[ubuntu/xenial-security] apparmor 2.10.95-0ubuntu2.12 (Accepted)
apparmor (2.10.95-0ubuntu2.12) xenial-security; urgency=medium * debian/lib/apparmor/functions: remove support for loading snapd generated profiles in /var/lib/snapd/apparmor/profiles as these are handled by snapd.apparmor.service (LP: #2024637) Date: 2023-06-29 11:24:15.463611+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/apparmor/2.10.95-0ubuntu2.12 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] intel-microcode 3.20210216.0ubuntu0.16.04.1 (Accepted)
intel-microcode (3.20210216.0ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 2021-02-16 (LP: #1927911) + Updated Microcodes: sig 0x00050654, pf_mask 0xb7, 2020-12-31, rev 0x2006a0a, size 36864 sig 0x00050656, pf_mask 0xbf, 2020-12-31, rev 0x4003006, size 53248 sig 0x00050657, pf_mask 0xbf, 2020-12-31, rev 0x5003006, size 53248 sig 0x000706a1, pf_mask 0x01, 2020-06-09, rev 0x0034, size 74752 - CVE-2020-8695 RAPL, INTEL-TA-00389 - CVE-2020-8696 Vector Register Leakage-Active, INTEL-TA-00381 - CVE-2020-8698 Fast forward store predictor, INTEL-TA-00381 Date: 2021-05-14 08:13:19.180896+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/intel-microcode/3.20210216.0ubuntu0.16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] libseccomp 2.5.1-1ubuntu1~16.04.1 (Accepted)
libseccomp (2.5.1-1ubuntu1~16.04.1) xenial; urgency=medium * Updated to new upstream 2.5.1 version for updated syscalls support (LP: #1891810) - Removed the following patches that are now included in the new version: + d/p/fix-aarch64-syscalls.patch + d/p/db-consolidate-some-of-the-code-which-adds-rules.patch + d/p/db-add-shadow-transactions.patch - Deleted the patch to add a local copy of architecture specific header files from linux-libc-dev/focal as this is not needed anymore + d/p/add-5.4-local-syscall-headers.patch - debian/control: Added gperf to Build-Depends as this is now required by upstream - debian/libseccomp2.symbols: Added new symbols * Add system call headers for powerpc required for backport to xenial - d/p/add-5.8-powerpc-syscall-headers.patch Date: Mon, 01 Mar 2021 13:50:00 +1030 Changed-By: Alex Murray Maintainer: Ubuntu Developers Signed-By: Timo Aaltonen https://launchpad.net/ubuntu/+source/libseccomp/2.5.1-1ubuntu1~16.04.1 Format: 1.8 Date: Mon, 01 Mar 2021 13:50:00 +1030 Source: libseccomp Built-For-Profiles: noudeb Architecture: source Version: 2.5.1-1ubuntu1~16.04.1 Distribution: xenial Urgency: medium Maintainer: Ubuntu Developers Changed-By: Alex Murray Launchpad-Bugs-Fixed: 1891810 Changes: libseccomp (2.5.1-1ubuntu1~16.04.1) xenial; urgency=medium . * Updated to new upstream 2.5.1 version for updated syscalls support (LP: #1891810) - Removed the following patches that are now included in the new version: + d/p/fix-aarch64-syscalls.patch + d/p/db-consolidate-some-of-the-code-which-adds-rules.patch + d/p/db-add-shadow-transactions.patch - Deleted the patch to add a local copy of architecture specific header files from linux-libc-dev/focal as this is not needed anymore + d/p/add-5.4-local-syscall-headers.patch - debian/control: Added gperf to Build-Depends as this is now required by upstream - debian/libseccomp2.symbols: Added new symbols * Add system call headers for powerpc required for backport to xenial - d/p/add-5.8-powerpc-syscall-headers.patch Checksums-Sha1: ca109198be2bc7abed4ec9cac40f6fdb73f6613c 2303 libseccomp_2.5.1-1ubuntu1~16.04.1.dsc 6069b720219400d8369f567af30cd2ad06ad938e 638811 libseccomp_2.5.1.orig.tar.gz f6d1c3057559e655b78cbe55fe7821af7e73071e 18572 libseccomp_2.5.1-1ubuntu1~16.04.1.debian.tar.xz 29e36920d3cc39e33c879809b05b5419148acf26 7273 libseccomp_2.5.1-1ubuntu1~16.04.1_source.buildinfo Checksums-Sha256: 09075989ee67567d281080cc458facd496ac693a2a5bd3ee899887aa0c0a97bd 2303 libseccomp_2.5.1-1ubuntu1~16.04.1.dsc ee307e383c77aa7995abc5ada544d51c9723ae399768a97667d4cdb3c3a30d55 638811 libseccomp_2.5.1.orig.tar.gz a36e4dc10c1ef55e59559638d04fafe504d73f2bc85d76c85446550157cd5e7b 18572 libseccomp_2.5.1-1ubuntu1~16.04.1.debian.tar.xz e1551f2b752b01468bd4a4dd2ff63d8b47de8a8e311cccecdf9eed8ec5ac6162 7273 libseccomp_2.5.1-1ubuntu1~16.04.1_source.buildinfo Files: c753c1fe374676abae2accbfd191eb71 2303 libs optional libseccomp_2.5.1-1ubuntu1~16.04.1.dsc 59f5563c532d3fa1df9db0516b36b1cd 638811 libs optional libseccomp_2.5.1.orig.tar.gz aee39a81e795a46f983e136d1d020cda 18572 libs optional libseccomp_2.5.1-1ubuntu1~16.04.1.debian.tar.xz d1cfb19fc6c48a26e31e797746b90775 7273 libs optional libseccomp_2.5.1-1ubuntu1~16.04.1_source.buildinfo Original-Maintainer: Kees Cook -- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] snapd 2.48.3 (Accepted)
snapd (2.48.3) xenial-security; urgency=medium * SECURITY UPDATE: sandbox escape vulnerability for containers (LP: #1910456) - many: add Delegate=true to generated systemd units for special interfaces - interfaces/greengrass-support: back-port interface changes to 2.48 - CVE-2020-27352 * interfaces/builtin/docker-support: allow /run/containerd/s/... - This is a new path that docker 19.03.14 (with a new version of containerd) uses to avoid containerd CVE issues around the unix socket. See also CVE-2020-15257. snapd (2.48.2) xenial; urgency=medium * New upstream release, LP: #1906690 - tests: sign new nested-18|20* models to allow for generic serials - secboot: add extra paranoia when waiting for that fde-reveal-key - tests: backport netplan workarounds from #9785 - secboot: add workaround for snapcore/core-initrd issue #13 - devicestate: log checkEncryption errors via logger.Noticef - tests: add nested spread end-to-end test for fde-hooks - devicestate: implement checkFDEFeatures() - boot: tweak resealing with fde-setup hooks - sysconfig/cloudinit.go: add "manual_cache_clean: true" to cloud- init restrict file - secboot: add new LockSealedKeys() that uses either TPM or fde-reveal-key - gadget: use "sealed-keys" to determine what method to use for reseal - boot: add sealKeyToModeenvUsingFdeSetupHook() - secboot: use `fde-reveal-key` if available to unseal key - cmd/snap-update-ns: fix sorting of overname mount entries wrt other entries - o/devicestate: save model with serial in the device save db - devicestate: add runFDESetupHook() helper - secboot,devicestate: add scaffoling for "fde-reveal-key" support - hookstate: add new HookManager.EphemeralRunHook() - update-pot: fix typo in plural keyword spec - store,cmd/snap-repair: increase initial expontential time intervals - o/devicestate,daemon: fix reboot system action to not require a system label - github: run nested suite when commit is pushed to release branch - tests: reset fakestore unit status - tests: fix uc20-create-parition-* tests for updated gadget - hookstate: implement snapctl fde-setup-{request,result} - devicestate: make checkEncryption fde-setup hook aware - client,snapctl: add naive support for "stdin" - devicestate: support "storage-safety" defaults during install - snap: use the boot-base for kernel hooks - vendor: update secboot repo to avoid including secboot.test binary snapd (2.48.1) xenial; urgency=medium * New upstream release, LP: #1906690 - gadget: disable ubuntu-boot role validation check snapd (2.48) xenial; urgency=medium * New upstream release, LP: #1904098 - osutil: add KernelCommandLineKeyValue - devicestate: implement boot.HasFDESetupHook - boot/makebootable.go: set snapd_recovery_mode=install at image- build time - bootloader: use ForGadget when installing boot config - interfaces/raw_usb: allow read access to /proc/tty/drivers - boot: add scaffolding for "fde-setup" hook support for sealing - tests: fix basic20 test on arm devices - seed: make a shared seed system label validation helper - snap: add new "fde-setup" hooktype - cmd/snap-bootstrap, secboot, tests: misc cleanups, add spread test - secboot,cmd/snap-bootstrap: fix degraded mode cases with better device handling - boot,dirs,c/snap-bootstrap: avoid InstallHost* at the cost of some messiness - tests/nested/manual/refresh-revert-fundamentals: temporarily disable secure boot - snap-bootstrap,secboot: call BlockPCRProtectionPolicies in all boot modes - many: address degraded recover mode feedback, cleanups - tests: Use systemd-run on tests part2 - tests: set the opensuse tumbleweed system as manual in spread.yaml - secboot: call BlockPCRProtectionPolicies even if the TPM is disabled - vendor: update to current secboot - cmd/snap-bootstrap,o/devicestate: use a secret to pair data and