summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Zygmunt Krynicki [Thu, 17 Jan 2019 13:48:46 +0000 (15:48 +0200)]
[PATCH 1/9] cmd/snap-seccomp: use upstream seccomp package
Upstream snapd uses a fork that carries additional compatibility patch
required to build snapd for Ubuntu 14.04. This patch is not required with
the latest snapshot of the upstream seccomp golang bindings but they are
neither released upstream nor backported (in their entirety) to Ubuntu
14.04.
The forked seccomp library is not packaged in Debian. As such, to build
snapd, we need to switch to the regular, non-forked package name.
Signed-off-by: Zygmunt Krynicki <me@zygoon.pl>
Gbp-Pq: Name 0001-cmd-snap-seccomp-use-upstream-seccomp-package.patch
Michael Vogt [Thu, 17 Feb 2022 15:29:46 +0000 (15:29 +0000)]
snapd (2.37.4-1+deb10u1) buster-security; urgency=medium
* SECURITY UPDATE: local privilege escalation
- d/p/cve202144730: Add validations of the
location of the snap-confine binary within snapd.
- d/p/cve202144730: Fix race condition in snap-confine
when preparing a private mount namespace for a snap.
- CVE-2021-44730
- CVE-2021-44731
[dgit import unpatched snapd 2.37.4-1+deb10u1]
Michael Vogt [Thu, 17 Feb 2022 15:29:46 +0000 (15:29 +0000)]
Import snapd_2.37.4-1+deb10u1.debian.tar.xz
[dgit import tarball snapd 2.37.4-1+deb10u1 snapd_2.37.4-1+deb10u1.debian.tar.xz]
Zygmunt Krynicki [Thu, 28 Feb 2019 17:21:26 +0000 (17:21 +0000)]
Import snapd_2.37.4.orig.tar.xz
[dgit import orig snapd_2.37.4.orig.tar.xz]