Name Status Last Modified Last Commit
lp:ubuntu/gutsy/cyrus-sasl2-mit 1 Development 2009-09-29 05:17:37 UTC
5. * Resync with 2.1.19.dfsg1-0.2 * Note...

Author: Sam Hartman
Revision Date: 2006-04-30 00:49:39 UTC

* Resync with 2.1.19.dfsg1-0.2
* Note that the MIT packages do not install digest-md5 so CVE 2006-1721
  does not apply

lp:ubuntu/feisty/cyrus-sasl2-mit 1 Development 2009-09-29 05:17:03 UTC
5. * Resync with 2.1.19.dfsg1-0.2 * Note...

Author: Sam Hartman
Revision Date: 2006-04-30 00:49:39 UTC

* Resync with 2.1.19.dfsg1-0.2
* Note that the MIT packages do not install digest-md5 so CVE 2006-1721
  does not apply

lp:ubuntu/edgy/cyrus-sasl2-mit 1 Development 2009-09-29 05:16:31 UTC
5. * Resync with 2.1.19.dfsg1-0.2 * Note...

Author: Sam Hartman
Revision Date: 2006-04-30 00:49:39 UTC

* Resync with 2.1.19.dfsg1-0.2
* Note that the MIT packages do not install digest-md5 so CVE 2006-1721
  does not apply

lp:ubuntu/dapper/cyrus-sasl2-mit 2 Mature 2009-09-29 05:16:01 UTC
4. * Sync with 2.1.19-1.7 - Includ...

Author: Sam Hartman
Revision Date: 2005-12-16 22:01:06 UTC

* Sync with 2.1.19-1.7
      - Includes fix for FTBFS, Closes: #285613
* Include NMU from 2.1.19-1.1
* Disable gssapi library mutexes as we no longer need them.

lp:ubuntu/breezy/cyrus-sasl2-mit 1 Development 2009-09-29 05:15:28 UTC
3. * NMU * resync to cyrus-sasl2 2.1.19-...

Author: Henrique de Moraes Holschuh
Revision Date: 2004-10-17 00:43:17 UTC

* NMU
* resync to cyrus-sasl2 2.1.19-1.5):
  * SECURITY FIX: SASL_PATH environment variable must not be honoured on
    setuid environments, otherwise we have a local privilege escalation
    exploit (CVE: CAN-2004-0884), related advisories: RHSA-2004:546-02;
    GLSA 200410-05 (closes: #276865)
    * upstream CVS: lib/common.c: don't honor SASL_PATH in setuid
      environment. from Gentoo (CVE CAN-2004-0884);
    * Fix to upstream CVS security fix: initialize *path = NULL
  * upstream CVS: plugins/kerberos4.c: document weirdness with openssl DES
  * upstream CVS: plugins/cram.c,plugins/anonymous.c,plugins/login.c,
    plugins/plain.c,plugins/sasldb.c: Fixed several 64 bit portability
    warnings
  * Forward port sasl_set_alloc locking patch from SASL 1.5, to avoid
    problems with the braindead idea of globals SASL has, and with libraries
    that think they can get around mucking with them (hello openldap!)
  * Add Build-Conflicts: autoconf2.13, automake1.4

lp:ubuntu/hoary/cyrus-sasl2-mit 1 Development 2009-09-29 05:14:56 UTC
3. * NMU * resync to cyrus-sasl2 2.1.19-...

Author: Henrique de Moraes Holschuh
Revision Date: 2004-10-17 00:43:17 UTC

* NMU
* resync to cyrus-sasl2 2.1.19-1.5):
  * SECURITY FIX: SASL_PATH environment variable must not be honoured on
    setuid environments, otherwise we have a local privilege escalation
    exploit (CVE: CAN-2004-0884), related advisories: RHSA-2004:546-02;
    GLSA 200410-05 (closes: #276865)
    * upstream CVS: lib/common.c: don't honor SASL_PATH in setuid
      environment. from Gentoo (CVE CAN-2004-0884);
    * Fix to upstream CVS security fix: initialize *path = NULL
  * upstream CVS: plugins/kerberos4.c: document weirdness with openssl DES
  * upstream CVS: plugins/cram.c,plugins/anonymous.c,plugins/login.c,
    plugins/plain.c,plugins/sasldb.c: Fixed several 64 bit portability
    warnings
  * Forward port sasl_set_alloc locking patch from SASL 1.5, to avoid
    problems with the braindead idea of globals SASL has, and with libraries
    that think they can get around mucking with them (hello openldap!)
  * Add Build-Conflicts: autoconf2.13, automake1.4

lp:ubuntu/warty/cyrus-sasl2-mit 1 Development 2009-09-29 05:14:31 UTC
2. Fix build-depends, Closes: #245239

Author: Sam Hartman
Revision Date: 2004-04-23 15:02:54 UTC

Fix build-depends, Closes: #245239

17 of 7 results