miniupnpc (1.6-3ubuntu2.14.04.4) trusty-security; urgency=medium
* SECURITY UPDATE: multiple overflows
- upnpreplyparse.c: properly initialize data structure for SOAP
parsing.
- minixml.c: fix heap buffer overflow.
- CVE-2017-1000494
Date: 2018-01-31 19:00:48.160205+00:00
miniupnpc (1.6-3ubuntu2.14.04.4) trusty-security; urgency=medium
* SECURITY UPDATE: multiple overflows
- upnpreplyparse.c: properly initialize data structure for SOAP
parsing.
- minixml.c: fix heap buffer overflow.
- CVE-2017-1000494
Date: 2018-01-31 19:00:48.160205+00:00
phpldapadmin (1.2.2-5ubuntu1.2) trusty-security; urgency=medium
* SECURITY UPDATE: Multiple Cross-Site Scripting vulnerabilities in
file htdocs/entry_chooser.php (LP: #1701731)
- debian/patches/fix-XSS-3.patch: sanitize user inputs in
file htdocs/entry_chooser.php.
-
partman-partitioning (99ubuntu2) trusty; urgency=medium
* Make get_real_device() both simpler and more generic.
(LP: #1733276) (Closes: #820818).
Date: Tue, 06 Feb 2018 12:08:28 -0500
Changed-By: Eric Desrochers
Maintainer: Ubuntu Installer Team
preseed (1.62ubuntu1.2) trusty; urgency=medium
* Fix for netcfg/hostname, if set, to take precedence. (LP: #1745531)
- Modify debian/network-preseed.postinst to make it more robust
Date: Thu, 25 Jan 2018 15:09:28 +0800
Changed-By: Hua Zhang
Maintainer: Ubuntu
phpldapadmin (1.2.2-5ubuntu1.2) trusty-security; urgency=medium
* SECURITY UPDATE: Multiple Cross-Site Scripting vulnerabilities in
file htdocs/entry_chooser.php (LP: #1701731)
- debian/patches/fix-XSS-3.patch: sanitize user inputs in
file htdocs/entry_chooser.php.
-
qemu (2.0.0+dfsg-2ubuntu1.38) trusty-security; urgency=medium
* SECURITY UPDATE: Add support for Spectre mitigations (LP: #1744882)
- debian/patches/CVE-2017-5715-1.patch: Lengthen X86CPUDefinition::
model_id in target-i386/cpu.c.
- debian/patches/CVE-2017-5715-2.patch: Add
libvirt (1.2.2-0ubuntu13.1.25) trusty-security; urgency=medium
* SECURITY UPDATE: Add support for Spectre mitigations
- debian/patches/CVE-2017-5715-ibrs*.patch: add CPU features for
indirect branch prediction protection and add new *-IBRS CPU models.
- debian/control: add Breaks
qemu (2.0.0+dfsg-2ubuntu1.38) trusty-security; urgency=medium
* SECURITY UPDATE: Add support for Spectre mitigations (LP: #1744882)
- debian/patches/CVE-2017-5715-1.patch: Lengthen X86CPUDefinition::
model_id in target-i386/cpu.c.
- debian/patches/CVE-2017-5715-2.patch: Add
libvirt (1.2.2-0ubuntu13.1.25) trusty-security; urgency=medium
* SECURITY UPDATE: Add support for Spectre mitigations
- debian/patches/CVE-2017-5715-ibrs*.patch: add CPU features for
indirect branch prediction protection and add new *-IBRS CPU models.
- debian/control: add Breaks
10 matches
Mail list logo