{ "summary": { "snap": { "added": [], "removed": [], "diff": [] }, "deb": { "added": [ "linux-headers-6.11.0-12", "linux-headers-6.11.0-12-generic", "linux-image-6.11.0-12-generic", "linux-modules-6.11.0-12-generic", "linux-tools-6.11.0-12", "linux-tools-6.11.0-12-generic", "systemd-cryptsetup" ], "removed": [ "linux-headers-6.11.0-9", "linux-headers-6.11.0-9-generic", "linux-image-6.11.0-9-generic", "linux-modules-6.11.0-9-generic", "linux-tools-6.11.0-9", "linux-tools-6.11.0-9-generic" ], "diff": [ "bpftrace", "curl", "gir1.2-packagekitglib-1.0", "initramfs-tools", "initramfs-tools-bin", "initramfs-tools-core", "libcurl3t64-gnutls:s390x", "libcurl4t64:s390x", "libdb5.3t64:s390x", "libexpat1:s390x", "libmodule-scandeps-perl", "libnss-systemd:s390x", "libpackagekit-glib2-18:s390x", "libpam-systemd:s390x", "libpython3.12-minimal:s390x", "libpython3.12-stdlib:s390x", "libpython3.12t64:s390x", "libsystemd-shared:s390x", "libsystemd0:s390x", "libudev1:s390x", "libudisks2-0:s390x", "linux-headers-generic", "linux-headers-virtual", "linux-image-virtual", "linux-libc-dev:s390x", "linux-tools-common", "linux-virtual", "needrestart", "packagekit", "packagekit-tools", "python3.12", "python3.12-gdbm", "python3.12-minimal", "snapd", "sosreport", "ssh-import-id", "systemd", "systemd-resolved", "systemd-sysv", "systemd-timesyncd", "udev", "udisks2", "vim", "vim-common", "vim-runtime", "vim-tiny", "xfsprogs", "xxd" ] } }, "diff": { "deb": [ { "name": "bpftrace", "from_version": { "source_package_name": "bpftrace", "source_package_version": "0.21.2-1ubuntu1", "version": "0.21.2-1ubuntu1" }, "to_version": { "source_package_name": "bpftrace", "source_package_version": "0.21.2-1ubuntu1.1", "version": "0.21.2-1ubuntu1.1" }, "cves": [], "launchpad_bugs_fixed": [ 2086104 ], "changes": [ { "cves": [], "log": [ "", " * Really link against shared LLVM (LP: #2086104)", "" ], "package": "bpftrace", "version": "0.21.2-1ubuntu1.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2086104 ], "author": "Mate Kukri ", "date": "Thu, 07 Nov 2024 19:06:19 +0000" } ], "notes": null }, { "name": "curl", "from_version": { "source_package_name": "curl", "source_package_version": "8.9.1-2ubuntu2", "version": "8.9.1-2ubuntu2" }, "to_version": { "source_package_name": "curl", "source_package_version": "8.9.1-2ubuntu2.1", "version": "8.9.1-2ubuntu2.1" }, "cves": [ { "cve": "CVE-2024-9681", "url": "https://ubuntu.com/security/CVE-2024-9681", "cve_description": "When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure `HTTP://` scheme and perform transfers with hosts like `x.example.com` as well as `example.com` where the first host is a subdomain of the second host. (The HSTS cache either needs to have been populated manually or there needs to have been previous HTTPS accesses done as the cache needs to have entries for the domains involved to trigger this problem.) When `x.example.com` responds with `Strict-Transport-Security:` headers, this bug can make the subdomain's expiry timeout *bleed over* and get set for the parent domain `example.com` in curl's HSTS cache. The result of a triggered bug is that HTTP accesses to `example.com` get converted to HTTPS for a different period of time than what was asked for by the origin server. If `example.com` for example stops supporting HTTPS at its expiry time, curl might then fail to access `http://example.com` until the (wrongly set) timeout expires. This bug can also expire the parent's entry *earlier*, thus making curl inadvertently switch back to insecure HTTP earlier than otherwise intended.", "cve_priority": "low", "cve_public_date": "2024-11-06 08:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-9681", "url": "https://ubuntu.com/security/CVE-2024-9681", "cve_description": "When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure `HTTP://` scheme and perform transfers with hosts like `x.example.com` as well as `example.com` where the first host is a subdomain of the second host. (The HSTS cache either needs to have been populated manually or there needs to have been previous HTTPS accesses done as the cache needs to have entries for the domains involved to trigger this problem.) When `x.example.com` responds with `Strict-Transport-Security:` headers, this bug can make the subdomain's expiry timeout *bleed over* and get set for the parent domain `example.com` in curl's HSTS cache. The result of a triggered bug is that HTTP accesses to `example.com` get converted to HTTPS for a different period of time than what was asked for by the origin server. If `example.com` for example stops supporting HTTPS at its expiry time, curl might then fail to access `http://example.com` until the (wrongly set) timeout expires. This bug can also expire the parent's entry *earlier*, thus making curl inadvertently switch back to insecure HTTP earlier than otherwise intended.", "cve_priority": "low", "cve_public_date": "2024-11-06 08:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: HSTS expiry overwrites parent cache entry.", " - debian/patches/CVE-2024-9681.patch: Add bestsub, blen, and hostname", " comparison in lib/hsts.c.", " - CVE-2024-9681", "" ], "package": "curl", "version": "8.9.1-2ubuntu2.1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Hlib Korzhynskyy ", "date": "Wed, 06 Nov 2024 09:10:08 -0330" } ], "notes": null }, { "name": "gir1.2-packagekitglib-1.0", "from_version": { "source_package_name": "packagekit", "source_package_version": "1.3.0-1", "version": "1.3.0-1" }, "to_version": { "source_package_name": "packagekit", "source_package_version": "1.3.0-1ubuntu1", "version": "1.3.0-1ubuntu1" }, "cves": [], "launchpad_bugs_fixed": [ 2086771, 2086773 ], "changes": [ { "cves": [], "log": [ "", " * Backport patch to fix pkcon crashing in transactions with user prompt", " (LP: #2086771)", " * Backport patch to fix showing the GTK debconf helper on Wayland", " (LP: #2086773)", "" ], "package": "packagekit", "version": "1.3.0-1ubuntu1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2086771, 2086773 ], "author": "Alessandro Astone ", "date": "Mon, 11 Nov 2024 16:17:57 +0100" } ], "notes": null }, { "name": "initramfs-tools", "from_version": { "source_package_name": "initramfs-tools", "source_package_version": "0.142ubuntu34", "version": "0.142ubuntu34" }, "to_version": { "source_package_name": "initramfs-tools", "source_package_version": "0.142ubuntu34.1", "version": "0.142ubuntu34.1" }, "cves": [], "launchpad_bugs_fixed": [ 2085157 ], "changes": [ { "cves": [], "log": [ "", " * hook-functions: make copy_libgcc to not take any parameters (LP: #2085157)", "" ], "package": "initramfs-tools", "version": "0.142ubuntu34.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2085157 ], "author": "Benjamin Drung ", "date": "Thu, 14 Nov 2024 14:56:32 +0100" } ], "notes": null }, { "name": "initramfs-tools-bin", "from_version": { "source_package_name": "initramfs-tools", "source_package_version": "0.142ubuntu34", "version": "0.142ubuntu34" }, "to_version": { "source_package_name": "initramfs-tools", "source_package_version": "0.142ubuntu34.1", "version": "0.142ubuntu34.1" }, "cves": [], "launchpad_bugs_fixed": [ 2085157 ], "changes": [ { "cves": [], "log": [ "", " * hook-functions: make copy_libgcc to not take any parameters (LP: #2085157)", "" ], "package": "initramfs-tools", "version": "0.142ubuntu34.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2085157 ], "author": "Benjamin Drung ", "date": "Thu, 14 Nov 2024 14:56:32 +0100" } ], "notes": null }, { "name": "initramfs-tools-core", "from_version": { "source_package_name": "initramfs-tools", "source_package_version": "0.142ubuntu34", "version": "0.142ubuntu34" }, "to_version": { "source_package_name": "initramfs-tools", "source_package_version": "0.142ubuntu34.1", "version": "0.142ubuntu34.1" }, "cves": [], "launchpad_bugs_fixed": [ 2085157 ], "changes": [ { "cves": [], "log": [ "", " * hook-functions: make copy_libgcc to not take any parameters (LP: #2085157)", "" ], "package": "initramfs-tools", "version": "0.142ubuntu34.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2085157 ], "author": "Benjamin Drung ", "date": "Thu, 14 Nov 2024 14:56:32 +0100" } ], "notes": null }, { "name": "libcurl3t64-gnutls:s390x", "from_version": { "source_package_name": "curl", "source_package_version": "8.9.1-2ubuntu2", "version": "8.9.1-2ubuntu2" }, "to_version": { "source_package_name": "curl", "source_package_version": "8.9.1-2ubuntu2.1", "version": "8.9.1-2ubuntu2.1" }, "cves": [ { "cve": "CVE-2024-9681", "url": "https://ubuntu.com/security/CVE-2024-9681", "cve_description": "When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure `HTTP://` scheme and perform transfers with hosts like `x.example.com` as well as `example.com` where the first host is a subdomain of the second host. (The HSTS cache either needs to have been populated manually or there needs to have been previous HTTPS accesses done as the cache needs to have entries for the domains involved to trigger this problem.) When `x.example.com` responds with `Strict-Transport-Security:` headers, this bug can make the subdomain's expiry timeout *bleed over* and get set for the parent domain `example.com` in curl's HSTS cache. The result of a triggered bug is that HTTP accesses to `example.com` get converted to HTTPS for a different period of time than what was asked for by the origin server. If `example.com` for example stops supporting HTTPS at its expiry time, curl might then fail to access `http://example.com` until the (wrongly set) timeout expires. This bug can also expire the parent's entry *earlier*, thus making curl inadvertently switch back to insecure HTTP earlier than otherwise intended.", "cve_priority": "low", "cve_public_date": "2024-11-06 08:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-9681", "url": "https://ubuntu.com/security/CVE-2024-9681", "cve_description": "When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure `HTTP://` scheme and perform transfers with hosts like `x.example.com` as well as `example.com` where the first host is a subdomain of the second host. (The HSTS cache either needs to have been populated manually or there needs to have been previous HTTPS accesses done as the cache needs to have entries for the domains involved to trigger this problem.) When `x.example.com` responds with `Strict-Transport-Security:` headers, this bug can make the subdomain's expiry timeout *bleed over* and get set for the parent domain `example.com` in curl's HSTS cache. The result of a triggered bug is that HTTP accesses to `example.com` get converted to HTTPS for a different period of time than what was asked for by the origin server. If `example.com` for example stops supporting HTTPS at its expiry time, curl might then fail to access `http://example.com` until the (wrongly set) timeout expires. This bug can also expire the parent's entry *earlier*, thus making curl inadvertently switch back to insecure HTTP earlier than otherwise intended.", "cve_priority": "low", "cve_public_date": "2024-11-06 08:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: HSTS expiry overwrites parent cache entry.", " - debian/patches/CVE-2024-9681.patch: Add bestsub, blen, and hostname", " comparison in lib/hsts.c.", " - CVE-2024-9681", "" ], "package": "curl", "version": "8.9.1-2ubuntu2.1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Hlib Korzhynskyy ", "date": "Wed, 06 Nov 2024 09:10:08 -0330" } ], "notes": null }, { "name": "libcurl4t64:s390x", "from_version": { "source_package_name": "curl", "source_package_version": "8.9.1-2ubuntu2", "version": "8.9.1-2ubuntu2" }, "to_version": { "source_package_name": "curl", "source_package_version": "8.9.1-2ubuntu2.1", "version": "8.9.1-2ubuntu2.1" }, "cves": [ { "cve": "CVE-2024-9681", "url": "https://ubuntu.com/security/CVE-2024-9681", "cve_description": "When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure `HTTP://` scheme and perform transfers with hosts like `x.example.com` as well as `example.com` where the first host is a subdomain of the second host. (The HSTS cache either needs to have been populated manually or there needs to have been previous HTTPS accesses done as the cache needs to have entries for the domains involved to trigger this problem.) When `x.example.com` responds with `Strict-Transport-Security:` headers, this bug can make the subdomain's expiry timeout *bleed over* and get set for the parent domain `example.com` in curl's HSTS cache. The result of a triggered bug is that HTTP accesses to `example.com` get converted to HTTPS for a different period of time than what was asked for by the origin server. If `example.com` for example stops supporting HTTPS at its expiry time, curl might then fail to access `http://example.com` until the (wrongly set) timeout expires. This bug can also expire the parent's entry *earlier*, thus making curl inadvertently switch back to insecure HTTP earlier than otherwise intended.", "cve_priority": "low", "cve_public_date": "2024-11-06 08:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-9681", "url": "https://ubuntu.com/security/CVE-2024-9681", "cve_description": "When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure `HTTP://` scheme and perform transfers with hosts like `x.example.com` as well as `example.com` where the first host is a subdomain of the second host. (The HSTS cache either needs to have been populated manually or there needs to have been previous HTTPS accesses done as the cache needs to have entries for the domains involved to trigger this problem.) When `x.example.com` responds with `Strict-Transport-Security:` headers, this bug can make the subdomain's expiry timeout *bleed over* and get set for the parent domain `example.com` in curl's HSTS cache. The result of a triggered bug is that HTTP accesses to `example.com` get converted to HTTPS for a different period of time than what was asked for by the origin server. If `example.com` for example stops supporting HTTPS at its expiry time, curl might then fail to access `http://example.com` until the (wrongly set) timeout expires. This bug can also expire the parent's entry *earlier*, thus making curl inadvertently switch back to insecure HTTP earlier than otherwise intended.", "cve_priority": "low", "cve_public_date": "2024-11-06 08:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: HSTS expiry overwrites parent cache entry.", " - debian/patches/CVE-2024-9681.patch: Add bestsub, blen, and hostname", " comparison in lib/hsts.c.", " - CVE-2024-9681", "" ], "package": "curl", "version": "8.9.1-2ubuntu2.1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Hlib Korzhynskyy ", "date": "Wed, 06 Nov 2024 09:10:08 -0330" } ], "notes": null }, { "name": "libdb5.3t64:s390x", "from_version": { "source_package_name": "db5.3", "source_package_version": "5.3.28+dfsg2-7", "version": "5.3.28+dfsg2-7" }, "to_version": { "source_package_name": "db5.3", "source_package_version": "5.3.28+dfsg2-7ubuntu1", "version": "5.3.28+dfsg2-7ubuntu1" }, "cves": [], "launchpad_bugs_fixed": [ 2085848 ], "changes": [ { "cves": [], "log": [ "", " * Backport fixes from Plucky as an SRU (LP: #2085848)", "", " [ Bastian Germann ]", " * Fix FTBFS because of implicit-int", "", " [ Adrian Bunk ]", " * Fix the \"64-bit integral type support for sequences\"", " autoconf test with gcc 14.", "" ], "package": "db5.3", "version": "5.3.28+dfsg2-7ubuntu1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2085848 ], "author": "Tobias Heider ", "date": "Wed, 30 Oct 2024 10:27:24 +0100" } ], "notes": null }, { "name": "libexpat1:s390x", "from_version": { "source_package_name": "expat", "source_package_version": "2.6.2-2", "version": "2.6.2-2" }, "to_version": { "source_package_name": "expat", "source_package_version": "2.6.2-2ubuntu0.1", "version": "2.6.2-2ubuntu0.1" }, "cves": [ { "cve": "CVE-2024-50602", "url": "https://ubuntu.com/security/CVE-2024-50602", "cve_description": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.", "cve_priority": "medium", "cve_public_date": "2024-10-27 05:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-50602", "url": "https://ubuntu.com/security/CVE-2024-50602", "cve_description": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.", "cve_priority": "medium", "cve_public_date": "2024-10-27 05:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: denial-of-service via XML_ResumeParser", " - debian/patches/CVE-2024-50602-1.patch: Make function XML_StopParser of", " expat/lib/xmlparse.c refuse to stop/suspend an unstarted parser", " - debian/patches/CVE-2024-50602-2.patch: Add XML_PARSING case to parser", " state in function XML_StopParser of expat/lib/xmlparse.c", " - debian/patches/CVE-2024-50602-3.patch: Add tests for CVE-2024-50602 to", " expat/tests/misc_tests.c", " - CVE-2024-50602", "" ], "package": "expat", "version": "2.6.2-2ubuntu0.1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Nicolas Campuzano Jimenez ", "date": "Thu, 28 Nov 2024 12:41:50 -0500" } ], "notes": null }, { "name": "libmodule-scandeps-perl", "from_version": { "source_package_name": "libmodule-scandeps-perl", "source_package_version": "1.35-1", "version": "1.35-1" }, "to_version": { "source_package_name": "libmodule-scandeps-perl", "source_package_version": "1.35-1ubuntu0.24.10.1", "version": "1.35-1ubuntu0.24.10.1" }, "cves": [ { "cve": "CVE-2024-10224", "url": "https://ubuntu.com/security/CVE-2024-10224", "cve_description": "Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a \"pesky pipe\" (such as passing \"commands|\" as a filename) or by passing arbitrary strings to eval().", "cve_priority": "medium", "cve_public_date": "2024-11-19 18:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-10224", "url": "https://ubuntu.com/security/CVE-2024-10224", "cve_description": "Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a \"pesky pipe\" (such as passing \"commands|\" as a filename) or by passing arbitrary strings to eval().", "cve_priority": "medium", "cve_public_date": "2024-11-19 18:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: parsing untrusted code", " - d/p/CVE-2024-10224/0001-use-three-argument-open.patch: use a", " three-argument open() alternative", " - d/p/CVE-2024-10224/0002-replace-eval-.-constructs.patch: replace eval ", " with parsing the code instead", " - CVE-2024-10224", "" ], "package": "libmodule-scandeps-perl", "version": "1.35-1ubuntu0.24.10.1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Sudhakar Verma ", "date": "Mon, 18 Nov 2024 22:49:10 +0530" } ], "notes": null }, { "name": "libnss-systemd:s390x", "from_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3", "version": "256.5-2ubuntu3" }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" } ], "notes": null }, { "name": "libpackagekit-glib2-18:s390x", "from_version": { "source_package_name": "packagekit", "source_package_version": "1.3.0-1", "version": "1.3.0-1" }, "to_version": { "source_package_name": "packagekit", "source_package_version": "1.3.0-1ubuntu1", "version": "1.3.0-1ubuntu1" }, "cves": [], "launchpad_bugs_fixed": [ 2086771, 2086773 ], "changes": [ { "cves": [], "log": [ "", " * Backport patch to fix pkcon crashing in transactions with user prompt", " (LP: #2086771)", " * Backport patch to fix showing the GTK debconf helper on Wayland", " (LP: #2086773)", "" ], "package": "packagekit", "version": "1.3.0-1ubuntu1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2086771, 2086773 ], "author": "Alessandro Astone ", "date": "Mon, 11 Nov 2024 16:17:57 +0100" } ], "notes": null }, { "name": "libpam-systemd:s390x", "from_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3", "version": "256.5-2ubuntu3" }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" } ], "notes": null }, { "name": "libpython3.12-minimal:s390x", "from_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1", "version": "3.12.7-1" }, "to_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1ubuntu1", "version": "3.12.7-1ubuntu1" }, "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: incorrect quoting in venv module", " - debian/patches/CVE-2024-9287.patch: quote template strings in venv", " activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,", " Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,", " Lib/venv/scripts/posix/activate.csh,", " Lib/venv/scripts/posix/activate.fish.", " - CVE-2024-9287", "" ], "package": "python3.12", "version": "3.12.7-1ubuntu1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Wed, 06 Nov 2024 13:29:01 -0500" } ], "notes": null }, { "name": "libpython3.12-stdlib:s390x", "from_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1", "version": "3.12.7-1" }, "to_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1ubuntu1", "version": "3.12.7-1ubuntu1" }, "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: incorrect quoting in venv module", " - debian/patches/CVE-2024-9287.patch: quote template strings in venv", " activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,", " Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,", " Lib/venv/scripts/posix/activate.csh,", " Lib/venv/scripts/posix/activate.fish.", " - CVE-2024-9287", "" ], "package": "python3.12", "version": "3.12.7-1ubuntu1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Wed, 