{ "summary": { "snap": { "added": [], "removed": [], "diff": [] }, "deb": { "added": [], "removed": [], "diff": [ "binutils", "binutils-arm-linux-gnueabihf", "binutils-common:armhf", "cloud-init", "dmeventd", "dmsetup", "libbinutils:armhf", "libctf-nobfd0:armhf", "libctf0:armhf", "libdevmapper-event1.02.1:armhf", "libdevmapper1.02.1:armhf", "liblvm2cmd2.03:armhf", "libopeniscsiusr", "lvm2", "open-iscsi", "pollinate" ] } }, "diff": { "deb": [ { "name": "binutils", "from_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.6", "version": "2.38-4ubuntu2.6" }, "to_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.7", "version": "2.38-4ubuntu2.7" }, "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Incorrect access control", " - debian/patches/CVE-2024-57360.patch: avoid potential", " segmentation fault when displaying symbols without version", " info in binutils/nm.c.", " - CVE-2024-57360", " * SECURITY UPDATE: Stack-based overflow", " - debian/patches/CVE-2025-0840.patch: fixing boundaries", " checking in binutils/objdump.c.", " - CVE-2025-0840", "" ], "package": "binutils", "version": "2.38-4ubuntu2.7", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Leonidas Da Silva Barbosa ", "date": "Wed, 05 Feb 2025 12:56:02 -0300" } ], "notes": null }, { "name": "binutils-arm-linux-gnueabihf", "from_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.6", "version": "2.38-4ubuntu2.6" }, "to_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.7", "version": "2.38-4ubuntu2.7" }, "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Incorrect access control", " - debian/patches/CVE-2024-57360.patch: avoid potential", " segmentation fault when displaying symbols without version", " info in binutils/nm.c.", " - CVE-2024-57360", " * SECURITY UPDATE: Stack-based overflow", " - debian/patches/CVE-2025-0840.patch: fixing boundaries", " checking in binutils/objdump.c.", " - CVE-2025-0840", "" ], "package": "binutils", "version": "2.38-4ubuntu2.7", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Leonidas Da Silva Barbosa ", "date": "Wed, 05 Feb 2025 12:56:02 -0300" } ], "notes": null }, { "name": "binutils-common:armhf", "from_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.6", "version": "2.38-4ubuntu2.6" }, "to_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.7", "version": "2.38-4ubuntu2.7" }, "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Incorrect access control", " - debian/patches/CVE-2024-57360.patch: avoid potential", " segmentation fault when displaying symbols without version", " info in binutils/nm.c.", " - CVE-2024-57360", " * SECURITY UPDATE: Stack-based overflow", " - debian/patches/CVE-2025-0840.patch: fixing boundaries", " checking in binutils/objdump.c.", " - CVE-2025-0840", "" ], "package": "binutils", "version": "2.38-4ubuntu2.7", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Leonidas Da Silva Barbosa ", "date": "Wed, 05 Feb 2025 12:56:02 -0300" } ], "notes": null }, { "name": "cloud-init", "from_version": { "source_package_name": "cloud-init", "source_package_version": "24.4-0ubuntu1~22.04.1", "version": "24.4-0ubuntu1~22.04.1" }, "to_version": { "source_package_name": "cloud-init", "source_package_version": "24.4.1-0ubuntu0~22.04.1", "version": "24.4.1-0ubuntu0~22.04.1" }, "cves": [], "launchpad_bugs_fixed": [ 2097319, 2094149, 2097441, 2094179, 2094208, 2094857, 2094858 ], "changes": [ { "cves": [], "log": [ "", " * Add d/p/cpick-84806336-chore-Add-feature-flag-for-manual-network-waiting", " - Pull in the upstream commit that makes it easier to patch out the", " new systemd-networkd-wait-online behavior in e30549e8", " * Add d/p/cpick-b817a679-fix-retry-AWS-hotplug-for-async-IMDS.patch", " - Pull in the upstream commit works around a limitation in AWS's IMDS", " (GH-5971) (LP: #2097319)", " * Add d/p/no-remove-networkd-online.patch", " - Revert breaking change on stable release (LP: #2094149)", " * Update d/p/no-single-process.patch", " - This patch missed waiting for mounts (LP: #2097441)", " * refresh patches:", " - d/p/cli-retain-file-argument-as-main-cmd-arg.patch", " - d/p/revert-551f560d-cloud-config-after-snap-seeding.patch", " * Upstream snapshot based on 24.4.1.", " List of changes from upstream can be found at", " https://raw.githubusercontent.com/canonical/cloud-init/24.4.1/ChangeLog", " (LP: #2094179, #2094208, #2094857, #2094858)", "" ], "package": "cloud-init", "version": "24.4.1-0ubuntu0~22.04.