Skip to content

Releases: cloudfoundry/cflinuxfs4

0.62.0

09 Feb 00:38
Compare
Choose a tag to compare

Notably, this release addresses:

USN-5844-1 USN-5844-1: OpenSSL vulnerabilities:

USN-5825-2 USN-5825-2: PAM regressions:

  • CVE-2022-28321: The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.
  • https://launchpad.net/bugs/2006073: PAM: CVE-2022-28321 patch not correctly applied
-ii  bind9-dnsutils           1:9.18.1-1ubuntu1.2       amd64 Clients provided with BIND 9
-ii  bind9-host               1:9.18.1-1ubuntu1.2       amd64 DNS Lookup Utility
-ii  bind9-libs:amd64         1:9.18.1-1ubuntu1.2       amd64 Shared Libraries used by BIND 9
+ii  bind9-dnsutils           1:9.18.1-1ubuntu1.3       amd64 Clients provided with BIND 9
+ii  bind9-host               1:9.18.1-1ubuntu1.3       amd64 DNS Lookup Utility
+ii  bind9-libs:amd64         1:9.18.1-1ubuntu1.3       amd64 Shared Libraries used by BIND 9
-ii  dnsutils                 1:9.18.1-1ubuntu1.2       all   Transitional package for bind9-dnsutils
+ii  dnsutils                 1:9.18.1-1ubuntu1.3       all   Transitional package for bind9-dnsutils
-ii  kbd                      2.3.0-3ubuntu4            amd64 Linux console font and keytable utilities
+ii  kbd                      2.3.0-3ubuntu4.22.04      amd64 Linux console font and keytable utilities
-ii  krb5-multidev:amd64      1.19.2-2                  amd64 development files for MIT Kerberos without Heimdal conflict
-ii  krb5-user                1.19.2-2                  amd64 basic programs to authenticate using MIT Kerberos
+ii  krb5-multidev:amd64      1.19.2-2ubuntu0.1         amd64 development files for MIT Kerberos without Heimdal conflict
+ii  krb5-user                1.19.2-2ubuntu0.1         amd64 basic programs to authenticate using MIT Kerberos
-ii  libdrm-common            2.4.110-1ubuntu1          all   Userspace interface to kernel DRM services -- common files
-ii  libdrm2:amd64            2.4.110-1ubuntu1          amd64 Userspace interface to kernel DRM services -- runtime
+ii  libdrm-common            2.4.113-2~ubuntu0.22.04.1 all   Userspace interface to kernel DRM services -- common files
+ii  libdrm2:amd64            2.4.113-2~ubuntu0.22.04.1 amd64 Userspace interface to kernel DRM services -- runtime
-ii  libgssapi-krb5-2:amd64   1.19.2-2                  amd64 MIT Kerberos runtime libraries - krb5 GSS-API Mechanism
-ii  libgssrpc4:amd64         1.19.2-2                  amd64 MIT Kerberos runtime libraries - GSS enabled ONCRPC
+ii  libgssapi-krb5-2:amd64   1.19.2-2ubuntu0.1         amd64 MIT Kerberos runtime libraries - krb5 GSS-API Mechanism
+ii  libgssrpc4:amd64         1.19.2-2ubuntu0.1         amd64 MIT Kerberos runtime libraries - GSS enabled ONCRPC
-ii  libk5crypto3:amd64       1.19.2-2                  amd64 MIT Kerberos runtime libraries - Crypto Library
-ii  libkadm5clnt-mit12:amd64 1.19.2-2                  amd64 MIT Kerberos runtime libraries - Administration Clients
-ii  libkadm5srv-mit12:amd64  1.19.2-2                  amd64 MIT Kerberos runtime libraries - KDC and Admin Server
-ii  libkdb5-10:amd64         1.19.2-2                  amd64 MIT Kerberos runtime libraries - Kerberos database
+ii  libk5crypto3:amd64       1.19.2-2ubuntu0.1         amd64 MIT Kerberos runtime libraries - Crypto Library
+ii  libkadm5clnt-mit12:amd64 1.19.2-2ubuntu0.1         amd64 MIT Kerberos runtime libraries - Administration Clients
+ii  libkadm5srv-mit12:amd64  1.19.2-2ubuntu0.1         amd64 MIT Kerberos runtime libraries - KDC and Admin Server
+ii  libkdb5-10:amd64         1.19.2-2ubuntu0.1         amd64 MIT Kerberos runtime libraries - Kerberos database
-ii  libkrb5-3:amd64          1.19.2-2                  amd64 MIT Kerberos runtime libraries
-ii  libkrb5-dev:amd64        1.19.2-2                  amd64 headers and development libraries for MIT Kerberos
-ii  libkrb5support0:amd64    1.19.2-2                  amd64 MIT Kerberos runtime libraries - Support library
+ii  libkrb5-3:amd64          1.19.2-2ubuntu0.1         amd64 MIT Kerberos runtime libraries
+ii  libkrb5-dev:amd64        1.19.2-2ubuntu0.1         amd64 headers and development libraries for MIT Kerberos
+ii  libkrb5support0:amd64    1.19.2-2ubuntu0.1         amd64 MIT Kerberos runtime libraries - Support library
-ii  libpam-modules:amd64     1.4.0-11ubuntu2.1         amd64 Pluggable Authentication Modules for PAM
-ii  libpam-modules-bin       1.4.0-11ubuntu2.1         amd64 Pluggable Authentication Modules for PAM - helper binaries
-ii  libpam-runtime           1.4.0-11ubuntu2.1         all   Runtime support for the PAM library
-ii  libpam0g:amd64           1.4.0-11ubuntu2.1         amd64 Pluggable Authentication Modules library
+ii  libpam-modules:amd64     1.4.0-11ubuntu2.3         amd64 Pluggable Authentication Modules for PAM
+ii  libpam-modules-bin       1.4.0-11ubuntu2.3         amd64 Pluggable Authentication Modules for PAM - helper binaries
+ii  libpam-runtime           1.4.0-11ubuntu2.3         all   Runtime support for the PAM library
+ii  libpam0g:amd64           1.4.0-11ubuntu2.3         amd64 Pluggable Authentication Modules library
-ii  libssl-dev:amd64         3.0.2-0ubuntu1.7          amd64 Secure Sockets Layer toolkit - development files
-ii  libssl3:amd64            3.0.2-0ubuntu1.7          amd64 Secure Sockets Layer toolkit - shared libraries
+ii  libssl-dev:amd64         3.0.2-0ubuntu1.8          amd64 Secure Sockets Layer toolkit - development files
+ii  libssl3:amd64            3.0.2-0ubuntu1.8          amd64 Secure Sockets Layer toolkit - shared libraries
-ii  linux-libc-dev:amd64     5.15.0-58.64              amd64 Linux Kernel Headers for development
+ii  linux-libc-dev:amd64     5.15.0-60.66              amd64 Linux Kernel Headers for development
-ii  openssl                  3.0.2-0ubuntu1.7          amd64 Secure Sockets Layer toolkit - cryptographic utility
+ii  openssl                  3.0.2-0ubuntu1.8          amd64 Secure Sockets Layer toolkit - cryptographic utility
-ii  ubuntu-advantage-tools   27.12~22.04.1             amd64 management tools for Ubuntu Pro
+ii  ubuntu-advantage-tools   27.13.3~22.04.1           amd64 management tools for Ubuntu Pro