06 Nov 2024 13:29:01 -0500" } ], "notes": null }, { "name": "libpython3.12t64:s390x", "from_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1", "version": "3.12.7-1" }, "to_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1ubuntu1", "version": "3.12.7-1ubuntu1" }, "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: incorrect quoting in venv module", " - debian/patches/CVE-2024-9287.patch: quote template strings in venv", " activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,", " Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,", " Lib/venv/scripts/posix/activate.csh,", " Lib/venv/scripts/posix/activate.fish.", " - CVE-2024-9287", "" ], "package": "python3.12", "version": "3.12.7-1ubuntu1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Wed, 06 Nov 2024 13:29:01 -0500" } ], "notes": null }, { "name": "libsystemd-shared:s390x", "from_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3", "version": "256.5-2ubuntu3" }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" } ], "notes": null }, { "name": "libsystemd0:s390x", "from_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3", "version": "256.5-2ubuntu3" }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" } ], "notes": null }, { "name": "libudev1:s390x", "from_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3", "version": "256.5-2ubuntu3" }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" } ], "notes": null }, { "name": "libudisks2-0:s390x", "from_version": { "source_package_name": "udisks2", "source_package_version": "2.10.1-9ubuntu2", "version": "2.10.1-9ubuntu2" }, "to_version": { "source_package_name": "udisks2", "source_package_version": "2.10.1-9ubuntu3", "version": "2.10.1-9ubuntu3" }, "cves": [], "launchpad_bugs_fixed": [ 2038761 ], "changes": [ { "cves": [], "log": [ "", " * d/p/nvme-disk-size.patch: Fix missing size for NVME disk (LP: #2038761).", "" ], "package": "udisks2", "version": "2.10.1-9ubuntu3", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2038761 ], "author": "Nathan Pratta Teodosio ", "date": "Mon, 18 Nov 2024 17:11:19 +0100" } ], "notes": null }, { "name": "linux-headers-generic", "from_version": { "source_package_name": "linux-meta", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [], "changes": [ { "cves": [], "log": [ "", " * Main version: 6.11.0-12.13", "" ], "package": "linux-meta", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:03:35 +0300" }, { "cves": [], "log": [ "", " * Main version: 6.11.0-11.12", "" ], "package": "linux-meta", "version": "6.11.0-11.12", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 15:58:17 +0300" }, { "cves": [], "log": [ "", " * Main version: 6.11.0-11.11", "" ], "package": "linux-meta", "version": "6.11.0-11.11", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Fri, 08 Nov 2024 21:05:12 +0300" } ], "notes": null }, { "name": "linux-headers-virtual", "from_version": { "source_package_name": "linux-meta", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [], "changes": [ { "cves": [], "log": [ "", " * Main version: 6.11.0-12.13", "" ], "package": "linux-meta", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:03:35 +0300" }, { "cves": [], "log": [ "", " * Main version: 6.11.0-11.12", "" ], "package": "linux-meta", "version": "6.11.0-11.12", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 15:58:17 +0300" }, { "cves": [], "log": [ "", " * Main version: 6.11.0-11.11", "" ], "package": "linux-meta", "version": "6.11.0-11.11", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Fri, 08 Nov 2024 21:05:12 +0300" } ], "notes": null }, { "name": "linux-image-virtual", "from_version": { "source_package_name": "linux-meta", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [], "changes": [ { "cves": [], "log": [ "", " * Main version: 6.11.0-12.13", "" ], "package": "linux-meta", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:03:35 +0300" }, { "cves": [], "log": [ "", " * Main version: 6.11.0-11.12", "" ], "package": "linux-meta", "version": "6.11.0-11.12", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 15:58:17 +0300" }, { "cves": [], "log": [ "", " * Main version: 6.11.0-11.11", "" ], "package": "linux-meta", "version": "6.11.0-11.11", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Fri, 08 Nov 2024 21:05:12 +0300" } ], "notes": null }, { "name": "linux-libc-dev:s390x", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": "linux", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "changes": [ { "cves": [], "log": [ "", " * oracular/linux: 6.11.0-12.13 -proposed tracker (LP: #2089269)", "", " * LXD fan bridge causes blocked tasks (LP: #2064176)", " - SAUCE: fan: release rcu_read_lock on skb discard path", " - SAUCE: fan: fix racy device stat update", "", " * OVTI08F4:00: number of CSI2 data lanes 2 is not supported (LP: #2084059)", " - SAUCE: media: ipu-bridge: Add support for additional link frequencies", "", " * [Oracular] Allow overriding Rust tools (LP: #2084693)", " - [Packaging] Allow rust overrides", "", " * Intel(R) PRO/1000 I219 ethernet adapter [8086:550c] may block entrance of", " modern standby (LP: #2081130)", " - platform/x86: intel/pmc: Ignore all LTRs during suspend", " - e1000e: change I219 (19) devices to ADP", " - x86/apic: Always explicitly disarm TSC-deadline timer", "", " * Need driver support for Realtek RTL8126A rev.b 5Gbps ethernet [10ec:8126]", " (LP: #2079017)", " - r8169: add support for RTL8126A rev.b", " - r8169: add missing MODULE_FIRMWARE entry for RTL8126A rev.b", "", " * Missing device ID for amd_atl driver for AMD Strix platform (LP: #2083292)", " - SAUCE: x86/amd_nb: Add new PCI ID for AMD family 1Ah model 20h", "", " * Lack of UART boot output on rb3gen2 even with earlycon (LP: #2083559)", " - [Config] move qcom clk and serial options as builtin", "", " * r8169: transmit queue 0 timed out error when re-plugging the Ethernet cable", " (LP: #2084526)", " - r8169: disable ALDPS per default for RTL8125", "", " * Dell Alienware sysytem reports errors of dell_wmi_sysman and dell_smbios in", " demsg (LP: #2084808)", " - platform/x86: dell-sysman: add support for alienware products", "", " * Add Intel Arrow Lake-H LPSS PCI IDs (LP: #2083905)", " - mfd: intel-lpss: Add Intel Arrow Lake-H LPSS PCI IDs", "", " * rtw89: reset IDMEM mode to prevent download firmware failure (LP: #2077396)", " - wifi: rtw89: 885xb: reset IDMEM mode to prevent download firmware failure", "", " * Missing Bluetooth device IDs for new Mediatek MT7920/MT7925 (LP: #2078878)", " - SAUCE: Bluetooth: btusb: Add USB HW IDs for MT7920/MT7925", "", " * rtw89: Support hardware rfkill (LP: #2077384)", " - wifi: rtw89: add support for hardware rfkill", "", " * [SRU] uncore: Add ARL and LNL support on 6.11 (LP: #2081810)", " - perf/x86/intel/uncore: Add Arrow Lake support", " - perf/x86/intel/uncore: Factor out common MMIO init and ops functions", " - perf/x86/intel/uncore: Add Lunar Lake support", " - perf/x86/intel/uncore: Add LNL uncore iMC freerunning support", " - perf/x86/intel/uncore: Use D0:F0 as a default device", "", " * Support Qualcomm WCN7851 Dual Bluetooth Adapter 0489:E0F3 (LP: #2081796)", " - SAUCE: Bluetooth: btusb: Add one more ID 0x0489:0xe0f3 for Qualcomm WCN785x", "", " * The system hangs after resume with thunderbolt monitor(AMD GPU [1002:1900])", " (LP: #2083182)", " - SAUCE: drm/amd/display: Fix system hang while resume with TBT monitor", "", " * UBSAN: array-index-out-of-bounds in module mt76 (LP: #2081785)", " - wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc", "", " * Missing devices nodes for AMD Instinct MI300 card when installed along with", " integrated display (LP: #2078773)", " - drm: Use XArray instead of IDR for minors", " - accel: Use XArray instead of IDR for minors", " - drm: Expand max DRM device number to full MINORBITS", "" ], "package": "linux", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:01:08 +0300" } ], "notes": null }, { "name": "linux-tools-common", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": "linux", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "changes": [ { "cves": [], "log": [ "", " * oracular/linux: 6.11.0-12.13 -proposed tracker (LP: #2089269)", "", " * LXD fan bridge causes blocked tasks (LP: #2064176)", " - SAUCE: fan: release rcu_read_lock on skb discard path", " - SAUCE: fan: fix racy device stat update", "", " * OVTI08F4:00: number of CSI2 data lanes 2 is not supported (LP: #2084059)", " - SAUCE: media: ipu-bridge: Add support for additional link frequencies", "", " * [Oracular] Allow overriding Rust tools (LP: #2084693)", " - [Packaging] Allow rust overrides", "", " * Intel(R) PRO/1000 I219 ethernet adapter [8086:550c] may block entrance of", " modern standby (LP: #2081130)", " - platform/x86: intel/pmc: Ignore all LTRs during suspend", " - e1000e: change I219 (19) devices to ADP", " - x86/apic: Always explicitly disarm TSC-deadline timer", "", " * Need driver support for Realtek RTL8126A rev.b 5Gbps ethernet [10ec:8126]", " (LP: #2079017)", " - r8169: add support for RTL8126A rev.b", " - r8169: add missing MODULE_FIRMWARE entry for RTL8126A rev.b", "", " * Missing device ID for amd_atl driver for AMD Strix platform (LP: #2083292)", " - SAUCE: x86/amd_nb: Add new PCI ID for AMD family 1Ah model 20h", "", " * Lack of UART boot output on rb3gen2 even with earlycon (LP: #2083559)", " - [Config] move qcom clk and serial options as builtin", "", " * r8169: transmit queue 0 timed out error when re-plugging the Ethernet cable", " (LP: #2084526)", " - r8169: disable ALDPS per default for RTL8125", "", " * Dell Alienware sysytem reports errors of dell_wmi_sysman and dell_smbios in", " demsg (LP: #2084808)", " - platform/x86: dell-sysman: add support for alienware products", "", " * Add Intel Arrow Lake-H LPSS PCI IDs (LP: #2083905)", " - mfd: intel-lpss: Add Intel Arrow Lake-H LPSS PCI IDs", "", " * rtw89: reset IDMEM mode to prevent download firmware failure (LP: #2077396)", " - wifi: rtw89: 885xb: reset IDMEM mode to prevent download firmware failure", "", " * Missing Bluetooth device IDs for new Mediatek MT7920/MT7925 (LP: #2078878)", " - SAUCE: Bluetooth: btusb: Add USB HW IDs for MT7920/MT7925", "", " * rtw89: Support hardware rfkill (LP: #2077384)", " - wifi: rtw89: add support for hardware rfkill", "", " * [SRU] uncore: Add ARL and LNL support on 6.11 (LP: #2081810)", " - perf/x86/intel/uncore: Add Arrow Lake support", " - perf/x86/intel/uncore: Factor out common MMIO init and ops functions", " - perf/x86/intel/uncore: Add Lunar Lake support", " - perf/x86/intel/uncore: Add LNL uncore iMC freerunning support", " - perf/x86/intel/uncore: Use D0:F0 as a default device", "", " * Support Qualcomm WCN7851 Dual Bluetooth Adapter 0489:E0F3 (LP: #2081796)", " - SAUCE: Bluetooth: btusb: Add one more ID 0x0489:0xe0f3 for Qualcomm WCN785x", "", " * The system hangs after resume with thunderbolt monitor(AMD GPU [1002:1900])", " (LP: #2083182)", " - SAUCE: drm/amd/display: Fix system hang while resume with TBT monitor", "", " * UBSAN: array-index-out-of-bounds in module mt76 (LP: #2081785)", " - wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc", "", " * Missing devices nodes for AMD Instinct MI300 card when installed along with", " integrated display (LP: #2078773)", " - drm: Use XArray instead of IDR for minors", " - accel: Use XArray instead of IDR for minors", " - drm: Expand max DRM device number to full MINORBITS", "" ], "package": "linux", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:01:08 +0300" } ], "notes": null }, { "name": "linux-virtual", "from_version": { "source_package_name": "linux-meta", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": "linux-meta", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [], "changes": [ { "cves": [], "log": [ "", " * Main version: 6.11.0-12.13", "" ], "package": "linux-meta", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:03:35 +0300" }, { "cves": [], "log": [ "", " * Main version: 6.11.0-11.12", "" ], "package": "linux-meta", "version": "6.11.0-11.12", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 15:58:17 +0300" }, { "cves": [], "log": [ "", " * Main version: 6.11.0-11.11", "" ], "package": "linux-meta", "version": "6.11.0-11.11", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Fri, 08 Nov 2024 21:05:12 +0300" } ], "notes": null }, { "name": "needrestart", "from_version": { "source_package_name": "needrestart", "source_package_version": "3.6-8ubuntu4", "version": "3.6-8ubuntu4" }, "to_version": { "source_package_name": "needrestart", "source_package_version": "3.6-8ubuntu4.4", "version": "3.6-8ubuntu4.4" }, "cves": [ { "cve": "CVE-2024-48990", "url": "https://ubuntu.com/security/CVE-2024-48990", "cve_description": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.", "cve_priority": "high", "cve_public_date": "2024-11-19 18:15:00 UTC" }, { "cve": "CVE-2024-48991", "url": "https://ubuntu.com/security/CVE-2024-48991", "cve_description": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).", "cve_priority": "high", "cve_public_date": "2024-11-19 18:15:00 UTC" }, { "cve": "CVE-2024-48992", "url": "https://ubuntu.com/security/CVE-2024-48992", "cve_description": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.", "cve_priority": "high", "cve_public_date": "2024-11-19 18:15:00 UTC" }, { "cve": "CVE-2024-11003", "url": "https://ubuntu.com/security/CVE-2024-11003", "cve_description": "Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps.", "cve_priority": "medium", "cve_public_date": "2024-11-19 18:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2089193, 2089193, 2084571 ], "changes": [ { "cves": [], "log": [ "", " * SECURITY REGRESSION: false positives for killing processes in LXC", " (LP: #2089193)", " - debian/patches/lp2091096/0021-fix-lxc-fp.patch: use the value of exe", " to check for obsolete processes when exec is undefined", "" ], "package": "needrestart", "version": "3.6-8ubuntu4.4", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [ 2089193 ], "author": "Sudhakar Verma ", "date": "Thu, 05 Dec 2024 17:12:44 +0530" }, { "cves": [], "log": [ "", " * SECURITY REGRESSION: false positives for killing processes (LP: #2089193)", " - debian/patches/lp2089193/0020-fix-chroot-mountns-fp.patch: ignore check", " for obsolete processes in chrooted or containerized processes", "" ], "package": "needrestart", "version": "3.6-8ubuntu4.3", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [ 2089193 ], "author": "Sudhakar Verma ", "date": "Tue, 26 Nov 2024 10:37:22 +0530" }, { "cves": [ { "cve": "CVE-2024-48990", "url": "https://ubuntu.com/security/CVE-2024-48990", "cve_description": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.", "cve_priority": "high", "cve_public_date": "2024-11-19 18:15:00 UTC" }, { "cve": "CVE-2024-48991", "url": "https://ubuntu.com/security/CVE-2024-48991", "cve_description": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3).", "cve_priority": "high", "cve_public_date": "2024-11-19 18:15:00 UTC" }, { "cve": "CVE-2024-48992", "url": "https://ubuntu.com/security/CVE-2024-48992", "cve_description": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.", "cve_priority": "high", "cve_public_date": "2024-11-19 18:15:00 UTC" }, { "cve": "CVE-2024-11003", "url": "https://ubuntu.com/security/CVE-2024-11003", "cve_description": "Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps.", "cve_priority": "medium", "cve_public_date": "2024-11-19 18:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: incorrect usage of PYTHONPATH environment variable", " - debian/patches/CVE-2024-48990.patch: chdir to a clean directory ", " to avoid loading arbirary objects, sanitize PYTHONPATH before", " spawning a new python interpreter", " - CVE-2024-48990", " * SECURITY UPDATE: race condition for checking path to python", " - debian/patches/CVE-2024-48991.patch: sync path for both check", " and usage for python interpreter", " - CVE-2024-48991", " * SECURITY UPDATE: incorrect usage of RUBYLIB environment variable", " - debian/patches/CVE-2024-48992.patch: chdir to a clean directory", " to avoid loading arbirary objects, sanitize RUBYLIB before", " spawning a new ruby interpreter", " - CVE-2024-48992", " * SECURITY UPDATE: incorrect usage of Perl ScanDeps", " - debian/patches/CVE-2024-11003.patch: remove usage of ScanDeps", " to avoid parsing arbitrary code", " - CVE-2024-11003", "" ], "package": "needrestart", "version": "3.6-8ubuntu4.2", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Sudhakar Verma ", "date": "Wed, 13 Nov 2024 17:03:15 +0530" }, { "cves": [], "log": [ "", " * Fix container handling (LP: #2084571)", " - d/p/ubuntu-mode.patch: make sure containers aren't restarted from APT", " - d/p/lp2084571/0019-container-fix-always-ignoring-lxc-lxd-instances-regr.patch:", " cherry-picked fix from upstream.", "" ], "package": "needrestart", "version": "3.6-8ubuntu4.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084571 ], "author": "Simon Chopin ", "date": "Tue, 15 Oct 2024 18:03:32 +0200" } ], "notes": null }, { "name": "packagekit", "from_version": { "source_package_name": "packagekit", "source_package_version": "1.3.0-1", "version": "1.3.0-1" }, "to_version": { "source_package_name": "packagekit", "source_package_version": "1.3.0-1ubuntu1", "version": "1.3.0-1ubuntu1" }, "cves": [], "launchpad_bugs_fixed": [ 2086771, 2086773 ], "changes": [ { "cves": [], "log": [ "", " * Backport patch to fix pkcon crashing in transactions with user prompt", " (LP: #2086771)", " * Backport patch to fix showing the GTK debconf helper on Wayland", " (LP: #2086773)", "" ], "package": "packagekit", "version": "1.3.0-1ubuntu1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2086771, 2086773 ], "author": "Alessandro Astone ", "date": "Mon, 11 Nov 2024 16:17:57 +0100" } ], "notes": null }, { "name": "packagekit-tools", "from_version": { "source_package_name": "packagekit", "source_package_version": "1.3.0-1", "version": "1.3.0-1" }, "to_version": { "source_package_name": "packagekit", "source_package_version": "1.3.0-1ubuntu1", "version": "1.3.0-1ubuntu1" }, "cves": [], "launchpad_bugs_fixed": [ 2086771, 2086773 ], "changes": [ { "cves": [], "log": [ "", " * Backport patch to fix pkcon crashing in transactions with user prompt", " (LP: #2086771)", " * Backport patch to fix showing the GTK debconf helper on Wayland", " (LP: #2086773)", "" ], "package": "packagekit", "version": "1.3.0-1ubuntu1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2086771, 2086773 ], "author": "Alessandro Astone ", "date": "Mon, 11 Nov 2024 16:17:57 +0100" } ], "notes": null }, { "name": "python3.12", "from_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1", "version": "3.12.7-1" }, "to_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1ubuntu1", "version": "3.12.7-1ubuntu1" }, "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: incorrect quoting in venv module", " - debian/patches/CVE-2024-9287.patch: quote template strings in venv", " activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,", " Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,", " Lib/venv/scripts/posix/activate.csh,", " Lib/venv/scripts/posix/activate.fish.", " - CVE-2024-9287", "" ], "package": "python3.12", "version": "3.12.7-1ubuntu1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Wed, 06 Nov 2024 13:29:01 -0500" } ], "notes": null }, { "name": "python3.12-gdbm", "from_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1", "version": "3.12.7-1" }, "to_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1ubuntu1", "version": "3.12.7-1ubuntu1" }, "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: incorrect quoting in venv module", " - debian/patches/CVE-2024-9287.patch: quote template strings in venv", " activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,", " Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,", " Lib/venv/scripts/posix/activate.csh,", " Lib/venv/scripts/posix/activate.fish.", " - CVE-2024-9287", "" ], "package": "python3.12", "version": "3.12.7-1ubuntu1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Wed, 06 Nov 2024 13:29:01 -0500" } ], "notes": null }, { "name": "python3.12-minimal", "from_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1", "version": "3.12.7-1" }, "to_version": { "source_package_name": "python3.12", "source_package_version": "3.12.7-1ubuntu1", "version": "3.12.7-1ubuntu1" }, "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2024-9287", "url": "https://ubuntu.com/security/CVE-2024-9287", "cve_description": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected.", "cve_priority": "medium", "cve_public_date": "2024-10-22 17:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: incorrect quoting in venv module", " - debian/patches/CVE-2024-9287.patch: quote template strings in venv", " activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,", " Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,", " Lib/venv/scripts/posix/activate.csh,", " Lib/venv/scripts/posix/activate.fish.", " - CVE-2024-9287", "" ], "package": "python3.12", "version": "3.12.7-1ubuntu1", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Wed, 06 Nov 2024 13:29:01 -0500" } ], "notes": null }, { "name": "snapd", "from_version": { "source_package_name": "snapd", "source_package_version": "2.65.3+24.10", "version": "2.65.3+24.10" }, "to_version": { "source_package_name": "snapd", "source_package_version": "2.66.1+24.10", "version": "2.66.1+24.10" }, "cves": [], "launchpad_bugs_fixed": [ 2083490, 2083490, 2077473 ], "changes": [ { "cves": [], "log": [ "", " * New upstream release, LP: #2083490", " - AppArmor prompting (experimental): Fix kernel prompting support", " check", " - Allow kernel snaps to have content slots", " - Fix ignoring snaps in try mode when amending", "" ], "package": "snapd", "version": "2.66.1+24.10", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2083490 ], "author": "Ernest Lotter ", "date": "Fri, 11 Oct 2024 10:05:46 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2083490", " - AppArmor prompting (experimental): expand kernel support checks", " - AppArmor prompting (experimental): consolidate error messages and", " add error kinds", " - AppArmor prompting (experimental): grant /v2/snaps/{name} via", " snap-interfaces-requests-control", " - AppArmor prompting (experimental): add checks for duplicate", " pattern variants", " - Registry views (experimental): add handlers that commit (and", " cleanup) registry transactions", " - Registry views (experimental): add a snapctl fail command for", " rejecting registry transactions", " - Registry views (experimental): allow custodian snaps to implement", " registry hooks that modify and save registry data", " - Registry views (experimental): run view-changed hooks only for", " snaps plugging views affected by modified paths", " - Registry views (experimental): make registry transactions", " serialisable", " - Snap components: handle refreshing components to revisions that", " have been on the system before", " - Snap components: enable creating Ubuntu Core images that contain", " components", " - Snap components: handle refreshing components independently of", " snaps", " - Snap components: handle removing components when refreshing a snap", " that no longer defines them", " - Snap components: extend snapd Ubuntu Core installation API to", " allow for picking optional snaps and components to install", " - Snap components: extend kernel.yaml with \"dynamic-modules\",", " allowing kernel to define a location for kmods from component", " hooks", " - Snap components: renamed component type \"test\" to \"standard\"", " - Desktop IDs: support installing desktop files with custom names", " based on desktop-file-ids desktop interface plug attr", " - Auto-install snapd on classic systems as prerequisite for any non-", " essential snap install", " - Support loading AppArmor profiles on WSL2 with non-default kernel", " and securityfs mounted", " - Debian/Fedora packaging updates", " - Add snap debug command for investigating execution aspects of the", " snap toolchain", " - Improve snap pack error for easier parsing", " - Add support for user services when refreshing snaps", " - Add snap remove --terminate flag for terminating running snap", " processes", " - Support building FIPS complaint snapd deb and snap", " - Fix to not use nss when looking up for users/groups from snapd", " snap", " - Fix ordering in which layout changes are saved", " - Patch snapd snap dynamic linker to ignore LD_LIBRARY_PATH and", " related variables", " - Fix libexec dir for openSUSE Slowroll", " - Fix handling of the shared snap directory for parallel installs", " - Allow writing to /run/systemd/journal/dev-log by default", " - Avoid state lock during snap removal to avoid delaying other snapd", " operations", " - Add nomad-support interface to enable running Hashicorp Nomad", " - Add intel-qat interface", " - u2f-devices interface: add u2f trustkey t120 product id and fx", " series fido u2f devices", " - desktop interface: improve integration with xdg-desktop-portal", " - desktop interface: add desktop-file-ids plug attr to desktop", " interface", " - unity7 interface: support desktop-file-ids in desktop files rule", " generation", " - desktop-legacy interface: support desktop-file-ids in desktop", " files rule generation", " - desktop-legacy interface: grant access to gcin socket location", " - login-session-observe interface: allow introspection", " - custom-device interface: allow to explicitly identify matching", " device in udev tagging block", " - system-packages-doc interface: allow reading /usr/share/javascript", " - modem-manager interface: add new format of WWAN ports", " - pcscd interface: allow pcscd to read opensc.conf", " - cpu-control interface: add IRQ affinity control to cpu_control", " - opengl interface: add support for cuda workloads on Tegra iGPU in", " opengl interface", "" ], "package": "snapd", "version": "2.66", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2083490 ], "author": "Ernest Lotter ", "date": "Fri, 04 Oct 2024 14:22:03 +0200" }, { "cves": [], "log": [ "", " * New upstream release, LP: #2077473", " - Fix missing aux info from store on snap setup", "" ], "package": "snapd", "version": "2.65.3", "urgency": "medium", "distributions": "xenial", "launchpad_bugs_fixed": [ 2077473 ], "author": "Ernest Lotter ", "date": "Thu, 12 Sep 2024 09:40:17 +0200" } ], "notes": null }, { "name": "sosreport", "from_version": { "source_package_name": "sosreport", "source_package_version": "4.8.0-1", "version": "4.8.0-1" }, "to_version": { "source_package_name": "sosreport", "source_package_version": "4.8.0-1ubuntu0.1", "version": "4.8.0-1ubuntu0.1" }, "cves": [], "launchpad_bugs_fixed": [ 2085607 ], "changes": [ { "cves": [], "log": [ "", " * Resolve obfuscation issues (LP: #2085607)", " - d/p/0004-heat-Obfuscate-Add-auth_encryption_key-in-config.patch:", " The configuration option auth_encryption_key was not being", " obfuscated by default.", " - d/p/0005-placement-Obfuscate-passwords-that-have-been-missed.patch", " The NOVA_API_PASS and PLACEMENT_PASS were not being obfuscated", " in one of the config files.", " - d/p/0006-mysql-Add-obfuscation-for-password-in-conf-files.patch:", " The password field in one of the config files was not being obfuscated.", "" ], "package": "sosreport", "version": "4.8.0-1ubuntu0.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2085607 ], "author": "Arif Ali ", "date": "Thu, 24 Oct 2024 06:45:01 +0000" } ], "notes": null }, { "name": "ssh-import-id", "from_version": { "source_package_name": "ssh-import-id", "source_package_version": "5.11-0ubuntu2", "version": "5.11-0ubuntu2" }, "to_version": { "source_package_name": "ssh-import-id", "source_package_version": "5.11-0ubuntu2.24.10.1", "version": "5.11-0ubuntu2.24.10.1" }, "cves": [], "launchpad_bugs_fixed": [ 2085898 ], "changes": [ { "cves": [], "log": [ "", " * Ensure ssh-import-id (the binary package) depends on python3-launchpadlib.", " This fixes a crash where ssh-import-id would raise a ModuleNotFoundError", " exception if python3-launchpadlib is not installed. (LP: #2085898).", "" ], "package": "ssh-import-id", "version": "5.11-0ubuntu2.24.10.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2085898 ], "author": "Olivier Gayot ", "date": "Wed, 30 Oct 2024 10:19:01 +0100" } ], "notes": null }, { "name": "systemd", "from_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3", "version": "256.5-2ubuntu3" }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" } ], "notes": null }, { "name": "systemd-resolved", "from_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3", "version": "256.5-2ubuntu3" }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" } ], "notes": null }, { "name": "systemd-sysv", "from_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3", "version": "256.5-2ubuntu3" }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" } ], "notes": null }, { "name": "systemd-timesyncd", "from_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3", "version": "256.5-2ubuntu3" }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" } ], "notes": null }, { "name": "udev", "from_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3", "version": "256.5-2ubuntu3" }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" } ], "notes": null }, { "name": "udisks2", "from_version": { "source_package_name": "udisks2", "source_package_version": "2.10.1-9ubuntu2", "version": "2.10.1-9ubuntu2" }, "to_version": { "source_package_name": "udisks2", "source_package_version": "2.10.1-9ubuntu3", "version": "2.10.1-9ubuntu3" }, "cves": [], "launchpad_bugs_fixed": [ 2038761 ], "changes": [ { "cves": [], "log": [ "", " * d/p/nvme-disk-size.patch: Fix missing size for NVME disk (LP: #2038761).", "" ], "package": "udisks2", "version": "2.10.1-9ubuntu3", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2038761 ], "author": "Nathan Pratta Teodosio ", "date": "Mon, 18 Nov 2024 17:11:19 +0100" } ], "notes": null }, { "name": "vim", "from_version": { "source_package_name": "vim", "source_package_version": "2:9.1.0496-1ubuntu6", "version": "2:9.1.0496-1ubuntu6" }, "to_version": { "source_package_name": "vim", "source_package_version": "2:9.1.0496-1ubuntu6.2", "version": "2:9.1.0496-1ubuntu6.2" }, "cves": [ { "cve": "CVE-2024-47814", "url": "https://ubuntu.com/security/CVE-2024-47814", "cve_description": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "cve_priority": "low", "cve_public_date": "2024-10-07 22:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2084706 ], "changes": [ { "cves": [ { "cve": "CVE-2024-47814", "url": "https://ubuntu.com/security/CVE-2024-47814", "cve_description": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "cve_priority": "low", "cve_public_date": "2024-10-07 22:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Use after free when closing a buffer.", " - debian/patches/CVE-2024-47814.patch: Add buf_locked() in src/buffer.c.", " Abort autocommands editing a file when buf_locked() in src/ex_cmds.c.", " Add buf_locked() in src/proto/buffer.pro.", " - CVE-2024-47814", "" ], "package": "vim", "version": "2:9.1.0496-1ubuntu6.2", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Hlib Korzhynskyy ", "date": "Tue, 05 Nov 2024 17:19:25 -0330" }, { "cves": [], "log": [ "", " * Ensure Ubuntu codenames are current (LP: #2084706).", "" ], "package": "vim", "version": "2:9.1.0496-1ubuntu6.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084706 ], "author": "Simon Quigley ", "date": "Wed, 16 Oct 2024 12:32:24 -0500" } ], "notes": null }, { "name": "vim-common", "from_version": { "source_package_name": "vim", "source_package_version": "2:9.1.0496-1ubuntu6", "version": "2:9.1.0496-1ubuntu6" }, "to_version": { "source_package_name": "vim", "source_package_version": "2:9.1.0496-1ubuntu6.2", "version": "2:9.1.0496-1ubuntu6.2" }, "cves": [ { "cve": "CVE-2024-47814", "url": "https://ubuntu.com/security/CVE-2024-47814", "cve_description": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "cve_priority": "low", "cve_public_date": "2024-10-07 22:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2084706 ], "changes": [ { "cves": [ { "cve": "CVE-2024-47814", "url": "https://ubuntu.com/security/CVE-2024-47814", "cve_description": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "cve_priority": "low", "cve_public_date": "2024-10-07 22:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Use after free when closing a buffer.", " - debian/patches/CVE-2024-47814.patch: Add buf_locked() in src/buffer.c.", " Abort autocommands editing a file when buf_locked() in src/ex_cmds.c.", " Add buf_locked() in src/proto/buffer.pro.", " - CVE-2024-47814", "" ], "package": "vim", "version": "2:9.1.0496-1ubuntu6.2", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Hlib Korzhynskyy ", "date": "Tue, 05 Nov 2024 17:19:25 -0330" }, { "cves": [], "log": [ "", " * Ensure Ubuntu codenames are current (LP: #2084706).", "" ], "package": "vim", "version": "2:9.1.0496-1ubuntu6.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084706 ], "author": "Simon Quigley ", "date": "Wed, 16 Oct 2024 12:32:24 -0500" } ], "notes": null }, { "name": "vim-runtime", "from_version": { "source_package_name": "vim", "source_package_version": "2:9.1.0496-1ubuntu6", "version": "2:9.1.0496-1ubuntu6" }, "to_version": { "source_package_name": "vim", "source_package_version": "2:9.1.0496-1ubuntu6.2", "version": "2:9.1.0496-1ubuntu6.2" }, "cves": [ { "cve": "CVE-2024-47814", "url": "https://ubuntu.com/security/CVE-2024-47814", "cve_description": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "cve_priority": "low", "cve_public_date": "2024-10-07 22:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2084706 ], "changes": [ { "cves": [ { "cve": "CVE-2024-47814", "url": "https://ubuntu.com/security/CVE-2024-47814", "cve_description": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "cve_priority": "low", "cve_public_date": "2024-10-07 22:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Use after free when closing a buffer.", " - debian/patches/CVE-2024-47814.patch: Add buf_locked() in src/buffer.c.", " Abort autocommands editing a file when buf_locked() in src/ex_cmds.c.", " Add buf_locked() in src/proto/buffer.pro.", " - CVE-2024-47814", "" ], "package": "vim", "version": "2:9.1.0496-1ubuntu6.2", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Hlib Korzhynskyy ", "date": "Tue, 05 Nov 2024 17:19:25 -0330" }, { "cves": [], "log": [ "", " * Ensure Ubuntu codenames are current (LP: #2084706).", "" ], "package": "vim", "version": "2:9.1.0496-1ubuntu6.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084706 ], "author": "Simon Quigley ", "date": "Wed, 16 Oct 2024 12:32:24 -0500" } ], "notes": null }, { "name": "vim-tiny", "from_version": { "source_package_name": "vim", "source_package_version": "2:9.1.0496-1ubuntu6", "version": "2:9.1.0496-1ubuntu6" }, "to_version": { "source_package_name": "vim", "source_package_version": "2:9.1.0496-1ubuntu6.2", "version": "2:9.1.0496-1ubuntu6.2" }, "cves": [ { "cve": "CVE-2024-47814", "url": "https://ubuntu.com/security/CVE-2024-47814", "cve_description": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "cve_priority": "low", "cve_public_date": "2024-10-07 22:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2084706 ], "changes": [ { "cves": [ { "cve": "CVE-2024-47814", "url": "https://ubuntu.com/security/CVE-2024-47814", "cve_description": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "cve_priority": "low", "cve_public_date": "2024-10-07 22:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Use after free when closing a buffer.", " - debian/patches/CVE-2024-47814.patch: Add buf_locked() in src/buffer.c.", " Abort autocommands editing a file when buf_locked() in src/ex_cmds.c.", " Add buf_locked() in src/proto/buffer.pro.", " - CVE-2024-47814", "" ], "package": "vim", "version": "2:9.1.0496-1ubuntu6.2", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Hlib Korzhynskyy ", "date": "Tue, 05 Nov 2024 17:19:25 -0330" }, { "cves": [], "log": [ "", " * Ensure Ubuntu codenames are current (LP: #2084706).", "" ], "package": "vim", "version": "2:9.1.0496-1ubuntu6.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084706 ], "author": "Simon Quigley ", "date": "Wed, 16 Oct 2024 12:32:24 -0500" } ], "notes": null }, { "name": "xfsprogs", "from_version": { "source_package_name": "xfsprogs", "source_package_version": "6.8.0-2.2ubuntu1", "version": "6.8.0-2.2ubuntu1" }, "to_version": { "source_package_name": "xfsprogs", "source_package_version": "6.8.0-2.2ubuntu1.1", "version": "6.8.0-2.2ubuntu1.1" }, "cves": [], "launchpad_bugs_fixed": [ 2081163 ], "changes": [ { "cves": [], "log": [ "", " * Backport from upstream:", " - fix fsck.xfs run by different shells when fsck.mode=force is set", " (LP: #2081163).", "" ], "package": "xfsprogs", "version": "6.8.0-2.2ubuntu1.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2081163 ], "author": "Gerald Yang ", "date": "Thu, 17 Oct 2024 07:48:37 +0000" } ], "notes": null }, { "name": "xxd", "from_version": { "source_package_name": "vim", "source_package_version": "2:9.1.0496-1ubuntu6", "version": "2:9.1.0496-1ubuntu6" }, "to_version": { "source_package_name": "vim", "source_package_version": "2:9.1.0496-1ubuntu6.2", "version": "2:9.1.0496-1ubuntu6.2" }, "cves": [ { "cve": "CVE-2024-47814", "url": "https://ubuntu.com/security/CVE-2024-47814", "cve_description": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "cve_priority": "low", "cve_public_date": "2024-10-07 22:15:00 UTC" } ], "launchpad_bugs_fixed": [ 2084706 ], "changes": [ { "cves": [ { "cve": "CVE-2024-47814", "url": "https://ubuntu.com/security/CVE-2024-47814", "cve_description": "Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "cve_priority": "low", "cve_public_date": "2024-10-07 22:15:00 UTC" } ], "log": [ "", " * SECURITY UPDATE: Use after free when closing a buffer.", " - debian/patches/CVE-2024-47814.patch: Add buf_locked() in src/buffer.c.", " Abort autocommands editing a file when buf_locked() in src/ex_cmds.c.", " Add buf_locked() in src/proto/buffer.pro.", " - CVE-2024-47814", "" ], "package": "vim", "version": "2:9.1.0496-1ubuntu6.2", "urgency": "medium", "distributions": "oracular-security", "launchpad_bugs_fixed": [], "author": "Hlib Korzhynskyy ", "date": "Tue, 05 Nov 2024 17:19:25 -0330" }, { "cves": [], "log": [ "", " * Ensure Ubuntu codenames are current (LP: #2084706).", "" ], "package": "vim", "version": "2:9.1.0496-1ubuntu6.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084706 ], "author": "Simon Quigley ", "date": "Wed, 16 Oct 2024 12:32:24 -0500" } ], "notes": null } ], "snap": [] }, "added": { "deb": [ { "name": "linux-headers-6.11.0-12", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "changes": [ { "cves": [], "log": [ "", " * oracular/linux: 6.11.0-12.13 -proposed tracker (LP: #2089269)", "", " * LXD fan bridge causes blocked tasks (LP: #2064176)", " - SAUCE: fan: release rcu_read_lock on skb discard path", " - SAUCE: fan: fix racy device stat update", "", " * OVTI08F4:00: number of CSI2 data lanes 2 is not supported (LP: #2084059)", " - SAUCE: media: ipu-bridge: Add support for additional link frequencies", "", " * [Oracular] Allow overriding Rust tools (LP: #2084693)", " - [Packaging] Allow rust overrides", "", " * Intel(R) PRO/1000 I219 ethernet adapter [8086:550c] may block entrance of", " modern standby (LP: #2081130)", " - platform/x86: intel/pmc: Ignore all LTRs during suspend", " - e1000e: change I219 (19) devices to ADP", " - x86/apic: Always explicitly disarm TSC-deadline timer", "", " * Need driver support for Realtek RTL8126A rev.b 5Gbps ethernet [10ec:8126]", " (LP: #2079017)", " - r8169: add support for RTL8126A rev.b", " - r8169: add missing MODULE_FIRMWARE entry for RTL8126A rev.b", "", " * Missing device ID for amd_atl driver for AMD Strix platform (LP: #2083292)", " - SAUCE: x86/amd_nb: Add new PCI ID for AMD family 1Ah model 20h", "", " * Lack of UART boot output on rb3gen2 even with earlycon (LP: #2083559)", " - [Config] move qcom clk and serial options as builtin", "", " * r8169: transmit queue 0 timed out error when re-plugging the Ethernet cable", " (LP: #2084526)", " - r8169: disable ALDPS per default for RTL8125", "", " * Dell Alienware sysytem reports errors of dell_wmi_sysman and dell_smbios in", " demsg (LP: #2084808)", " - platform/x86: dell-sysman: add support for alienware products", "", " * Add Intel Arrow Lake-H LPSS PCI IDs (LP: #2083905)", " - mfd: intel-lpss: Add Intel Arrow Lake-H LPSS PCI IDs", "", " * rtw89: reset IDMEM mode to prevent download firmware failure (LP: #2077396)", " - wifi: rtw89: 885xb: reset IDMEM mode to prevent download firmware failure", "", " * Missing Bluetooth device IDs for new Mediatek MT7920/MT7925 (LP: #2078878)", " - SAUCE: Bluetooth: btusb: Add USB HW IDs for MT7920/MT7925", "", " * rtw89: Support hardware rfkill (LP: #2077384)", " - wifi: rtw89: add support for hardware rfkill", "", " * [SRU] uncore: Add ARL and LNL support on 6.11 (LP: #2081810)", " - perf/x86/intel/uncore: Add Arrow Lake support", " - perf/x86/intel/uncore: Factor out common MMIO init and ops functions", " - perf/x86/intel/uncore: Add Lunar Lake support", " - perf/x86/intel/uncore: Add LNL uncore iMC freerunning support", " - perf/x86/intel/uncore: Use D0:F0 as a default device", "", " * Support Qualcomm WCN7851 Dual Bluetooth Adapter 0489:E0F3 (LP: #2081796)", " - SAUCE: Bluetooth: btusb: Add one more ID 0x0489:0xe0f3 for Qualcomm WCN785x", "", " * The system hangs after resume with thunderbolt monitor(AMD GPU [1002:1900])", " (LP: #2083182)", " - SAUCE: drm/amd/display: Fix system hang while resume with TBT monitor", "", " * UBSAN: array-index-out-of-bounds in module mt76 (LP: #2081785)", " - wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc", "", " * Missing devices nodes for AMD Instinct MI300 card when installed along with", " integrated display (LP: #2078773)", " - drm: Use XArray instead of IDR for minors", " - accel: Use XArray instead of IDR for minors", " - drm: Expand max DRM device number to full MINORBITS", "" ], "package": "linux", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:01:08 +0300" } ], "notes": "linux-headers-6.11.0-12 version '6.11.0-12.13' (source package linux version '6.11.0-12.13') was added. linux-headers-6.11.0-12 version '6.11.0-12.13' has the same source package name, linux, as removed package linux-headers-6.11.0-9. As such we can use the source package version of the removed package, '6.11.0-9.9', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-headers-6.11.0-12-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "changes": [ { "cves": [], "log": [ "", " * oracular/linux: 6.11.0-12.13 -proposed tracker (LP: #2089269)", "", " * LXD fan bridge causes blocked tasks (LP: #2064176)", " - SAUCE: fan: release rcu_read_lock on skb discard path", " - SAUCE: fan: fix racy device stat update", "", " * OVTI08F4:00: number of CSI2 data lanes 2 is not supported (LP: #2084059)", " - SAUCE: media: ipu-bridge: Add support for additional link frequencies", "", " * [Oracular] Allow overriding Rust tools (LP: #2084693)", " - [Packaging] Allow rust overrides", "", " * Intel(R) PRO/1000 I219 ethernet adapter [8086:550c] may block entrance of", " modern standby (LP: #2081130)", " - platform/x86: intel/pmc: Ignore all LTRs during suspend", " - e1000e: change I219 (19) devices to ADP", " - x86/apic: Always explicitly disarm TSC-deadline timer", "", " * Need driver support for Realtek RTL8126A rev.b 5Gbps ethernet [10ec:8126]", " (LP: #2079017)", " - r8169: add support for RTL8126A rev.b", " - r8169: add missing MODULE_FIRMWARE entry for RTL8126A rev.b", "", " * Missing device ID for amd_atl driver for AMD Strix platform (LP: #2083292)", " - SAUCE: x86/amd_nb: Add new PCI ID for AMD family 1Ah model 20h", "", " * Lack of UART boot output on rb3gen2 even with earlycon (LP: #2083559)", " - [Config] move qcom clk and serial options as builtin", "", " * r8169: transmit queue 0 timed out error when re-plugging the Ethernet cable", " (LP: #2084526)", " - r8169: disable ALDPS per default for RTL8125", "", " * Dell Alienware sysytem reports errors of dell_wmi_sysman and dell_smbios in", " demsg (LP: #2084808)", " - platform/x86: dell-sysman: add support for alienware products", "", " * Add Intel Arrow Lake-H LPSS PCI IDs (LP: #2083905)", " - mfd: intel-lpss: Add Intel Arrow Lake-H LPSS PCI IDs", "", " * rtw89: reset IDMEM mode to prevent download firmware failure (LP: #2077396)", " - wifi: rtw89: 885xb: reset IDMEM mode to prevent download firmware failure", "", " * Missing Bluetooth device IDs for new Mediatek MT7920/MT7925 (LP: #2078878)", " - SAUCE: Bluetooth: btusb: Add USB HW IDs for MT7920/MT7925", "", " * rtw89: Support hardware rfkill (LP: #2077384)", " - wifi: rtw89: add support for hardware rfkill", "", " * [SRU] uncore: Add ARL and LNL support on 6.11 (LP: #2081810)", " - perf/x86/intel/uncore: Add Arrow Lake support", " - perf/x86/intel/uncore: Factor out common MMIO init and ops functions", " - perf/x86/intel/uncore: Add Lunar Lake support", " - perf/x86/intel/uncore: Add LNL uncore iMC freerunning support", " - perf/x86/intel/uncore: Use D0:F0 as a default device", "", " * Support Qualcomm WCN7851 Dual Bluetooth Adapter 0489:E0F3 (LP: #2081796)", " - SAUCE: Bluetooth: btusb: Add one more ID 0x0489:0xe0f3 for Qualcomm WCN785x", "", " * The system hangs after resume with thunderbolt monitor(AMD GPU [1002:1900])", " (LP: #2083182)", " - SAUCE: drm/amd/display: Fix system hang while resume with TBT monitor", "", " * UBSAN: array-index-out-of-bounds in module mt76 (LP: #2081785)", " - wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc", "", " * Missing devices nodes for AMD Instinct MI300 card when installed along with", " integrated display (LP: #2078773)", " - drm: Use XArray instead of IDR for minors", " - accel: Use XArray instead of IDR for minors", " - drm: Expand max DRM device number to full MINORBITS", "" ], "package": "linux", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:01:08 +0300" } ], "notes": "linux-headers-6.11.0-12-generic version '6.11.0-12.13' (source package linux version '6.11.0-12.13') was added. linux-headers-6.11.0-12-generic version '6.11.0-12.13' has the same source package name, linux, as removed package linux-headers-6.11.0-9. As such we can use the source package version of the removed package, '6.11.0-9.9', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-image-6.11.0-12-generic", "from_version": { "source_package_name": "linux-signed", "source_package_version": "6.11.0-9.9", "version": null }, "to_version": { "source_package_name": "linux-signed", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [ 1786013, 1786013 ], "changes": [ { "cves": [], "log": [ "", " * Main version: 6.11.0-12.13", "", " * Packaging resync (LP: #1786013)", " - [Packaging] debian/tracking-bug -- resync from main package", "" ], "package": "linux-signed", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 1786013 ], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:04:19 +0300" }, { "cves": [], "log": [ "", " * Main version: 6.11.0-11.12", "" ], "package": "linux-signed", "version": "6.11.0-11.12", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 15:58:53 +0300" }, { "cves": [], "log": [ "", " * Main version: 6.11.0-11.11", "", " * Packaging resync (LP: #1786013)", " - [Packaging] debian/tracking-bug -- resync from main package", "" ], "package": "linux-signed", "version": "6.11.0-11.11", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 1786013 ], "author": "Mehmet Basaran ", "date": "Fri, 08 Nov 2024 21:05:58 +0300" } ], "notes": "linux-image-6.11.0-12-generic version '6.11.0-12.13' (source package linux-signed version '6.11.0-12.13') was added. linux-image-6.11.0-12-generic version '6.11.0-12.13' has the same source package name, linux-signed, as removed package linux-image-6.11.0-9-generic. As such we can use the source package version of the removed package, '6.11.0-9.9', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-modules-6.11.0-12-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "changes": [ { "cves": [], "log": [ "", " * oracular/linux: 6.11.0-12.13 -proposed tracker (LP: #2089269)", "", " * LXD fan bridge causes blocked tasks (LP: #2064176)", " - SAUCE: fan: release rcu_read_lock on skb discard path", " - SAUCE: fan: fix racy device stat update", "", " * OVTI08F4:00: number of CSI2 data lanes 2 is not supported (LP: #2084059)", " - SAUCE: media: ipu-bridge: Add support for additional link frequencies", "", " * [Oracular] Allow overriding Rust tools (LP: #2084693)", " - [Packaging] Allow rust overrides", "", " * Intel(R) PRO/1000 I219 ethernet adapter [8086:550c] may block entrance of", " modern standby (LP: #2081130)", " - platform/x86: intel/pmc: Ignore all LTRs during suspend", " - e1000e: change I219 (19) devices to ADP", " - x86/apic: Always explicitly disarm TSC-deadline timer", "", " * Need driver support for Realtek RTL8126A rev.b 5Gbps ethernet [10ec:8126]", " (LP: #2079017)", " - r8169: add support for RTL8126A rev.b", " - r8169: add missing MODULE_FIRMWARE entry for RTL8126A rev.b", "", " * Missing device ID for amd_atl driver for AMD Strix platform (LP: #2083292)", " - SAUCE: x86/amd_nb: Add new PCI ID for AMD family 1Ah model 20h", "", " * Lack of UART boot output on rb3gen2 even with earlycon (LP: #2083559)", " - [Config] move qcom clk and serial options as builtin", "", " * r8169: transmit queue 0 timed out error when re-plugging the Ethernet cable", " (LP: #2084526)", " - r8169: disable ALDPS per default for RTL8125", "", " * Dell Alienware sysytem reports errors of dell_wmi_sysman and dell_smbios in", " demsg (LP: #2084808)", " - platform/x86: dell-sysman: add support for alienware products", "", " * Add Intel Arrow Lake-H LPSS PCI IDs (LP: #2083905)", " - mfd: intel-lpss: Add Intel Arrow Lake-H LPSS PCI IDs", "", " * rtw89: reset IDMEM mode to prevent download firmware failure (LP: #2077396)", " - wifi: rtw89: 885xb: reset IDMEM mode to prevent download firmware failure", "", " * Missing Bluetooth device IDs for new Mediatek MT7920/MT7925 (LP: #2078878)", " - SAUCE: Bluetooth: btusb: Add USB HW IDs for MT7920/MT7925", "", " * rtw89: Support hardware rfkill (LP: #2077384)", " - wifi: rtw89: add support for hardware rfkill", "", " * [SRU] uncore: Add ARL and LNL support on 6.11 (LP: #2081810)", " - perf/x86/intel/uncore: Add Arrow Lake support", " - perf/x86/intel/uncore: Factor out common MMIO init and ops functions", " - perf/x86/intel/uncore: Add Lunar Lake support", " - perf/x86/intel/uncore: Add LNL uncore iMC freerunning support", " - perf/x86/intel/uncore: Use D0:F0 as a default device", "", " * Support Qualcomm WCN7851 Dual Bluetooth Adapter 0489:E0F3 (LP: #2081796)", " - SAUCE: Bluetooth: btusb: Add one more ID 0x0489:0xe0f3 for Qualcomm WCN785x", "", " * The system hangs after resume with thunderbolt monitor(AMD GPU [1002:1900])", " (LP: #2083182)", " - SAUCE: drm/amd/display: Fix system hang while resume with TBT monitor", "", " * UBSAN: array-index-out-of-bounds in module mt76 (LP: #2081785)", " - wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc", "", " * Missing devices nodes for AMD Instinct MI300 card when installed along with", " integrated display (LP: #2078773)", " - drm: Use XArray instead of IDR for minors", " - accel: Use XArray instead of IDR for minors", " - drm: Expand max DRM device number to full MINORBITS", "" ], "package": "linux", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:01:08 +0300" } ], "notes": "linux-modules-6.11.0-12-generic version '6.11.0-12.13' (source package linux version '6.11.0-12.13') was added. linux-modules-6.11.0-12-generic version '6.11.0-12.13' has the same source package name, linux, as removed package linux-headers-6.11.0-9. As such we can use the source package version of the removed package, '6.11.0-9.9', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-tools-6.11.0-12", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "changes": [ { "cves": [], "log": [ "", " * oracular/linux: 6.11.0-12.13 -proposed tracker (LP: #2089269)", "", " * LXD fan bridge causes blocked tasks (LP: #2064176)", " - SAUCE: fan: release rcu_read_lock on skb discard path", " - SAUCE: fan: fix racy device stat update", "", " * OVTI08F4:00: number of CSI2 data lanes 2 is not supported (LP: #2084059)", " - SAUCE: media: ipu-bridge: Add support for additional link frequencies", "", " * [Oracular] Allow overriding Rust tools (LP: #2084693)", " - [Packaging] Allow rust overrides", "", " * Intel(R) PRO/1000 I219 ethernet adapter [8086:550c] may block entrance of", " modern standby (LP: #2081130)", " - platform/x86: intel/pmc: Ignore all LTRs during suspend", " - e1000e: change I219 (19) devices to ADP", " - x86/apic: Always explicitly disarm TSC-deadline timer", "", " * Need driver support for Realtek RTL8126A rev.b 5Gbps ethernet [10ec:8126]", " (LP: #2079017)", " - r8169: add support for RTL8126A rev.b", " - r8169: add missing MODULE_FIRMWARE entry for RTL8126A rev.b", "", " * Missing device ID for amd_atl driver for AMD Strix platform (LP: #2083292)", " - SAUCE: x86/amd_nb: Add new PCI ID for AMD family 1Ah model 20h", "", " * Lack of UART boot output on rb3gen2 even with earlycon (LP: #2083559)", " - [Config] move qcom clk and serial options as builtin", "", " * r8169: transmit queue 0 timed out error when re-plugging the Ethernet cable", " (LP: #2084526)", " - r8169: disable ALDPS per default for RTL8125", "", " * Dell Alienware sysytem reports errors of dell_wmi_sysman and dell_smbios in", " demsg (LP: #2084808)", " - platform/x86: dell-sysman: add support for alienware products", "", " * Add Intel Arrow Lake-H LPSS PCI IDs (LP: #2083905)", " - mfd: intel-lpss: Add Intel Arrow Lake-H LPSS PCI IDs", "", " * rtw89: reset IDMEM mode to prevent download firmware failure (LP: #2077396)", " - wifi: rtw89: 885xb: reset IDMEM mode to prevent download firmware failure", "", " * Missing Bluetooth device IDs for new Mediatek MT7920/MT7925 (LP: #2078878)", " - SAUCE: Bluetooth: btusb: Add USB HW IDs for MT7920/MT7925", "", " * rtw89: Support hardware rfkill (LP: #2077384)", " - wifi: rtw89: add support for hardware rfkill", "", " * [SRU] uncore: Add ARL and LNL support on 6.11 (LP: #2081810)", " - perf/x86/intel/uncore: Add Arrow Lake support", " - perf/x86/intel/uncore: Factor out common MMIO init and ops functions", " - perf/x86/intel/uncore: Add Lunar Lake support", " - perf/x86/intel/uncore: Add LNL uncore iMC freerunning support", " - perf/x86/intel/uncore: Use D0:F0 as a default device", "", " * Support Qualcomm WCN7851 Dual Bluetooth Adapter 0489:E0F3 (LP: #2081796)", " - SAUCE: Bluetooth: btusb: Add one more ID 0x0489:0xe0f3 for Qualcomm WCN785x", "", " * The system hangs after resume with thunderbolt monitor(AMD GPU [1002:1900])", " (LP: #2083182)", " - SAUCE: drm/amd/display: Fix system hang while resume with TBT monitor", "", " * UBSAN: array-index-out-of-bounds in module mt76 (LP: #2081785)", " - wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc", "", " * Missing devices nodes for AMD Instinct MI300 card when installed along with", " integrated display (LP: #2078773)", " - drm: Use XArray instead of IDR for minors", " - accel: Use XArray instead of IDR for minors", " - drm: Expand max DRM device number to full MINORBITS", "" ], "package": "linux", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:01:08 +0300" } ], "notes": "linux-tools-6.11.0-12 version '6.11.0-12.13' (source package linux version '6.11.0-12.13') was added. linux-tools-6.11.0-12 version '6.11.0-12.13' has the same source package name, linux, as removed package linux-headers-6.11.0-9. As such we can use the source package version of the removed package, '6.11.0-9.9', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "linux-tools-6.11.0-12-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": null }, "to_version": { "source_package_name": "linux", "source_package_version": "6.11.0-12.13", "version": "6.11.0-12.13" }, "cves": [], "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "changes": [ { "cves": [], "log": [ "", " * oracular/linux: 6.11.0-12.13 -proposed tracker (LP: #2089269)", "", " * LXD fan bridge causes blocked tasks (LP: #2064176)", " - SAUCE: fan: release rcu_read_lock on skb discard path", " - SAUCE: fan: fix racy device stat update", "", " * OVTI08F4:00: number of CSI2 data lanes 2 is not supported (LP: #2084059)", " - SAUCE: media: ipu-bridge: Add support for additional link frequencies", "", " * [Oracular] Allow overriding Rust tools (LP: #2084693)", " - [Packaging] Allow rust overrides", "", " * Intel(R) PRO/1000 I219 ethernet adapter [8086:550c] may block entrance of", " modern standby (LP: #2081130)", " - platform/x86: intel/pmc: Ignore all LTRs during suspend", " - e1000e: change I219 (19) devices to ADP", " - x86/apic: Always explicitly disarm TSC-deadline timer", "", " * Need driver support for Realtek RTL8126A rev.b 5Gbps ethernet [10ec:8126]", " (LP: #2079017)", " - r8169: add support for RTL8126A rev.b", " - r8169: add missing MODULE_FIRMWARE entry for RTL8126A rev.b", "", " * Missing device ID for amd_atl driver for AMD Strix platform (LP: #2083292)", " - SAUCE: x86/amd_nb: Add new PCI ID for AMD family 1Ah model 20h", "", " * Lack of UART boot output on rb3gen2 even with earlycon (LP: #2083559)", " - [Config] move qcom clk and serial options as builtin", "", " * r8169: transmit queue 0 timed out error when re-plugging the Ethernet cable", " (LP: #2084526)", " - r8169: disable ALDPS per default for RTL8125", "", " * Dell Alienware sysytem reports errors of dell_wmi_sysman and dell_smbios in", " demsg (LP: #2084808)", " - platform/x86: dell-sysman: add support for alienware products", "", " * Add Intel Arrow Lake-H LPSS PCI IDs (LP: #2083905)", " - mfd: intel-lpss: Add Intel Arrow Lake-H LPSS PCI IDs", "", " * rtw89: reset IDMEM mode to prevent download firmware failure (LP: #2077396)", " - wifi: rtw89: 885xb: reset IDMEM mode to prevent download firmware failure", "", " * Missing Bluetooth device IDs for new Mediatek MT7920/MT7925 (LP: #2078878)", " - SAUCE: Bluetooth: btusb: Add USB HW IDs for MT7920/MT7925", "", " * rtw89: Support hardware rfkill (LP: #2077384)", " - wifi: rtw89: add support for hardware rfkill", "", " * [SRU] uncore: Add ARL and LNL support on 6.11 (LP: #2081810)", " - perf/x86/intel/uncore: Add Arrow Lake support", " - perf/x86/intel/uncore: Factor out common MMIO init and ops functions", " - perf/x86/intel/uncore: Add Lunar Lake support", " - perf/x86/intel/uncore: Add LNL uncore iMC freerunning support", " - perf/x86/intel/uncore: Use D0:F0 as a default device", "", " * Support Qualcomm WCN7851 Dual Bluetooth Adapter 0489:E0F3 (LP: #2081796)", " - SAUCE: Bluetooth: btusb: Add one more ID 0x0489:0xe0f3 for Qualcomm WCN785x", "", " * The system hangs after resume with thunderbolt monitor(AMD GPU [1002:1900])", " (LP: #2083182)", " - SAUCE: drm/amd/display: Fix system hang while resume with TBT monitor", "", " * UBSAN: array-index-out-of-bounds in module mt76 (LP: #2081785)", " - wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc", "", " * Missing devices nodes for AMD Instinct MI300 card when installed along with", " integrated display (LP: #2078773)", " - drm: Use XArray instead of IDR for minors", " - accel: Use XArray instead of IDR for minors", " - drm: Expand max DRM device number to full MINORBITS", "" ], "package": "linux", "version": "6.11.0-12.13", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2089269, 2064176, 2084059, 2084693, 2081130, 2079017, 2083292, 2083559, 2084526, 2084808, 2083905, 2077396, 2078878, 2077384, 2081810, 2081796, 2083182, 2081785, 2078773 ], "author": "Mehmet Basaran ", "date": "Thu, 21 Nov 2024 21:01:08 +0300" } ], "notes": "linux-tools-6.11.0-12-generic version '6.11.0-12.13' (source package linux version '6.11.0-12.13') was added. linux-tools-6.11.0-12-generic version '6.11.0-12.13' has the same source package name, linux, as removed package linux-headers-6.11.0-9. As such we can use the source package version of the removed package, '6.11.0-9.9', as the starting point in our changelog diff. Kernel packages are an example of where the binary package name changes for the same source package. Using the removed package source package version as our starting point means we can still get meaningful changelog diffs even for what appears to be a new package." }, { "name": "systemd-cryptsetup", "from_version": { "source_package_name": null, "source_package_version": null, "version": null }, "to_version": { "source_package_name": "systemd", "source_package_version": "256.5-2ubuntu3.1", "version": "256.5-2ubuntu3.1" }, "cves": [], "launchpad_bugs_fixed": [ 2084251, 2083704, 2079993 ], "changes": [ { "cves": [], "log": [ "", " * Make sure systemd-cryptsetup is pulled in by systemd on install/upgrade", " (LP: #2084251)", " - d/control: make systemd-cryptsetup Priority: important", " - d/control: make systemd Recommends: systemd-cryptsetup again", "" ], "package": "systemd", "version": "256.5-2ubuntu3.1", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2084251 ], "author": "Nick Rosbrook ", "date": "Wed, 16 Oct 2024 13:01:05 -0400" }, { "cves": [], "log": [ "", " * d/control: demote systemd-cryptsetup from Recommends: to Suggests: of systemd", " * test: skip TEST-69-SHUTDOWN on ubuntu too (LP: #2083704)", "" ], "package": "systemd", "version": "256.5-2ubuntu3", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2083704 ], "author": "Nick Rosbrook ", "date": "Fri, 04 Oct 2024 11:37:37 -0400" }, { "cves": [], "log": [ "", " * initramfs-tools: ensure rules file exists before invoking chzdev (LP: #2079993)", "" ], "package": "systemd", "version": "256.5-2ubuntu2", "urgency": "medium", "distributions": "oracular", "launchpad_bugs_fixed": [ 2079993 ], "author": "Nick Rosbrook ", "date": "Mon, 09 Sep 2024 09:42:11 -0400" } ], "notes": "For a newly added package only the three most recent changelog entries are shown." } ], "snap": [] }, "removed": { "deb": [ { "name": "linux-headers-6.11.0-9", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-headers-6.11.0-9-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-image-6.11.0-9-generic", "from_version": { "source_package_name": "linux-signed", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-modules-6.11.0-9-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-tools-6.11.0-9", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null }, { "name": "linux-tools-6.11.0-9-generic", "from_version": { "source_package_name": "linux", "source_package_version": "6.11.0-9.9", "version": "6.11.0-9.9" }, "to_version": { "source_package_name": null, "source_package_version": null, "version": null }, "cves": [], "launchpad_bugs_fixed": [], "changes": [], "notes": null } ], "snap": [] }, "notes": "Changelog diff for Ubuntu 24.10 oracular image from release image serial 20241109 to 20241212", "from_series": "oracular", "to_series": "oracular", "from_serial": "20241109", "to_serial": "20241212", "from_manifest_filename": "release_manifest.previous", "to_manifest_filename": "manifest.current" }