MINI Sh3ll
29/04/2025, commit https://git.launchpad.net/snap-core20/tree/92f33cf5c91cc93d7888f389647936aa39a31752
[ Changes in the core20 snap ]
No detected changes for the core20 snap
[ Changes in primed packages ]
cryptsetup, cryptsetup-bin, libcryptsetup12:amd64 (built from cryptsetup) updated from 2:2.2.2-3ubuntu2.4 to 2:2.2.2-3ubuntu2.5:
cryptsetup (2:2.2.2-3ubuntu2.5) focal; urgency=medium
[ Chengen Du ]
* Refine proc mounts entries traversal (LP: #2054390)
- d/i/h/cryptroot: Backport upstream commit 95fd4be9b4c6: d/functions:
get_mnt_devno(): Speed up execution time on large /proc/mounts.
[ Heitor Alves de Siqueira ]
* Ignore ZFS entries that don't have major/minor (LP: #1830110):
- d/i/h/cryptroot: add $fstype check for zfs in get_mnt_devno(), add
checks for $devnos in generate_initrd_crypttab()
-- Heitor Alves de Siqueira <[email protected]> Wed, 29 Jan 2025 18:37:57 +0000
distro-info-data (built from distro-info-data) updated from 0.43ubuntu1.17 to 0.43ubuntu1.18:
distro-info-data (0.43ubuntu1.18) focal; urgency=medium
* Add Ubuntu 25.10 "Questing Quokka" (LP: #2107391)
* Add Debian 15 "Duke"
-- Benjamin Drung <[email protected]> Wed, 23 Apr 2025 12:03:33 +0200
opensc, opensc-pkcs11:amd64 (built from opensc) updated from 0.20.0-3ubuntu0.1~esm3 to 0.20.0-3ubuntu0.1~esm4:
opensc (0.20.0-3ubuntu0.1~esm4) focal-security; urgency=medium
* SECURITY REGRESSION: Stack buffer overflow (LP: #2104948)
- debian/patches/CVE-2021-42782-pre1.patch: simplify PIV I/O
- debian/patches/CVE-2021-42782-pre2.patch: Replace internal
implementation of put_tag with asn1
- debian/patches/CVE-2021-42782-1.patch: cardos: Correctly calculate
the left bytes to avoid buffer overrun
- debian/patches/CVE-2021-42782-2.patch: PIV Improved parsing of
data from the card
- debian/patches/CVE-2021-42782-3.patch: coolkey: Initialize
potentially uninitialized memory
- debian/patches/CVE-2021-42782-4.patch: tcos: prevent out of bounds read
- debian/patches/CVE-2021-42782-5.patch: iasecc: Prevent stack
buffer overflow when empty ACL is returned
- CVE-2021-42782
* SECURITY UPDATE: Use after return
- debian/patches/CVE-2021-42780.patch: tcos: Check bounds in
insert_pin()
- CVE-2021-42780
* SECURITY UPDATE: PIN Bypass
- debian/patches/CVE-2023-40660-1.patch: Fixed PIN authentication
bypass
- debian/patches/CVE-2023-40660-2.patch: pkcs15init: Check login
status before asking for a pin
overflow during keygen
- CVE-2023-40660
* SECURITY UPDATE: Compromised card operations
- debian/patches/CVE-2023-40661-1.patch: pkcs15: Avoid buffer
overflow when getting last update
- debian/patches/CVE-2023-40661-2.patch: setcos: Avoid buffer
underflow
- debian/patches/CVE-2023-40661-3.patch: setcos: Avoid writing
behind the path buffer end
- debian/patches/CVE-2023-40661-4.patch: oberthur: Avoid buffer
overflow
- debian/patches/CVE-2023-40661-5-pre1.patch: pkcs15-pubkey: free
DER value when parsing public key fails
- debian/patches/CVE-2023-40661-5.patch: pkcs15-pubkey.c: Avoid
double-free
- debian/patches/CVE-2023-40661-6.patch: pkcs15-cflex: check path
length to prevent underflow
- debian/patches/CVE-2023-40661-7.patch: Check length of string
before making copy
- debian/patches/CVE-2023-40661-8.patch: Check array bounds
- debian/patches/CVE-2023-40661-9.patch: sc_pkcs15init_rmdir:
prevent out of bounds write
- debian/patches/CVE-2023-40661-10.patch: iasecc: Avoid another
buffer overflow
- debian/patches/CVE-2023-40661-11-pre1.patch: iassecc: Verify
buffer lengths before use
- debian/patches/CVE-2023-40661-11.patch: iasecc: Avoid buffer
overflow with invalid data
- debian/patches/CVE-2023-40661-12.patch: iasecc: Check length of
data when parsing crt
- debian/patches/CVE-2023-40661-13-pre1.patch: card-entersafe.c:
Free modulus buffer in case of error
- debian/patches/CVE-2023-40661-13.patch: entersafe: Avoid buffer
overflow during keygen
- CVE-2023-40661
* SECURITY UPDATE: Missing variable initialization
- debian/patches/CVE-2024-45615-1.patch: Fix uninitialized values
- debian/patches/CVE-2024-45615-2.patch: Initialize variables for tag and
CLA
- debian/patches/CVE-2024-45615-3.patch: Initialize OID length
- debian/patches/CVE-2024-45615-4.patch: Initialize variables for tag and
CLA
- debian/patches/CVE-2024-45615-5.patch: Avoid using uninitialized memory
- debian/patches/CVE-2024-45617-1.patch: Check return value when selecting
AID
- debian/patches/CVE-2024-45617-2.patch: Return error when response length
is 0
- debian/patches/CVE-2024-45617-3.patch: Check number of read bytes
- debian/patches/CVE-2024-45618-1.patch: Check return value of serial num
conversion
- debian/patches/CVE-2024-45618-2.patch: Report transport key error
- CVE-2024-45615
- CVE-2024-45617
- CVE-2024-45618
* SECURITY UPDATE: Buffer overflow
- debian/patches/CVE-2023-2977.patch: pkcs15init: correct left
length calculation to fix buffer overrun bug
- debian/patches/CVE-2024-45616-1.patch: Fix uninitialized values
- debian/patches/CVE-2024-45616-2.patch: Check length of APDU response
- debian/patches/CVE-2024-45616-3.patch: Correctly calculate certificate
length based on the resplen
- debian/patches/CVE-2024-45616-4.patch: Check length of serial number
- debian/patches/CVE-2024-45616-5.patch: Use actual length of reponse
buffer
- debian/patches/CVE-2024-45616-6.patch: Check length of response buffer
in select
- debian/patches/CVE-2024-45616-7.patch: Check APDU response length and
ASN1 lengths
- debian/patches/CVE-2024-45616-8.patch: Report invalid SW when reading
object
- debian/patches/CVE-2024-45616-9.patch: Avoid using uninitialized memory
- debian/patches/CVE-2024-45616-10.patch: Check length of serial number
- debian/patches/CVE-2024-45620-1.patch: Check length of file to be non-zero
- debian/patches/CVE-2024-45620-2.patch: Check length of data before
dereferencing
- debian/patches/CVE-2024-45620-3.patch: Check length of data when parsing
- debian/patches/CVE-2024-8443-1.patch: Avoid buffer overflow when writing
fingerprint
- debian/patches/CVE-2024-8443-2.patch: Do not accept non-matching key
responses
- CVE-2023-2977
- CVE-2024-45616
- CVE-2024-45620
- CVE-2024-8443
-- Bruce Cable <[email protected]> Wed, 09 Apr 2025 13:19:18 +1000
openssh-client, openssh-server, openssh-sftp-server (built from openssh) updated from 1:8.2p1-4ubuntu0.12 to 1:8.2p1-4ubuntu0.13:
openssh (1:8.2p1-4ubuntu0.13) focal-security; urgency=medium
* SECURITY UPDATE: incorrect DisableForwarding directive behaviour
- debian/patches/CVE-2025-32728.patch: fix logic error in session.c.
- CVE-2025-32728
-- Marc Deslauriers <[email protected]> Fri, 11 Apr 2025 08:16:08 -0400
OHA YOOOO