0.61.0

25 Jan 13:24
Compare
Choose a tag to compare

Notably, this release addresses:

USN-5825-1 USN-5825-1: PAM vulnerability:

  • CVE-2022-28321: The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.
-ii  libpam-modules:amd64 1.4.0-11ubuntu2          amd64 Pluggable Authentication Modules for PAM
-ii  libpam-modules-bin   1.4.0-11ubuntu2          amd64 Pluggable Authentication Modules for PAM - helper binaries
-ii  libpam-runtime       1.4.0-11ubuntu2          all   Runtime support for the PAM library
-ii  libpam0g:amd64       1.4.0-11ubuntu2          amd64 Pluggable Authentication Modules library
+ii  libpam-modules:amd64 1.4.0-11ubuntu2.1        amd64 Pluggable Authentication Modules for PAM
+ii  libpam-modules-bin   1.4.0-11ubuntu2.1        amd64 Pluggable Authentication Modules for PAM - helper binaries
+ii  libpam-runtime       1.4.0-11ubuntu2.1        all   Runtime support for the PAM library
+ii  libpam0g:amd64       1.4.0-11ubuntu2.1        amd64 Pluggable Authentication Modules library
-ii  libwbclient0:amd64   2:4.15.9+dfsg-0ubuntu0.3 amd64 Samba winbind client library
+ii  libwbclient0:amd64   2:4.15.13+dfsg-0ubuntu1  amd64 Samba winbind client library

0.60.0

23 Jan 20:17
Compare
Choose a tag to compare

Notably, this release addresses:

