flashplugin-nonfree (29.0.0.140ubuntu0.14.04.1) trusty-security; urgency=medium
* New upstream release 29.0.0.140
- debian/flashplugin-installer.{config,postinst},
debian/post-download-hook: Updated version and sha256sum
Date: 2018-04-10 14:11:14.442258+00:00
Changed-By: Chris
flashplugin-nonfree (29.0.0.140ubuntu0.14.04.1) trusty-security; urgency=medium
* New upstream release 29.0.0.140
- debian/flashplugin-installer.{config,postinst},
debian/post-download-hook: Updated version and sha256sum
Date: 2018-04-10 14:11:14.442258+00:00
Changed-By: Chris
adobe-flashplugin (1:20180410.1-0ubuntu0.14.04.1) trusty; urgency=medium
* New upstream releases (29.0.0.140)
adobe-flashplugin (1:20180313.1-0ubuntu1) bionic; urgency=medium
* New upstream releases (29.0.0.113)
Date: 2018-04-10 18:34:20.449699+00:00
Changed-By: Chris Coulson
adobe-flashplugin (1:20180410.1-0ubuntu0.14.04.1) trusty; urgency=medium
* New upstream releases (29.0.0.140)
Date: Mon, 09 Apr 2018 14:45:12 +0100
Changed-By: Chris Coulson
Maintainer: DL-Flash Player Ubuntu
patch (2.7.1-4ubuntu2.4) trusty-security; urgency=medium
* SECURITY UPDATE: Out-of-bounds access
- debian/patches/CVE-2016-10713.patch: fix in
src/pch.c.
- CVE-2016-10713
* SECURITY UPDATE: Input validation vulnerability
- debian/patches/CVE-2018-1000156.patch: fix in
patch (2.7.1-4ubuntu2.4) trusty-security; urgency=medium
* SECURITY UPDATE: Out-of-bounds access
- debian/patches/CVE-2016-10713.patch: fix in
src/pch.c.
- CVE-2016-10713
* SECURITY UPDATE: Input validation vulnerability
- debian/patches/CVE-2018-1000156.patch: fix in
squirrelmail (2:1.4.23~svn20120406-2+deb8u2build0.14.04.1) trusty-security;
urgency=medium
* fake sync from Debian
squirrelmail (2:1.4.23~svn20120406-2+deb8u2) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Path traversal vulnerability (CVE-2018-8741)
squirrelmail (2:1.4.23~svn20120406-2+deb8u2build0.14.04.1) trusty-security;
urgency=medium
* fake sync from Debian
squirrelmail (2:1.4.23~svn20120406-2+deb8u2) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Path traversal vulnerability (CVE-2018-8741)