lua5.1 (5.1.5-5ubuntu0.1) trusty-security; urgency=medium
* SECURITY UPDATE: possible code execution via overflow in vararg
functions (LP: #1362278)
- debian/patches/CVE-2014-5461.patch: properly calculate length in
src/ldo.c.
- CVE-2014-5461
Date: 2014-09-02
lua5.1 (5.1.5-5ubuntu0.1) trusty-security; urgency=medium
* SECURITY UPDATE: possible code execution via overflow in vararg
functions (LP: #1362278)
- debian/patches/CVE-2014-5461.patch: properly calculate length in
src/ldo.c.
- CVE-2014-5461
Date: 2014-09-02
maas (1.5.4+bzr2294-0ubuntu1) trusty-proposed; urgency=medium
* New upstream bug fix release:
- Change supported releases for install to Precise, Saucy, Trusty, Utopic
(Add Utopic; Remove Quantal/Raring) -- will still only be able to install
releases with streams available to
libgcrypt11 (1.5.3-2ubuntu4.1) trusty-security; urgency=medium
* SECURITY UPDATE: side-channel attack on Elgamal encryption subkeys
- debian/patches/add_gcry_divide_by_zero.patch: replace deliberate
division by zero with new _gcry_divide_by_zero().
-
libgcrypt11 (1.5.3-2ubuntu4.1) trusty-security; urgency=medium
* SECURITY UPDATE: side-channel attack on Elgamal encryption subkeys
- debian/patches/add_gcry_divide_by_zero.patch: replace deliberate
division by zero with new _gcry_divide_by_zero().
-