USN-5806-2 USN-5806-2: Ruby vulnerability:

  • CVE-2021-33621: The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.
-ii  libruby3.0:amd64      3.0.2-7ubuntu2.2          amd64 Libraries necessary to run Ruby 3.0
+ii  libruby3.0:amd64      3.0.2-7ubuntu2.3          amd64 Libraries necessary to run Ruby 3.0
-ii  python3-pkg-resources 59.6.0-1.2                all   Package Discovery and Resource Access using pkg_resources
+ii  python3-pkg-resources 59.6.0-1.2ubuntu0.22.04.1 all   Package Discovery and Resource Access using pkg_resources
-ii  ruby3.0               3.0.2-7ubuntu2.2          amd64 Interpreter of object-oriented scripting language Ruby
+ii  ruby3.0               3.0.2-7ubuntu2.3          amd64 Interpreter of object-oriented scripting language Ruby

0.59.0

18 Jan 22:48
Compare
Choose a tag to compare

Notably, this release addresses:

USN-5811-1 USN-5811-1: Sudo vulnerabilities:

  • CVE-2023-22809: arbitrary file overwrite via sudoedit
  • CVE-2022-33070: Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
  • CVE-2023-22809: arbitrary file overwrite via sudoedit
  • CVE-2022-33070: Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
-ii  sudo  1.9.9-1ubuntu2.1  amd64  Provide limited super user privileges to specific users
+ii  sudo  1.9.9-1ubuntu2.2  amd64  Provide limited super user privileges to specific users

0.58.0

18 Jan 01:28
Compare
Choose a tag to compare
-ii  python-apt-common 2.3.0ubuntu2.1 all   Python interface to libapt-pkg (locales)
+ii  python-apt-common 2.4.0          all   Python interface to libapt-pkg (locales)
-ii  python3-apt       2.3.0ubuntu2.1 amd64 Python 3 interface to libapt-pkg
+ii  python3-apt       2.4.0          amd64 Python 3 interface to libapt-pkg

0.57.0

17 Jan 22:40
Compare
Choose a tag to compare

Notably, this release addresses:

USN-5810-1 USN-5810-1: Git vulnerabilities:

  • CVE-2022-23521: When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge.
  • CVE-2022-41903: When processing the padding operators (e.g., %<(, %<|(, %>(, %>>(, or %><( ), an integer overflow can occur in pretty.c::format_and_pad_commit() where a size_t is improperly stored as an int, and then added as an offset to a subsequent memcpy() call.
  • CVE-2022-41903: When processing the padding operators (e.g., %<(, %<|(, %>(, %>>(, or %><( ), an integer overflow can occur in pretty.c::format_and_pad_commit() where a size_t is improperly stored as an int, and then added as an offset to a subsequent memcpy() call.
  • CVE-2022-23521: When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge.

USN-5807-1 USN-5807-1: libXpm vulnerabilities:

-ii  git              1:2.34.1-1ubuntu1.5       amd64 fast, scalable, distributed revision control system
-ii  git-man          1:2.34.1-1ubuntu1.5       all   fast, scalable, distributed revision control system (manual pages)
+ii  git              1:2.34.1-1ubuntu1.6       amd64 fast, scalable, distributed revision control system
+ii  git-man          1:2.34.1-1ubuntu1.6       all   fast, scalable, distributed revision control system (manual pages)
-ii  libxpm-dev:amd64 1:3.5.12-1build2          amd64 X11 pixmap library (development headers)
-ii  libxpm4:amd64    1:3.5.12-1build2          amd64 X11 pixmap library
+ii  libxpm-dev:amd64 1:3.5.12-1ubuntu0.22.04.1 amd64 X11 pixmap library (development headers)
+ii  libxpm4:amd64    1:3.5.12-1ubuntu0.22.04.1 amd64 X11 pixmap library

0.56.0

13 Jan 08:23
Compare
Choose a tag to compare

Notably, this release addresses:

USN-5801-1 USN-5801-1: Vim vulnerabilities:

