{ "summary": { "snap": { "added": [], "removed": [], "diff": [] }, "deb": { "added": [], "removed": [], "diff": [ "libnetplan0:s390x", "libssl3:s390x", "netplan.io", "openssl", "wget" ] } }, "diff": { "deb": [ { "name": "libnetplan0:s390x", "from_version": { "source_package_name": "netplan.io", "source_package_version": "0.106.1-7ubuntu0.22.04.2", "version": "0.106.1-7ubuntu0.22.04.2" }, "to_version": { "source_package_name": "netplan.io", "source_package_version": "0.106.1-7ubuntu0.22.04.3", "version": "0.106.1-7ubuntu0.22.04.3" }, "cves": [ { "cve": "CVE-2022-4968", "url": "https://ubuntu.com/security/CVE-2022-4968", "cve_description": "netplan leaks the private key of wireguard to local users. A security fix will be released soon.", "cve_priority": "medium", "cve_public_date": "2024-06-07 01:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2065738, 1987842, 2066258 ], "changes": [ { "cves": [ { "cve": "CVE-2022-4968", "url": "https://ubuntu.com/security/CVE-2022-4968", "cve_description": "netplan leaks the private key of wireguard to local users. A security fix will be released soon.", "cve_priority": "medium", "cve_public_date": "2024-06-07 01:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: weak permissions on secret files, command injection", " - d/p/lp2065738/0028-libnetplan-use-more-restrictive-file-permissions.patch:", " Use more restrictive file permissions to prevent unprivileged users to", " read sensitive data from back end files (LP: #2065738, #1987842)", " - CVE-2022-4968", " - d/p/lp2066258/0029-libnetplan-escape-control-characters.patch:", " Escape control characters in the parser and double quotes in backend", " files", " - d/p/lp2066258/0030-backends-escape-file-paths.patch:", " Escape special characters in file paths", " - d/p/lp2066258/0031-backends-escape-semicolons-in-service-units.patch:", " Escape isolated semicolons in systemd service units (LP: #2066258)", " * debian/netplan.io.postinst: Add a postinst maintainer script to call the", " generator. It's needed so the file permissions fixes will be applied", " automatically, thanks to danilogondolfo ", "" ], "package": "netplan.io", "version": "0.106.1-7ubuntu0.22.04.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [ 2065738, 1987842, 2066258 ], "author": "Sudhakar Verma ", "date": "Mon, 24 Jun 2024 23:20:42 +0530" } ], "notes": null }, { "name": "libssl3:s390x", "from_version": { "source_package_name": "openssl", "source_package_version": "3.0.2-0ubuntu1.15", "version": "3.0.2-0ubuntu1.15" }, "to_version": { "source_package_name": "openssl", "source_package_version": "3.0.2-0ubuntu1.16", "version": "3.0.2-0ubuntu1.16" }, "cves": [ { "cve": "CVE-2022-40735", "url": "https://ubuntu.com/security/CVE-2022-40735", "cve_description": "The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \"(appropriately) short exponents\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together.", "cve_priority": "medium", "cve_public_date": "2022-11-14 23:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2022-40735", "url": "https://ubuntu.com/security/CVE-2022-40735", "cve_description": "The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \"(appropriately) short exponents\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together.", "cve_priority": "medium", "cve_public_date": "2022-11-14 23:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Excessive time spent in DH modular-exponentiation", " calcuations when using long exponents.", " - debian/patches/CVE-2022-40735-1.patch: Use the minimum key length", " for known safe primes as per RFC 7919 in crypto/dh/dh_group_params.c,", " crypto/ffc/ffc_backend.c, crypto/ffc/ffc_dh.c,", " crypto/ffc/ffc_key_generate.c, include/internal/ffc.h and", " test/ffc_internal_test.c", " - debian/patches/CVE-2022-40735-2.patch: print DH key length in", " providers/implementations/encode_decode/encode_key2text.c,", " test/recipes/30-test_evp_pkey_provided/DH.priv.txt and", " test/recipes/30-test_evp_pkey_provided/DH.pub.txt", " - debian/patches/CVE-2022-40735-3.patch: test that short private keys", " are generated when using a known safe DH prime in", " test/evp_extra_test2.c", " - debian/patches/CVE-2022-40735-4.patch: copy keylength when copying", " FFC parameters in crypto/ffc/ffc_params.c and test/ffc_internal_test.c", " - CVE-2022-40735", "" ], "package": "openssl", "version": "3.0.2-0ubuntu1.16", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Alex Murray ", "date": "Wed, 05 Jun 2024 12:58:14 +0930" } ], "notes": null }, { "name": "netplan.io", "from_version": { "source_package_name": "netplan.io", "source_package_version": "0.106.1-7ubuntu0.22.04.2", "version": "0.106.1-7ubuntu0.22.04.2" }, "to_version": { "source_package_name": "netplan.io", "source_package_version": "0.106.1-7ubuntu0.22.04.3", "version": "0.106.1-7ubuntu0.22.04.3" }, "cves": [ { "cve": "CVE-2022-4968", "url": "https://ubuntu.com/security/CVE-2022-4968", "cve_description": "netplan leaks the private key of wireguard to local users. A security fix will be released soon.", "cve_priority": "medium", "cve_public_date": "2024-06-07 01:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2065738, 