[ubuntu/xenial-security] apparmor 2.10.95-0ubuntu2.12 (Accepted)

2023-07-02 Thread Alex Murray
apparmor (2.10.95-0ubuntu2.12) xenial-security; urgency=medium

  * debian/lib/apparmor/functions: remove support for loading snapd
generated profiles in /var/lib/snapd/apparmor/profiles as these are
handled by snapd.apparmor.service (LP: #2024637)

Date: 2023-06-29 11:24:15.463611+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/apparmor/2.10.95-0ubuntu2.12
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] intel-microcode 3.20210216.0ubuntu0.16.04.1 (Accepted)

2021-05-17 Thread Alex Murray
intel-microcode (3.20210216.0ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 2021-02-16 (LP: #1927911)
+ Updated Microcodes:
  sig 0x00050654, pf_mask 0xb7, 2020-12-31, rev 0x2006a0a, size 36864
  sig 0x00050656, pf_mask 0xbf, 2020-12-31, rev 0x4003006, size 53248
  sig 0x00050657, pf_mask 0xbf, 2020-12-31, rev 0x5003006, size 53248
  sig 0x000706a1, pf_mask 0x01, 2020-06-09, rev 0x0034, size 74752
- CVE-2020-8695 RAPL, INTEL-TA-00389
- CVE-2020-8696 Vector Register Leakage-Active, INTEL-TA-00381
- CVE-2020-8698 Fast forward store predictor, INTEL-TA-00381

Date: 2021-05-14 08:13:19.180896+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/intel-microcode/3.20210216.0ubuntu0.16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] libseccomp 2.5.1-1ubuntu1~16.04.1 (Accepted)

2021-03-29 Thread Alex Murray
libseccomp (2.5.1-1ubuntu1~16.04.1) xenial; urgency=medium

  * Updated to new upstream 2.5.1 version for updated syscalls support
(LP: #1891810)
   - Removed the following patches that are now included in the new version:
 + d/p/fix-aarch64-syscalls.patch
 + d/p/db-consolidate-some-of-the-code-which-adds-rules.patch
 + d/p/db-add-shadow-transactions.patch
   - Deleted the patch to add a local copy of architecture specific header
 files from linux-libc-dev/focal as this is not needed anymore
 + d/p/add-5.4-local-syscall-headers.patch
   - debian/control: Added gperf to Build-Depends as this is now required
 by upstream
   - debian/libseccomp2.symbols: Added new symbols
  * Add system call headers for powerpc required for backport to xenial
- d/p/add-5.8-powerpc-syscall-headers.patch

Date: Mon, 01 Mar 2021 13:50:00 +1030
Changed-By: Alex Murray 
Maintainer: Ubuntu Developers 
Signed-By: Timo Aaltonen 
https://launchpad.net/ubuntu/+source/libseccomp/2.5.1-1ubuntu1~16.04.1
Format: 1.8
Date: Mon, 01 Mar 2021 13:50:00 +1030
Source: libseccomp
Built-For-Profiles: noudeb
Architecture: source
Version: 2.5.1-1ubuntu1~16.04.1
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Alex Murray 
Launchpad-Bugs-Fixed: 1891810
Changes:
 libseccomp (2.5.1-1ubuntu1~16.04.1) xenial; urgency=medium
 .
   * Updated to new upstream 2.5.1 version for updated syscalls support
 (LP: #1891810)
- Removed the following patches that are now included in the new version:
  + d/p/fix-aarch64-syscalls.patch
  + d/p/db-consolidate-some-of-the-code-which-adds-rules.patch
  + d/p/db-add-shadow-transactions.patch
- Deleted the patch to add a local copy of architecture specific header
  files from linux-libc-dev/focal as this is not needed anymore
  + d/p/add-5.4-local-syscall-headers.patch
- debian/control: Added gperf to Build-Depends as this is now required
  by upstream
- debian/libseccomp2.symbols: Added new symbols
   * Add system call headers for powerpc required for backport to xenial
 - d/p/add-5.8-powerpc-syscall-headers.patch
Checksums-Sha1:
 ca109198be2bc7abed4ec9cac40f6fdb73f6613c 2303 
libseccomp_2.5.1-1ubuntu1~16.04.1.dsc
 6069b720219400d8369f567af30cd2ad06ad938e 638811 libseccomp_2.5.1.orig.tar.gz
 f6d1c3057559e655b78cbe55fe7821af7e73071e 18572 
libseccomp_2.5.1-1ubuntu1~16.04.1.debian.tar.xz
 29e36920d3cc39e33c879809b05b5419148acf26 7273 
libseccomp_2.5.1-1ubuntu1~16.04.1_source.buildinfo
Checksums-Sha256:
 09075989ee67567d281080cc458facd496ac693a2a5bd3ee899887aa0c0a97bd 2303 
libseccomp_2.5.1-1ubuntu1~16.04.1.dsc
 ee307e383c77aa7995abc5ada544d51c9723ae399768a97667d4cdb3c3a30d55 638811 
libseccomp_2.5.1.orig.tar.gz
 a36e4dc10c1ef55e59559638d04fafe504d73f2bc85d76c85446550157cd5e7b 18572 
libseccomp_2.5.1-1ubuntu1~16.04.1.debian.tar.xz
 e1551f2b752b01468bd4a4dd2ff63d8b47de8a8e311cccecdf9eed8ec5ac6162 7273 
libseccomp_2.5.1-1ubuntu1~16.04.1_source.buildinfo
Files:
 c753c1fe374676abae2accbfd191eb71 2303 libs optional 
libseccomp_2.5.1-1ubuntu1~16.04.1.dsc
 59f5563c532d3fa1df9db0516b36b1cd 638811 libs optional 
libseccomp_2.5.1.orig.tar.gz
 aee39a81e795a46f983e136d1d020cda 18572 libs optional 
libseccomp_2.5.1-1ubuntu1~16.04.1.debian.tar.xz
 d1cfb19fc6c48a26e31e797746b90775 7273 libs optional 
libseccomp_2.5.1-1ubuntu1~16.04.1_source.buildinfo
Original-Maintainer: Kees Cook 
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] snapd 2.48.3 (Accepted)

2021-02-09 Thread Alex Murray
snapd (2.48.3) xenial-security; urgency=medium

  * SECURITY UPDATE: sandbox escape vulnerability for containers
(LP: #1910456)
- many: add Delegate=true to generated systemd units for special
  interfaces
- interfaces/greengrass-support: back-port interface changes to
  2.48
- CVE-2020-27352
  * interfaces/builtin/docker-support: allow /run/containerd/s/...
- This is a new path that docker 19.03.14 (with a new version of
  containerd) uses to avoid containerd CVE issues around the unix
  socket. See also CVE-2020-15257.

snapd (2.48.2) xenial; urgency=medium

  * New upstream release, LP: #1906690
- tests: sign new nested-18|20* models to allow for generic serials
- secboot: add extra paranoia when waiting for that fde-reveal-key
- tests: backport netplan workarounds from #9785
- secboot: add workaround for snapcore/core-initrd issue #13
- devicestate: log checkEncryption errors via logger.Noticef
- tests: add nested spread end-to-end test for fde-hooks
- devicestate: implement checkFDEFeatures()
- boot: tweak resealing with fde-setup hooks
- sysconfig/cloudinit.go: add "manual_cache_clean: true" to cloud-
  init restrict file
- secboot: add new LockSealedKeys() that uses either TPM or
  fde-reveal-key
- gadget: use "sealed-keys" to determine what method to use for
  reseal
- boot: add sealKeyToModeenvUsingFdeSetupHook()
- secboot: use `fde-reveal-key` if available to unseal key
- cmd/snap-update-ns: fix sorting of overname mount entries wrt
  other entries
- o/devicestate: save model with serial in the device save db
- devicestate: add runFDESetupHook() helper
- secboot,devicestate: add scaffoling for "fde-reveal-key" support
- hookstate: add new HookManager.EphemeralRunHook()
- update-pot: fix typo in plural keyword spec
- store,cmd/snap-repair: increase initial expontential time
  intervals
- o/devicestate,daemon: fix reboot system action to not require a
  system label
- github: run nested suite when commit is pushed to release branch
- tests: reset fakestore unit status
- tests: fix uc20-create-parition-* tests for updated gadget
- hookstate: implement snapctl fde-setup-{request,result}
- devicestate: make checkEncryption fde-setup hook aware
- client,snapctl: add naive support for "stdin"
- devicestate: support "storage-safety" defaults during install
- snap: use the boot-base for kernel hooks
- vendor: update secboot repo to avoid including secboot.test binary

snapd (2.48.1) xenial; urgency=medium

  * New upstream release, LP: #1906690
- gadget: disable ubuntu-boot role validation check

