D7net
Home
Console
Upload
information
Create File
Create Folder
About
Tools
:
/
snap
/
core20
/
2582
/
usr
/
share
/
doc
/
Filename :
ChangeLog
back
Copy
29/04/2025, commit https://git.launchpad.net/snap-core20/tree/92f33cf5c91cc93d7888f389647936aa39a31752 [ Changes in the core20 snap ] No detected changes for the core20 snap [ Changes in primed packages ] cryptsetup, cryptsetup-bin, libcryptsetup12:amd64 (built from cryptsetup) updated from 2:2.2.2-3ubuntu2.4 to 2:2.2.2-3ubuntu2.5: cryptsetup (2:2.2.2-3ubuntu2.5) focal; urgency=medium [ Chengen Du ] * Refine proc mounts entries traversal (LP: #2054390) - d/i/h/cryptroot: Backport upstream commit 95fd4be9b4c6: d/functions: get_mnt_devno(): Speed up execution time on large /proc/mounts. [ Heitor Alves de Siqueira ] * Ignore ZFS entries that don't have major/minor (LP: #1830110): - d/i/h/cryptroot: add $fstype check for zfs in get_mnt_devno(), add checks for $devnos in generate_initrd_crypttab() -- Heitor Alves de Siqueira <halves@canonical.com> Wed, 29 Jan 2025 18:37:57 +0000 distro-info-data (built from distro-info-data) updated from 0.43ubuntu1.17 to 0.43ubuntu1.18: distro-info-data (0.43ubuntu1.18) focal; urgency=medium * Add Ubuntu 25.10 "Questing Quokka" (LP: #2107391) * Add Debian 15 "Duke" -- Benjamin Drung <bdrung@ubuntu.com> Wed, 23 Apr 2025 12:03:33 +0200 opensc, opensc-pkcs11:amd64 (built from opensc) updated from 0.20.0-3ubuntu0.1~esm3 to 0.20.0-3ubuntu0.1~esm4: opensc (0.20.0-3ubuntu0.1~esm4) focal-security; urgency=medium * SECURITY REGRESSION: Stack buffer overflow (LP: #2104948) - debian/patches/CVE-2021-42782-pre1.patch: simplify PIV I/O - debian/patches/CVE-2021-42782-pre2.patch: Replace internal implementation of put_tag with asn1 - debian/patches/CVE-2021-42782-1.patch: cardos: Correctly calculate the left bytes to avoid buffer overrun - debian/patches/CVE-2021-42782-2.patch: PIV Improved parsing of data from the card - debian/patches/CVE-2021-42782-3.patch: coolkey: Initialize potentially uninitialized memory - debian/patches/CVE-2021-42782-4.patch: tcos: prevent out of bounds read - debian/patches/CVE-2021-42782-5.patch: iasecc: Prevent stack buffer overflow when empty ACL is returned - CVE-2021-42782 * SECURITY UPDATE: Use after return - debian/patches/CVE-2021-42780.patch: tcos: Check bounds in insert_pin() - CVE-2021-42780 * SECURITY UPDATE: PIN Bypass - debian/patches/CVE-2023-40660-1.patch: Fixed PIN authentication bypass - debian/patches/CVE-2023-40660-2.patch: pkcs15init: Check login status before asking for a pin overflow during keygen - CVE-2023-40660 * SECURITY UPDATE: Compromised card operations - debian/patches/CVE-2023-40661-1.patch: pkcs15: Avoid buffer overflow when getting last update - debian/patches/CVE-2023-40661-2.patch: setcos: Avoid buffer underflow - debian/patches/CVE-2023-40661-3.patch: setcos: Avoid writing behind the path buffer end - debian/patches/CVE-2023-40661-4.patch: oberthur: Avoid buffer overflow - debian/patches/CVE-2023-40661-5-pre1.patch: pkcs15-pubkey: free DER value when parsing public key fails - debian/patches/CVE-2023-40661-5.patch: pkcs15-pubkey.c: Avoid double-free - debian/patches/CVE-2023-40661-6.patch: pkcs15-cflex: check path length to prevent underflow - debian/patches/CVE-2023-40661-7.patch: Check length of string before making copy - debian/patches/CVE-2023-40661-8.patch: Check array bounds - debian/patches/CVE-2023-40661-9.patch: sc_pkcs15init_rmdir: prevent out of bounds write - debian/patches/CVE-2023-40661-10.patch: iasecc: Avoid another buffer overflow - debian/patches/CVE-2023-40661-11-pre1.patch: iassecc: Verify buffer lengths before use - debian/patches/CVE-2023-40661-11.patch: iasecc: Avoid buffer overflow with invalid data - debian/patches/CVE-2023-40661-12.patch: iasecc: Check length of data when parsing crt - debian/patches/CVE-2023-40661-13-pre1.patch: card-entersafe.c: Free modulus buffer in case of error - debian/patches/CVE-2023-40661-13.patch: entersafe: Avoid buffer overflow during keygen - CVE-2023-40661 * SECURITY UPDATE: Missing variable initialization - debian/patches/CVE-2024-45615-1.patch: Fix uninitialized values - debian/patches/CVE-2024-45615-2.patch: Initialize variables for tag and CLA - debian/patches/CVE-2024-45615-3.patch: Initialize OID length - debian/patches/CVE-2024-45615-4.patch: Initialize variables for tag and CLA - debian/patches/CVE-2024-45615-5.patch: Avoid using uninitialized memory - debian/patches/CVE-2024-45617-1.patch: Check return value when selecting AID - debian/patches/CVE-2024-45617-2.patch: Return error when response length is 0 - debian/patches/CVE-2024-45617-3.patch: Check number of read bytes - debian/patches/CVE-2024-45618-1.patch: Check return value of serial num conversion - debian/patches/CVE-2024-45618-2.patch: Report transport key error - CVE-2024-45615 - CVE-2024-45617 - CVE-2024-45618 * SECURITY UPDATE: Buffer overflow - debian/patches/CVE-2023-2977.patch: pkcs15init: correct left length calculation to fix buffer overrun bug - debian/patches/CVE-2024-45616-1.patch: Fix uninitialized values - debian/patches/CVE-2024-45616-2.patch: Check length of APDU response - debian/patches/CVE-2024-45616-3.patch: Correctly calculate certificate length based on the resplen - debian/patches/CVE-2024-45616-4.patch: Check length of serial number - debian/patches/CVE-2024-45616-5.patch: Use actual length of reponse buffer - debian/patches/CVE-2024-45616-6.patch: Check length of response buffer in select - debian/patches/CVE-2024-45616-7.patch: Check APDU response length and ASN1 lengths - debian/patches/CVE-2024-45616-8.patch: Report invalid SW when reading object - debian/patches/CVE-2024-45616-9.patch: Avoid using uninitialized memory - debian/patches/CVE-2024-45616-10.patch: Check length of serial number - debian/patches/CVE-2024-45620-1.patch: Check length of file to be non-zero - debian/patches/CVE-2024-45620-2.patch: Check length of data before dereferencing - debian/patches/CVE-2024-45620-3.patch: Check length of data when parsing - debian/patches/CVE-2024-8443-1.patch: Avoid buffer overflow when writing fingerprint - debian/patches/CVE-2024-8443-2.patch: Do not accept non-matching key responses - CVE-2023-2977 - CVE-2024-45616 - CVE-2024-45620 - CVE-2024-8443 -- Bruce Cable <bruce.cable@canonical.com> Wed, 09 Apr 2025 13:19:18 +1000 openssh-client, openssh-server, openssh-sftp-server (built from openssh) updated from 1:8.2p1-4ubuntu0.12 to 1:8.2p1-4ubuntu0.13: openssh (1:8.2p1-4ubuntu0.13) focal-security; urgency=medium * SECURITY UPDATE: incorrect DisableForwarding directive behaviour - debian/patches/CVE-2025-32728.patch: fix logic error in session.c. - CVE-2025-32728 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Fri, 11 Apr 2025 08:16:08 -0400