuntu.com/security/CVE-2023-1523", "cve_description": "Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.", "cve_priority": "medium", "cve_public_date": "2023-09-01 19:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2039017, 2039017, 2024007, 2039017, 2024007, 2024007, 2024007, 2024007, 2024007, 2009946, 2009946, 2018977, 2009946, 2009946, 2009946, 2009946, 1998462, 1998462, 1998462, 1998462 ], "changes": [ { "cves": [], "log": [ "", " * New upstream release, LP: #2039017", " - Install systemd files in correct location for 24.04", "" ], "package": "snapd", "version": "2.61.3+22.04", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2039017 ], "author": "Ernest Lotter ", "date": "Wed, 06 Mar 2024 23:18:11 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2039017", " - Fix to enable plug/slot sanitization for prepare-image", " - Fix panic when device-service.access=offline", " - Support offline remodeling", " - Allow offline update only remodels without serial", " - Fail early when remodeling to old model revision", " - Fix to enable plug/slot sanitization for validate-seed", " - Allow removal of core snap on classic systems", " - Fix network-control interface denial for file lock on /run/netns", " - Add well-known core24 snap-id", " - Fix remodel snap installation order", " - Prevent remodeling from UC18+ to UC16", " - Fix cups auto-connect on classic with cups snap installed", " - u2f-devices interface support for GoTrust Idem Key with USB-C", " - Fix to restore services after unlink failure", " - Add libcudnn.so to Nvidia libraries", " - Fix skipping base snap download due to false snapd downgrade", " conflict", "" ], "package": "snapd", "version": "2.61.2", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2039017 ], "author": "Ernest Lotter ", "date": "Fri, 16 Feb 2024 20:22:23 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2024007", " - Stop requiring default provider snaps on image building and first", " boot if alternative providers are included and available", " - Fix auth.json access for login as non-root group ID", " - Fix incorrect remodelling conflict when changing track to older", " snapd version", " - Improved check-rerefresh message", " - Fix UC16/18 kernel/gadget update failure due volume mismatch with", " installed disk", " - Stop auto-import of assertions during install modes", " - Desktop interface exposes GetIdletime", " - Polkit interface support for new polkit versions", " - Fix not applying snapd snap changes in tracked channel when remodelling", "" ], "package": "snapd", "version": "2.61.1", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2024007 ], "author": "Ernest Lotter ", "date": "Fri, 24 Nov 2023 10:22:55 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2039017", " - Fix control of activated services in 'snap start' and 'snap stop'", " - Correctly reflect activated services in 'snap services'", " - Disabled services are no longer enabled again when snap is", " refreshed", " - interfaces/builtin: added support for Token2 U2F keys", " - interfaces/u2f-devices: add Swissbit iShield Key", " - interfaces/builtin: update gpio apparmor to match pattern that", " contains multiple subdirectories under /sys/devices/platform", " - interfaces: add a polkit-agent interface", " - interfaces: add pcscd interface", " - Kernel command-line can now be edited in the gadget.yaml", " - Only track validation-sets in run-mode, fixes validation-set", " issues on first boot.", " - Added support for using store.access to disable access to snap", " store", " - Support for fat16 partition in gadget", " - Pre-seed authority delegation is now possible", " - Support new system-user name daemon", " - Several bug fixes and improvements around remodelling", " - Offline remodelling support", "" ], "package": "snapd", "version": "2.61", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2039017 ], "author": "Philip Meulengracht ", "date": "Fri, 13 Oct 2023 13:06:02 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2024007", " - i/b/qualcomm_ipc_router.go: switch to plug/slot and add socket", " permission", " - interfaces/builtin: fix custom-device udev KERNEL values", " - overlord: allow the firmware-updater snap to install user daemons", " - interfaces: allow loopback as a block-device", "" ], "package": "snapd", "version": "2.60.4", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2024007 ], "author": "Michael Vogt ", "date": "Fri, 15 Sep 2023 20:46:59 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2024007", " - i/b/shared-memory: handle \"private\" plug attribute in shared-", " memory interface correctly", " - i/apparmor: support for home.d tunables from /etc/", "" ], "package": "snapd", "version": "2.60.3", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2024007 ], "author": "Michael Vogt ", "date": "Fri, 25 Aug 2023 18:36:50 +0200" }, { "cves": [ { "cve": "CVE-2022-28948", "url": "https://ubuntu.com/security/CVE-2022-28948", "cve_description": "An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.", "cve_priority": "medium", "cve_public_date": "2022-05-19 20:15:00 UTC" } ], "log": [ "", " * New upstream release, LP: #2024007", " - i/builtin: allow directories in private /dev/shm", " - i/builtin: add read access to /proc/task/schedstat in system-", " observe", " - snap-bootstrap: print version information at startup", " - go.mod: update gopkg.in/yaml.v3 to v3.0.1 to fix CVE-2022-28948", " - snap, store: filter out invalid snap edited links from store info", " and persisted state", " - o/configcore: write netplan defaults to 00-snapd-config on seeding", " - snapcraft.yaml: pull in apparmor_parser optimization patches from", " https://gitlab.com/apparmor/apparmor/-/merge_requests/711", " - snap-confine: fix missing \\0 after readlink", " - cmd/snap: hide append-integrity-data", " - interfaces/opengl: add support for ARM Mali", "" ], "package": "snapd", "version": "2.60.2", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2024007 ], "author": "Michael Vogt ", "date": "Fri, 04 Aug 2023 12:14:04 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2024007", " - install: fallback to lazy unmount() in writeFilesystemContent", " - data: include \"modprobe.d\" and \"modules-load.d\" in preseeded blob", " - gadget: fix install test on armhf", " - interfaces: fix typo in network_manager_observe", " - sandbox/apparmor: don't let vendored apparmor conflict with system", " - gadget/update: set parts in laid out data from the ones matched", " - many: move SnapConfineAppArmorDir from dirs to sandbox/apparmor", " - many: stop using `-O no-expr-simplify` in apparmor_parser", " - go.mod: update secboot to latest uc22 branch", "" ], "package": "snapd", "version": "2.60.1", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2024007 ], "author": "Michael Vogt ", "date": "Tue, 04 Jul 2023 21:21:48 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2024007", " - Support for dynamic snapshot data exclusions", " - Apparmor userspace is vendored inside the snapd snap", " - Added a default-configure hook that exposes gadget default", " configuration options to snaps during first install before", " services are started", " - Allow install from initrd to speed up the initial installation", " for systems that do not have a install-device hook", " - New `snap sign --chain` flag that appends the account and", " account-key assertions", " - Support validation-sets in the model assertion", " - Support new \"min-size\" field in gadget.yaml", " - New interface: \"userns\"", "" ], "package": "snapd", "version": "2.60", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2024007 ], "author": "Michael Vogt ", "date": "Thu, 15 Jun 2023 17:14:31 +0200" }, { "cves": [ { "cve": "CVE-2023-1523", "url": "https://ubuntu.com/security/CVE-2023-1523", "cve_description": "Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.", "cve_priority": "medium", "cve_public_date": "2023-09-01 19:15:00 UTC" } ], "log": [ "", " * New upstream release, LP: #2009946", " - Explicitly disallow the use of ioctl + TIOCLINUX", " This fixes CVE-2023-1523.", "" ], "package": "snapd", "version": "2.59.5", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2009946 ], "author": "Michael Vogt ", "date": "Sat, 27 May 2023 09:44:43 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2009946", " - Retry when looking for disk label on non-UEFI systems", " (LP: #2018977)", " - Fix remodel from UC20 to UC22", "" ], "package": "snapd", "version": "2.59.4", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2009946, 2018977 ], "author": "Michael Vogt ", "date": "Fri, 12 May 2023 10:15:57 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2009946", " - Fix quiet boot", " - i/b/physical_memory_observe: allow reading virt-phys page mappings", " - gadget: warn instead of returning error if overlapping with GPT", " header", " - overlord,wrappers: restart always enabled units", " - go.mod: update github.com/snapcore/secboot to latest uc22", " - boot: make sure we update assets for the system-seed-null role", " - many: ignore case for vfat partitions when validating", "" ], "package": "snapd", "version": "2.59.3", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2009946 ], "author": "Michael Vogt ", "date": "Wed, 03 May 2023 12:31:00 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2009946", " - Notify users when a user triggered auto refresh finished", "" ], "package": "snapd", "version": "2.59.2", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2009946 ], "author": "Michael Vogt ", "date": "Tue, 18 Apr 2023 19:46:10 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2009946", " - Add udev rules from steam-devices to steam-support interface", " - Bugfixes for layout path checking, dm_crypt permissions,", " mount-control interface parameter checking, kernel commandline", " parsing, docker-support, refresh-app-awareness", "" ], "package": "snapd", "version": "2.59.1", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2009946 ], "author": "Michael Vogt ", "date": "Tue, 28 Mar 2023 20:58:44 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2009946", " - Support setting extra kernel command line parameters via snap", " configuration and under a gadget allow-list", " - Support for Full-Disk-Encryption using ICE", " - Support for arbitrary home dir locations via snap configuration", " - New nvidia-drivers-support interface", " - Support for udisks2 snap", " - Pre-download of snaps ready for refresh and automatic refresh of", " the snap when all apps are closed", " - New microovn interface", " - Support uboot with `CONFIG_SYS_REDUNDAND_ENV=n`", " - Make \"snap-preseed --reset\" re-exec when needed", " - Update the fwupd interface to support fully confined fwupd", " - The memory,cpu,thread quota options are no longer experimental", " - Support debugging snap client requests via the", " `SNAPD_CLIENT_DEBUG_HTTP` environment variable", " - Support ssh listen-address via snap configuration", " - Support for quotas on single services", " - prepare-image now takes into account snapd versions going into", " the image, including in the kernel initrd, to fetch supported", " assertion formats", "" ], "package": "snapd", "version": "2.59", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2009946 ], "author": "Michael Vogt ", "date": "Fri, 10 Mar 2023 12:51:26 +0100" }, { "cves": [], "log": [ "", " * New upstream release, LP: #1998462", " - interfaces/screen-inhibit-control: Add support for xfce-power-", " manager", " - interfaces/network-manager: do not show ptrace read", " denials", " - interfaces: relax rules for mount-control `what` for functionfs", " - cmd/snap-bootstrap: add support for snapd_system_disk", " - interfaces/modem-manager: add net_admin capability", " - interfaces/network-manager: add permission for OpenVPN", " - httputil: fix checking x509 certification error on go 1.20", " - i/b/fwupd: allow reading host os-release", " - boot: on classic+modes `MarkBootSuccessfull` does not need a base", " - boot: do not include `base=` in modeenv for classic+modes installs", " - tests: add spread test that validates revert on boot for core does", " not happen on classic+modes", " - snapstate: only take boot participants into account in", " UpdateBootRevisions", " - snapstate: refactor UpdateBootRevisions() to make it easier to", " check for boot.SnapTypeParticipatesInBoot()", "" ], "package": "snapd", "version": "2.58.3", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 1998462 ], "author": "Michael Vogt ", "date": "Tue, 21 Feb 2023 17:14:50 +0100" }, { "cves": [], "log": [ "", " * New upstream release, LP: #1998462", " - bootloader: fix dirty build by hardcoding copyright year", "" ], "package": "snapd", "version": "2.58.2", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 1998462 ], "author": "Michael Vogt ", "date": "Wed, 25 Jan 2023 20:02:08 +0100" }, { "cves": [], "log": [ "", " * New upstream release, LP: #1998462", " - secboot: detect lockout mode in CheckTPMKeySealingSupported", " - cmd/snap-update-ns: prevent keeping unneeded mountpoints", " - o/snapstate: do not infinitely retry when an update fails during", " seeding", " - interfaces/modem-manager: add permissions for NETLINK_ROUTE", " - systemd/emulation.go: use `systemctl --root` to enable/disable", " - snap: provide more error context in `NotSnapError`", " - interfaces: add read access to /run for cryptsetup", " - boot: avoid reboot loop if there is a bad try kernel", " - devicestate: retry serial acquire on time based certificate", " errors", " - o/devicestate: run systemctl daemon-reload after install-device", " hook", " - cmd/snap,daemon: add 'held' to notes in 'snap list'", " - o/snapshotstate: check snapshots are self-contained on import", " - cmd/snap: show user+gating hold info in 'snap info'", " - daemon: expose user and gating holds at /v2/snaps/{name}", "" ], "package": "snapd", "version": "2.58.1", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 1998462 ], "author": "Michael Vogt ", "date": "Mon, 23 Jan 2023 18:03:40 +0100" }, { "cves": [], "log": [ "", " * New upstream release, LP: #1998462", " - many: Use /tmp/snap-private-tmp for per-snap private tmps", " - data: Add systemd-tmpfiles configuration to create private tmp dir", " - cmd/snap: test allowed and forbidden refresh hold values", " - cmd/snap: be more consistent in --hold help and err messages", " - cmd/snap: error on refresh holds that are negative or too short", " - o/homedirs: make sure we do not write to /var on build time", " - image: make sure file customizations happen also when we have", " defaultscause", " - tests/fde-on-classic: set ubuntu-seed label in seed partitions", " - gadget: system-seed-null should also have fs label ubuntu-seed", " - many: gadget.HasRole, ubuntu-seed can come also from system-seed-", " null", " - o/devicestate: fix paths for retrieving recovery key on classic", " - cmd/snap-confine: do not discard const qualifier", " - interfaces: allow python3.10+ in the default template", " - o/restart: fix PendingForSystemRestart", " - interfaces: allow wayland slot snaps to access shm files created", " by Firefox", " - o/assertstate: add Sequence() to val set tracking", " - o/assertstate: set val set 'Current' to pinned sequence", " - tests: tweak the libvirt interface test to work on 22.10", " - tests: use system-seed-null role on classic with modes tests", " - boot: add directory for data on install", " - o/devicestate: change some names from esp to seed/seed-null", " - gadget: add system-seed-null role", " - o/devicestate: really add error to new error message", " - restart,snapstate: implement reboot-required notifications on", " classic", " - many: avoid automatic system restarts on classic through new", " overlord/restart logic", " - release: Fix WSL detection in LXD", " - o/state: introduce WaitStatus", " - interfaces: Fix desktop interface rules for document portal", " - client: remove classic check for `snap recovery --show-", " keys`", " - many: create snapd.mounts targets to schedule mount units", " - image: enable sysfs overlay for UC preseeding", " - i/b/network-control: add permissions for using AF_XDP", " - i/apparmor: move mocking of home and overlay conditions to osutil", " - tests/main/degraded: ignore man-db update failures in CentOS", " - cmd/snap: fix panic when running snap w/ flag but w/o subcommand", " - tests: save snaps generated during image preaparation", " - tests: skip building snapd based on new env var", " - client: remove misleading comments in ValidateApplyOptions", " - boot/seal: add debug traces for bootchains", " - bootloader/assets: fix grub.cfg when there are no labels", " - cmd/snap: improve refresh hold's output", " - packaging: enable BPF in RHEL9", " - packaging: do not traverse filesystems in postrm script", " - tests: get microk8s from another branch", " - bootloader: do not specify Core version in grub entry", " - many: refresh --hold follow-up", " - many: support refresh hold/unhold to API and CLI", " - many: expand fully handling links mapping in all components, in", " the API and in snap info", " - snap/system_usernames,tests: Azure IoT Edge system usernames", " - interface: Allow access to", " org.freedesktop.DBus.ListActivatableNames via system-observe", " interface", " - o/devicestate,daemon: use the expiration date from the assertion", " in user-state and REST api (user-removal 4/n)", " - gadget: add unit tests for new install functions for FDE on", " classic", " - cmd/snap-seccomp: fix typo in AF_XDP value", " - tests/connected-after-reboot-revert: run also on UC16", " - kvm: allow read of AMD-SEV parameters", " - data: tweak apt integration config var", " - o/c/configcore: add faillock configuration", " - tests: use dbus-daemon instead of dbus-launch", " - packaging: remove unclean debian-sid patch", " - asserts: add keyword 'user-presence' keyword in system-user", " assertion (auto-removal 3/n)", " - interfaces: steam-support allow pivot /run/media and /etc/nvidia", " mount", " - aspects: initial code", " - overlord: process auto-import assertion at first boot", " - release, snapd-apparmor, syscheck: distinguish WSL1 and WSL2", " - tests: fix lxd-mount-units in ubuntu kinetic", " - tests: new variable used to configure the kernel command line in", " nested tests", " - go.mod: update to newer secboot/uc22 branch", " - autopkgtests: fix running autopkgtest on kinetic", " - tests: remove squashfs leftovers in fakeinstaller", " - tests: create partition table in fakeinstaller", " - o/ifacestate: introduce DebugAutoConnectCheck hook", " - tests: use test-snapd-swtpm instead of swtpm-mvo snap in nested", " helper", " - interfaces/polkit: do not require polkit directory if no file is", " needed", " - o/snapstate: be consistent not creating per-snap save dirs for", " classic models", " - inhibit: use hintFile()", " - tests: use `snap prepare-image` in fde-on-classic mk-image.sh", " - interfaces: add microceph interface", " - seccomp: allow opening XDP sockets", " - interfaces: allow access to icon subdirectories", " - tests: add minimal-smoke test for UC22 and increase minimal RAM", " - overlord: introduce hold levels in the snapstate.Hold* API", " - o/devicestate: support mounting ubuntu-save also on classic with", " modes", " - interfaces: steam-support allow additional mounts", " - fakeinstaller: format SystemDetails result with %+v", " - cmd/libsnap-confine-private: do not panic on chmod failure", " - tests: ensure that fakeinstaller put the seed into the right place", " - many: add stub services for prompting", " - tests: add libfwupd and libfwupdplugin5 to openSUSE dependencies", " - o/snapstate: fix snaps-hold pruning/reset in the presence of", " system holding", " - many: add support for setting up encryption from installer", " - many: support classic snaps in the context of classic and extended", " models", " - cmd/snap,daemon: allow zero values from client to daemon for", " journal