[ubuntu/xenial-updates] netty-3.9 3.9.0.Final-1ubuntu0.1 (Accepted)
netty-3.9 (3.9.0.Final-1ubuntu0.1) xenial-security; urgency=medium * Update debian/rules to fix FTBFS * SECURITY UPDATE: HTTP request smuggling - debian/patches/0004-CVE-2019-16869.patch: Correctly handle whitespaces in HTTP header names as defined by RFC7230#section-3.2.4. - debian/patches/0005-CVE-2019-20444.patch: Detect missing colon when parsing http headers with no value. - debian/patches/0006-CVE-2019-20445-1.patch: Verify we do not receive multiple content-length headers or a content-length and transfer-encoding: chunked header when using HTTP/1.1. - debian/patches/0007-CVE-2019-20445-2.patch: Remove "Content-Length" when decoding HTTP/1.1 message with both "Transfer-Encoding: chunked" and "Content-Length". - CVE-2019-16869 - CVE-2019-20444 - CVE-2019-20445 - CVE-2020-7238 Date: 2020-10-21 19:41:21.086524+00:00 Changed-By: Paulo Flabiano Smorigo Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/netty-3.9/3.9.0.Final-1ubuntu0.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] netty-3.9 3.9.0.Final-1ubuntu0.1 (Accepted)
netty-3.9 (3.9.0.Final-1ubuntu0.1) xenial-security; urgency=medium * Update debian/rules to fix FTBFS * SECURITY UPDATE: HTTP request smuggling - debian/patches/0004-CVE-2019-16869.patch: Correctly handle whitespaces in HTTP header names as defined by RFC7230#section-3.2.4. - debian/patches/0005-CVE-2019-20444.patch: Detect missing colon when parsing http headers with no value. - debian/patches/0006-CVE-2019-20445-1.patch: Verify we do not receive multiple content-length headers or a content-length and transfer-encoding: chunked header when using HTTP/1.1. - debian/patches/0007-CVE-2019-20445-2.patch: Remove "Content-Length" when decoding HTTP/1.1 message with both "Transfer-Encoding: chunked" and "Content-Length". - CVE-2019-16869 - CVE-2019-20444 - CVE-2019-20445 - CVE-2020-7238 Date: 2020-10-21 19:41:21.086524+00:00 Changed-By: Paulo Flabiano Smorigo https://launchpad.net/ubuntu/+source/netty-3.9/3.9.0.Final-1ubuntu0.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] libetpan 1.6-1ubuntu0.1 (Accepted)
libetpan (1.6-1ubuntu0.1) xenial-security; urgency=medium * SECURITY UPDATE: response injection in STARTTLS - debian/patches/CVE-2020-15953-1.patch: detect extra data after STARTTLS response and exit - debian/patches/CVE-2020-15953-2.patch: detect extra data after STARTTLS responses in SMTP and POP3 and exit - CVE-2020-15953 Date: 2020-10-21 21:03:19.188331+00:00 Changed-By: Emilia Torino Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/libetpan/1.6-1ubuntu0.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] libapache2-mod-auth-mellon 0.12.0-2+deb9u1build0.16.04.1 (Accepted)
libapache2-mod-auth-mellon (0.12.0-2+deb9u1build0.16.04.1) xenial-security; urgency=medium * fake sync from Debian Date: 2020-10-21 20:39:13.629282+00:00 Changed-By: Eduardo Barretto Maintainer: Thijs Kinkhorst Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/libapache2-mod-auth-mellon/0.12.0-2+deb9u1build0.16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] libetpan 1.6-1ubuntu0.1 (Accepted)
libetpan (1.6-1ubuntu0.1) xenial-security; urgency=medium * SECURITY UPDATE: response injection in STARTTLS - debian/patches/CVE-2020-15953-1.patch: detect extra data after STARTTLS response and exit - debian/patches/CVE-2020-15953-2.patch: detect extra data after STARTTLS responses in SMTP and POP3 and exit - CVE-2020-15953 Date: 2020-10-21 21:03:19.188331+00:00 Changed-By: Emilia Torino https://launchpad.net/ubuntu/+source/libetpan/1.6-1ubuntu0.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] libapache2-mod-auth-mellon 0.12.0-2+deb9u1build0.16.04.1 (Accepted)
libapache2-mod-auth-mellon (0.12.0-2+deb9u1build0.16.04.1) xenial-security; urgency=medium * fake sync from Debian Date: 2020-10-21 20:39:13.629282+00:00 Changed-By: Eduardo Barretto Maintainer: Thijs Kinkhorst https://launchpad.net/ubuntu/+source/libapache2-mod-auth-mellon/0.12.0-2+deb9u1build0.16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes