pgpdump (0.28-1+deb8u1build0.14.04.1) trusty-security; urgency=medium
* fake sync from Debian
Date: 2018-11-06 19:35:18.690256+00:00
Changed-By: Mike Salvatore
Maintainer: Jose-Luis Rivas
Signed-By: Ubuntu Archive Robot
https://launchpad.net/ubuntu/+source/pgpdump/0.28-1+deb8u1build0.14.04.
mactelnet (0.4.0-1+deb8u1build0.14.04.1) trusty-security; urgency=medium
* fake sync from Debian
Date: 2018-11-06 19:06:13.182878+00:00
Changed-By: Mike Salvatore
Maintainer: Håkon Nessjøen
Signed-By: Ubuntu Archive Robot
https://launchpad.net/ubuntu/+source/mactelnet/0.4.0-1+deb8u1build0.1
pgpdump (0.28-1+deb8u1build0.14.04.1) trusty-security; urgency=medium
* fake sync from Debian
Date: 2018-11-06 19:35:18.690256+00:00
Changed-By: Mike Salvatore
Maintainer: Jose-Luis Rivas
https://launchpad.net/ubuntu/+source/pgpdump/0.28-1+deb8u1build0.14.04.1
Sorry, changesfile not available
mactelnet (0.4.0-1+deb8u1build0.14.04.1) trusty-security; urgency=medium
* fake sync from Debian
Date: 2018-11-06 19:06:13.182878+00:00
Changed-By: Mike Salvatore
Maintainer: Håkon Nessjøen
https://launchpad.net/ubuntu/+source/mactelnet/0.4.0-1+deb8u1build0.14.04.1
Sorry, changesfile not avai
spamassassin (3.4.2-0ubuntu0.14.04.1) trusty-security; urgency=medium
* SECURITY UPDATE: Update to 3.4.2 to fix multiple security issues and
support new rule update signatures (LP: #1796863)
- debian/patches/*patch: sync patches from 3.4.2-1 package.
- add pkgrules orig tarball from
ppp (2.4.5-5.1ubuntu2.3) trusty-security; urgency=medium
* SECURITY UPDATE: buffer overflow in pppd EAP-TLS implementation
- debian/patches/CVE-2018-11574.patch: check lengths in pppd/eap.c,
pppd/eap-tls.c.
- CVE-2018-11574
Date: 2018-06-12 17:51:11.264723+00:00
Changed-By: Marc D
spamassassin (3.4.2-0ubuntu0.14.04.1) trusty-security; urgency=medium
* SECURITY UPDATE: Update to 3.4.2 to fix multiple security issues and
support new rule update signatures (LP: #1796863)
- debian/patches/*patch: sync patches from 3.4.2-1 package.
- add pkgrules orig tarball from
ppp (2.4.5-5.1ubuntu2.3) trusty-security; urgency=medium
* SECURITY UPDATE: buffer overflow in pppd EAP-TLS implementation
- debian/patches/CVE-2018-11574.patch: check lengths in pppd/eap.c,
pppd/eap-tls.c.
- CVE-2018-11574
Date: 2018-06-12 17:51:11.264723+00:00
Changed-By: Marc D
mokutil (0.3.0+1538710437.fb6250f-0ubuntu2~14.04.1) trusty; urgency=medium
* Backport mokutil 0.3.0+1538710437.fb6250f-0ubuntu2 to 14.04.
(LP: #1797011)
Date: Thu, 11 Oct 2018 14:55:12 -0400
Changed-By: Mathieu Trudel-Lapierre
Maintainer: Ubuntu Developers
https://launchpad.net/ubuntu/+so
openssh (1:6.6p1-2ubuntu2.11) trusty-security; urgency=medium
* SECURITY UPDATE: OpenSSH User Enumeration Vulnerability (LP: #1794629)
- debian/patches/CVE-2018-15473.patch: delay bailout for invalid
authenticating user until after the packet containing the request
has been fully
openssh (1:6.6p1-2ubuntu2.11) trusty-security; urgency=medium
* SECURITY UPDATE: OpenSSH User Enumeration Vulnerability (LP: #1794629)
- debian/patches/CVE-2018-15473.patch: delay bailout for invalid
authenticating user until after the packet containing the request
has been fully
11 matches
Mail list logo