[ubuntu/trusty-security] lua5.1 5.1.5-5ubuntu0.1 (Accepted)

2014-09-03 Thread Marc Deslauriers
lua5.1 (5.1.5-5ubuntu0.1) trusty-security; urgency=medium * SECURITY UPDATE: possible code execution via overflow in vararg functions (LP: #1362278) - debian/patches/CVE-2014-5461.patch: properly calculate length in src/ldo.c. - CVE-2014-5461 Date: 2014-09-02

[ubuntu/trusty-updates] lua5.1 5.1.5-5ubuntu0.1 (Accepted)

2014-09-03 Thread Ubuntu Archive Robot
lua5.1 (5.1.5-5ubuntu0.1) trusty-security; urgency=medium * SECURITY UPDATE: possible code execution via overflow in vararg functions (LP: #1362278) - debian/patches/CVE-2014-5461.patch: properly calculate length in src/ldo.c. - CVE-2014-5461 Date: 2014-09-02

[ubuntu/trusty-proposed] maas 1.5.4+bzr2294-0ubuntu1 (Accepted)

2014-09-03 Thread Greg Lutostanski
maas (1.5.4+bzr2294-0ubuntu1) trusty-proposed; urgency=medium * New upstream bug fix release: - Change supported releases for install to Precise, Saucy, Trusty, Utopic (Add Utopic; Remove Quantal/Raring) -- will still only be able to install releases with streams available to

[ubuntu/trusty-security] libgcrypt11 1.5.3-2ubuntu4.1 (Accepted)

2014-09-03 Thread Marc Deslauriers
libgcrypt11 (1.5.3-2ubuntu4.1) trusty-security; urgency=medium * SECURITY UPDATE: side-channel attack on Elgamal encryption subkeys - debian/patches/add_gcry_divide_by_zero.patch: replace deliberate division by zero with new _gcry_divide_by_zero(). -

[ubuntu/trusty-updates] libgcrypt11 1.5.3-2ubuntu4.1 (Accepted)

2014-09-03 Thread Ubuntu Archive Robot
libgcrypt11 (1.5.3-2ubuntu4.1) trusty-security; urgency=medium * SECURITY UPDATE: side-channel attack on Elgamal encryption subkeys - debian/patches/add_gcry_divide_by_zero.patch: replace deliberate division by zero with new _gcry_divide_by_zero(). -