1987842, 2066258 ], "changes": [ { "cves": [ { "cve": "CVE-2022-4968", "url": "https://ubuntu.com/security/CVE-2022-4968", "cve_description": "netplan leaks the private key of wireguard to local users. A security fix will be released soon.", "cve_priority": "medium", "cve_public_date": "2024-06-07 01:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: weak permissions on secret files, command injection", " - d/p/lp2065738/0028-libnetplan-use-more-restrictive-file-permissions.patch:", " Use more restrictive file permissions to prevent unprivileged users to", " read sensitive data from back end files (LP: #2065738, #1987842)", " - CVE-2022-4968", " - d/p/lp2066258/0029-libnetplan-escape-control-characters.patch:", " Escape control characters in the parser and double quotes in backend", " files", " - d/p/lp2066258/0030-backends-escape-file-paths.patch:", " Escape special characters in file paths", " - d/p/lp2066258/0031-backends-escape-semicolons-in-service-units.patch:", " Escape isolated semicolons in systemd service units (LP: #2066258)", " * debian/netplan.io.postinst: Add a postinst maintainer script to call the", " generator. It's needed so the file permissions fixes will be applied", " automatically, thanks to danilogondolfo ", "" ], "package": "netplan.io", "version": "0.106.1-7ubuntu0.22.04.3", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [ 2065738, 1987842, 2066258 ], "author": "Sudhakar Verma ", "date": "Mon, 24 Jun 2024 23:20:42 +0530" } ], "notes": null }, { "name": "openssl", "from_version": { "source_package_name": "openssl", "source_package_version": "3.0.2-0ubuntu1.15", "version": "3.0.2-0ubuntu1.15" }, "to_version": { "source_package_name": "openssl", "source_package_version": "3.0.2-0ubuntu1.16", "version": "3.0.2-0ubuntu1.16" }, "cves": [ { "cve": "CVE-2022-40735", "url": "https://ubuntu.com/security/CVE-2022-40735", "cve_description": "The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \"(appropriately) short exponents\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together.", "cve_priority": "medium", "cve_public_date": "2022-11-14 23:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2022-40735", "url": "https://ubuntu.com/security/CVE-2022-40735", "cve_description": "The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \"(appropriately) short exponents\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together.", "cve_priority": "medium", "cve_public_date": "2022-11-14 23:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Excessive time spent in DH modular-exponentiation", " calcuations when using long exponents.", " - debian/patches/CVE-2022-40735-1.patch: Use the minimum key length", " for known safe primes as per RFC 7919 in crypto/dh/dh_group_params.c,", " crypto/ffc/ffc_backend.c, crypto/ffc/ffc_dh.c,", " crypto/ffc/ffc_key_generate.c, include/internal/ffc.h and", " test/ffc_internal_test.c", " - debian/patches/CVE-2022-40735-2.patch: print DH key length in", " providers/implementations/encode_decode/encode_key2text.c,", " test/recipes/30-test_evp_pkey_provided/DH.priv.txt and", " test/recipes/30-test_evp_pkey_provided/DH.pub.txt", " - debian/patches/CVE-2022-40735-3.patch: test that short private keys", " are generated when using a known safe DH prime in", " test/evp_extra_test2.c", " - debian/patches/CVE-2022-40735-4.patch: copy keylength when copying", " FFC parameters in crypto/ffc/ffc_params.c and test/ffc_internal_test.c", " - CVE-2022-40735", "" ], "package": "openssl", "version": "3.0.2-0ubuntu1.16", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Alex Murray ", "date": "Wed, 05 Jun 2024 12:58:14 +0930" } ], "notes": null }, { "name": "wget", "from_version": { "source_package_name": "wget", "source_package_version": "1.21.2-2ubuntu1", "version": "1.21.2-2ubuntu1" }, "to_version": { "source_package_name": "wget", "source_package_version": "1.21.2-2ubuntu1.1", "version": "1.21.2-2ubuntu1.1" }, "cves": [ { "cve": "CVE-2024-38428", "url": "https://ubuntu.com/security/CVE-2024-38428", "cve_description": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.", "cve_priority": "medium", "cve_public_date": "2024-06-16 03:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-38428", "url": "https://ubuntu.com/security/CVE-2024-38428", "cve_description": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.", "cve_priority": "medium", "cve_public_date": "2024-06-16 03:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: mishandling of semicolons in userinfo", " - debian/patches/CVE-2024-38428.patch: properly re-implement userinfo", " parsing in src/url.c.", " - CVE-2024-38428", "" ], "package": "wget", "version": "1.21.2-2ubuntu1.1", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Wed, 19 Jun 2024 08:15:59 -0400" } ], "notes": null } ], "snap": [] }, "added": { "deb": [], "snap": [] }, "removed": { "deb": [], "snap": [] }, "notes": "Changelog diff for Ubuntu 22.04 jammy image from release image serial 20240626 to 20240627", "from_series": "jammy", "to_series": "jammy", "from_serial": "20240626", "to_serial": "20240627", "from_manifest_filename": "release_manifest.previous", "to_manifest_filename": "manifest.current" }