firefox (65.0.1+build2-0ubuntu0.16.04.1) xenial; urgency=medium
* New upstream stable release (65.0.1build2)
Date: 2019-02-15 00:06:12.536054+00:00
Changed-By: Olivier Tilloy
Signed-By: Ubuntu Archive Robot
https://launchpad.net/ubuntu/+source/firefox/65.0.1+build2-0ubuntu0.16.04.1
Sorry,
thunderbird (1:60.5.1+build2-0ubuntu0.16.04.1) xenial; urgency=medium
* New upstream stable release (60.5.1build2)
* Refresh patches:
- debian/patches/drop-check-glibc-symbols.patch
- debian/patches/unity-menubar.patch
Date: 2019-02-19 15:05:36.799926+00:00
Changed-By: Olivier
ldb (2:1.1.24-1ubuntu3.1) xenial-security; urgency=medium
* SECURITY UPDATE: Out of bound read in ldb_wildcard_compare
- debian/patches/CVE-2019-3824-1.patch: fix length.
- debian/patches/CVE-2019-3824-2.patch: add extra comments.
- debian/patches/CVE-2019-3824-3.patch: improve code
gnome-keyring (3.18.3-0ubuntu2.1) xenial-security; urgency=medium
* SECURITY UPDATE: credentials exposed in memory (LP: #1772919)
- debian/patches/CVE-2018-20781.patch: destroy the password in
pam_sm_open_session in pam/gkr-pam-module.c.
- CVE-2018-20781
Date: 2019-02-14
gnome-keyring (3.18.3-0ubuntu2.1) xenial-security; urgency=medium
* SECURITY UPDATE: credentials exposed in memory (LP: #1772919)
- debian/patches/CVE-2018-20781.patch: destroy the password in
pam_sm_open_session in pam/gkr-pam-module.c.
- CVE-2018-20781
Date: 2019-02-14
ghostscript (9.26~dfsg+0-0ubuntu0.16.04.7) xenial-security; urgency=medium
* SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail,
second fix attempt. (LP: #1815339)
- debian/patches/lp1815339.patch: re-enable.
- debian/patches/lp1815339-2.patch: properly map RGBW
thunderbird (1:60.5.1+build2-0ubuntu0.16.04.1) xenial; urgency=medium
* New upstream stable release (60.5.1build2)
* Refresh patches:
- debian/patches/drop-check-glibc-symbols.patch
- debian/patches/unity-menubar.patch
Date: 2019-02-19 15:05:36.799926+00:00
Changed-By: Olivier
ghostscript (9.26~dfsg+0-0ubuntu0.16.04.7) xenial-security; urgency=medium
* SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail,
second fix attempt. (LP: #1815339)
- debian/patches/lp1815339.patch: re-enable.
- debian/patches/lp1815339-2.patch: properly map RGBW
ldb (2:1.1.24-1ubuntu3.1) xenial-security; urgency=medium
* SECURITY UPDATE: Out of bound read in ldb_wildcard_compare
- debian/patches/CVE-2019-3824-1.patch: fix length.
- debian/patches/CVE-2019-3824-2.patch: add extra comments.
- debian/patches/CVE-2019-3824-3.patch: improve code
firefox (65.0.1+build2-0ubuntu0.16.04.1) xenial; urgency=medium
* New upstream stable release (65.0.1build2)
Date: 2019-02-15 00:06:12.536054+00:00
Changed-By: Olivier Tilloy
Signed-By: Chris Coulson
https://launchpad.net/ubuntu/+source/firefox/65.0.1+build2-0ubuntu0.16.04.1
Sorry,
postgis (2.2.1+dfsg-2ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: An empty argument in a postgis function can cause a DoS
in PostgreSQL. This fix avoid it.
- debian/patches/CVE-2017-18359.patch: ST_AsX3D handle empty geometries.
- CVE-2017-18359
Date: 2019-02-14
user-setup (1.63ubuntu4.1) xenial; urgency=medium
* Mount /proc before calling adduser --encrypt-home. This calls into
ecryptfs, which requires a /proc in order to find out where sysfs is
mounted. (LP: #1817689)
Date: Tue, 26 Feb 2019 18:43:44 +
Changed-By: Iain Lane
Maintainer:
faad2 (2.8.0~cvs20150510-1ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Various issues were discovered in faad2 that can
cause DoS (large loop and CPU consumption) via a crafted mp4 file.
- debian/patches/CVE-2017-92xx.patch: Fix multiple vulnerabilities.
-
postgis (2.2.1+dfsg-2ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: An empty argument in a postgis function can cause a DoS
in PostgreSQL. This fix avoid it.
- debian/patches/CVE-2017-18359.patch: ST_AsX3D handle empty geometries.
- CVE-2017-18359
Date: 2019-02-14
faad2 (2.8.0~cvs20150510-1ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Various issues were discovered in faad2 that can
cause DoS (large loop and CPU consumption) via a crafted mp4 file.
- debian/patches/CVE-2017-92xx.patch: Fix multiple vulnerabilities.
-
sqlite3 (3.11.0-1ubuntu1.1) xenial-security; urgency=medium
* SECURITY UPDATE: Avoid segmentation fault while using a corrupted file.
- d/p/0001-Fix-a-parsing-issue-associated-with-a-corrupt-sqlite.patch:
Check if parser is busy before using it and raise an error if positive.
ubiquity (2.21.63.10) xenial; urgency=medium
* Automatic update of included source packages: user-setup
1.63ubuntu4.1. (LP: #1817689)
Date: Tue, 26 Feb 2019 21:37:01 +0100
Changed-By: Łukasz 'sil2100' Zemczak
Maintainer: Ubuntu Installer Team
sqlite3 (3.11.0-1ubuntu1.1) xenial-security; urgency=medium
* SECURITY UPDATE: Avoid segmentation fault while using a corrupted file.
- d/p/0001-Fix-a-parsing-issue-associated-with-a-corrupt-sqlite.patch:
Check if parser is busy before using it and raise an error if positive.
user-setup (1.63ubuntu4.1) xenial; urgency=medium
* Mount /proc before calling adduser --encrypt-home. This calls into
ecryptfs, which requires a /proc in order to find out where sysfs is
mounted. (LP: #1817689)
Date: 2019-02-26 18:49:09.783344+00:00
Changed-By: Iain Lane
Signed-By:
ubiquity (2.21.63.10) xenial; urgency=medium
* Automatic update of included source packages: user-setup
1.63ubuntu4.1. (LP: #1817689)
Date: 2019-02-26 20:59:09.617075+00:00
Changed-By: Łukasz Zemczak
https://launchpad.net/ubuntu/+source/ubiquity/2.21.63.10
Sorry, changesfile not
docker.io (18.09.2-0ubuntu1~16.04.1) xenial; urgency=medium
* Backport to 16.04 (LP: #1815683).
* Revert "Let dh_systemd install .service file: replace .install file entry
with symlink"
* Build with the freshly backported golang-1.10-go package.
* Relax the build dependency on
21 matches
Mail list logo