snapd (2.48) xenial; urgency=medium

  * New upstream release, LP: #1904098
- osutil: add KernelCommandLineKeyValue
- devicestate: implement boot.HasFDESetupHook
- boot/makebootable.go: set snapd_recovery_mode=install at image-
  build time
- bootloader: use ForGadget when installing boot config
- interfaces/raw_usb: allow read access to /proc/tty/drivers
- boot: add scaffolding for "fde-setup" hook support for sealing
- tests: fix basic20 test on arm devices
- seed: make a shared seed system label validation helper
- snap: add new "fde-setup" hooktype
- cmd/snap-bootstrap, secboot, tests: misc cleanups, add spread test
- secboot,cmd/snap-bootstrap: fix degraded mode cases with better
  device handling
- boot,dirs,c/snap-bootstrap: avoid InstallHost* at the cost of some
  messiness
- tests/nested/manual/refresh-revert-fundamentals: temporarily
  disable secure boot
- snap-bootstrap,secboot: call BlockPCRProtectionPolicies in all
  boot modes
- many: address degraded recover mode feedback, cleanups
- tests: Use systemd-run on tests part2
- tests: set the opensuse tumbleweed system as manual in spread.yaml
- secboot: call BlockPCRProtectionPolicies even if the TPM is
  disabled
- vendor: update to current secboot
- cmd/snap-bootstrap,o/devicestate: use a secret to pair data and
  save
- spread.yaml: increase number of workers on 20.10
- snap: add new `snap recovery --show-keys` option
- tests: minor test tweaks suggested in the review of 9607
- snapd-generator: set standard snapfuse options when generating
  units for containers
- tests: enable lxd test on ubuntu-core-20 and 16.04-32
- interfaces: share /tmp/.X11-unix/ from host or provider
- tests: enable main lxd test on 20.10
- cmd/s-b/initramfs-mounts: refactor recover mode to implement
  degraded mode
- gadget/install: add progress logging
- packaging: keep secboot/encrypt_dummy.go in debian
- interfaces/udev: use distro specific path to snap-device-helper
- o/devistate: fix chaining of tasks related to regular snaps when
  preseeding
- gadget, overlord/devicestate: validate that system supports
  

[ubuntu/xenial-security] intel-microcode 3.20201110.0ubuntu0.16.04.2 (Accepted)

2020-11-11 Thread Alex Murray
intel-microcode (3.20201110.0ubuntu0.16.04.2) xenial-security; urgency=medium

  * SECURITY REGRESSION: Some CPUs in the Tiger Lake family sig=0x806c1
fail to boot (LP: #1903883)
- remove 06-8c-01/0x000806c1 microcode

Date: 2020-11-11 23:55:16.634837+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] intel-microcode 3.20201110.0ubuntu0.16.04.1 (Accepted)

2020-11-10 Thread Alex Murray
intel-microcode (3.20201110.0ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 2020-11-10 (includes
updates from 2020-06-16)
+ New Microcodes:
  sig 0x0005065b, pf_mask 0xbf, 2020-08-20, rev 0x71e, size 27648
  sig 0x000806a1, pf_mask 0x10, 2020-06-26, rev 0x0028, size 32768
  sig 0x000806c1, pf_mask 0x80, 2020-10-02, rev 0x0068, size 107520
  sig 0x000a0652, pf_mask 0x20, 2020-07-08, rev 0x00e0, size 93184
  sig 0x000a0653, pf_mask 0x22, 2020-07-08, rev 0x00e0, size 94208
  sig 0x000a0655, pf_mask 0x22, 2020-07-08, rev 0x00e0, size 93184
  sig 0x000a0661, pf_mask 0x80, 2020-07-02, rev 0x00e0, size 93184
+ Updated Microcodes:
  sig 0x000306f2, pf_mask 0x6f, 2020-05-27, rev 0x0044, size 34816
  sig 0x000406e3, pf_mask 0xc0, 2020-07-14, rev 0x00e2, size 105472
  sig 0x00050653, pf_mask 0x97, 2020-06-18, rev 0x1000159, size 33792
  sig 0x00050654, pf_mask 0xb7, 2020-06-16, rev 0x2006a08, size 35840
  sig 0x00050656, pf_mask 0xbf, 2020-06-18, rev 0x4003003, size 52224
  sig 0x00050657, pf_mask 0xbf, 2020-06-18, rev 0x5003003, size 52224
  sig 0x000506c9, pf_mask 0x03, 2020-02-27, rev 0x0040, size 17408
  sig 0x000506ca, pf_mask 0x03, 2020-02-27, rev 0x001e, size 15360
  sig 0x000506e3, pf_mask 0x36, 2020-07-14, rev 0x00e2, size 105472
  sig 0x000706a8, pf_mask 0x01, 2020-06-09, rev 0x0018, size 75776
  sig 0x000706e5, pf_mask 0x80, 2020-07-30, rev 0x00a0, size 109568
  sig 0x000806e9, pf_mask 0x10, 2020-05-27, rev 0x00de, size 104448
  sig 0x000806e9, pf_mask 0xc0, 2020-05-27, rev 0x00de, size 104448
  sig 0x000806ea, pf_mask 0xc0, 2020-06-17, rev 0x00e0, size 104448
  sig 0x000806eb, pf_mask 0xd0, 2020-06-03, rev 0x00de, size 104448
  sig 0x000806ec, pf_mask 0x94, 2020-05-18, rev 0x00de, size 104448
  sig 0x000906e9, pf_mask 0x2a, 2020-05-26, rev 0x00de, size 104448
  sig 0x000906ea, pf_mask 0x22, 2020-05-25, rev 0x00de, size 103424
  sig 0x000906eb, pf_mask 0x02, 2020-05-25, rev 0x00de, size 104448
  sig 0x000906ec, pf_mask 0x22, 2020-06-03, rev 0x00de, size 103424
  sig 0x000906ed, pf_mask 0x22, 2020-05-24, rev 0x00de, size 103424
  sig 0x000a0660, pf_mask 0x80, 2020-07-08, rev 0x00e0, size 94208
- CVE-2020-8695 RAPL, INTEL-TA-00389
- CVE-2020-8696 Vector Register Leakage-Active, INTEL-TA-00381
- CVE-2020-8698 Fast forward store predictor, INTEL-TA-00381
- Replace releasenote with new releasenote.md from upstream
  * Remaining Ubuntu changes:
- debian/initramfs.hook: Do not override preset defaults from
  auto-exported conf snippets loaded by initramfs-tools.

