From: Raspbian automatic forward porter Date: Mon, 21 Feb 2022 09:05:52 +0000 (+0000) Subject: Merge version 2.49-1+rpi1 and 2.49-1+deb11u1 to produce 2.49-1+rpi1+deb11u1 X-Git-Tag: archive/raspbian/2.49-1+rpi1+deb11u1^0 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=b4c927afad5e1b11743c3ec668e7ede1c5c46752;p=snapd.git Merge version 2.49-1+rpi1 and 2.49-1+deb11u1 to produce 2.49-1+rpi1+deb11u1 --- b4c927afad5e1b11743c3ec668e7ede1c5c46752 diff --cc debian/changelog index 5a74687e,87cb5804..a2958830 --- a/debian/changelog +++ b/debian/changelog @@@ -1,11 -1,21 +1,30 @@@ - snapd (2.49-1+rpi1) bullseye-staging; urgency=medium ++snapd (2.49-1+rpi1+deb11u1) bullseye-staging; urgency=medium + + [changes brought forward from 2.27.2-2+rpi1 by Peter Michael Green at Thu, 24 Aug 2017 17:53:18 +0000] + * Treat unknown derivatives the same as Debian. + * Disable testsuite. + * Fix clean target. + - -- Raspbian forward porter Sat, 06 Mar 2021 20:36:56 +0000 ++ -- Raspbian forward porter Mon, 21 Feb 2022 09:05:51 +0000 ++ + snapd (2.49-1+deb11u1) bullseye-security; urgency=high + + * SECURITY UPDATE: local privilege escalation + - 0015-cve-2021-44730-44731-4120.patch: Add validations of the + location of the snap-confine binary within snapd. + - 0015-cve-2021-44730-44731-4120: Fix race condition in snap-confine + when preparing a private mount namespace for a snap. + - 0016-cve-2021-2021-44730-44731-4120-auto-remove.patch: automatic + remove vulnerable inactive core/snapd snaps + - CVE-2021-44730 + - CVE-2021-44731 + * SECURITY UPDATE: data injection from malicious snaps + - 0015-cve-2021-44730-44731-4120: Add validations of snap content + interface and layout paths in snapd + - CVE-2021-4120 + - LP: #1949368 + + -- Michael Vogt Wed, 16 Feb 2022 10:56:34 +0100 snapd (2.49-1) unstable; urgency=high