save - spread.yaml: increase number of workers on 20.10 - snap: add new `snap recovery --show-keys` option - tests: minor test tweaks suggested in the review of 9607 - snapd-generator: set standard snapfuse options when generating units for containers - tests: enable lxd test on ubuntu-core-20 and 16.04-32 - interfaces: share /tmp/.X11-unix/ from host or provider - tests: enable main lxd test on 20.10 - cmd/s-b/initramfs-mounts: refactor recover mode to implement degraded mode - gadget/install: add progress logging - packaging: keep secboot/encrypt_dummy.go in debian - interfaces/udev: use distro specific path to snap-device-helper - o/devistate: fix chaining of tasks related to regular snaps when preseeding - gadget, overlord/devicestate: validate that system supports
[ubuntu/xenial-security] intel-microcode 3.20201110.0ubuntu0.16.04.2 (Accepted)
intel-microcode (3.20201110.0ubuntu0.16.04.2) xenial-security; urgency=medium * SECURITY REGRESSION: Some CPUs in the Tiger Lake family sig=0x806c1 fail to boot (LP: #1903883) - remove 06-8c-01/0x000806c1 microcode Date: 2020-11-11 23:55:16.634837+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.2 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] intel-microcode 3.20201110.0ubuntu0.16.04.1 (Accepted)
intel-microcode (3.20201110.0ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 2020-11-10 (includes updates from 2020-06-16) + New Microcodes: sig 0x0005065b, pf_mask 0xbf, 2020-08-20, rev 0x71e, size 27648 sig 0x000806a1, pf_mask 0x10, 2020-06-26, rev 0x0028, size 32768 sig 0x000806c1, pf_mask 0x80, 2020-10-02, rev 0x0068, size 107520 sig 0x000a0652, pf_mask 0x20, 2020-07-08, rev 0x00e0, size 93184 sig 0x000a0653, pf_mask 0x22, 2020-07-08, rev 0x00e0, size 94208 sig 0x000a0655, pf_mask 0x22, 2020-07-08, rev 0x00e0, size 93184 sig 0x000a0661, pf_mask 0x80, 2020-07-02, rev 0x00e0, size 93184 + Updated Microcodes: sig 0x000306f2, pf_mask 0x6f, 2020-05-27, rev 0x0044, size 34816 sig 0x000406e3, pf_mask 0xc0, 2020-07-14, rev 0x00e2, size 105472 sig 0x00050653, pf_mask 0x97, 2020-06-18, rev 0x1000159, size 33792 sig 0x00050654, pf_mask 0xb7, 2020-06-16, rev 0x2006a08, size 35840 sig 0x00050656, pf_mask 0xbf, 2020-06-18, rev 0x4003003, size 52224 sig 0x00050657, pf_mask 0xbf, 2020-06-18, rev 0x5003003, size 52224 sig 0x000506c9, pf_mask 0x03, 2020-02-27, rev 0x0040, size 17408 sig 0x000506ca, pf_mask 0x03, 2020-02-27, rev 0x001e, size 15360 sig 0x000506e3, pf_mask 0x36, 2020-07-14, rev 0x00e2, size 105472 sig 0x000706a8, pf_mask 0x01, 2020-06-09, rev 0x0018, size 75776 sig 0x000706e5, pf_mask 0x80, 2020-07-30, rev 0x00a0, size 109568 sig 0x000806e9, pf_mask 0x10, 2020-05-27, rev 0x00de, size 104448 sig 0x000806e9, pf_mask 0xc0, 2020-05-27, rev 0x00de, size 104448 sig 0x000806ea, pf_mask 0xc0, 2020-06-17, rev 0x00e0, size 104448 sig 0x000806eb, pf_mask 0xd0, 2020-06-03, rev 0x00de, size 104448 sig 0x000806ec, pf_mask 0x94, 2020-05-18, rev 0x00de, size 104448 sig 0x000906e9, pf_mask 0x2a, 2020-05-26, rev 0x00de, size 104448 sig 0x000906ea, pf_mask 0x22, 2020-05-25, rev 0x00de, size 103424 sig 0x000906eb, pf_mask 0x02, 2020-05-25, rev 0x00de, size 104448 sig 0x000906ec, pf_mask 0x22, 2020-06-03, rev 0x00de, size 103424 sig 0x000906ed, pf_mask 0x22, 2020-05-24, rev 0x00de, size 103424 sig 0x000a0660, pf_mask 0x80, 2020-07-08, rev 0x00e0, size 94208 - CVE-2020-8695 RAPL, INTEL-TA-00389 - CVE-2020-8696 Vector Register Leakage-Active, INTEL-TA-00381 - CVE-2020-8698 Fast forward store predictor, INTEL-TA-00381 - Replace releasenote with new releasenote.md from upstream * Remaining Ubuntu changes: - debian/initramfs.hook: Do not override preset defaults from auto-exported conf snippets loaded by initramfs-tools. Date: 2020-11-11 02:01:44.958912+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] freetype 2.6.1-0.1ubuntu2.5 (Accepted)
freetype (2.6.1-0.1ubuntu2.5) xenial-security; urgency=medium * SECURITY UPDATE: heap buffer overflow via integer truncation in Load_SBit_Png - debian/patches-freetype/CVE-2020-15999.patch: Update src/sfnt/pngshim.c to test and reject invalid bitmap size earlier in Load_SBit_Png. Based on upstream patch. - CVE-2020-15999 Date: 2020-10-20 04:04:24.603479+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/freetype/2.6.1-0.1ubuntu2.5 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] libseccomp 2.4.3-1ubuntu3.16.04.2 (Accepted)
libseccomp (2.4.3-1ubuntu3.16.04.2) xenial; urgency=medium * Updated to new upstream 2.4.3 version for updated syscalls support and test-suite robustness - d/p/add-5.4-local-syscall-headers.patch: Add local copy of the architecture specific header files which specify system call numbers from linux-libc-dev in focal to ensure unit tests pass on older releases where the linux-libc-dev package does not have the required system calls defined and use these during compilation of unit tests - d/p/db-properly-reset-attribute-state.patch: Drop this patch since is now upstream - LP: #1876055 * Add missing aarch64 system calls - d/p/fix-aarch64-syscalls.patch - LP: #1877633 * Re-enable build failure on unit test failure Date: 2020-06-02 07:28:55.932200+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/libseccomp/2.4.3-1ubuntu3.16.04.2 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] glib-networking 2.48.2-1~ubuntu16.04.2 (Accepted)
glib-networking (2.48.2-1~ubuntu16.04.2) xenial-security; urgency=medium * SECURITY UPDATE: Failure to validate TLS certificate hostname in certain conditions, contrary to documented behaviour - debian/patches/CVE-2020-13645.patch: Fail certificate verification when the server identity is missing. Based on upstream patch. - debian/patches/update-test-certs-for-gnutls.patch: Update the certificates used for unit test. Taken from upstream. - debian/patches/allow-insecure-md2-cert-in-test.patch: Allow insecure md2 certificate to used for one unit test. Taken from upstream. - CVE-2020-13645 Date: 2020-06-25 06:47:23.213023+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/glib-networking/2.48.2-1~ubuntu16.04.2 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] apt 1.2.32ubuntu0.1 (Accepted)
apt (1.2.32ubuntu0.1) xenial-security; urgency=high * SECURITY UPDATE: Out of bounds read in ar, tar implementations (LP: #1878177) - apt-pkg/contrib/arfile.cc: Fix out-of-bounds read in member name - apt-pkg/contrib/arfile.cc: Fix out-of-bounds read on unterminated member names in error path - apt-pkg/contrib/extracttar.cc: Fix out-of-bounds read on unterminated member names in error path - CVE-2020-3810 * Add .gitlab-ci.yml for CI testing on Salsa apt (1.2.32) xenial; urgency=medium * Add test case for local-only packages pinned to never * Prevent shutdown while running dpkg (LP: #1820886) * Add linux-{buildinfo,image-unsigned,source} versioned kernel pkgs (LP: #1821640) apt (1.2.31) xenial; urgency=medium * Fix name of APT::Update::Post-Invoke-Stats (was ...Update-Post...) * apt.dirs: Install auth.conf.d directory (LP: #1818996) * Merge translations from 1.6.10 (via 1.4.y branch) apt (1.2.30) xenial; urgency=medium * merge security upload for content injection in http method (CVE-2019-3462); with fixed autopkgtest (LP: #1815750) * Introduce experimental 'never' pinning for sources (LP: #1814727) * Add support for /etc/apt/auth.conf.d/*.conf (netrcparts) (LP: #1811120) * Add a Packages-Require-Authorization Release file field (LP: #1814727) * NeverAutoRemove kernel meta packages (LP: #1787460) * doc: Set ubuntu-codename to xenial (LP: #1812696) * update: Provide APT::Update-Post-Invoke-Stats script hook point (LP: #1815760) * Introduce APT::Install::Pre-Invoke / Post-Invoke-Success (LP: #1815761) Date: 2020-05-13 13:16:15.047351+00:00 Changed-By: Julian Andres Klode Signed-By: Alex Murray https://launchpad.net/ubuntu/+source/apt/1.2.32ubuntu0.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.23 (Accepted)
apport (2.20.1-0ubuntu2.23) xenial-security; urgency=medium * SECURITY UPDATE: World writable root owned lock file created in user controllable location (LP: #1862348) - data/apport: Change location of lock file to be directly under /var/run so that regular users can not directly access it or perform symlink attacks. - CVE-2020-8831 * SECURITY UPDATE: Race condition between report creation and ownership (LP: #1862933) - data/apport: When setting owner of report file use a file-descriptor to the report file instead of its path name to ensure that users can not cause Apport to change the ownership of other files via a symlink attack. - CVE-2020-8833 Date: 2020-03-27 07:00:19.529151+00:00 Changed-By: Alex Murray Maintainer: Martin Pitt https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.23 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] ibus 1.5.11-1ubuntu2.4 (Accepted)
