linux-meta-keystone (3.13.0.21.19) trusty; urgency=low
* linux-meta-keystone ABI 21
Date: 2015-01-14 10:24:11.487713+00:00
Changed-By: Ike Panhc
Signed-By: Adam Conrad
https://launchpad.net/ubuntu/+source/linux-meta-keystone/3.13.0.21.19
Sorry, changesfile not available.--
Trusty-changes mai
linux-keystone (3.13.0-21.34) trusty; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1410600
* Rebase to Ubuntu-3.13.0-45.74
[ Upstream Kernel Changes ]
* arm: Outer sharable memory
- LP: #1411905
[ Ubuntu: 3.13.0-45.74 ]
* Release Tracking Bug
- LP: #141038
thunderbird (1:31.4.0+build1-0ubuntu0.14.04.1) trusty-security; urgency=medium
* New upstream stable release (THUNDERBIRD_31_4_0_BUILD1)
- see USN-2460-1
Date: 2015-01-12 18:48:44.517689+00:00
Changed-By: Chris Coulson
Signed-By: Ubuntu Archive Robot
https://launchpad.net/ubuntu/+source/
thunderbird (1:31.4.0+build1-0ubuntu0.14.04.1) trusty-security; urgency=medium
* New upstream stable release (THUNDERBIRD_31_4_0_BUILD1)
- see USN-2460-1
Date: 2015-01-12 18:48:44.517689+00:00
Changed-By: Chris Coulson
https://launchpad.net/ubuntu/+source/thunderbird/1:31.4.0+build1-0ubunt
libevent (2.0.21-stable-1ubuntu1.14.04.1) trusty-security; urgency=medium
* SECURITY UPDATE: arbitrary code execution via evbuffer API
- debian/patches/CVE-2014-6272.patch: check sizes in buffer.c,
configure.in, evbuffer-internal.h.
- CVE-2014-6272
Date: 2015-01-16 16:45:11.330962
rpm (4.11.1-3ubuntu0.1) trusty-security; urgency=medium
* SECURITY UPDATE: code execution via insecure temp file use
- debian/patches/CVE-2013-6435.patch: create file with proper
permissions in lib/fsm.c.
- CVE-2013-6435
* SECURITY UPDATE: code execution via long file name
-
libssh (0.6.1-0ubuntu3.1) trusty-security; urgency=medium
* SECURITY UPDATE: denial of service via crafted kexinit packet
- debian/patches/CVE-2014-8132.patch: properly set slots to NULL in
src/kex.c.
- CVE-2014-8132
Date: 2015-01-07 17:35:32.650017+00:00
Changed-By: Marc Deslauri
rpm (4.11.1-3ubuntu0.1) trusty-security; urgency=medium
* SECURITY UPDATE: code execution via insecure temp file use
- debian/patches/CVE-2013-6435.patch: create file with proper
permissions in lib/fsm.c.
- CVE-2013-6435
* SECURITY UPDATE: code execution via long file name
-
libssh (0.6.1-0ubuntu3.1) trusty-security; urgency=medium
* SECURITY UPDATE: denial of service via crafted kexinit packet
- debian/patches/CVE-2014-8132.patch: properly set slots to NULL in
src/kex.c.
- CVE-2014-8132
Date: 2015-01-07 17:35:32.650017+00:00
Changed-By: Marc Deslauri
libevent (2.0.21-stable-1ubuntu1.14.04.1) trusty-security; urgency=medium
* SECURITY UPDATE: arbitrary code execution via evbuffer API
- debian/patches/CVE-2014-6272.patch: check sizes in buffer.c,
configure.in, evbuffer-internal.h.
- CVE-2014-6272
Date: 2015-01-16 16:45:11.330962
10 matches
Mail list logo