ruby1.9.1 (1.9.3.484-2ubuntu1.5) trusty-security; urgency=medium

  * SECURITY UPDATE: Buffer underrun vulneratiblity
    - debian/patches/CVE-2017-0898-10748-14033-14064.patch
      patch extracted from debian Wheezy.
    - CVE-2017-0898
  * SECURITY UPDATE: ANSI escape sequence vulnerability
    - debian/patches/CVE-2017-0899-0900-0901.patch
      patch extracted from debian Wheezy.
    - CVE-2017-0899
  * SECURITY UPDATE: DoS vulnerability in query command
    - debian/patches/CVE-2017-0899-0900-0901-0902.patch
      patch extracted from debian Wheezy.
    - CVE-2017-0900
  * SECURITY UPDATE: Malicious gem overwrite arbitrary files
    - debian/patches/CVE-2017-0899-0900-0901.patch
      patch extracted from debian Wheezy.
    - CVE-2017-0901
  * SECURITY UPDATE: Escape sequence injection vulnerability
    - debian/patches/CVE-2017-0898-10748-14033-14064.patch
      patch extracted from debian Wheezy.
    - CVE-2017-10748
  * SECURITY UPDATE: Buffer underrun
    - debian/patches/CVE-2017-0898-10748-14033-14064.patch
      patch extracted from debian Wheezy.
    - CVE-2017-14033
  * SECURITY UPDATE: Heap exposure
    - debian/patches/CVE-2017-0898-10748-14033-14064.patch
      patch extracted from debian Wheezy.
    - CVE-2017-14064

Date: 2017-10-03 19:48:17.058847+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.484-2ubuntu1.5
Sorry, changesfile not available.
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to