libservicelog (1.1.16-0ubuntu1.1) xenial; urgency=medium
* debian/patches: Cherry-pick and rebase upstream fixes for additional NULL
checking, string length calculation and validation. (LP: #1705538)
- 0001-Correct-string-length-calculation-and-validates-dest.patch
- 0002-NULL-check
google-cloud-sdk (201.0.0-0ubuntu2~16.04.0) xenial; urgency=medium
* debian/install:
- Make sure we install usr/lib/google-cloud-sdk/properties.
Date: Mon, 04 Jun 2018 21:30:19 +0200
Changed-By: Łukasz 'sil2100' Zemczak
Maintainer: Canonical CPC Team
https://launchpad.net/ubuntu/+source/g
liblouis (2.6.4-2ubuntu0.2) xenial-security; urgency=medium
* SECURITY UPDATE: Stack-based buffer overflow
- debian/patches/CVE-2018-11440.patch: fix in table parsing
liblouis/compileTranslationTable.c.
- CVE-2018-11440
* SECURITY UPDATE: Buffer overflow in braille table parser
liblouis (2.6.4-2ubuntu0.2) xenial-security; urgency=medium
* SECURITY UPDATE: Stack-based buffer overflow
- debian/patches/CVE-2018-11440.patch: fix in table parsing
liblouis/compileTranslationTable.c.
- CVE-2018-11440
* SECURITY UPDATE: Buffer overflow in braille table parser
makedumpfile (1:1.6.3-2~16.04.1) xenial; urgency=medium
* Backport latest makedumpfile to xenial. (LP: #1746299)
* Revert to build-depending on dh-systemd, as xenial does not have
debhelper >= 9.20160709.
Date: Mon, 21 May 2018 11:02:15 -0300
Changed-By: Thadeu Lima de Souza Cascardo
Mai
exempi (2.2.2-2ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: integer overflow in RIFF.cpp
- debian/patches/CVE-2017-18233.patch: fix overflow in
source/XMPFiles/FormatSupport/RIFF.cpp.
- CVE-2017-18233
* SECURITY UPDATE: DoS via pdf file with JPEG data
- debia
kexec-tools (1:2.0.16-1ubuntu1~16.04.1) xenial; urgency=low
* Backport latest kexec-tools from bionic to xenial (LP: #1743529).
Date: Fri, 23 Feb 2018 12:11:36 -0300
Changed-By: Thadeu Lima de Souza Cascardo
Maintainer: Ubuntu Developers
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu
exempi (2.2.2-2ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: integer overflow in RIFF.cpp
- debian/patches/CVE-2017-18233.patch: fix overflow in
source/XMPFiles/FormatSupport/RIFF.cpp.
- CVE-2017-18233
* SECURITY UPDATE: DoS via pdf file with JPEG data
- debia
gce-compute-image-packages (20180510+dfsg1-0ubuntu3~16.04.0) xenial;
urgency=medium
* Backport to Xenial
* Don't wait for snapd.seeded.service
* Keep recommending google-cloud-sdk
gce-compute-image-packages (20180510+dfsg1-0ubuntu3) cosmic; urgency=medium
* Update prerm to stop google-n
postgresql-9.5 (9.5.13-0ubuntu0.16.04) xenial; urgency=medium
* New upstream release (LP: #1769888)
- A dump/restore is not required for those running 9.5.X.
However, if the function marking mistakes mentioned in the first
changelog entry affect you, you will want to take steps t
10 matches
Mail list logo