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2097319, 2094149, 2097441, 2094179, 2094208, 2094857, 2094858 ], "author": "Brett Holman ", "date": "Tue, 04 Feb 2025 17:35:10 -0700" } ], "notes": null }, { "name": "dmeventd", "from_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu4", "version": "2:1.02.175-2.1ubuntu4" }, "to_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu5", "version": "2:1.02.175-2.1ubuntu5" }, "cves": [], "launchpad_bugs_fixed": [ 2084233 ], "changes": [ { "cves": [], "log": [ "", " * Remove libaio from being skipped by memlock (LP: #2084233)", " - d/p/lp2084233-mm-remove-libaio-from-being-skipped.patch", "" ], "package": "lvm2", "version": "2.03.11-2.1ubuntu5", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2084233 ], "author": "Heitor Alves de Siqueira ", "date": "Wed, 27 Nov 2024 19:04:29 +0000" } ], "notes": null }, { "name": "dmsetup", "from_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu4", "version": "2:1.02.175-2.1ubuntu4" }, "to_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu5", "version": "2:1.02.175-2.1ubuntu5" }, "cves": [], "launchpad_bugs_fixed": [ 2084233 ], "changes": [ { "cves": [], "log": [ "", " * Remove libaio from being skipped by memlock (LP: #2084233)", " - d/p/lp2084233-mm-remove-libaio-from-being-skipped.patch", "" ], "package": "lvm2", "version": "2.03.11-2.1ubuntu5", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2084233 ], "author": "Heitor Alves de Siqueira ", "date": "Wed, 27 Nov 2024 19:04:29 +0000" } ], "notes": null }, { "name": "libbinutils:armhf", "from_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.6", "version": "2.38-4ubuntu2.6" }, "to_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.7", "version": "2.38-4ubuntu2.7" }, "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Incorrect access control", " - debian/patches/CVE-2024-57360.patch: avoid potential", " segmentation fault when displaying symbols without version", " info in binutils/nm.c.", " - CVE-2024-57360", " * SECURITY UPDATE: Stack-based overflow", " - debian/patches/CVE-2025-0840.patch: fixing boundaries", " checking in binutils/objdump.c.", " - CVE-2025-0840", "" ], "package": "binutils", "version": "2.38-4ubuntu2.7", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Leonidas Da Silva Barbosa ", "date": "Wed, 05 Feb 2025 12:56:02 -0300" } ], "notes": null }, { "name": "libctf-nobfd0:armhf", "from_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.6", "version": "2.38-4ubuntu2.6" }, "to_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.7", "version": "2.38-4ubuntu2.7" }, "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Incorrect access control", " - debian/patches/CVE-2024-57360.patch: avoid potential", " segmentation fault when displaying symbols without version", " info in binutils/nm.c.", " - CVE-2024-57360", " * SECURITY UPDATE: Stack-based overflow", " - debian/patches/CVE-2025-0840.patch: fixing boundaries", " checking in binutils/objdump.c.", " - CVE-2025-0840", "" ], "package": "binutils", "version": "2.38-4ubuntu2.7", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Leonidas Da Silva Barbosa ", "date": "Wed, 05 Feb 2025 12:56:02 -0300" } ], "notes": null }, { "name": "libctf0:armhf", "from_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.6", "version": "2.38-4ubuntu2.6" }, "to_version": { "source_package_name": "binutils", "source_package_version": "2.38-4ubuntu2.7", "version": "2.38-4ubuntu2.7" }, "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-57360", "url": "https://ubuntu.com/security/CVE-2024-57360", "cve_description": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function.", "cve_priority": "medium", "cve_public_date": "2025-01-21 21:15:00 UTC" }, { "cve": "CVE-2025-0840", "url": "https://ubuntu.com/security/CVE-2025-0840", "cve_description": "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.", "cve_priority": "medium", "cve_public_date": "2025-01-29 20:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Incorrect access control", " - debian/patches/CVE-2024-57360.patch: avoid potential", " segmentation fault when displaying symbols without version", " info in binutils/nm.c.", " - CVE-2024-57360", " * SECURITY UPDATE: Stack-based overflow", " - debian/patches/CVE-2025-0840.patch: fixing boundaries", " checking in binutils/objdump.c.", " - CVE-2025-0840", "" ], "package": "binutils", "version": "2.38-4ubuntu2.7", "urgency": "medium", "distributions": "jammy-security", "launchpad_bugs_fixed": [], "author": "Leonidas Da Silva Barbosa ", "date": "Wed, 05 Feb 2025 12:56:02 -0300" } ], "notes": null }, { "name": "libdevmapper-event1.02.1:armhf", "from_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu4", "version": "2:1.02.175-2.1ubuntu4" }, "to_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu5", "version": "2:1.02.175-2.1ubuntu5" }, "cves": [], "launchpad_bugs_fixed": [ 2084233 ], "changes": [ { "cves": [], "log": [ "", " * Remove libaio from being skipped by memlock (LP: #2084233)", " - d/p/lp2084233-mm-remove-libaio-from-being-skipped.patch", "" ], "package": "lvm2", "version": "2.03.11-2.1ubuntu5", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2084233 ], "author": "Heitor Alves de Siqueira ", "date": "Wed, 27 Nov 2024 19:04:29 +0000" } ], "notes": null }, { "name": "libdevmapper1.02.1:armhf", "from_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu4", "version": "2:1.02.175-2.1ubuntu4" }, "to_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu5", "version": "2:1.02.175-2.1ubuntu5" }, "cves": [], "launchpad_bugs_fixed": [ 2084233 ], "changes": [ { "cves": [], "log": [ "", " * Remove libaio from being skipped by memlock (LP: #2084233)", " - d/p/lp2084233-mm-remove-libaio-from-being-skipped.patch", "" ], "package": "lvm2", "version": "2.03.11-2.1ubuntu5", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2084233 ], "author": "Heitor Alves de Siqueira ", "date": "Wed, 27 Nov 2024 19:04:29 +0000" } ], "notes": null }, { "name": "liblvm2cmd2.03:armhf", "from_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu4", "version": "2.03.11-2.1ubuntu4" }, "to_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu5", "version": "2.03.11-2.1ubuntu5" }, "cves": [], "launchpad_bugs_fixed": [ 2084233 ], "changes": [ { "cves": [], "log": [ "", " * Remove libaio from being skipped by memlock (LP: #2084233)", " - d/p/lp2084233-mm-remove-libaio-from-being-skipped.patch", "" ], "package": "lvm2", "version": "2.03.11-2.1ubuntu5", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2084233 ], "author": "Heitor Alves de Siqueira ", "date": "Wed, 27 Nov 2024 19:04:29 +0000" } ], "notes": null }, { "name": "libopeniscsiusr", "from_version": { "source_package_name": "open-iscsi", "source_package_version": "2.1.5-1ubuntu1", "version": "2.1.5-1ubuntu1" }, "to_version": { "source_package_name": "open-iscsi", "source_package_version": "2.1.5-1ubuntu1.1", "version": "2.1.5-1ubuntu1.1" }, "cves": [], "launchpad_bugs_fixed": [ 2097808 ], "changes": [ { "cves": [], "log": [ "", " * IPv6 support for iBFT iSCSI boot (LP: #2097808)", " - d/p/lp2097808-IPv6-support-for-iBFT-iSCSI-boot-493.patch", "" ], "package": "open-iscsi", "version": "2.1.5-1ubuntu1.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2097808 ], "author": "Chengen Du ", "date": "Tue, 11 Feb 2025 03:06:32 +0000" } ], "notes": null }, { "name": "lvm2", "from_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu4", "version": "2.03.11-2.1ubuntu4" }, "to_version": { "source_package_name": "lvm2", "source_package_version": "2.03.11-2.1ubuntu5", "version": "2.03.11-2.1ubuntu5" }, "cves": [], "launchpad_bugs_fixed": [ 2084233 ], "changes": [ { "cves": [], "log": [ "", " * Remove libaio from being skipped by memlock (LP: #2084233)", " - d/p/lp2084233-mm-remove-libaio-from-being-skipped.patch", "" ], "package": "lvm2", "version": "2.03.11-2.1ubuntu5", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2084233 ], "author": "Heitor Alves de Siqueira ", "date": "Wed, 27 Nov 2024 19:04:29 +0000" } ], "notes": null }, { "name": "open-iscsi", "from_version": { "source_package_name": "open-iscsi", "source_package_version": "2.1.5-1ubuntu1", "version": "2.1.5-1ubuntu1" }, "to_version": { "source_package_name": "open-iscsi", "source_package_version": "2.1.5-1ubuntu1.1", "version": "2.1.5-1ubuntu1.1" }, "cves": [], "launchpad_bugs_fixed": [ 2097808 ], "changes": [ { "cves": [], "log": [ "", " * IPv6 support for iBFT iSCSI boot (LP: #2097808)", " - d/p/lp2097808-IPv6-support-for-iBFT-iSCSI-boot-493.patch", "" ], "package": "open-iscsi", "version": "2.1.5-1ubuntu1.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2097808 ], "author": "Chengen Du ", "date": "Tue, 11 Feb 2025 03:06:32 +0000" } ], "notes": null }, { "name": "pollinate", "from_version": { "source_package_name": "pollinate", "source_package_version": "4.33-3ubuntu2", "version": "4.33-3ubuntu2" }, "to_version": { "source_package_name": "pollinate", "source_package_version": "4.33-3ubuntu2.1", "version": "4.33-3ubuntu2.1" }, "cves": [], "launchpad_bugs_fixed": [ 2097596 ], "changes": [ { "cves": [], "log": [ "", " * Relicensing check_pollen (LP: #2097596)", " - d/p/check-pollen-to-pollinate.patch: update to match latest upstream", " - d/copyright: drop AGPL stanza", "" ], "package": "pollinate", "version": "4.33-3ubuntu2.1", "urgency": "medium", "distributions": "jammy", "launchpad_bugs_fixed": [ 2097596 ], "author": "Christian Ehrhardt ", "date": "Fri, 07 Feb 2025 09:19:06 +0100" } ], "notes": null } ], "snap": [] }, "added": { "deb": [], "snap": [] }, "removed": { "deb": [], "snap": [] }, "notes": "Changelog diff for Ubuntu 22.04 jammy image from daily image serial 20250226 to 20250228", "from_series": "jammy", "to_series": "jammy", "from_serial": "20250226", "to_serial": "20250228", "from_manifest_filename": "daily_manifest.previous", "to_manifest_filename": "manifest.current" }