  • CVE-2022-0392: Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.
  • CVE-2022-0417: Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.
  • CVE-2022-0392: Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.
  • CVE-2022-0417: Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.
-ii  libpq-dev            14.5-0ubuntu0.22.04.1 amd64 header files for libpq5 (PostgreSQL library)
-ii  libpq5:amd64         14.5-0ubuntu0.22.04.1 amd64 PostgreSQL C client library
+ii  libpq-dev            14.6-0ubuntu0.22.04.1 amd64 header files for libpq5 (PostgreSQL library)
+ii  libpq5:amd64         14.6-0ubuntu0.22.04.1 amd64 PostgreSQL C client library
-ii  linux-libc-dev:amd64 5.15.0-56.62          amd64 Linux Kernel Headers for development
+ii  linux-libc-dev:amd64 5.15.0-58.64          amd64 Linux Kernel Headers for development
-ii  openssh-client       1:8.9p1-3             amd64 secure shell (SSH) client, for secure access to remote machines
-ii  openssh-server       1:8.9p1-3             amd64 secure shell (SSH) server, for secure access from remote machines
-ii  openssh-sftp-server  1:8.9p1-3             amd64 secure shell (SSH) sftp server module, for SFTP access from remote machines
+ii  openssh-client       1:8.9p1-3ubuntu0.1    amd64 secure shell (SSH) client, for secure access to remote machines
+ii  openssh-server       1:8.9p1-3ubuntu0.1    amd64 secure shell (SSH) server, for secure access from remote machines
+ii  openssh-sftp-server  1:8.9p1-3ubuntu0.1    amd64 secure shell (SSH) sftp server module, for SFTP access from remote machines
-ii  vim-common           2:8.2.3995-1ubuntu2.1 all   Vi IMproved - Common files
-ii  vim-tiny             2:8.2.3995-1ubuntu2.1 amd64 Vi IMproved - enhanced vi editor - compact version
+ii  vim-common           2:8.2.3995-1ubuntu2.3 all   Vi IMproved - Common files
+ii  vim-tiny             2:8.2.3995-1ubuntu2.3 amd64 Vi IMproved - enhanced vi editor - compact version
-ii  xxd                  2:8.2.3995-1ubuntu2.1 amd64 tool to make (or reverse) a hex dump
+ii  xxd                  2:8.2.3995-1ubuntu2.3 amd64 tool to make (or reverse) a hex dump

0.55.0

05 Jan 21:30
Compare
Choose a tag to compare

Notably, this release addresses:

USN-5788-1 USN-5788-1: curl vulnerabilities:

  • CVE-2022-43551: A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) .. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
  • CVE-2022-43552: HTTP Proxy deny use-after-free
  • CVE-2022-43551: A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) .. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
  • CVE-2022-43552: HTTP Proxy deny use-after-free
-ii  curl                              7.81.0-1ubuntu1.6       amd64 command line tool for transferring data with URL syntax
+ii  curl                              7.81.0-1ubuntu1.7       amd64 command line tool for transferring data with URL syntax
-ii  libcurl3-gnutls:amd64             7.81.0-1ubuntu1.6       amd64 easy-to-use client-side URL transfer library (GnuTLS flavour)
-ii  libcurl4:amd64                    7.81.0-1ubuntu1.6       amd64 easy-to-use client-side URL transfer library (OpenSSL flavour)
-ii  libcurl4-openssl-dev:amd64        7.81.0-1ubuntu1.6       amd64 development files and documentation for libcurl (OpenSSL flavour)
+ii  libcurl3-gnutls:amd64             7.81.0-1ubuntu1.7       amd64 easy-to-use client-side URL transfer library (GnuTLS flavour)
+ii  libcurl4:amd64                    7.81.0-1ubuntu1.7       amd64 easy-to-use client-side URL transfer library (OpenSSL flavour)
+ii  libcurl4-openssl-dev:amd64        7.81.0-1ubuntu1.7       amd64 development files and documentation for libcurl (OpenSSL flavour)
-ii  libsasl2-2:amd64                  2.1.27+dfsg2-3ubuntu1   amd64 Cyrus SASL - authentication abstraction library
-ii  libsasl2-dev                      2.1.27+dfsg2-3ubuntu1   amd64 Cyrus SASL - development files for authentication abstraction library
-ii  libsasl2-modules:amd64            2.1.27+dfsg2-3ubuntu1   amd64 Cyrus SASL - pluggable authentication modules
-ii  libsasl2-modules-db:amd64         2.1.27+dfsg2-3ubuntu1   amd64 Cyrus SASL - pluggable authentication modules (DB)
-ii  libsasl2-modules-gssapi-mit:amd64 2.1.27+dfsg2-3ubuntu1   amd64 Cyrus SASL - pluggable authentication modules (GSSAPI)
+ii  libsasl2-2:amd64                  2.1.27+dfsg2-3ubuntu1.1 amd64 Cyrus SASL - authentication abstraction library
+ii  libsasl2-dev                      2.1.27+dfsg2-3ubuntu1.1 amd64 Cyrus SASL - development files for authentication abstraction library
+ii  libsasl2-modules:amd64            2.1.27+dfsg2-3ubuntu1.1 amd64 Cyrus SASL - pluggable authentication modules
+ii  libsasl2-modules-db:amd64         2.1.27+dfsg2-3ubuntu1.1 amd64 Cyrus SASL - pluggable authentication modules (DB)
+ii  libsasl2-modules-gssapi-mit:amd64 2.1.27+dfsg2-3ubuntu1.1 amd64 Cyrus SASL - pluggable authentication modules (GSSAPI)
-ii  tzdata                            2022f-0ubuntu0.22.04.1  all   time zone and daylight-saving time data
+ii  tzdata                            2022g-0ubuntu0.22.04.1  all   time zone and daylight-saving time data

0.54.0

08 Dec 18:38
Compare
Choose a tag to compare

Notably, this release addresses:

USN-5767-1 USN-5767-1: Python vulnerabilities:

  • CVE-2022-37454: The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
  • CVE-2022-45061: An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
  • CVE-2022-45061: An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
  • CVE-2022-37454: The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
-ii  libpython3.10:amd64         3.10.6-1~22.04.1         amd64  Shared Python runtime library (version 3.10)
-ii  libpython3.10-minimal:amd64 3.10.6-1~22.04.1         amd64  Minimal subset of the Python language (version 3.10)
-ii  libpython3.10-stdlib:amd64  3.10.6-1~22.04.1         amd64  Interactive high-level object-oriented language (standard library, version 3.10)
+ii  libpython3.10:amd64         3.10.6-1~22.04.2         amd64  Shared Python runtime library (version 3.10)
+ii  libpython3.10-minimal:amd64 3.10.6-1~22.04.2         amd64  Minimal subset of the Python language (version 3.10)
+ii  libpython3.10-stdlib:amd64  3.10.6-1~22.04.2         amd64  Interactive high-level object-oriented language (standard library, version 3.10)
-ii  libwbclient0:amd64          2:4.15.9+dfsg-0ubuntu0.2 amd64  Samba winbind client library
+ii  libwbclient0:amd64          2:4.15.9+dfsg-0ubuntu0.3 amd64  Samba winbind client library
-ii  python3.10                  3.10.6-1~22.04.1         amd64  Interactive high-level object-oriented language (version 3.10)
-ii  python3.10-minimal          3.10.6-1~22.04.1         amd64  Minimal subset of the Python language (version 3.10)
+ii  python3.10                  3.10.6-1~22.04.2         amd64  Interactive high-level object-oriented language (version 3.10)
+ii  python3.10-minimal          3.10.6-1~22.04.2         amd64  Minimal subset of the Python language (version 3.10)

0.53.0

05 Dec 23:54
Compare
Choose a tag to compare

Notably, this release addresses:

USN-5762-1 USN-5762-1: GNU binutils vulnerability:

  • CVE-2022-38533: In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.
-ii  binutils                  2.38-4ubuntu2   amd64  GNU assembler, linker and binary utilities
-ii  binutils-common:amd64     2.38-4ubuntu2   amd64  Common files for the GNU assembler, linker and binary utilities
-ii  binutils-x86-64-linux-gnu 2.38-4ubuntu2   amd64  GNU binary utilities, for x86-64-linux-gnu target
+ii  binutils                  2.38-4ubuntu2.1 amd64  GNU assembler, linker and binary utilities
+ii  binutils-common:amd64     2.38-4ubuntu2.1 amd64  Common files for the GNU assembler, linker and binary utilities
+ii  binutils-x86-64-linux-gnu 2.38-4ubuntu2.1 amd64  GNU binary utilities, for x86-64-linux-gnu target
-ii  libbinutils:amd64         2.38-4ubuntu2   amd64  GNU binary utilities (private shared library)
+ii  libbinutils:amd64         2.38-4ubuntu2.1 amd64  GNU binary utilities (private shared library)
-ii  libctf-nobfd0:amd64       2.38-4ubuntu2   amd64  Compact C Type Format library (runtime, no BFD dependency)
-ii  libctf0:amd64             2.38-4ubuntu2   amd64  Compact C Type Format library (runtime, BFD dependency)
+ii  libctf-nobfd0:amd64       2.38-4ubuntu2.1 amd64  Compact C Type Format library (runtime, no BFD dependency)
+ii  libctf0:amd64             2.38-4ubuntu2.1 amd64  Compact C Type Format library (runtime, BFD dependency)