capnproto (0.4.0-1ubuntu2.1) trusty-security; urgency=medium

  * SECURITY UPDATE: Integer overflow in pointer validation.
    - debian/patches/CVE-2015-2310.patch: fix in src/capnp/layout.c++
    - CVE-2015-2310

  * SECURITY UPDATE: Integer underflow in pointer validation.
    - debian/patches/CVE-2015-2311.patch: fix in src/capnp/layout.c++
    - CVE-2015-2311

  * SECURITY UPDATE: CPU usage amplification attack.
    - debian/patches/CVE-2015-2312.patch: fix in src/capnp/arena.h,
      src/capnp/encoding-test.c++ and src/capnp/layout.c++
    - CVE-2015-2312

  * SECURITY UPDATE: CPU additional CPU amplification case.
    - debian/patches/CVE-2015-2313.patch: fix in src/capnp/layout.c++
      and src/capnp/encoding-test.c++
    - CVE-2015-2313

  * SECURITY UPDATE: Prevent compiler from eliding bounds checks.
    - debian/patches/CVE-2017-7892.patch: fix in src/capnp/arena.h
    - CVE-2017-7892

Date: 2018-07-31 12:57:18.048380+00:00
Changed-By: Eduardo dos Santos Barretto <[email protected]>
Signed-By: Ubuntu Archive Robot 
<[email protected]>
https://launchpad.net/ubuntu/+source/capnproto/0.4.0-1ubuntu2.1
Sorry, changesfile not available.
-- 
Trusty-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to