%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream
16/06/2025, commit https://git.launchpad.net/snap-core18/tree/74bb5585b7c696c20e4e7ca7faff13d2be218d8b [ Changes in the core18 snap ] No detected changes for the core18 snap [ Changes in primed packages ] libc-bin, libc6:amd64, libc6:i386, multiarch-support (built from glibc) updated from 2.27-3ubuntu1.6+esm4 to 2.27-3ubuntu1.6+esm5: glibc (2.27-3ubuntu1.6+esm5) bionic-security; urgency=medium * SECURITY UPDATE: privelege escalation issue - debian/patches/any/CVE-2025-4802.patch: elf: Ignore LD_LIBRARY_PATH and debug env var for setuid for static - CVE-2025-4802 -- Nishit Majithia <nishit.majithia@canonical.com> Mon, 26 May 2025 13:48:50 +0530 libgssapi-krb5-2:amd64, libk5crypto3:amd64, libkrb5-3:amd64, libkrb5support0:amd64 (built from krb5) updated from 1.16-2ubuntu0.4+esm3 to 1.16-2ubuntu0.4+esm5: krb5 (1.16-2ubuntu0.4+esm5) bionic-security; urgency=medium * SECURITY UPDATE: Use of weak cryptographic hash. - debian/patches/CVE-2025-3576*.patch: Add allow_des3 and allow_rc4 options. Disallow usage of des3 and rc4 unless allowed in the config. Replace warn_des3 with warn_deprecated in ./src/lib/krb5/krb/get_in_tkt.c. Add allow_des3 and allow_rc4 boolean in ./src/include/k5-int.h. Prevent usage of deprecated enctypes in ./src/kdc/kdc_util.c. - debian/patches/CVE-2025-3576-post1.patch: Add enctype comparison with ENCTYPE_AES256_CTS_HMAC_SHA1_96 in ./src/kdc/kdc_util.c. - debian/libk5crypto3.symbols: Add krb5int_c_deprecated_enctype symbol. - CVE-2025-3576 -- Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com> Tue, 20 May 2025 11:16:32 -0230 python3-pkg-resources (built from python-setuptools) updated from 39.0.1-2ubuntu0.1+esm1 to 39.0.1-2ubuntu0.1+esm2: python-setuptools (39.0.1-2ubuntu0.1+esm2) bionic-security; urgency=medium * SECURITY UPDATE: path traversal vulnerability - debian/patches/CVE-2025-47273-pre1.patch: Extract _resolve_download_filename with test. - debian/patches/CVE-2025-47273.patch: Add a check to ensure the name resolves relative to the tmpdir. - CVE-2025-47273 -- Fabian Toepfer <fabian.toepfer@canonical.com> Wed, 28 May 2025 19:37:50 +0200 libpython3.6-minimal:amd64, libpython3.6-stdlib:amd64, python3.6, python3.6-minimal (built from python3.6) updated from 3.6.9-1~18.04ubuntu1.13+esm4 to 3.6.9-1~18.04ubuntu1.13+esm5: python3.6 (3.6.9-1~18.04ubuntu1.13+esm5) bionic-security; urgency=medium * SECURITY UPDATE: Improper encoding of comma during address list folding. - debian/patches/CVE-2025-1795-1.patch: Replace ValueTerminal with ListSeparator in ./Lib/email/_header_value_parser.py. - debian/patches/CVE-2025-1795-2.patch: Add checks for terminal non-encoding in ./Lib/email/_header_value_parser.py. - CVE-2025-1795 * SECURITY UPDATE: Use after free in unicode_escape decoding. - debian/patches/CVE-2025-4516-pre1.patch: Add DecodeUnicodeEscapeStateful and replace DecodeUnicodeEscape with DecodeUnicodeEscapeInternal in ./Include/cpython/unicodeobject.h. Change IncrementalDecoder and add decode to StreamReader in ./Lib/encodings/unicode_escape.py. Change instance to DecodeUnicodeEscapeStateful in ./Modules/_codecsmodule.c. Change checks in ./Modules/clinic/_codecsmodule.c.h and instances in ./Objects/unicodeobject.c and ./Parser/pegen/parse_string.c. - debian/patches/CVE-2025-4516.patch: Add _PyBytes_DecodeEscape2 in ./Include/cpython/bytesobject.h. Add _PyUnicode_DecodeUnicodeEscapeInternal2 in ./Include/cpython/unicodeobject.h. Add extra escape checks in ./Objects/bytesobject.c and ./Objects/unicodeobject.c. - debian/libpython.symbols.in: Update symbols with new functions. - CVE-2025-4516 -- Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com> Wed, 11 Jun 2025 09:40:51 -0230 python3-requests (built from requests) updated from 2.18.4-2ubuntu0.1+esm1 to 2.18.4-2ubuntu0.1+esm2: requests (2.18.4-2ubuntu0.1+esm2) bionic-security; urgency=medium * SECURITY UPDATE: Information Leak - debian/patches/CVE-2024-47081.patch: Only use hostname to do netrc lookup instead of netloc - CVE-2024-47081 -- Bruce Cable <bruce.cable@canonical.com> Wed, 11 Jun 2025 13:27:28 +1000