[ubuntu/xenial-updates] netty-3.9 3.9.0.Final-1ubuntu0.1 (Accepted)

2020-10-22 Thread Ubuntu Archive Robot
netty-3.9 (3.9.0.Final-1ubuntu0.1) xenial-security; urgency=medium

  * Update debian/rules to fix FTBFS
  * SECURITY UPDATE: HTTP request smuggling
- debian/patches/0004-CVE-2019-16869.patch: Correctly handle whitespaces in
  HTTP header names as defined by RFC7230#section-3.2.4.
- debian/patches/0005-CVE-2019-20444.patch: Detect missing colon when
  parsing http headers with no value.
- debian/patches/0006-CVE-2019-20445-1.patch: Verify we do not receive
  multiple content-length headers or a content-length and
  transfer-encoding: chunked header when using HTTP/1.1.
- debian/patches/0007-CVE-2019-20445-2.patch: Remove "Content-Length" when
  decoding HTTP/1.1 message with both "Transfer-Encoding: chunked" and
  "Content-Length".
- CVE-2019-16869
- CVE-2019-20444
- CVE-2019-20445
- CVE-2020-7238

Date: 2020-10-21 19:41:21.086524+00:00
Changed-By: Paulo Flabiano Smorigo 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/netty-3.9/3.9.0.Final-1ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] netty-3.9 3.9.0.Final-1ubuntu0.1 (Accepted)

2020-10-22 Thread Paulo Flabiano Smorigo
netty-3.9 (3.9.0.Final-1ubuntu0.1) xenial-security; urgency=medium

  * Update debian/rules to fix FTBFS
  * SECURITY UPDATE: HTTP request smuggling
- debian/patches/0004-CVE-2019-16869.patch: Correctly handle whitespaces in
  HTTP header names as defined by RFC7230#section-3.2.4.
- debian/patches/0005-CVE-2019-20444.patch: Detect missing colon when
  parsing http headers with no value.
- debian/patches/0006-CVE-2019-20445-1.patch: Verify we do not receive
  multiple content-length headers or a content-length and
  transfer-encoding: chunked header when using HTTP/1.1.
- debian/patches/0007-CVE-2019-20445-2.patch: Remove "Content-Length" when
  decoding HTTP/1.1 message with both "Transfer-Encoding: chunked" and
  "Content-Length".
- CVE-2019-16869
- CVE-2019-20444
- CVE-2019-20445
- CVE-2020-7238

Date: 2020-10-21 19:41:21.086524+00:00
Changed-By: Paulo Flabiano Smorigo 
https://launchpad.net/ubuntu/+source/netty-3.9/3.9.0.Final-1ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] libetpan 1.6-1ubuntu0.1 (Accepted)

2020-10-22 Thread Ubuntu Archive Robot
libetpan (1.6-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: response injection in STARTTLS
- debian/patches/CVE-2020-15953-1.patch: detect extra data after
  STARTTLS response and exit
- debian/patches/CVE-2020-15953-2.patch: detect extra data after
  STARTTLS responses in SMTP and POP3 and exit
- CVE-2020-15953

Date: 2020-10-21 21:03:19.188331+00:00
Changed-By: Emilia Torino 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/libetpan/1.6-1ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] libapache2-mod-auth-mellon 0.12.0-2+deb9u1build0.16.04.1 (Accepted)

2020-10-22 Thread Ubuntu Archive Robot
libapache2-mod-auth-mellon (0.12.0-2+deb9u1build0.16.04.1) xenial-security; 
urgency=medium

  * fake sync from Debian

Date: 2020-10-21 20:39:13.629282+00:00
Changed-By: Eduardo Barretto 
Maintainer: Thijs Kinkhorst 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/libapache2-mod-auth-mellon/0.12.0-2+deb9u1build0.16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] libetpan 1.6-1ubuntu0.1 (Accepted)

2020-10-22 Thread Emilia Torino
libetpan (1.6-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: response injection in STARTTLS
- debian/patches/CVE-2020-15953-1.patch: detect extra data after
  STARTTLS response and exit
- debian/patches/CVE-2020-15953-2.patch: detect extra data after
  STARTTLS responses in SMTP and POP3 and exit
- CVE-2020-15953

Date: 2020-10-21 21:03:19.188331+00:00
Changed-By: Emilia Torino 
https://launchpad.net/ubuntu/+source/libetpan/1.6-1ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] libapache2-mod-auth-mellon 0.12.0-2+deb9u1build0.16.04.1 (Accepted)

2020-10-22 Thread Eduardo Barretto
libapache2-mod-auth-mellon (0.12.0-2+deb9u1build0.16.04.1) xenial-security; 
urgency=medium

  * fake sync from Debian

Date: 2020-10-21 20:39:13.629282+00:00
Changed-By: Eduardo Barretto 
Maintainer: Thijs Kinkhorst 
https://launchpad.net/ubuntu/+source/libapache2-mod-auth-mellon/0.12.0-2+deb9u1build0.16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes