ruby1.9.1 (1.9.3.484-2ubuntu1.5) trusty-security; urgency=medium
* SECURITY UPDATE: Buffer underrun vulneratiblity
- debian/patches/CVE-2017-0898-10748-14033-14064.patch
patch extracted from debian Wheezy.
- CVE-2017-0898
* SECURITY UPDATE: ANSI escape sequence vulnerability
- debian/patches/CVE-2017-0899-0900-0901.patch
patch extracted from debian Wheezy.
- CVE-2017-0899
* SECURITY UPDATE: DoS vulnerability in query command
- debian/patches/CVE-2017-0899-0900-0901-0902.patch
patch extracted from debian Wheezy.
- CVE-2017-0900
* SECURITY UPDATE: Malicious gem overwrite arbitrary files
- debian/patches/CVE-2017-0899-0900-0901.patch
patch extracted from debian Wheezy.
- CVE-2017-0901
* SECURITY UPDATE: Escape sequence injection vulnerability
- debian/patches/CVE-2017-0898-10748-14033-14064.patch
patch extracted from debian Wheezy.
- CVE-2017-10748
* SECURITY UPDATE: Buffer underrun
- debian/patches/CVE-2017-0898-10748-14033-14064.patch
patch extracted from debian Wheezy.
- CVE-2017-14033
* SECURITY UPDATE: Heap exposure
- debian/patches/CVE-2017-0898-10748-14033-14064.patch
patch extracted from debian Wheezy.
- CVE-2017-14064
Date: 2017-10-03 19:48:17.058847+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.484-2ubuntu1.5
Sorry, changesfile not available.
--
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/trusty-changes