rate limit", " - boot,o/devicestate: extend HasFDESetupHook to consider unrelated", " kernels", " - cmd/snap: validation set refresh-enforce CLI support + spread test", " - many: fix filenames written in modeenv for base/gadget plus drive-", " by TODO", " - seed: fix seed test to use a pseudo-random byte sequence", " - cmd/snap-confine: remove setuid calls from cgroup init code", " - boot,o/devicestate: introduce and use MakeRunnableStandaloneSystem", " - devicestate,boot,tests: make `fakeinstaller` test work", " - store: send Snap-Device-Location header with cloud information", " - overlord: fix unit tests after merging master in", " - o/auth: move HasUserExpired into UserState and name it HasExpired,", " and add unit tests for this", " - o/auth: rename NewUserData to NewUserParams", " - many: implementation of finish install step handlers", " - overlord: auto-resolve validation set enforcement constraints", " - i/backends,o/ifacestate: cleanup backends.All", " - cmd/snap-confine: move bind-mount setup into separate function", " - tests/main/mount-ns: update namespace for 18.04", " - o/state: Hold pseudo-error for explicit holding, concept of", " pending changes in prune logic", " - many: support extended classic models that omit kernel/gadget", " - data/selinux: allow snapd to detect WSL", " - overlord: add code to remove users that has an expiration date set", " - wrappers,snap/quota: clear LogsDirectory= in the service unit for", " journal namespaces", " - daemon: move user add, remove operations to overlord device state", " - gadget: implement write content from gadget information", " - {device,snap}state: fix ineffectual assignments", " - daemon: support validation set refresh+enforce in API", " - many: rename AddAffected* to RegisterAffected*, add", " Change|State.Has, fix a comment", " - many: reset store session when setting proxy.store", " - overlord/ifacestate: fix conflict detection of auto-connection", " - interfaces: added read/write access to /proc/self/coredump_filter", " for process-control", " - interfaces: add read access to /proc/cgroups and", " /proc/sys/vm/swappiness to system-observe", " - fde: run fde-reveal-key with `DefaultDependencies=no`", " - many: don't concatenate non-constant format strings", " - o/devicestate: fix non-compiling test", " - release, snapd-apparmor: fixed outdated WSL detection", " - many: add todos discussed in the review in", " tests/nested/manual/fde-on-classic, snapstate cleanups", " - overlord: run install-device hook during factory reset", " - i/b/mount-control: add optional `/` to umount rules", " - gadget/install: split Run in several functions", " - o/devicestate: refactor some methods as preparation for install", " steps implementation", " - tests: fix how snaps are cached in uc22", " - tests/main/cgroup-tracking-failure: fix rare failure in Xenial and", " Bionic", " - many: make {Install,Initramfs}{{,Host},Writable}Dir a function", " - tests/nested/manual/core20: fix manual test after changes to", " 'tests.nested exec'", " - tests: move the unit tests system to 22.04 in github actions", " workflow", " - tests: fix nested errors uc20", " - boot: rewrite switch in SnapTypeParticipatesInBoot()", " - gadget: refactor to allow usage from the installer", " - overlord/devicestate: support for mounting ubuntu-save before the", " install-device hook", " - many: allow to install/update kernels/gadgets on classic with", " modes", " - tests: fix issues related to dbus session and localtime in uc18", " - many: support home dirs located deeper under /home", " - many: refactor tests to use explicit strings instead of", " boot.Install{Initramfs,Host}{Writable,FDEData}Dir", " - boot: add factory-reset cases for boot-flags", " - tests: disable quota tests on arm devices using ubuntu core", " - tests: fix unbound SPREAD_PATH variable on nested debug session", " - overlord: start turning restart into a full state manager", " - boot: apply boot logic also for classic with modes boot snaps", " - tests: fix snap-env test on debug section when no var files were", " created", " - overlord,daemon: allow returning errors when requesting a restart", " - interfaces: login-session-control: add further D-Bus interfaces", " - snapdenv: added wsl to userAgent", " - o/snapstate: support running multiple ops transactionally", " - store: use typed valset keys in store package", " - daemon: add `ensureStateSoon()` when calling systems POST api", " - gadget: add rules for validating classic with modes gadget.yaml", " files", " - wrappers: journal namespaces did not honor journal.persistent", " - many: stub devicestate.Install{Finish,SetupStorageEncryption}()", " - sandbox/cgroup: don't check V1 cgroup if V2 is active", " - seed: add support to load auto import assertion", " - tests: fix preseed tests for arm systems", " - include/lk: update LK recovery environment definition to include", " device lock state used by bootloader", " - daemon: return `storage-encryption` in /systems/