Date: 2020-11-11 02:01:44.958912+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] freetype 2.6.1-0.1ubuntu2.5 (Accepted)

2020-10-20 Thread Alex Murray
freetype (2.6.1-0.1ubuntu2.5) xenial-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow via integer truncation in
Load_SBit_Png
- debian/patches-freetype/CVE-2020-15999.patch: Update
  src/sfnt/pngshim.c to test and reject invalid bitmap size earlier in
  Load_SBit_Png. Based on upstream patch.
- CVE-2020-15999

Date: 2020-10-20 04:04:24.603479+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/freetype/2.6.1-0.1ubuntu2.5
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] libseccomp 2.4.3-1ubuntu3.16.04.2 (Accepted)

2020-06-29 Thread Alex Murray
libseccomp (2.4.3-1ubuntu3.16.04.2) xenial; urgency=medium

  * Updated to new upstream 2.4.3 version for updated syscalls support
and test-suite robustness
- d/p/add-5.4-local-syscall-headers.patch: Add local copy of the
  architecture specific header files which specify system call numbers
  from linux-libc-dev in focal to ensure unit tests pass on older
  releases where the linux-libc-dev package does not have the required
  system calls defined and use these during compilation of unit tests
- d/p/db-properly-reset-attribute-state.patch: Drop this patch since
  is now upstream  
- LP: #1876055
  * Add missing aarch64 system calls
- d/p/fix-aarch64-syscalls.patch
- LP: #1877633
  * Re-enable build failure on unit test failure

Date: 2020-06-02 07:28:55.932200+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/libseccomp/2.4.3-1ubuntu3.16.04.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] glib-networking 2.48.2-1~ubuntu16.04.2 (Accepted)

2020-06-28 Thread Alex Murray
glib-networking (2.48.2-1~ubuntu16.04.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Failure to validate TLS certificate hostname in
certain conditions, contrary to documented behaviour
- debian/patches/CVE-2020-13645.patch: Fail certificate verification
  when the server identity is missing. Based on upstream patch.
- debian/patches/update-test-certs-for-gnutls.patch: Update the
  certificates used for unit test. Taken from upstream.
- debian/patches/allow-insecure-md2-cert-in-test.patch: Allow insecure
  md2 certificate to used for one unit test. Taken from upstream.
- CVE-2020-13645

Date: 2020-06-25 06:47:23.213023+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/glib-networking/2.48.2-1~ubuntu16.04.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] apt 1.2.32ubuntu0.1 (Accepted)

2020-05-13 Thread Alex Murray
apt (1.2.32ubuntu0.1) xenial-security; urgency=high

  * SECURITY UPDATE: Out of bounds read in ar, tar implementations (LP: 
#1878177)
- apt-pkg/contrib/arfile.cc: Fix out-of-bounds read in member name
- apt-pkg/contrib/arfile.cc: Fix out-of-bounds read on unterminated
  member names in error path
- apt-pkg/contrib/extracttar.cc: Fix out-of-bounds read on unterminated
  member names in error path
- CVE-2020-3810
  * Add .gitlab-ci.yml for CI testing on Salsa

apt (1.2.32) xenial; urgency=medium

  * Add test case for local-only packages pinned to never
  * Prevent shutdown while running dpkg (LP: #1820886)
  * Add linux-{buildinfo,image-unsigned,source} versioned kernel pkgs
(LP: #1821640)

apt (1.2.31) xenial; urgency=medium

  * Fix name of APT::Update::Post-Invoke-Stats (was ...Update-Post...)
  * apt.dirs: Install auth.conf.d directory (LP: #1818996)
  * Merge translations from 1.6.10 (via 1.4.y branch)

apt (1.2.30) xenial; urgency=medium

  * merge security upload for content injection in http method (CVE-2019-3462);
with fixed autopkgtest (LP: #1815750)
  * Introduce experimental 'never' pinning for sources (LP: #1814727)
  * Add support for /etc/apt/auth.conf.d/*.conf (netrcparts) (LP: #1811120)
  * Add a Packages-Require-Authorization Release file field (LP: #1814727)
  * NeverAutoRemove kernel meta packages (LP: #1787460)
  * doc: Set ubuntu-codename to xenial (LP: #1812696)
  * update: Provide APT::Update-Post-Invoke-Stats script hook point
(LP: #1815760)
  * Introduce APT::Install::Pre-Invoke / Post-Invoke-Success (LP: #1815761)