ibus (1.5.11-1ubuntu2.4) xenial-security; urgency=medium * SECURITY UPDATE: Lack of access control on DBus socket allows other local users to make arbitrary method calls - debian/patches/CVE-2019-14822.patch: Re-enable to implement GDBusAuthObserver callback in bus/server.c to add access control to the DBus server socket - CVE-2019-14822 * Add breaks for older libglib2.0-0 releases which do not contain the GDBusServer fix for Qt applications Date: 2020-03-24 00:23:14.504502+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/ibus/1.5.11-1ubuntu2.4 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] glib2.0 2.48.2-0ubuntu4.6 (Accepted)
glib2.0 (2.48.2-0ubuntu4.6) xenial-security; urgency=medium * No-change rebuild for -security glib2.0 (2.48.2-0ubuntu4.5) xenial; urgency=medium * d/p/gcredentialsprivate-Document-the-various-private-macros.patch, d/p/credentials-Invalid-Linux-struct-ucred-means-no-informati.patch, d/p/GDBus-prefer-getsockopt-style-credentials-passing-APIs.patch: - Ensure libdbus clients can authenticate with a GDBusServer like the one in ibus. The patches cherry picked from 2.62.2-2 in focal in order to allow the ibus fix of CVE-2019-14822 to be re-enabled without breaking ibus for Qt applications (LP: #1844853). Date: 2020-03-24 02:40:20.121682+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/glib2.0/2.48.2-0ubuntu4.6 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.22 (Accepted)
apport (2.20.1-0ubuntu2.22) xenial-security; urgency=medium [ Michael Hudson-Doyle ] * SECURITY REGRESSION: fix autopkgtest failures since recent security update (LP: #1854237) - Fix regression in creating report for crashing setuid process by getting kernel to tell us the executable path rather than reading /proc/[pid]/exe. - Fix deletion of partially written core files. - Fix test_get_logind_session to use new API. - Restore add_proc_info raising ValueError for a dead process. - Delete test_lock_symlink, no longer applicable now that the lock is created in a directory only root can write to. [ Tiago Stürmer Daitx ] * SECURITY REGRESSION: 'module' object has no attribute 'O_PATH' (LP: #1851806) - apport/report.py, apport/ui.py: use file descriptors for /proc/pid directory access only when running under python 3; prevent reading /proc maps under python 2 as it does not provide a secure way to do so; use io.open for better compatibility between python 2 and 3. * data/apport: fix number of arguments passed through socks into a container. * test/test_report.py: test login session with both pid and proc_pid_fd. * test/test_apport_valgrind.py: skip test_sandbox_cache_options if system has little memory. * test/test_ui.py: modify run_crash_kernel test to account for the fact that linux-image-$kvers-$flavor is now built from the linux-signed source package on amd64 and ppc64el. (LP: #1766740) Date: 2020-03-11 10:52:27.696222+00:00 Changed-By: Tiago Stürmer Daitx Maintainer: Martin Pitt Signed-By: Alex Murray https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.22 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] amd64-microcode 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2 (Accepted)
amd64-microcode (3.20191021.1+really3.20180524.1~ubuntu0.16.04.2) xenial-security; urgency=medium * Revert to 3.20180524.1 version of microcode because of regressions on certain hardware. (LP: #1853614) Date: 2019-11-25 20:02:15.219337+00:00 Changed-By: Marc Deslauriers Signed-By: Alex Murray https://launchpad.net/ubuntu/+source/amd64-microcode/3.20191021.1+really3.20180524.1~ubuntu0.16.04.2 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.21 (Accepted)
apport (2.20.1-0ubuntu2.21) xenial-security; urgency=medium * SECURITY REGRESSION: missing argument in Report.add_proc_environ call (LP: #1850929) - apport/report.py: call add_proc_environ using named arguments and move proc_pid_dir keyword to last to keep api compatibility. Date: 2019-11-05 04:28:17.357120+00:00 Changed-By: Tiago Stürmer Daitx Maintainer: Martin Pitt Signed-By: Alex Murray https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.21 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] whoopsie 0.2.52.5ubuntu0.4 (Accepted)
