File Manager

Current Path : /snap/core20/2582/usr/share/doc/
Upload File :
Current File : //snap/core20/2582/usr/share/doc/ChangeLog

29/04/2025, commit https://git.launchpad.net/snap-core20/tree/92f33cf5c91cc93d7888f389647936aa39a31752

[ Changes in the core20 snap ]

No detected changes for the core20 snap

[ Changes in primed packages ]

cryptsetup, cryptsetup-bin, libcryptsetup12:amd64 (built from cryptsetup) updated from 2:2.2.2-3ubuntu2.4 to 2:2.2.2-3ubuntu2.5:

  cryptsetup (2:2.2.2-3ubuntu2.5) focal; urgency=medium

    [ Chengen Du ]
    * Refine proc mounts entries traversal (LP: #2054390)
      - d/i/h/cryptroot: Backport upstream commit 95fd4be9b4c6: d/functions:
        get_mnt_devno(): Speed up execution time on large /proc/mounts.

    [ Heitor Alves de Siqueira ]
    * Ignore ZFS entries that don't have major/minor (LP: #1830110):
      - d/i/h/cryptroot: add $fstype check for zfs in get_mnt_devno(), add
        checks for $devnos in generate_initrd_crypttab()

   -- Heitor Alves de Siqueira <halves@canonical.com>  Wed, 29 Jan 2025 18:37:57 +0000

distro-info-data (built from distro-info-data) updated from 0.43ubuntu1.17 to 0.43ubuntu1.18:

  distro-info-data (0.43ubuntu1.18) focal; urgency=medium

    * Add Ubuntu 25.10 "Questing Quokka" (LP: #2107391)
    * Add Debian 15 "Duke"

   -- Benjamin Drung <bdrung@ubuntu.com>  Wed, 23 Apr 2025 12:03:33 +0200

opensc, opensc-pkcs11:amd64 (built from opensc) updated from 0.20.0-3ubuntu0.1~esm3 to 0.20.0-3ubuntu0.1~esm4:

  opensc (0.20.0-3ubuntu0.1~esm4) focal-security; urgency=medium

    * SECURITY REGRESSION: Stack buffer overflow (LP: #2104948)
      - debian/patches/CVE-2021-42782-pre1.patch: simplify PIV I/O
      - debian/patches/CVE-2021-42782-pre2.patch: Replace internal
        implementation of put_tag with asn1
      - debian/patches/CVE-2021-42782-1.patch: cardos: Correctly calculate
        the left bytes to avoid buffer overrun
      - debian/patches/CVE-2021-42782-2.patch: PIV Improved parsing of
        data from the card
      - debian/patches/CVE-2021-42782-3.patch: coolkey: Initialize
        potentially uninitialized memory
      - debian/patches/CVE-2021-42782-4.patch: tcos: prevent out of bounds read
      - debian/patches/CVE-2021-42782-5.patch: iasecc: Prevent stack
        buffer overflow when empty ACL is returned
      - CVE-2021-42782
    * SECURITY UPDATE: Use after return
      - debian/patches/CVE-2021-42780.patch: tcos: Check bounds in
        insert_pin()
      - CVE-2021-42780
    * SECURITY UPDATE: PIN Bypass
      - debian/patches/CVE-2023-40660-1.patch: Fixed PIN authentication
        bypass
      - debian/patches/CVE-2023-40660-2.patch: pkcs15init: Check login
        status before asking for a pin
        overflow during keygen
      - CVE-2023-40660
    * SECURITY UPDATE: Compromised card operations
      - debian/patches/CVE-2023-40661-1.patch: pkcs15: Avoid buffer
        overflow when getting last update
      - debian/patches/CVE-2023-40661-2.patch: setcos: Avoid buffer
        underflow
      - debian/patches/CVE-2023-40661-3.patch: setcos: Avoid writing
        behind the path buffer end
      - debian/patches/CVE-2023-40661-4.patch: oberthur: Avoid buffer
        overflow
      - debian/patches/CVE-2023-40661-5-pre1.patch: pkcs15-pubkey: free
        DER value when parsing public key fails
      - debian/patches/CVE-2023-40661-5.patch: pkcs15-pubkey.c: Avoid
        double-free
      - debian/patches/CVE-2023-40661-6.patch: pkcs15-cflex: check path
        length to prevent underflow
      - debian/patches/CVE-2023-40661-7.patch: Check length of string
        before making copy
      - debian/patches/CVE-2023-40661-8.patch: Check array bounds
      - debian/patches/CVE-2023-40661-9.patch: sc_pkcs15init_rmdir:
        prevent out of bounds write
      - debian/patches/CVE-2023-40661-10.patch: iasecc: Avoid another
        buffer overflow
      - debian/patches/CVE-2023-40661-11-pre1.patch: iassecc: Verify
        buffer lengths before use
      - debian/patches/CVE-2023-40661-11.patch: iasecc: Avoid buffer
        overflow with invalid data
      - debian/patches/CVE-2023-40661-12.patch: iasecc: Check length of
        data when parsing crt
      - debian/patches/CVE-2023-40661-13-pre1.patch: card-entersafe.c:
        Free modulus buffer in case of error
      - debian/patches/CVE-2023-40661-13.patch: entersafe: Avoid buffer
        overflow during keygen
      - CVE-2023-40661
    * SECURITY UPDATE: Missing variable initialization
      - debian/patches/CVE-2024-45615-1.patch: Fix uninitialized values
      - debian/patches/CVE-2024-45615-2.patch: Initialize variables for tag and
        CLA
      - debian/patches/CVE-2024-45615-3.patch: Initialize OID length
      - debian/patches/CVE-2024-45615-4.patch: Initialize variables for tag and
        CLA
      - debian/patches/CVE-2024-45615-5.patch: Avoid using uninitialized memory
      - debian/patches/CVE-2024-45617-1.patch: Check return value when selecting
        AID
      - debian/patches/CVE-2024-45617-2.patch: Return error when response length
        is 0
      - debian/patches/CVE-2024-45617-3.patch: Check number of read bytes
      - debian/patches/CVE-2024-45618-1.patch: Check return value of serial num
        conversion
      - debian/patches/CVE-2024-45618-2.patch: Report transport key error
      - CVE-2024-45615
      - CVE-2024-45617
      - CVE-2024-45618
    * SECURITY UPDATE: Buffer overflow
      - debian/patches/CVE-2023-2977.patch: pkcs15init: correct left
        length calculation to fix buffer overrun bug
      - debian/patches/CVE-2024-45616-1.patch: Fix uninitialized values
      - debian/patches/CVE-2024-45616-2.patch: Check length of APDU response
      - debian/patches/CVE-2024-45616-3.patch: Correctly calculate certificate
        length based on the resplen
      - debian/patches/CVE-2024-45616-4.patch: Check length of serial number
      - debian/patches/CVE-2024-45616-5.patch: Use actual length of reponse
        buffer
      - debian/patches/CVE-2024-45616-6.patch: Check length of response buffer
        in select
      - debian/patches/CVE-2024-45616-7.patch: Check APDU response length and
        ASN1 lengths
      - debian/patches/CVE-2024-45616-8.patch: Report invalid SW when reading
        object
      - debian/patches/CVE-2024-45616-9.patch: Avoid using uninitialized memory
      - debian/patches/CVE-2024-45616-10.patch: Check length of serial number
      - debian/patches/CVE-2024-45620-1.patch: Check length of file to be non-zero
      - debian/patches/CVE-2024-45620-2.patch: Check length of data before
        dereferencing
      - debian/patches/CVE-2024-45620-3.patch: Check length of data when parsing
      - debian/patches/CVE-2024-8443-1.patch: Avoid buffer overflow when writing
        fingerprint
      - debian/patches/CVE-2024-8443-2.patch: Do not accept non-matching key
        responses
      - CVE-2023-2977
      - CVE-2024-45616
      - CVE-2024-45620
      - CVE-2024-8443

   -- Bruce Cable <bruce.cable@canonical.com>  Wed, 09 Apr 2025 13:19:18 +1000

openssh-client, openssh-server, openssh-sftp-server (built from openssh) updated from 1:8.2p1-4ubuntu0.12 to 1:8.2p1-4ubuntu0.13:

  openssh (1:8.2p1-4ubuntu0.13) focal-security; urgency=medium

    * SECURITY UPDATE: incorrect DisableForwarding directive behaviour
      - debian/patches/CVE-2025-32728.patch: fix logic error in session.c.
      - CVE-2025-32728

   -- Marc Deslauriers <marc.deslauriers@ubuntu.com>  Fri, 11 Apr 2025 08:16:08 -0400


File Manager Version 1.0, Coded By Lucas
Email: hehe@yahoo.com