* SECURITY UPDATE: weak permissions on secret files, command injection
- d/p/lp2065738/0028-libnetplan-use-more-restrictive-file-permissions.patch:
Use more restrictive file permissions to prevent unprivileged users to
read sensitive data from back end files (LP: #2065738, #1987842)
- CVE-2022-4968
- d/p/lp2066258/0029-libnetplan-escape-control-characters.patch:
Escape control characters in the parser and double quotes in backend
files
- d/p/lp2066258/0030-backends-escape-file-paths.patch:
Escape special characters in file paths
- d/p/lp2066258/0031-backends-escape-semicolons-in-service-units.patch:
Escape isolated semicolons in systemd service units (LP: #2066258)
* debian/netplan.io.postinst: Add a postinst maintainer script to call the
generator. It's needed so the file permissions fixes will be applied
automatically, thanks to danilogondolfo
This bug was fixed in the package netplan.io - 0.106.1- 7ubuntu0. 22.04.3
--------------- 1-7ubuntu0. 22.04.3) jammy-security; urgency=medium
netplan.io (0.106.
* SECURITY UPDATE: weak permissions on secret files, command injection 0028-libnetplan -use-more- restrictive- file-permission s.patch: 0029-libnetplan -escape- control- characters. patch: 0030-backends- escape- file-paths. patch: 0031-backends- escape- semicolons- in-service- units.patch: netplan. io.postinst: Add a postinst maintainer script to call the
- d/p/lp2065738/
Use more restrictive file permissions to prevent unprivileged users to
read sensitive data from back end files (LP: #2065738, #1987842)
- CVE-2022-4968
- d/p/lp2066258/
Escape control characters in the parser and double quotes in backend
files
- d/p/lp2066258/
Escape special characters in file paths
- d/p/lp2066258/
Escape isolated semicolons in systemd service units (LP: #2066258)
* debian/
generator. It's needed so the file permissions fixes will be applied
automatically, thanks to danilogondolfo
-- Sudhakar Verma <email address hidden> Mon, 24 Jun 2024 23:20:42 +0530