Date: 2020-05-13 13:16:15.047351+00:00
Changed-By: Julian Andres Klode 
Signed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/apt/1.2.32ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.23 (Accepted)

2020-04-01 Thread Alex Murray
apport (2.20.1-0ubuntu2.23) xenial-security; urgency=medium

  * SECURITY UPDATE: World writable root owned lock file created in user
controllable location (LP: #1862348)
- data/apport: Change location of lock file to be directly under
  /var/run so that regular users can not directly access it or perform
  symlink attacks.
- CVE-2020-8831
  * SECURITY UPDATE: Race condition between report creation and ownership
(LP: #1862933)
- data/apport: When setting owner of report file use a file-descriptor
  to the report file instead of its path name to ensure that users can
  not cause Apport to change the ownership of other files via a
  symlink attack.
- CVE-2020-8833

Date: 2020-03-27 07:00:19.529151+00:00
Changed-By: Alex Murray 
Maintainer: Martin Pitt 
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.23
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] ibus 1.5.11-1ubuntu2.4 (Accepted)

2020-03-24 Thread Alex Murray
ibus (1.5.11-1ubuntu2.4) xenial-security; urgency=medium

  * SECURITY UPDATE: Lack of access control on DBus socket allows other
local users to make arbitrary method calls
- debian/patches/CVE-2019-14822.patch:
  Re-enable to implement GDBusAuthObserver callback in bus/server.c to
  add access control to the DBus server socket
- CVE-2019-14822
  * Add breaks for older libglib2.0-0 releases which do not contain the
GDBusServer fix for Qt applications

Date: 2020-03-24 00:23:14.504502+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/ibus/1.5.11-1ubuntu2.4
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] glib2.0 2.48.2-0ubuntu4.6 (Accepted)

2020-03-24 Thread Alex Murray
glib2.0 (2.48.2-0ubuntu4.6) xenial-security; urgency=medium

  * No-change rebuild for -security

glib2.0 (2.48.2-0ubuntu4.5) xenial; urgency=medium

  * d/p/gcredentialsprivate-Document-the-various-private-macros.patch,
d/p/credentials-Invalid-Linux-struct-ucred-means-no-informati.patch,
d/p/GDBus-prefer-getsockopt-style-credentials-passing-APIs.patch:
- Ensure libdbus clients can authenticate with a GDBusServer like
  the one in ibus. The patches cherry picked from 2.62.2-2 in focal
  in order to allow the ibus fix of CVE-2019-14822 to be re-enabled
  without breaking ibus for Qt applications (LP: #1844853).

Date: 2020-03-24 02:40:20.121682+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/glib2.0/2.48.2-0ubuntu4.6
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.22 (Accepted)

2020-03-17 Thread Alex Murray
apport (2.20.1-0ubuntu2.22) xenial-security; urgency=medium

  [ Michael Hudson-Doyle ]
  * SECURITY REGRESSION: fix autopkgtest failures since recent security
update (LP: #1854237)
- Fix regression in creating report for crashing setuid process by getting
  kernel to tell us the executable path rather than reading
  /proc/[pid]/exe.
- Fix deletion of partially written core files.
- Fix test_get_logind_session to use new API.
- Restore add_proc_info raising ValueError for a dead process.
- Delete test_lock_symlink, no longer applicable now that the lock is
  created in a directory only root can write to.

  [ Tiago Stürmer Daitx ]
  * SECURITY REGRESSION: 'module' object has no attribute 'O_PATH'
(LP: #1851806)
- apport/report.py, apport/ui.py: use file descriptors for /proc/pid
  directory access only when running under python 3; prevent reading /proc
  maps under python 2 as it does not provide a secure way to do so; use
  io.open for better compatibility between python 2 and 3.
  * data/apport: fix number of arguments passed through socks into a container.
  * test/test_report.py: test login session with both pid and proc_pid_fd.
  * test/test_apport_valgrind.py: skip test_sandbox_cache_options if system
has little memory.
  * test/test_ui.py: modify run_crash_kernel test to account for the fact that
linux-image-$kvers-$flavor is now built from the linux-signed source
package on amd64 and ppc64el. (LP: #1766740)

Date: 2020-03-11 10:52:27.696222+00:00
Changed-By: Tiago Stürmer Daitx 
Maintainer: Martin Pitt 
Signed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.22
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] amd64-microcode 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2 (Accepted)

2019-11-26 Thread Alex Murray
amd64-microcode (3.20191021.1+really3.20180524.1~ubuntu0.16.04.2) 
xenial-security; urgency=medium

  * Revert to 3.20180524.1 version of microcode because of regressions on
certain hardware. (LP: #1853614)

Date: 2019-11-25 20:02:15.219337+00:00
Changed-By: Marc Deslauriers 
Signed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/amd64-microcode/3.20191021.1+really3.20180524.1~ubuntu0.16.04.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.21 (Accepted)

2019-11-04 Thread Alex Murray
apport (2.20.1-0ubuntu2.21) xenial-security; urgency=medium

  * SECURITY REGRESSION: missing argument in Report.add_proc_environ
call (LP: #1850929)
- apport/report.py: call add_proc_environ using named arguments
  and move proc_pid_dir keyword to last to keep api compatibility.

Date: 2019-11-05 04:28:17.357120+00:00
Changed-By: Tiago Stürmer Daitx 
Maintainer: Martin Pitt 
Signed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.21
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] whoopsie 0.2.52.5ubuntu0.4 (Accepted)

2019-11-04 Thread Alex Murray
whoopsie (0.2.52.5ubuntu0.4) xenial-security; urgency=medium

  * SECURITY REGRESSION: segfault when sending crash report (LP: #1830865)
- use uint32_t instead of size_t and INT32_MAX instead of INT_MAX
  as bson expects variable sizes to be 32 bits long.

Date: 2019-11-05 02:19:13.293290+00:00
Changed-By: Tiago Stürmer Daitx 
Maintainer: Evan 
Signed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.4
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.20 (Accepted)

2019-10-29 Thread Alex Murray
apport (2.20.1-0ubuntu2.20) xenial-security; urgency=medium

  * SECURITY UPDATE: apport reads arbitrary files if ~/.config/apport/settings
is a symlink (LP: #1830862)
- apport/fileutils.py: drop permissions before reading user settings file.
- CVE-2019-11481
  * SECURITY UPDATE: TOCTTOU race conditions and following symbolic
links when creating a core file (LP: #1839413)
- data/apport: use file descriptor to reference to cwd instead
  of strings.
- CVE-2019-11482
  * SECURITY UPDATE: fully user controllable lock file due to lock file
being located in world-writable directory (LP: #1839415)
- data/apport: create and use lock file from /var/lock/apport.
- CVE-2019-11485
  * SECURITY UPDATE: per-process user controllable Apport socket file
(LP: #1839420)
- data/apport: forward crashes only under a valid uid and gid,
  thanks Stéphane Graber for the patch.
- CVE-2019-11483
  * SECURITY UPDATE: PID recycling enables an unprivileged user to
generate and read a crash report for a privileged process (LP: #1839795)
- data/apport: drop permissions before adding proc info (special thanks
  to Kevin Backhouse for the patch)
- data/apport, apport/report.py, apport/ui.py: only access or open
  /proc/[pid] through a file descriptor for that directory.
- CVE-2019-15790

Date: 2019-10-30 04:37:15.163428+00:00
Changed-By: Tiago Stürmer Daitx 
Maintainer: Martin Pitt 
Signed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.20
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] whoopsie 0.2.52.5ubuntu0.2 (Accepted)

2019-10-29 Thread Alex Murray
whoopsie (0.2.52.5ubuntu0.2) xenial-security; urgency=high

  * SECURITY UPDATE: Integer overflow when handling large bson
objects (LP: #1830865)
- lib/bson/bson.c, lib/bson/bson.h, src/whoopsie.c: use size_t
  for size instead of int to prevent integer overflows.
- lib/bson/bson.c: ensure bson objects are not bigger than INT_MAX.
- CVE-2019-11484

Date: 2019-10-28 10:08:14.861684+00:00
Changed-By: Tiago Stürmer Daitx 
Maintainer: Evan 
Signed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] ibus 1.5.11-1ubuntu2.2 (Accepted)

2019-09-16 Thread Alex Murray
ibus (1.5.11-1ubuntu2.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Lack of access control on DBus socket allows other
local users to make arbitrary method calls
- debian/patches/CVE-2019-14822.patch: Implement GDBusAuthObserver
  callback in bus/server.c to add access control to the DBus server
  socket
- CVE-2019-14822

Date: 2019-09-12 03:11:21.466689+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/ibus/1.5.11-1ubuntu2.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] curl 7.47.0-1ubuntu2.14 (Accepted)

2019-09-11 Thread Alex Murray
curl (7.47.0-1ubuntu2.14) xenial-security; urgency=medium

  * SECURITY UPDATE: double-free when using kerberos over FTP may cause
denial-of-service
- debian/patches/CVE-2019-5481.patch: update lib/security.c to avoid
  double-free on large memory allocation failures
- CVE-2019-5481
  * SECURITY UPDATE: heap buffer overflow when receiving TFTP data may
cause denial-of-service or remote code-execution
- debian/patches/CVE-2019-5482.patch: ensure to use the correct block
  size when calling recvfrom() if the server returns an OACK without
  specifying a block size in lib/tftp.c
- CVE-2019-5482

Date: 2019-09-10 13:02:14.197305+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.14
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] exim4 4.86.2-2ubuntu2.5 (Accepted)

2019-09-06 Thread Alex Murray
exim4 (4.86.2-2ubuntu2.5) xenial-security; urgency=medium

  * SECURITY UPDATE: remote command execution
- debian/patches/CVE-2019-15846.patch: ensure not to interpret '\\'
  before '\0' in src/string.c
- CVE-2019-15846

Date: 2019-09-05 05:42:14.095608+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/exim4/4.86.2-2ubuntu2.5
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] cups 2.1.3-4ubuntu0.10 (Accepted)

2019-08-19 Thread Alex Murray
cups (2.1.3-4ubuntu0.10) xenial-security; urgency=medium

  * SECURITY UPDATE: Stack buffer overflow in SNMP ASN.1 decoder
- debian/patches/CVE-2019-86xx.patch: update cups/snmp.c to check for
  buffer overflow when decoding various ASN.1 elements.
- CVE-2019-8675
- CVE-2019-8696
  * SECURITY UPDATE: Buffer overflow in IPP
- debian/patches/CVE-2019-86xx.patch: update cups/ipp.c to avoid
  buffer overflow due to tag type confusion
  * SECURITY UPDATE: Denial of service and memory disclosure in scheduler
- debian/patches/CVE-2019-86xx.patch: update scheduler/client.c to
  avoid a denial of service and possible memory disclosure if the
  client unexpectedly closes the connection

cups (2.1.3-4ubuntu0.9) xenial; urgency=medium

  * d/p/0045-Fix-an-issue-with-PreserveJobHistory-and-time-values.patch
Fix an issue with `PreserveJobHistory` and time values
(Issue #5538, Closes: #921741, LP: #1747765)

cups (2.1.3-4ubuntu0.8) xenial; urgency=medium

  * d/p/systemd-service-for-cupsd-after-sssd.patch: Start cupsd after sssd if
installed (LP: #1822062)

cups (2.1.3-4ubuntu0.7) xenial; urgency=medium

  * fix-handling-of-MaxJobTime.patch: Fix handling of MaxJobTime 0
(LP: #1804576)

Date: 2019-08-20 00:30:13.441679+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/cups/2.1.3-4ubuntu0.10
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] whoopsie 0.2.52.5ubuntu0.1 (Accepted)

2019-07-08 Thread Alex Murray
whoopsie (0.2.52.5ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Integer overflow when handling large crash dumps (LP:
#1830863)
- src/whoopsie.c: Don't use signed integer types for lengths to ensure
  large crash dumps do not cause signed integer overflow
- CVE-2019-11476

Date: 2019-07-05 07:42:38.503518+00:00
Changed-By: Alex Murray 
Maintainer: Evan 
https://launchpad.net/ubuntu/+source/whoopsie/0.2.52.5ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] apport 2.20.1-0ubuntu2.19 (Accepted)

2019-07-08 Thread Alex Murray
apport (2.20.1-0ubuntu2.19) xenial-security; urgency=medium

  * SECURITY UPDATE: TOCTOU issue allows local user to read arbitrary
files (LP: #1830858)
- apport/report.py: Avoid TOCTOU issue on users ignore file by
  dropping privileges and then opening the file both test for access and
  open the file in a single operation, instead of using access() before
  reading the file which could be abused by a symlink to cause Apport to
  read and embed an arbitrary file in the resulting crash dump.
- CVE-2019-7307

Date: 2019-07-04 06:07:14.079469+00:00
Changed-By: Alex Murray 
Maintainer: Martin Pitt 
https://launchpad.net/ubuntu/+source/apport/2.20.1-0ubuntu2.19
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] evolution-data-server 3.18.5-1ubuntu1.2 (Accepted)

2019-05-30 Thread Alex Murray
evolution-data-server (3.18.5-1ubuntu1.2) xenial-security; urgency=medium

  * SECURITY UPDATE: GPG email signature spoofing
- debian/patches/CVE-2018-15587-1.patch: Add more strict parsing for
  output from gpg in src/camel/camel-gpg-context.c to ensure signatures
  cannot be spoofed
- debian/patches/CVE-2018-15587-2.patch: Ensure decrypted output is
  not truncated in src/camel/camel-gpg-context.c
- debian/patches/CVE-2018-15587-3.patch: Fix incomplete upstream patch in
  src/camel/camel-gpg-context.c to ensure the entire message is read

Date: 2019-05-28 12:16:14.365200+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/evolution-data-server/3.18.5-1ubuntu1.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] freerdp 1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.3 (Accepted)

2018-12-12 Thread Alex Murray
freerdp (1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.3) xenial-security; 
urgency=medium

  * SECURITY UPDATE: Integer truncation in update_read_bitmap_update
- debian/patches/CVE-2018-8786.patch: Promote count to 32-bit integer
  type to avoid integer truncation in libfreerdp/core/update.c. Based on
  upstream patch.
- CVE-2018-8786
  * SECURITY UPDATE: Integer overflow in gdi_Bitmap_Decompress
- debian/patches/CVE-2018-8787.patch: Check for and avoid possible
  integer overflow in libfreerdp/gdi/graphics.c. Based on upstream
  patch.
- CVE-2018-8787
  * SECURITY UPDATE: Buffer overflow in nsc_rle_decode
- debian/patches/CVE-2018-8788.patch: Check for lengths and avoid
  possible buffer overflow in libfreerdp/codec/nsc.c and
  libfreerdp/codec/nsc_encode.c. Based on upstream patch.
- CVE-2018-8788
  * SECURITY UPDATE: Out-of-bounds read in ntlm_read_message_fields_buffer
- debian/patches/CVE-2018-8789.patch: Ensure to use 64-bit integer
  type when checking offset against stream length in
  winpr/libwinpr/sspi/NTLM/ntlm_message.c. Based on upstream patch.
- CVE-2018-8789

Date: 2018-12-11 11:31:26.684727+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/freerdp/1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.3
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] libraw 0.17.1-1ubuntu0.4 (Accepted)

2018-12-05 Thread Alex Murray
libraw (0.17.1-1ubuntu0.4) xenial-security; urgency=medium

  * SECURITY UPDATE: Multiple memory management issues
- debian/patches/CVE-2018-5807_5810_5811_5812.patch: out-of-bounds
  reads, heap-based buffer overflow and NULL pointer dereference in
  internal/dcraw_common.cpp
- CVE-2018-5807
- CVE-2018-5810
- CVE-2018-5811
- CVE-2018-5812
  * SECURITY UPDATE: Infinite loop
- debian/patches/CVE-2018-5813.patch: infinite loop in dcraw/dcraw.c
  and internal/dcraw_common.cpp
- CVE-2018-5813
  * SECURITY UPDATE: Integer overflow
- debian/patches/CVE-2018-5815.patch: integer overflow in
  internal/dcraw_common.cpp
- CVE-2018-5815
  * SECURITY UPDATE: Divide by zero
- debian/patches/CVE-2018-5816.patch: divide by zero in
  internal/dcraw_common.cpp
- CVE-2018-5816

Date: 2018-12-06 01:32:12.143813+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/libraw/0.17.1-1ubuntu0.4
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] libmspack 0.5-1ubuntu0.16.04.3 (Accepted)

2018-11-12 Thread Alex Murray
libmspack (0.5-1ubuntu0.16.04.3) xenial-security; urgency=medium

  * SECURITY UPDATE: Denial of service
- debian/patches/CVE-2018-18585.patch: Ensure file names are valid in chmd.c
- CVE-2018-18585
  * SECURITY UPDATE: One byte buffer overflow -
- debian/patches/CVE-2018-18584.patch: Ensure input buffer is large
  enough in cab.h
- CVE-2018-18584

Date: 2018-11-12 03:39:12.025679+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/libmspack/0.5-1ubuntu0.16.04.3
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] vim-syntastic 3.7.0-1+deb9u2build0.16.04.1 (Accepted)

2018-08-15 Thread Alex Murray
vim-syntastic (3.7.0-1+deb9u2build0.16.04.1) xenial-security; urgency=medium

  * fake sync from Debian

Date: 2018-08-10 00:53:12.263208+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/vim-syntastic/3.7.0-1+deb9u2build0.16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] znc 1.6.3-1ubuntu0.1 (Accepted)

2018-08-06 Thread Alex Murray
znc (1.6.3-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Privilege escalation for non-admin users (LP: #1781925)
- debian/patches/CVE-2018-14055-1.patch: Remove newlines from incoming
  network configuration change directives. Based on upstream patch.
- debian/patches/CVE-2018-14055-2.patch: Remove extra newlines when
  writing out configuration file. Based on upstream patch.
- CVE-2018-14055
  * SECURITY UPDATE: Path traversal flaw allows access to files outside of
skins (LP: #1781925)
- debian/patches/CVE-2018-14056.patch: Replace path traversal components
  in skin names to ensure path traversal is not possible. Based on
  upstream patch.
- CVE-2018-14056

Date: 2018-08-03 05:08:39.022036+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/znc/1.6.3-1ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] gnupg 1.4.20-1ubuntu3.3 (Accepted)

2018-08-06 Thread Alex Murray
gnupg (1.4.20-1ubuntu3.3) xenial-security; urgency=medium

  * SECURITY UPDATE: full RSA key recovery via side-channel attack
- debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-2.patch: use same computation for square
  and multiply in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-3.patch: fix allocation size for mpi_pow
- debian/patches/CVE-2017-7526-4.patch: add exponent blinding in
  cipher/rsa.c.
- debian/patches/CVE-2017-7526-5.patch: allow different build directory
- CVE-2017-7526

Date: 2018-08-06 01:08:17.468128+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/gnupg/1.4.20-1ubuntu3.3
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes