https://usn.ubuntu.com/usn/usn-2098-2/
** Tags added: regression-update
** No longer affects: libyaml (Ubuntu Trusty)
** Changed in: libyaml (Ubuntu)
Importance: Undecided => Critical
** Changed in: libyaml (Ubuntu Precise)
Importance: Undecided => Critical
** Changed in: libyaml
** Changed in: libyaml (Debian)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libyaml in Ubuntu.
https://bugs.launchpad.net/bugs/1279805
Title:
regression in CVE-2013-6393 patch
To
** Changed in: libyaml (Debian)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1279805
Title:
regression in CVE-2013-6393 patch
To manage notifications
** Changed in: libyaml (Debian)
Status: Unknown = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libyaml in Ubuntu.
https://bugs.launchpad.net/bugs/1279805
Title:
regression in CVE-2013-6393 patch
To manage
This bug was fixed in the package libyaml - 0.1.4-2ubuntu0.13.10.2
---
libyaml (0.1.4-2ubuntu0.13.10.2) saucy-security; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: updated to use upstream
This bug was fixed in the package libyaml - 0.1.4-2ubuntu0.12.04.2
---
libyaml (0.1.4-2ubuntu0.12.04.2) precise-security; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: updated to use upstream
This bug was fixed in the package libyaml - 0.1.4-2ubuntu0.12.10.2
---
libyaml (0.1.4-2ubuntu0.12.10.2) quantal-security; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: updated to use upstream
** Branch linked: lp:ubuntu/trusty-proposed/libyaml
** Branch linked: lp:ubuntu/precise-security/libyaml
** Branch linked: lp:ubuntu/quantal-security/libyaml
** Branch linked: lp:ubuntu/saucy-security/libyaml
--
You received this bug notification because you are a member of Ubuntu
Server
This bug was fixed in the package libyaml - 0.1.4-3ubuntu2
---
libyaml (0.1.4-3ubuntu2) trusty; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: use upstream commits from 0.1.5.
-
** Changed in: libyaml (Debian)
Status: Unknown = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1279805
Title:
regression in CVE-2013-6393 patch
To manage notifications about
This bug was fixed in the package libyaml - 0.1.4-2ubuntu0.13.10.2
---
libyaml (0.1.4-2ubuntu0.13.10.2) saucy-security; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: updated to use upstream
This bug was fixed in the package libyaml - 0.1.4-2ubuntu0.12.04.2
---
libyaml (0.1.4-2ubuntu0.12.04.2) precise-security; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: updated to use upstream
This bug was fixed in the package libyaml - 0.1.4-2ubuntu0.12.10.2
---
libyaml (0.1.4-2ubuntu0.12.10.2) quantal-security; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: updated to use upstream
** Branch linked: lp:ubuntu/trusty-proposed/libyaml
** Branch linked: lp:ubuntu/precise-security/libyaml
** Branch linked: lp:ubuntu/quantal-security/libyaml
** Branch linked: lp:ubuntu/saucy-security/libyaml
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
This bug was fixed in the package libyaml - 0.1.4-3ubuntu2
---
libyaml (0.1.4-3ubuntu2) trusty; urgency=medium
* SECURITY REGRESSION: parsing regression in security update
(LP: #1279805)
- debian/patches/CVE-2013-6393.patch: use upstream commits from 0.1.5.
-
15 matches
Mail list logo