whoopsie (0.2.52.5ubuntu0.4) xenial-security; urgency=medium * SECURITY REGRESSION: segfault when sending crash report (LP: #1830865) - use uint32_t instead of size_t and INT32_MAX instead of INT_MAX as bson expects variable sizes to be 32 bits long. Date: 2019-11-05 02:19:13.293290+00:00 Changed-By: Tiago Stürmer Daitx Maintainer: Evan Signed-By: Alex Murray https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.4 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.20 (Accepted)
apport (2.20.1-0ubuntu2.20) xenial-security; urgency=medium * SECURITY UPDATE: apport reads arbitrary files if ~/.config/apport/settings is a symlink (LP: #1830862) - apport/fileutils.py: drop permissions before reading user settings file. - CVE-2019-11481 * SECURITY UPDATE: TOCTTOU race conditions and following symbolic links when creating a core file (LP: #1839413) - data/apport: use file descriptor to reference to cwd instead of strings. - CVE-2019-11482 * SECURITY UPDATE: fully user controllable lock file due to lock file being located in world-writable directory (LP: #1839415) - data/apport: create and use lock file from /var/lock/apport. - CVE-2019-11485 * SECURITY UPDATE: per-process user controllable Apport socket file (LP: #1839420) - data/apport: forward crashes only under a valid uid and gid, thanks Stéphane Graber for the patch. - CVE-2019-11483 * SECURITY UPDATE: PID recycling enables an unprivileged user to generate and read a crash report for a privileged process (LP: #1839795) - data/apport: drop permissions before adding proc info (special thanks to Kevin Backhouse for the patch) - data/apport, apport/report.py, apport/ui.py: only access or open /proc/[pid] through a file descriptor for that directory. - CVE-2019-15790 Date: 2019-10-30 04:37:15.163428+00:00 Changed-By: Tiago Stürmer Daitx Maintainer: Martin Pitt Signed-By: Alex Murray https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.20 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] whoopsie 0.2.52.5ubuntu0.2 (Accepted)
whoopsie (0.2.52.5ubuntu0.2) xenial-security; urgency=high * SECURITY UPDATE: Integer overflow when handling large bson objects (LP: #1830865) - lib/bson/bson.c, lib/bson/bson.h, src/whoopsie.c: use size_t for size instead of int to prevent integer overflows. - lib/bson/bson.c: ensure bson objects are not bigger than INT_MAX. - CVE-2019-11484 Date: 2019-10-28 10:08:14.861684+00:00 Changed-By: Tiago Stürmer Daitx Maintainer: Evan Signed-By: Alex Murray https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.2 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] ibus 1.5.11-1ubuntu2.2 (Accepted)
ibus (1.5.11-1ubuntu2.2) xenial-security; urgency=medium * SECURITY UPDATE: Lack of access control on DBus socket allows other local users to make arbitrary method calls - debian/patches/CVE-2019-14822.patch: Implement GDBusAuthObserver callback in bus/server.c to add access control to the DBus server socket - CVE-2019-14822 Date: 2019-09-12 03:11:21.466689+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/ibus/1.5.11-1ubuntu2.2 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] curl 7.47.0-1ubuntu2.14 (Accepted)
curl (7.47.0-1ubuntu2.14) xenial-security; urgency=medium * SECURITY UPDATE: double-free when using kerberos over FTP may cause denial-of-service - debian/patches/CVE-2019-5481.patch: update lib/security.c to avoid double-free on large memory allocation failures - CVE-2019-5481 * SECURITY UPDATE: heap buffer overflow when receiving TFTP data may cause denial-of-service or remote code-execution - debian/patches/CVE-2019-5482.patch: ensure to use the correct block size when calling recvfrom() if the server returns an OACK without specifying a block size in lib/tftp.c - CVE-2019-5482 Date: 2019-09-10 13:02:14.197305+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.14 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] exim4 4.86.2-2ubuntu2.5 (Accepted)
exim4 (4.86.2-2ubuntu2.5) xenial-security; urgency=medium * SECURITY UPDATE: remote command execution - debian/patches/CVE-2019-15846.patch: ensure not to interpret '\\' before '\0' in src/string.c - CVE-2019-15846 Date: 2019-09-05 05:42:14.095608+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/exim4/4.86.2-2ubuntu2.5 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] cups 2.1.3-4ubuntu0.10 (Accepted)
cups (2.1.3-4ubuntu0.10) xenial-security; urgency=medium * SECURITY UPDATE: Stack buffer overflow in SNMP ASN.1 decoder - debian/patches/CVE-2019-86xx.patch: update cups/snmp.c to check for buffer overflow when decoding various ASN.1 elements. - CVE-2019-8675 - CVE-2019-8696 * SECURITY UPDATE: Buffer overflow in IPP - debian/patches/CVE-2019-86xx.patch: update cups/ipp.c to avoid buffer overflow due to tag type confusion * SECURITY UPDATE: Denial of service and memory disclosure in scheduler - debian/patches/CVE-2019-86xx.patch: update scheduler/client.c to avoid a denial of service and possible memory disclosure if the client unexpectedly closes the connection cups (2.1.3-4ubuntu0.9) xenial; urgency=medium * d/p/0045-Fix-an-issue-with-PreserveJobHistory-and-time-values.patch Fix an issue with `PreserveJobHistory` and time values (Issue #5538, Closes: #921741, LP: #1747765) cups (2.1.3-4ubuntu0.8) xenial; urgency=medium * d/p/systemd-service-for-cupsd-after-sssd.patch: Start cupsd after sssd if installed (LP: #1822062) cups (2.1.3-4ubuntu0.7) xenial; urgency=medium * fix-handling-of-MaxJobTime.patch: Fix handling of MaxJobTime 0 (LP: #1804576) Date: 2019-08-20 00:30:13.441679+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/cups/2.1.3-4ubuntu0.10 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] whoopsie 0.2.52.5ubuntu0.1 (Accepted)
whoopsie (0.2.52.5ubuntu0.1) xenial-security; urgency=medium * SECURITY UPDATE: Integer overflow when handling large crash dumps (LP: #1830863) - src/whoopsie.c: Don't use signed integer types for lengths to ensure large crash dumps do not cause signed integer overflow - CVE-2019-11476 Date: 2019-07-05 07:42:38.503518+00:00 Changed-By: Alex Murray Maintainer: Evan https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.19 (Accepted)
apport (2.20.1-0ubuntu2.19) xenial-security; urgency=medium * SECURITY UPDATE: TOCTOU issue allows local user to read arbitrary files (LP: #1830858) - apport/report.py: Avoid TOCTOU issue on users ignore file by dropping privileges and then opening the file both test for access and open the file in a single operation, instead of using access() before reading the file which could be abused by a symlink to cause Apport to read and embed an arbitrary file in the resulting crash dump. - CVE-2019-7307 Date: 2019-07-04 06:07:14.079469+00:00 Changed-By: Alex Murray Maintainer: Martin Pitt https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.19 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] evolution-data-server 3.18.5-1ubuntu1.2 (Accepted)
evolution-data-server (3.18.5-1ubuntu1.2) xenial-security; urgency=medium * SECURITY UPDATE: GPG email signature spoofing - debian/patches/CVE-2018-15587-1.patch: Add more strict parsing for output from gpg in src/camel/camel-gpg-context.c to ensure signatures cannot be spoofed - debian/patches/CVE-2018-15587-2.patch: Ensure decrypted output is not truncated in src/camel/camel-gpg-context.c - debian/patches/CVE-2018-15587-3.patch: Fix incomplete upstream patch in src/camel/camel-gpg-context.c to ensure the entire message is read Date: 2019-05-28 12:16:14.365200+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/evolution-data-server/3.18.5-1ubuntu1.2 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] freerdp 1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.3 (Accepted)
freerdp (1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.3) xenial-security; urgency=medium * SECURITY UPDATE: Integer truncation in update_read_bitmap_update - debian/patches/CVE-2018-8786.patch: Promote count to 32-bit integer type to avoid integer truncation in libfreerdp/core/update.c. Based on upstream patch. - CVE-2018-8786 * SECURITY UPDATE: Integer overflow in gdi_Bitmap_Decompress - debian/patches/CVE-2018-8787.patch: Check for and avoid possible integer overflow in libfreerdp/gdi/graphics.c. Based on upstream patch. - CVE-2018-8787 * SECURITY UPDATE: Buffer overflow in nsc_rle_decode - debian/patches/CVE-2018-8788.patch: Check for lengths and avoid possible buffer overflow in libfreerdp/codec/nsc.c and libfreerdp/codec/nsc_encode.c. Based on upstream patch. - CVE-2018-8788 * SECURITY UPDATE: Out-of-bounds read in ntlm_read_message_fields_buffer - debian/patches/CVE-2018-8789.patch: Ensure to use 64-bit integer type when checking offset against stream length in winpr/libwinpr/sspi/NTLM/ntlm_message.c. Based on upstream patch. - CVE-2018-8789 Date: 2018-12-11 11:31:26.684727+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/freerdp/1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.3 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] libraw 0.17.1-1ubuntu0.4 (Accepted)
libraw (0.17.1-1ubuntu0.4) xenial-security; urgency=medium * SECURITY UPDATE: Multiple memory management issues - debian/patches/CVE-2018-5807_5810_5811_5812.patch: out-of-bounds reads, heap-based buffer overflow and NULL pointer dereference in internal/dcraw_common.cpp - CVE-2018-5807 - CVE-2018-5810 - CVE-2018-5811 - CVE-2018-5812 * SECURITY UPDATE: Infinite loop - debian/patches/CVE-2018-5813.patch: infinite loop in dcraw/dcraw.c and internal/dcraw_common.cpp - CVE-2018-5813 * SECURITY UPDATE: Integer overflow - debian/patches/CVE-2018-5815.patch: integer overflow in internal/dcraw_common.cpp - CVE-2018-5815 * SECURITY UPDATE: Divide by zero - debian/patches/CVE-2018-5816.patch: divide by zero in internal/dcraw_common.cpp - CVE-2018-5816 Date: 2018-12-06 01:32:12.143813+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/libraw/0.17.1-1ubuntu0.4 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] libmspack 0.5-1ubuntu0.16.04.3 (Accepted)
libmspack (0.5-1ubuntu0.16.04.3) xenial-security; urgency=medium * SECURITY UPDATE: Denial of service - debian/patches/CVE-2018-18585.patch: Ensure file names are valid in chmd.c - CVE-2018-18585 * SECURITY UPDATE: One byte buffer overflow - - debian/patches/CVE-2018-18584.patch: Ensure input buffer is large enough in cab.h - CVE-2018-18584 Date: 2018-11-12 03:39:12.025679+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/libmspack/0.5-1ubuntu0.16.04.3 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] vim-syntastic 3.7.0-1+deb9u2build0.16.04.1 (Accepted)
vim-syntastic (3.7.0-1+deb9u2build0.16.04.1) xenial-security; urgency=medium * fake sync from Debian Date: 2018-08-10 00:53:12.263208+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/vim-syntastic/3.7.0-1+deb9u2build0.16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] znc 1.6.3-1ubuntu0.1 (Accepted)
znc (1.6.3-1ubuntu0.1) xenial-security; urgency=medium * SECURITY UPDATE: Privilege escalation for non-admin users (LP: #1781925) - debian/patches/CVE-2018-14055-1.patch: Remove newlines from incoming network configuration change directives. Based on upstream patch. - debian/patches/CVE-2018-14055-2.patch: Remove extra newlines when writing out configuration file. Based on upstream patch. - CVE-2018-14055 * SECURITY UPDATE: Path traversal flaw allows access to files outside of skins (LP: #1781925) - debian/patches/CVE-2018-14056.patch: Replace path traversal components in skin names to ensure path traversal is not possible. Based on upstream patch. - CVE-2018-14056 Date: 2018-08-03 05:08:39.022036+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/znc/1.6.3-1ubuntu0.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] gnupg 1.4.20-1ubuntu3.3 (Accepted)
gnupg (1.4.20-1ubuntu3.3) xenial-security; urgency=medium * SECURITY UPDATE: full RSA key recovery via side-channel attack - debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c. - debian/patches/CVE-2017-7526-2.patch: use same computation for square and multiply in mpi/mpi-pow.c. - debian/patches/CVE-2017-7526-3.patch: fix allocation size for mpi_pow - debian/patches/CVE-2017-7526-4.patch: add exponent blinding in cipher/rsa.c. - debian/patches/CVE-2017-7526-5.patch: allow different build directory - CVE-2017-7526 Date: 2018-08-06 01:08:17.468128+00:00 Changed-By: Alex Murray https://launchpad.net/ubuntu/+source/gnupg/1.4.20-1ubuntu3.3 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes