View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/eglibc
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2018-03-06 10:28:19 UTC 2018-03-06
DSC file for 2.19-0ubuntu6.14

Author: Ubuntu Git Importer
Author Date: 2018-03-06 10:28:19 UTC

DSC file for 2.19-0ubuntu6.14

importer/ubuntu/pristine-tar 2018-03-06 09:57:19 UTC 2018-03-06
pristine-tar data for eglibc_2.19.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-06 09:57:19 UTC

pristine-tar data for eglibc_2.19.orig.tar.xz

importer/debian/dsc 2018-03-06 06:36:26 UTC 2018-03-06
DSC file for 2.13-38+deb7u10

Author: Ubuntu Git Importer
Author Date: 2018-03-06 06:36:26 UTC

DSC file for 2.13-38+deb7u10

importer/debian/pristine-tar 2018-03-06 06:24:28 UTC 2018-03-06
pristine-tar data for eglibc_2.19.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-06 06:24:28 UTC

pristine-tar data for eglibc_2.19.orig.tar.xz

ubuntu/trusty-security 2018-01-17 10:08:13 UTC 2018-01-17
Import patches-unapplied version 2.19-0ubuntu6.14 to ubuntu/trusty-security

Author: Chris Coulson
Author Date: 2018-01-15 09:37:19 UTC

Import patches-unapplied version 2.19-0ubuntu6.14 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 53d5734276d6cb3df277dae2644b44f4b62003d4

New changelog entries:
  * SECURITY UPDATE: Memory leak in dynamic loader (ld.so)
    - debian/patches/any/cvs-compute-correct-array-size-in-_dl_init_paths.diff:
      Compute correct array size in _dl_init_paths
    - CVE-2017-1000408
  * SECURITY UPDATE: Buffer overflow in dynamic loader (ld.so)
    - debian/patches/any/cvs-count-components-of-expanded-path-in-_dl_init_paths.diff:
      Count components of the expanded path in _dl_init_path
    - CVE-2017-1000409
  * SECURITY UPDATE: One-byte overflow in glob
    - debian/patches/any/cvs-fix-one-byte-glob-overflow.diff: Fix one-byte
      overflow in glob
    - CVE-2017-15670
  * SECURITY UPDATE: Buffer overflow in glob
    - debian/patches/any/cvs-fix-glob-buffer-overflow.diff: Fix buffer overflow
      during GLOB_TILDE unescaping
    - CVE-2017-15804
  * SECURITY UPDATE: Local privilege escalation via mishandled RPATH / RUNPATH
    - debian/patches/any/cvs-elf-check-for-empty-tokens.diff: elf: Check for
      empty tokens before dynamic string token expansion
    - CVE-2017-16997
  * SECURITY UPDATE: Buffer underflow in realpath()
    - debian/patches/any/cvs-make-getcwd-fail-if-path-is-no-absolute.diff:
      Make getcwd(3) fail if it cannot obtain an absolute path
    - CVE-2018-1000001

ubuntu/trusty-updates 2018-01-17 10:08:13 UTC 2018-01-17
Import patches-unapplied version 2.19-0ubuntu6.14 to ubuntu/trusty-security

Author: Chris Coulson
Author Date: 2018-01-15 09:37:19 UTC

Import patches-unapplied version 2.19-0ubuntu6.14 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 53d5734276d6cb3df277dae2644b44f4b62003d4

New changelog entries:
  * SECURITY UPDATE: Memory leak in dynamic loader (ld.so)
    - debian/patches/any/cvs-compute-correct-array-size-in-_dl_init_paths.diff:
      Compute correct array size in _dl_init_paths
    - CVE-2017-1000408
  * SECURITY UPDATE: Buffer overflow in dynamic loader (ld.so)
    - debian/patches/any/cvs-count-components-of-expanded-path-in-_dl_init_paths.diff:
      Count components of the expanded path in _dl_init_path
    - CVE-2017-1000409
  * SECURITY UPDATE: One-byte overflow in glob
    - debian/patches/any/cvs-fix-one-byte-glob-overflow.diff: Fix one-byte
      overflow in glob
    - CVE-2017-15670
  * SECURITY UPDATE: Buffer overflow in glob
    - debian/patches/any/cvs-fix-glob-buffer-overflow.diff: Fix buffer overflow
      during GLOB_TILDE unescaping
    - CVE-2017-15804
  * SECURITY UPDATE: Local privilege escalation via mishandled RPATH / RUNPATH
    - debian/patches/any/cvs-elf-check-for-empty-tokens.diff: elf: Check for
      empty tokens before dynamic string token expansion
    - CVE-2017-16997
  * SECURITY UPDATE: Buffer underflow in realpath()
    - debian/patches/any/cvs-make-getcwd-fail-if-path-is-no-absolute.diff:
      Make getcwd(3) fail if it cannot obtain an absolute path
    - CVE-2018-1000001

ubuntu/trusty-devel 2018-01-17 10:08:13 UTC 2018-01-17
Import patches-unapplied version 2.19-0ubuntu6.14 to ubuntu/trusty-security

Author: Chris Coulson
Author Date: 2018-01-15 09:37:19 UTC

Import patches-unapplied version 2.19-0ubuntu6.14 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 53d5734276d6cb3df277dae2644b44f4b62003d4

New changelog entries:
  * SECURITY UPDATE: Memory leak in dynamic loader (ld.so)
    - debian/patches/any/cvs-compute-correct-array-size-in-_dl_init_paths.diff:
      Compute correct array size in _dl_init_paths
    - CVE-2017-1000408
  * SECURITY UPDATE: Buffer overflow in dynamic loader (ld.so)
    - debian/patches/any/cvs-count-components-of-expanded-path-in-_dl_init_paths.diff:
      Count components of the expanded path in _dl_init_path
    - CVE-2017-1000409
  * SECURITY UPDATE: One-byte overflow in glob
    - debian/patches/any/cvs-fix-one-byte-glob-overflow.diff: Fix one-byte
      overflow in glob
    - CVE-2017-15670
  * SECURITY UPDATE: Buffer overflow in glob
    - debian/patches/any/cvs-fix-glob-buffer-overflow.diff: Fix buffer overflow
      during GLOB_TILDE unescaping
    - CVE-2017-15804
  * SECURITY UPDATE: Local privilege escalation via mishandled RPATH / RUNPATH
    - debian/patches/any/cvs-elf-check-for-empty-tokens.diff: elf: Check for
      empty tokens before dynamic string token expansion
    - CVE-2017-16997
  * SECURITY UPDATE: Buffer underflow in realpath()
    - debian/patches/any/cvs-make-getcwd-fail-if-path-is-no-absolute.diff:
      Make getcwd(3) fail if it cannot obtain an absolute path
    - CVE-2018-1000001

applied/ubuntu/trusty-devel 2018-01-17 10:08:13 UTC 2018-01-17
Import patches-applied version 2.19-0ubuntu6.14 to applied/ubuntu/trusty-secu...

Author: Chris Coulson
Author Date: 2018-01-15 09:37:19 UTC

Import patches-applied version 2.19-0ubuntu6.14 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: c13768bce4f7c63023faebe02e6fe5b571b46ed8
Unapplied parent: e1dc3ad818c8f168a25f31465c8dcfeb8503dff6

New changelog entries:
  * SECURITY UPDATE: Memory leak in dynamic loader (ld.so)
    - debian/patches/any/cvs-compute-correct-array-size-in-_dl_init_paths.diff:
      Compute correct array size in _dl_init_paths
    - CVE-2017-1000408
  * SECURITY UPDATE: Buffer overflow in dynamic loader (ld.so)
    - debian/patches/any/cvs-count-components-of-expanded-path-in-_dl_init_paths.diff:
      Count components of the expanded path in _dl_init_path
    - CVE-2017-1000409
  * SECURITY UPDATE: One-byte overflow in glob
    - debian/patches/any/cvs-fix-one-byte-glob-overflow.diff: Fix one-byte
      overflow in glob
    - CVE-2017-15670
  * SECURITY UPDATE: Buffer overflow in glob
    - debian/patches/any/cvs-fix-glob-buffer-overflow.diff: Fix buffer overflow
      during GLOB_TILDE unescaping
    - CVE-2017-15804
  * SECURITY UPDATE: Local privilege escalation via mishandled RPATH / RUNPATH
    - debian/patches/any/cvs-elf-check-for-empty-tokens.diff: elf: Check for
      empty tokens before dynamic string token expansion
    - CVE-2017-16997
  * SECURITY UPDATE: Buffer underflow in realpath()
    - debian/patches/any/cvs-make-getcwd-fail-if-path-is-no-absolute.diff:
      Make getcwd(3) fail if it cannot obtain an absolute path
    - CVE-2018-1000001

applied/ubuntu/trusty-security 2018-01-17 10:08:13 UTC 2018-01-17
Import patches-applied version 2.19-0ubuntu6.14 to applied/ubuntu/trusty-secu...

Author: Chris Coulson
Author Date: 2018-01-15 09:37:19 UTC

Import patches-applied version 2.19-0ubuntu6.14 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: c13768bce4f7c63023faebe02e6fe5b571b46ed8
Unapplied parent: e1dc3ad818c8f168a25f31465c8dcfeb8503dff6

New changelog entries:
  * SECURITY UPDATE: Memory leak in dynamic loader (ld.so)
    - debian/patches/any/cvs-compute-correct-array-size-in-_dl_init_paths.diff:
      Compute correct array size in _dl_init_paths
    - CVE-2017-1000408
  * SECURITY UPDATE: Buffer overflow in dynamic loader (ld.so)
    - debian/patches/any/cvs-count-components-of-expanded-path-in-_dl_init_paths.diff:
      Count components of the expanded path in _dl_init_path
    - CVE-2017-1000409
  * SECURITY UPDATE: One-byte overflow in glob
    - debian/patches/any/cvs-fix-one-byte-glob-overflow.diff: Fix one-byte
      overflow in glob
    - CVE-2017-15670
  * SECURITY UPDATE: Buffer overflow in glob
    - debian/patches/any/cvs-fix-glob-buffer-overflow.diff: Fix buffer overflow
      during GLOB_TILDE unescaping
    - CVE-2017-15804
  * SECURITY UPDATE: Local privilege escalation via mishandled RPATH / RUNPATH
    - debian/patches/any/cvs-elf-check-for-empty-tokens.diff: elf: Check for
      empty tokens before dynamic string token expansion
    - CVE-2017-16997
  * SECURITY UPDATE: Buffer underflow in realpath()
    - debian/patches/any/cvs-make-getcwd-fail-if-path-is-no-absolute.diff:
      Make getcwd(3) fail if it cannot obtain an absolute path
    - CVE-2018-1000001

applied/ubuntu/trusty-updates 2018-01-17 10:08:13 UTC 2018-01-17
Import patches-applied version 2.19-0ubuntu6.14 to applied/ubuntu/trusty-secu...

Author: Chris Coulson
Author Date: 2018-01-15 09:37:19 UTC

Import patches-applied version 2.19-0ubuntu6.14 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: c13768bce4f7c63023faebe02e6fe5b571b46ed8
Unapplied parent: e1dc3ad818c8f168a25f31465c8dcfeb8503dff6

New changelog entries:
  * SECURITY UPDATE: Memory leak in dynamic loader (ld.so)
    - debian/patches/any/cvs-compute-correct-array-size-in-_dl_init_paths.diff:
      Compute correct array size in _dl_init_paths
    - CVE-2017-1000408
  * SECURITY UPDATE: Buffer overflow in dynamic loader (ld.so)
    - debian/patches/any/cvs-count-components-of-expanded-path-in-_dl_init_paths.diff:
      Count components of the expanded path in _dl_init_path
    - CVE-2017-1000409
  * SECURITY UPDATE: One-byte overflow in glob
    - debian/patches/any/cvs-fix-one-byte-glob-overflow.diff: Fix one-byte
      overflow in glob
    - CVE-2017-15670
  * SECURITY UPDATE: Buffer overflow in glob
    - debian/patches/any/cvs-fix-glob-buffer-overflow.diff: Fix buffer overflow
      during GLOB_TILDE unescaping
    - CVE-2017-15804
  * SECURITY UPDATE: Local privilege escalation via mishandled RPATH / RUNPATH
    - debian/patches/any/cvs-elf-check-for-empty-tokens.diff: elf: Check for
      empty tokens before dynamic string token expansion
    - CVE-2017-16997
  * SECURITY UPDATE: Buffer underflow in realpath()
    - debian/patches/any/cvs-make-getcwd-fail-if-path-is-no-absolute.diff:
      Make getcwd(3) fail if it cannot obtain an absolute path
    - CVE-2018-1000001

ubuntu/precise-security 2017-03-24 04:33:28 UTC 2017-03-24
Import patches-unapplied version 2.15-0ubuntu10.18 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-03-23 18:38:25 UTC

Import patches-unapplied version 2.15-0ubuntu10.18 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 2c8379e5d1da783171ad805f5e60401ac8896a58

New changelog entries:
  * REGRESSION UPDATE: IPv6 addresses not being returned from a
    dual-stack ipv4-ipv6 host query.
    - Revert patches/any/CVE-2016-3706.diff (LP: #1674776)

ubuntu/precise-devel 2017-03-24 04:33:28 UTC 2017-03-24
Import patches-unapplied version 2.15-0ubuntu10.18 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-03-23 18:38:25 UTC

Import patches-unapplied version 2.15-0ubuntu10.18 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 2c8379e5d1da783171ad805f5e60401ac8896a58

New changelog entries:
  * REGRESSION UPDATE: IPv6 addresses not being returned from a
    dual-stack ipv4-ipv6 host query.
    - Revert patches/any/CVE-2016-3706.diff (LP: #1674776)

applied/ubuntu/precise-updates 2017-03-24 04:33:28 UTC 2017-03-24
Import patches-applied version 2.15-0ubuntu10.18 to applied/ubuntu/precise-se...

Author: Steve Beattie
Author Date: 2017-03-23 18:38:25 UTC

Import patches-applied version 2.15-0ubuntu10.18 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 5c3280fcefac11a8512dc8618278da13ff2a4253
Unapplied parent: 1478213cdb7b0d27ec6611df41c7291d8668d3df

New changelog entries:
  * REGRESSION UPDATE: IPv6 addresses not being returned from a
    dual-stack ipv4-ipv6 host query.
    - Revert patches/any/CVE-2016-3706.diff (LP: #1674776)

ubuntu/precise-updates 2017-03-24 04:33:28 UTC 2017-03-24
Import patches-unapplied version 2.15-0ubuntu10.18 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-03-23 18:38:25 UTC

Import patches-unapplied version 2.15-0ubuntu10.18 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 2c8379e5d1da783171ad805f5e60401ac8896a58

New changelog entries:
  * REGRESSION UPDATE: IPv6 addresses not being returned from a
    dual-stack ipv4-ipv6 host query.
    - Revert patches/any/CVE-2016-3706.diff (LP: #1674776)

applied/ubuntu/precise-security 2017-03-24 04:33:28 UTC 2017-03-24
Import patches-applied version 2.15-0ubuntu10.18 to applied/ubuntu/precise-se...

Author: Steve Beattie
Author Date: 2017-03-23 18:38:25 UTC

Import patches-applied version 2.15-0ubuntu10.18 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 5c3280fcefac11a8512dc8618278da13ff2a4253
Unapplied parent: 1478213cdb7b0d27ec6611df41c7291d8668d3df

New changelog entries:
  * REGRESSION UPDATE: IPv6 addresses not being returned from a
    dual-stack ipv4-ipv6 host query.
    - Revert patches/any/CVE-2016-3706.diff (LP: #1674776)

applied/ubuntu/precise-devel 2017-03-24 04:33:28 UTC 2017-03-24
Import patches-applied version 2.15-0ubuntu10.18 to applied/ubuntu/precise-se...

Author: Steve Beattie
Author Date: 2017-03-23 18:38:25 UTC

Import patches-applied version 2.15-0ubuntu10.18 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 5c3280fcefac11a8512dc8618278da13ff2a4253
Unapplied parent: 1478213cdb7b0d27ec6611df41c7291d8668d3df

New changelog entries:
  * REGRESSION UPDATE: IPv6 addresses not being returned from a
    dual-stack ipv4-ipv6 host query.
    - Revert patches/any/CVE-2016-3706.diff (LP: #1674776)

applied/debian/wheezy 2016-06-05 05:09:36 UTC 2016-06-05
Import patches-applied version 2.13-38+deb7u10 to applied/debian/wheezy

Author: Aurelien Jarno
Author Date: 2016-02-11 22:11:53 UTC

Import patches-applied version 2.13-38+deb7u10 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: fdf77120aebb0f88db6bb8e65030ce3328271dbc
Unapplied parent: aeac25dbe52e386c88ce9db70958b46e9537b100

New changelog entries:
  [ Aurelien Jarno¬†]
  * patches/any/cvs-strftime.diff: new patch from upstream to fix
    segmentation fault caused by passing out-of-range data to strftime()
    (CVE-2015-8776). Closes: #812445.
  * patches/any/cvs-hcreate.diff: new patch from upstream to fix an integer
    overflow in hcreate() and hcreate_r() (CVE-2015-8778). Closes: #812441.
  * patches/any/cvs-catopen.diff: new patch from upstream to fix multiple
    unbounded stack allocations in catopen() (CVE-2015-8779). Closes:
    #812455.
  * patches/any/cvs-gethostbyname4-memory-leak.diff: new patch from
    upstream to fix a memory leak in _nss_dns_gethostbyname4_r with big
    DNS answers.
  * patches/any/local-CVE-2015-7547.diff: new patch to fix glibc getaddrinfo
    stack-based buffer overflow (CVE-2015-7547).

debian/wheezy 2016-06-05 05:09:36 UTC 2016-06-05
Import patches-unapplied version 2.13-38+deb7u10 to debian/wheezy

Author: Aurelien Jarno
Author Date: 2016-02-11 22:11:53 UTC

Import patches-unapplied version 2.13-38+deb7u10 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: c13db414e9a80126520a17623a7c1b1004abfe74

New changelog entries:
  [ Aurelien Jarno¬†]
  * patches/any/cvs-strftime.diff: new patch from upstream to fix
    segmentation fault caused by passing out-of-range data to strftime()
    (CVE-2015-8776). Closes: #812445.
  * patches/any/cvs-hcreate.diff: new patch from upstream to fix an integer
    overflow in hcreate() and hcreate_r() (CVE-2015-8778). Closes: #812441.
  * patches/any/cvs-catopen.diff: new patch from upstream to fix multiple
    unbounded stack allocations in catopen() (CVE-2015-8779). Closes:
    #812455.
  * patches/any/cvs-gethostbyname4-memory-leak.diff: new patch from
    upstream to fix a memory leak in _nss_dns_gethostbyname4_r with big
    DNS answers.
  * patches/any/local-CVE-2015-7547.diff: new patch to fix glibc getaddrinfo
    stack-based buffer overflow (CVE-2015-7547).

applied/ubuntu/precise-proposed 2016-04-26 01:53:37 UTC 2016-04-26
Import patches-applied version 2.15-0ubuntu10.14 to applied/ubuntu/precise-pr...

Author: Steve Beattie
Author Date: 2016-04-09 06:59:46 UTC

Import patches-applied version 2.15-0ubuntu10.14 to applied/ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 8f175e6e90b1018eb9d740dc080794a389f78616
Unapplied parent: f7b3665e2bbdea3add1c3be88bd2ddec65dabc92

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gethostbyname_r and related
    functions
    - debian/patches/any/CVE-2015-1781.diff: take alignment padding
      into account when computing if buffer is too small.
    - CVE-2015-1781
  * SECURITY UPDATE: glibc Name Service Switch (NSS) denial of sevice
    - debian/patches/any/CVE-2014-8121-1.diff: do not close NSS files
      database during iteration.
    - debian/patches/any/CVE-2014-8121-2.diff: Separate internal state
      between getXXent and getXXbyYY NSS calls.
    - CVE-2014-8121
  * SECURITY UPDATE: glibc unbounded stack usage in NaN strtod
    conversion
    - debian/patches/any/CVE-2014-9761-1.diff: Refactor strtod parsing
      of NaN payloads.
    - debian/patches/any/CVE-2014-9761-1.diff: Fix nan functions
      handling of payload strings
    - CVE-2014-9761
  * SECURITY UPDATE: out of range data to strftime() causes segfault
    (denial of service)
    - debian/patches/any/CVE-2015-8776.diff: add range checks to
      strftime() processing
    - CVE-2015-8776
  * SECURITY UPDATE: glibc honors LD_POINTER_GUARD env for setuid
    AT_SECURE programs (e.g. setuid), allowing disabling of pointer
    mangling
    - debian/patches/any/CVE-2015-8777.diff: Always enable pointer
      guard
    - CVE-2015-8777
  * SECURITY UPDATE: integer overflow in hcreate and hcreate_r
    - debian/patches/any/CVE-2015-8778.diff: check for large inputs
    - CVE-2015-8778
  * SECURITY UPDATE: unbounded stack allocation in catopen()
    - debian/patches/any/CVE-2015-8779.diff: stop using unbounded
      alloca()
    - CVE-2015-8779
  * SECURITY UPDATE: Stack overflow in _nss_dns_getnetbyname_r
    - debian/patches/any/CVE-2016-3075.diff: do not make unneeded
      memory copy on the stack.
    - CVE-2016-3075
  * SECURITY UPDATE: pt_chown privilege escalation
    - debian/patches/any/CVE-2016-2856-pre.diff: add option to
      enable/disable pt_chown.
    - debian/patches/any/CVE-2016-2856.diff: grantpt: trust the kernel
      about pty group and permission mode
    - debian/debhelper.in/libc-bin.install: drop installation of
      pt_chown
    - CVE-2016-2856, CVE-2013-2207
  * debian/debhelper.in/libc.postinst: add reboot notifications for
    security updates (LP: #1546457)

ubuntu/trusty-proposed 2016-04-26 01:53:37 UTC 2016-04-26
Import patches-unapplied version 2.19-0ubuntu6.8 to ubuntu/trusty-proposed

Author: Steve Beattie
Author Date: 2016-04-09 06:26:02 UTC

Import patches-unapplied version 2.19-0ubuntu6.8 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 1d8ff4e62ee6f84dc2830355f1ff23a4ccf2323c

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gethostbyname_r and related
    functions
    - debian/patches/any/CVE-2015-1781.diff: take alignment padding
      into account when computing if buffer is too small.
    - CVE-2015-1781
  * SECURITY UPDATE: glibc Name Service Switch (NSS) denial of sevice
    - debian/patches/any/CVE-2014-8121-1.diff: do not close NSS files
      database during iteration.
    - debian/patches/any/CVE-2014-8121-2.diff: Separate internal state
      between getXXent and getXXbyYY NSS calls.
    - CVE-2014-8121
  * SECURITY UPDATE: glibc unbounded stack usage in NaN strtod
    conversion
    - debian/patches/any/CVE-2014-9761-1.diff: Refactor strtod parsing
      of NaN payloads.
    - debian/patches/any/CVE-2014-9761-1.diff: Fix nan functions
      handling of payload strings
    - CVE-2014-9761
  * SECURITY UPDATE: NSS files long line buffer overflow
    - debian/patches/any/CVE-2015-5277.diff: Don't ignore too long
      lines in nss_files
    - CVE-2015-5277
  * SECURITY UPDATE: out of range data to strftime() causes segfault
    (denial of service)
    - debian/patches/any/CVE-2015-8776.diff: add range checks to
      strftime() processing
    - CVE-2015-8776
  * SECURITY UPDATE: glibc honors LD_POINTER_GUARD env for setuid
    AT_SECURE programs (e.g. setuid), allowing disabling of pointer
    mangling
    - debian/patches/any/CVE-2015-8777.diff: Always enable pointer
      guard
    - CVE-2015-8777
  * SECURITY UPDATE: integer overflow in hcreate and hcreate_r
    - debian/patches/any/CVE-2015-8778.diff: check for large inputs
    - CVE-2015-8778
  * SECURITY UPDATE: unbounded stack allocation in catopen()
    - debian/patches/any/CVE-2015-8779.diff: stop using unbounded
      alloca()
    - CVE-2015-8779
  * SECURITY UPDATE: Stack overflow in _nss_dns_getnetbyname_r
    - debian/patches/any/CVE-2016-3075.diff: do not make unneeded
      memory copy on the stack.
    - CVE-2016-3075
  * SECURITY UPDATE: pt_chown privilege escalation
    - debian/patches/any/CVE-2016-2856.diff: grantpt: trust the kernel
      about pty group and permission mode
    - debian/sysdeps/linux.mk: don't build pt_chown
    - debian/rules.d/debhelper.mk: only install pt_chown when built.
    - CVE-2016-2856, CVE-2013-2207
  * debian/debhelper.in/libc.postinst: add reboot notifications for
    security updates (LP: #1546457)
  * debian/patches/ubuntu/submitted-no-stack-backtrace.diff: update
    patch to eliminate compiler warning.

ubuntu/precise-proposed 2016-04-26 01:53:37 UTC 2016-04-26
Import patches-unapplied version 2.15-0ubuntu10.14 to ubuntu/precise-proposed

Author: Steve Beattie
Author Date: 2016-04-09 06:59:46 UTC

Import patches-unapplied version 2.15-0ubuntu10.14 to ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 3f7a6a3f0398b8de3788bd14d294daa4a1564a49

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gethostbyname_r and related
    functions
    - debian/patches/any/CVE-2015-1781.diff: take alignment padding
      into account when computing if buffer is too small.
    - CVE-2015-1781
  * SECURITY UPDATE: glibc Name Service Switch (NSS) denial of sevice
    - debian/patches/any/CVE-2014-8121-1.diff: do not close NSS files
      database during iteration.
    - debian/patches/any/CVE-2014-8121-2.diff: Separate internal state
      between getXXent and getXXbyYY NSS calls.
    - CVE-2014-8121
  * SECURITY UPDATE: glibc unbounded stack usage in NaN strtod
    conversion
    - debian/patches/any/CVE-2014-9761-1.diff: Refactor strtod parsing
      of NaN payloads.
    - debian/patches/any/CVE-2014-9761-1.diff: Fix nan functions
      handling of payload strings
    - CVE-2014-9761
  * SECURITY UPDATE: out of range data to strftime() causes segfault
    (denial of service)
    - debian/patches/any/CVE-2015-8776.diff: add range checks to
      strftime() processing
    - CVE-2015-8776
  * SECURITY UPDATE: glibc honors LD_POINTER_GUARD env for setuid
    AT_SECURE programs (e.g. setuid), allowing disabling of pointer
    mangling
    - debian/patches/any/CVE-2015-8777.diff: Always enable pointer
      guard
    - CVE-2015-8777
  * SECURITY UPDATE: integer overflow in hcreate and hcreate_r
    - debian/patches/any/CVE-2015-8778.diff: check for large inputs
    - CVE-2015-8778
  * SECURITY UPDATE: unbounded stack allocation in catopen()
    - debian/patches/any/CVE-2015-8779.diff: stop using unbounded
      alloca()
    - CVE-2015-8779
  * SECURITY UPDATE: Stack overflow in _nss_dns_getnetbyname_r
    - debian/patches/any/CVE-2016-3075.diff: do not make unneeded
      memory copy on the stack.
    - CVE-2016-3075
  * SECURITY UPDATE: pt_chown privilege escalation
    - debian/patches/any/CVE-2016-2856-pre.diff: add option to
      enable/disable pt_chown.
    - debian/patches/any/CVE-2016-2856.diff: grantpt: trust the kernel
      about pty group and permission mode
    - debian/debhelper.in/libc-bin.install: drop installation of
      pt_chown
    - CVE-2016-2856, CVE-2013-2207
  * debian/debhelper.in/libc.postinst: add reboot notifications for
    security updates (LP: #1546457)

applied/ubuntu/trusty-proposed 2016-04-26 01:53:37 UTC 2016-04-26
Import patches-applied version 2.19-0ubuntu6.8 to applied/ubuntu/trusty-proposed

Author: Steve Beattie
Author Date: 2016-04-09 06:26:02 UTC

Import patches-applied version 2.19-0ubuntu6.8 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 23e1a4b2ab44d6a84e80cc2f6765af9cf70c5e7d
Unapplied parent: 9ecdb04567e9ab3b12311dc309fb9acbc38cb705

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gethostbyname_r and related
    functions
    - debian/patches/any/CVE-2015-1781.diff: take alignment padding
      into account when computing if buffer is too small.
    - CVE-2015-1781
  * SECURITY UPDATE: glibc Name Service Switch (NSS) denial of sevice
    - debian/patches/any/CVE-2014-8121-1.diff: do not close NSS files
      database during iteration.
    - debian/patches/any/CVE-2014-8121-2.diff: Separate internal state
      between getXXent and getXXbyYY NSS calls.
    - CVE-2014-8121
  * SECURITY UPDATE: glibc unbounded stack usage in NaN strtod
    conversion
    - debian/patches/any/CVE-2014-9761-1.diff: Refactor strtod parsing
      of NaN payloads.
    - debian/patches/any/CVE-2014-9761-1.diff: Fix nan functions
      handling of payload strings
    - CVE-2014-9761
  * SECURITY UPDATE: NSS files long line buffer overflow
    - debian/patches/any/CVE-2015-5277.diff: Don't ignore too long
      lines in nss_files
    - CVE-2015-5277
  * SECURITY UPDATE: out of range data to strftime() causes segfault
    (denial of service)
    - debian/patches/any/CVE-2015-8776.diff: add range checks to
      strftime() processing
    - CVE-2015-8776
  * SECURITY UPDATE: glibc honors LD_POINTER_GUARD env for setuid
    AT_SECURE programs (e.g. setuid), allowing disabling of pointer
    mangling
    - debian/patches/any/CVE-2015-8777.diff: Always enable pointer
      guard
    - CVE-2015-8777
  * SECURITY UPDATE: integer overflow in hcreate and hcreate_r
    - debian/patches/any/CVE-2015-8778.diff: check for large inputs
    - CVE-2015-8778
  * SECURITY UPDATE: unbounded stack allocation in catopen()
    - debian/patches/any/CVE-2015-8779.diff: stop using unbounded
      alloca()
    - CVE-2015-8779
  * SECURITY UPDATE: Stack overflow in _nss_dns_getnetbyname_r
    - debian/patches/any/CVE-2016-3075.diff: do not make unneeded
      memory copy on the stack.
    - CVE-2016-3075
  * SECURITY UPDATE: pt_chown privilege escalation
    - debian/patches/any/CVE-2016-2856.diff: grantpt: trust the kernel
      about pty group and permission mode
    - debian/sysdeps/linux.mk: don't build pt_chown
    - debian/rules.d/debhelper.mk: only install pt_chown when built.
    - CVE-2016-2856, CVE-2013-2207
  * debian/debhelper.in/libc.postinst: add reboot notifications for
    security updates (LP: #1546457)
  * debian/patches/ubuntu/submitted-no-stack-backtrace.diff: update
    patch to eliminate compiler warning.

ubuntu/lucid-security 2015-02-26 15:43:34 UTC 2015-02-26
Import patches-unapplied version 2.11.1-0ubuntu7.21 to ubuntu/lucid-security

Author: Marc Deslauriers
Author Date: 2015-02-25 14:19:02 UTC

Import patches-unapplied version 2.11.1-0ubuntu7.21 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 51330080077e51aaad5bf225f346b7eb22f1a23d

New changelog entries:
  * SECURITY UPDATE: getaddrinfo writes to random file descriptors under
    high load
    - debian/patches/any/cvs-resolv-reuse-fd.diff: reload file descriptor
      after calling reopen in resolv/res_send.c.
    - CVE-2013-7423
  * SECURITY UPDATE: denial of service via endless loop in getaddr_r
    - debian/patches/any/cvs-getnetbyname.diff: iterate over alias names in
      resolv/nss_dns/dns-network.c.
    - CVE-2014-9402

applied/ubuntu/lucid-security 2015-02-26 15:43:34 UTC 2015-02-26
Import patches-applied version 2.11.1-0ubuntu7.21 to applied/ubuntu/lucid-sec...

Author: Marc Deslauriers
Author Date: 2015-02-25 14:19:02 UTC

Import patches-applied version 2.11.1-0ubuntu7.21 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 8c43ce3f236d39a5511cd6168c063628f67cbb90
Unapplied parent: 0c5cbca14c4e33a225cac9782fca97745a010d88

New changelog entries:
  * SECURITY UPDATE: getaddrinfo writes to random file descriptors under
    high load
    - debian/patches/any/cvs-resolv-reuse-fd.diff: reload file descriptor
      after calling reopen in resolv/res_send.c.
    - CVE-2013-7423
  * SECURITY UPDATE: denial of service via endless loop in getaddr_r
    - debian/patches/any/cvs-getnetbyname.diff: iterate over alias names in
      resolv/nss_dns/dns-network.c.
    - CVE-2014-9402

ubuntu/lucid-updates 2015-02-26 15:43:34 UTC 2015-02-26
Import patches-unapplied version 2.11.1-0ubuntu7.21 to ubuntu/lucid-security

Author: Marc Deslauriers
Author Date: 2015-02-25 14:19:02 UTC

Import patches-unapplied version 2.11.1-0ubuntu7.21 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 51330080077e51aaad5bf225f346b7eb22f1a23d

New changelog entries:
  * SECURITY UPDATE: getaddrinfo writes to random file descriptors under
    high load
    - debian/patches/any/cvs-resolv-reuse-fd.diff: reload file descriptor
      after calling reopen in resolv/res_send.c.
    - CVE-2013-7423
  * SECURITY UPDATE: denial of service via endless loop in getaddr_r
    - debian/patches/any/cvs-getnetbyname.diff: iterate over alias names in
      resolv/nss_dns/dns-network.c.
    - CVE-2014-9402

applied/ubuntu/lucid-devel 2015-02-26 15:43:34 UTC 2015-02-26
Import patches-applied version 2.11.1-0ubuntu7.21 to applied/ubuntu/lucid-sec...

Author: Marc Deslauriers
Author Date: 2015-02-25 14:19:02 UTC

Import patches-applied version 2.11.1-0ubuntu7.21 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 8c43ce3f236d39a5511cd6168c063628f67cbb90
Unapplied parent: 0c5cbca14c4e33a225cac9782fca97745a010d88

New changelog entries:
  * SECURITY UPDATE: getaddrinfo writes to random file descriptors under
    high load
    - debian/patches/any/cvs-resolv-reuse-fd.diff: reload file descriptor
      after calling reopen in resolv/res_send.c.
    - CVE-2013-7423
  * SECURITY UPDATE: denial of service via endless loop in getaddr_r
    - debian/patches/any/cvs-getnetbyname.diff: iterate over alias names in
      resolv/nss_dns/dns-network.c.
    - CVE-2014-9402

ubuntu/lucid-devel 2015-02-26 15:43:34 UTC 2015-02-26
Import patches-unapplied version 2.11.1-0ubuntu7.21 to ubuntu/lucid-security

Author: Marc Deslauriers
Author Date: 2015-02-25 14:19:02 UTC

Import patches-unapplied version 2.11.1-0ubuntu7.21 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 51330080077e51aaad5bf225f346b7eb22f1a23d

New changelog entries:
  * SECURITY UPDATE: getaddrinfo writes to random file descriptors under
    high load
    - debian/patches/any/cvs-resolv-reuse-fd.diff: reload file descriptor
      after calling reopen in resolv/res_send.c.
    - CVE-2013-7423
  * SECURITY UPDATE: denial of service via endless loop in getaddr_r
    - debian/patches/any/cvs-getnetbyname.diff: iterate over alias names in
      resolv/nss_dns/dns-network.c.
    - CVE-2014-9402

applied/ubuntu/lucid-updates 2015-02-26 15:43:34 UTC 2015-02-26
Import patches-applied version 2.11.1-0ubuntu7.21 to applied/ubuntu/lucid-sec...

Author: Marc Deslauriers
Author Date: 2015-02-25 14:19:02 UTC

Import patches-applied version 2.11.1-0ubuntu7.21 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 8c43ce3f236d39a5511cd6168c063628f67cbb90
Unapplied parent: 0c5cbca14c4e33a225cac9782fca97745a010d88

New changelog entries:
  * SECURITY UPDATE: getaddrinfo writes to random file descriptors under
    high load
    - debian/patches/any/cvs-resolv-reuse-fd.diff: reload file descriptor
      after calling reopen in resolv/res_send.c.
    - CVE-2013-7423
  * SECURITY UPDATE: denial of service via endless loop in getaddr_r
    - debian/patches/any/cvs-getnetbyname.diff: iterate over alias names in
      resolv/nss_dns/dns-network.c.
    - CVE-2014-9402

debian/sid 2014-10-18 16:49:48 UTC 2014-10-18
Import patches-unapplied version 2.13-38+deb7u6 to debian/wheezy

Author: Aurelien Jarno
Author Date: 2014-10-16 13:29:00 UTC

Import patches-unapplied version 2.13-38+deb7u6 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: f98bd1b777fc73fb0f8f932c210a2e3a473582e8

New changelog entries:
  * Update 2.13-38+deb7u5 changelog to mention that some lost glibc-doc
    files have been re-added in this version.
  * debian/patches/any/cvs-CVE-2013-4357.diff: update patch with upstream
    commit c8fc0c91 to fix segmentation faults when nscd is in use.
    Closes: #765506, #765526, #765562.

debian/jessie 2014-10-18 16:49:48 UTC 2014-10-18
Import patches-unapplied version 2.13-38+deb7u6 to debian/wheezy

Author: Aurelien Jarno
Author Date: 2014-10-16 13:29:00 UTC

Import patches-unapplied version 2.13-38+deb7u6 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: f98bd1b777fc73fb0f8f932c210a2e3a473582e8

New changelog entries:
  * Update 2.13-38+deb7u5 changelog to mention that some lost glibc-doc
    files have been re-added in this version.
  * debian/patches/any/cvs-CVE-2013-4357.diff: update patch with upstream
    commit c8fc0c91 to fix segmentation faults when nscd is in use.
    Closes: #765506, #765526, #765562.

applied/debian/jessie 2014-10-18 16:49:48 UTC 2014-10-18
Import patches-applied version 2.13-38+deb7u6 to applied/debian/wheezy

Author: Aurelien Jarno
Author Date: 2014-10-16 13:29:00 UTC

Import patches-applied version 2.13-38+deb7u6 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: fc67751e3ea6c54e644061c2b4c3eb2957723df3
Unapplied parent: 4a442bdb16b001d243b84c9413eea95ba6c18c53

New changelog entries:
  * Update 2.13-38+deb7u5 changelog to mention that some lost glibc-doc
    files have been re-added in this version.
  * debian/patches/any/cvs-CVE-2013-4357.diff: update patch with upstream
    commit c8fc0c91 to fix segmentation faults when nscd is in use.
    Closes: #765506, #765526, #765562.

applied/debian/sid 2014-10-18 16:49:48 UTC 2014-10-18
Import patches-applied version 2.13-38+deb7u6 to applied/debian/wheezy

Author: Aurelien Jarno
Author Date: 2014-10-16 13:29:00 UTC

Import patches-applied version 2.13-38+deb7u6 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: fc67751e3ea6c54e644061c2b4c3eb2957723df3
Unapplied parent: 4a442bdb16b001d243b84c9413eea95ba6c18c53

New changelog entries:
  * Update 2.13-38+deb7u5 changelog to mention that some lost glibc-doc
    files have been re-added in this version.
  * debian/patches/any/cvs-CVE-2013-4357.diff: update patch with upstream
    commit c8fc0c91 to fix segmentation faults when nscd is in use.
    Closes: #765506, #765526, #765562.

applied/debian/experimental 2014-05-23 22:10:18 UTC 2014-05-23
Import patches-applied version 2.19-0experimental0 to applied/debian/experime...

Author: Adam Conrad
Author Date: 2014-05-23 05:42:20 UTC

Import patches-applied version 2.19-0experimental0 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 68909bdb57dc3b3914ad45301c8db04c85ef1b87
Unapplied parent: dabdc95f9eac07cfe58ed874f53f7f57a9048699

New changelog entries:
  [ Adam Conrad ]
  * New upstream release: version 2.19, orig tarball built at SVN r25252:
    - debian/patches/alpha/local-string-functions.diff: Rebased.
    - debian/patches/any/local-disable-test-tgmath2.diff: Rebased.
    - debian/patches/any/local-localedef-fix-trampoline.diff: Rebased.
    - debian/patches/any/local-no-malloc-backtrace.diff: Rebased.
    - debian/patches/any/submitted-longdouble.diff: Rebased.
    - debian/patches/hurd-i386/local-enable-ldconfig.diff: Rebased.
    - debian/patches/kfreebsd/local-fbtl-depends.diff: Rebased.
    - debian/patches/kfreebsd/local-scripts.diff: Rebased.
    - debian/patches/locale/preprocessor-collate-uli-sucks.diff: Rebased.
    - debian/patches/localedata/fix-lang.diff: Rebased.
    - debian/patches/localedata/locale-en_DK.diff: Rebased.
    - debian/patches/localedata/locale-hsb_DE.diff: Rebased.
    - debian/patches/localedata/locale-ku_TR.diff: Rebased.
    - debian/patches/localedata/locales-fr.diff: Rebased.
    - debian/patches/localedata/sort-UTF8-first.diff: Rebased.
    - debian/patches/powerpc/local-math-logb.diff: Rebased.
    - debian/patches/sparc/local-fork.diff: Rebased.
    - debian/patches/sparc/local-sparcv9-target.diff: Rebased.
    - debian/patches/i386/local-i586-ulps.diff: Regenerate.
    - debian/patches/alpha/submitted-PTR_MANGLE.diff: Fixed upstream.
    - debian/patches/ia64/submitted-fpu-ulps.diff: Regenerated upstream.
    - debian/patches/powerpc/submitted-gettimeofday-vdso.diff: Dropped.
    - debian/patches/any/local-use-glibc-predef.diff: Merged upstream.
    - debian/patches/any/submitted-getaddrinfo-lo.diff: Merged upstream.
    - debian/patches/any/local-getaddrinfo-interface.diff: Merged upstream.
    - debian/patches/any/submitted-resolv-init.diff: Merged upstream.
    - debian/patches/arm/cvs-arm-always-blx.diff: Merged upstream.
    - debian/patches/arm/cvs-memcpy-align.diff: Merged upstream.
    - debian/patches/sparc/cvs-strcmp.diff: Merged upstream.
    - debian/patches/sparc/cvs-efd_semaphore.diff: Merged upstream.
    - debian/patches/sparc/submitted-prlimit.diff: Merged upstream.
    - Drop all cvs-* patches that are included in the 2.19 upstream release.
  * debian/sysdeps/ppc64el.mk: Use --with-cpu=power7 to optimize properly.
  * debian/*: Update occurences of 2.18 to 2.19 and update symbols to match.
  * debian/patches/any/unsubmitted-tst-ftell-locale.diff: Apply the correct
    environment for the tst-ftell-partial-wide.out test to find its locales.
  * debian/*: Remove references to libbsd-compat.a which is no longer built.
  * debian/sysdeps/powerpc.mk: Follow rename of stubs-64.h to stubs-64-v1.h.
  * debian/patches/any/submitted-sysdeps-auxv.diff: Fix implicit declaration
    when including <sys/auxv.h> in the testsuite by fixing up header guards.
  * expected-results-aarch64-linux-gnu-libc: Tolerate fenv-tls test failure.
  * debian/rules.d/tarball.mk: Add an update-from-upstream-git glibc target.
  * debian/patches/git-updates.diff: Updates to current release/2.19/master.
  * debian/sysdeps/arm64.mk: Enable IFUNC, now that binutils can support it.
  * debian/patches/locale/submitted-XDR-revert.diff: Return the XDR currency
    to locale/iso-4217.def because localedata/locales/i18n needs to have it.
  * debian/patches/powerpc/cvs-ibm-branch.diff: Pull in IBM's 2.19 backports
    to fix several bugs and add optimisations on POWER7 and POWER8 machines.
  * debian/patches/any/local-no-malloc-backtrace.diff: Change M_CHECK_ACTION
    to abort if the first bit is set (ie: MALLOC_CHECK_=1), like the second.
  * debian/patches/arm64/submitted-align.diff: Right pthread_self alignment.
  * debian/patches/arm64/submitted-setcontext.diff: Bring in patch from Will
    Newton of Linaro to reimplement setcontext without rt_sigreturn syscall.
  * debian/patches/arm64/submitted-tst-setcontext.diff: Apply test for same.
  * debian/debhelper.in/libc-bin.manpages: Drop locale.1, moved to manpages.
  [ Aurelien Jarno ]
  * debian/debhelper.in/libc.preinst: remove check for sparc32 kernel, the
    support has been removed with Lenny.
  * debian/debhelper.in/libc.preinst: remove code to upgrade armhf systems
    from pre-Wheezy versions.
  * debian/debhelper.in/libc.preinst: don't act on the filesystem until it
    is sure that the libc is going to be upgraded.
  * debian/debhelper.in/libc.preinst: stop checking for /etc/init.d/glibc.sh
    on upgrade, we don't support lenny to jessie upgrades.
  * debhelper.in/libc-alt.preinst: drop, we don't support lenny to jessie
    upgrades.
  * sysdeps/{amd64.mk,i386.mk,x32.mk}: enable lock elision.
  * expected-results-arm-linux-gnueabi-{armel,libc}: ignore basic-test.out
    test, as it is due to GCC bug #748616.
  * debian/control.in/main: build-depends on systemtap-sdt-dev on linux-any.
    debian/sysdeps/linux.mk: enable systemtap support. Closes: #700760.
  * patches/any/cvs-strtod.diff: new patch to fix strtod on some
    architectures, fixing a FTBFS on sparc.
  [ Samuel Thibault ]
  * Hurd fixes for new upstream
    - debian/patches/hurd-i386/libpthread_version.diff: Rebased.
    - debian/patches/hurd-i386/submitted-net.diff: Rebased.
    - debian/patches/hurd-i386/tg-elfosabi_gnu.diff: Fixed upstream.
    - debian/patches/hurd-i386/tg-pthread-atfork.diff: Fixed upstream.
    - debian/patches/hurd-i386/tg-tls-threadvar.diff: Rebased.
    - debian/patches/hurd-i386/tg-tls.diff: Rebased.
    - debian/patches/hurd-i386/unsubmitted-gnumach.defs.diff: Rebased.
    - update testsuite hurd-i386 results.
  [ Martin Pitt ]
  * Adjust autopkgtest to build the package within the test instead of
    having a simple "/bin/true" test. This avoids copying the sizable
    built tree between host and VM twice.
  [ Petr Salinger ]
  * kfreebsd/local-nscd-nosendfile-fix.diff: remove, fixed upstream.
  * kfreebsd/local-no-execfn.diff: new patch,
      to handle systems without AT_EXECFN
  * kfreebsd/local-sysdeps.diff: update to revision 5466 (from glibc-bsd).
  * kfreebsd/local-fbtl.diff: likewise.
  * update testsuite-checking/expected-results-*-kfreebsd-gnu-*

debian/experimental 2014-05-23 22:10:18 UTC 2014-05-23
Import patches-unapplied version 2.19-0experimental0 to debian/experimental

Author: Adam Conrad
Author Date: 2014-05-23 05:42:20 UTC

Import patches-unapplied version 2.19-0experimental0 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 23164cd99740625d613122638424c0c89dc869fa

New changelog entries:
  [ Adam Conrad ]
  * New upstream release: version 2.19, orig tarball built at SVN r25252:
    - debian/patches/alpha/local-string-functions.diff: Rebased.
    - debian/patches/any/local-disable-test-tgmath2.diff: Rebased.
    - debian/patches/any/local-localedef-fix-trampoline.diff: Rebased.
    - debian/patches/any/local-no-malloc-backtrace.diff: Rebased.
    - debian/patches/any/submitted-longdouble.diff: Rebased.
    - debian/patches/hurd-i386/local-enable-ldconfig.diff: Rebased.
    - debian/patches/kfreebsd/local-fbtl-depends.diff: Rebased.
    - debian/patches/kfreebsd/local-scripts.diff: Rebased.
    - debian/patches/locale/preprocessor-collate-uli-sucks.diff: Rebased.
    - debian/patches/localedata/fix-lang.diff: Rebased.
    - debian/patches/localedata/locale-en_DK.diff: Rebased.
    - debian/patches/localedata/locale-hsb_DE.diff: Rebased.
    - debian/patches/localedata/locale-ku_TR.diff: Rebased.
    - debian/patches/localedata/locales-fr.diff: Rebased.
    - debian/patches/localedata/sort-UTF8-first.diff: Rebased.
    - debian/patches/powerpc/local-math-logb.diff: Rebased.
    - debian/patches/sparc/local-fork.diff: Rebased.
    - debian/patches/sparc/local-sparcv9-target.diff: Rebased.
    - debian/patches/i386/local-i586-ulps.diff: Regenerate.
    - debian/patches/alpha/submitted-PTR_MANGLE.diff: Fixed upstream.
    - debian/patches/ia64/submitted-fpu-ulps.diff: Regenerated upstream.
    - debian/patches/powerpc/submitted-gettimeofday-vdso.diff: Dropped.
    - debian/patches/any/local-use-glibc-predef.diff: Merged upstream.
    - debian/patches/any/submitted-getaddrinfo-lo.diff: Merged upstream.
    - debian/patches/any/local-getaddrinfo-interface.diff: Merged upstream.
    - debian/patches/any/submitted-resolv-init.diff: Merged upstream.
    - debian/patches/arm/cvs-arm-always-blx.diff: Merged upstream.
    - debian/patches/arm/cvs-memcpy-align.diff: Merged upstream.
    - debian/patches/sparc/cvs-strcmp.diff: Merged upstream.
    - debian/patches/sparc/cvs-efd_semaphore.diff: Merged upstream.
    - debian/patches/sparc/submitted-prlimit.diff: Merged upstream.
    - Drop all cvs-* patches that are included in the 2.19 upstream release.
  * debian/sysdeps/ppc64el.mk: Use --with-cpu=power7 to optimize properly.
  * debian/*: Update occurences of 2.18 to 2.19 and update symbols to match.
  * debian/patches/any/unsubmitted-tst-ftell-locale.diff: Apply the correct
    environment for the tst-ftell-partial-wide.out test to find its locales.
  * debian/*: Remove references to libbsd-compat.a which is no longer built.
  * debian/sysdeps/powerpc.mk: Follow rename of stubs-64.h to stubs-64-v1.h.
  * debian/patches/any/submitted-sysdeps-auxv.diff: Fix implicit declaration
    when including <sys/auxv.h> in the testsuite by fixing up header guards.
  * expected-results-aarch64-linux-gnu-libc: Tolerate fenv-tls test failure.
  * debian/rules.d/tarball.mk: Add an update-from-upstream-git glibc target.
  * debian/patches/git-updates.diff: Updates to current release/2.19/master.
  * debian/sysdeps/arm64.mk: Enable IFUNC, now that binutils can support it.
  * debian/patches/locale/submitted-XDR-revert.diff: Return the XDR currency
    to locale/iso-4217.def because localedata/locales/i18n needs to have it.
  * debian/patches/powerpc/cvs-ibm-branch.diff: Pull in IBM's 2.19 backports
    to fix several bugs and add optimisations on POWER7 and POWER8 machines.
  * debian/patches/any/local-no-malloc-backtrace.diff: Change M_CHECK_ACTION
    to abort if the first bit is set (ie: MALLOC_CHECK_=1), like the second.
  * debian/patches/arm64/submitted-align.diff: Right pthread_self alignment.
  * debian/patches/arm64/submitted-setcontext.diff: Bring in patch from Will
    Newton of Linaro to reimplement setcontext without rt_sigreturn syscall.
  * debian/patches/arm64/submitted-tst-setcontext.diff: Apply test for same.
  * debian/debhelper.in/libc-bin.manpages: Drop locale.1, moved to manpages.
  [ Aurelien Jarno ]
  * debian/debhelper.in/libc.preinst: remove check for sparc32 kernel, the
    support has been removed with Lenny.
  * debian/debhelper.in/libc.preinst: remove code to upgrade armhf systems
    from pre-Wheezy versions.
  * debian/debhelper.in/libc.preinst: don't act on the filesystem until it
    is sure that the libc is going to be upgraded.
  * debian/debhelper.in/libc.preinst: stop checking for /etc/init.d/glibc.sh
    on upgrade, we don't support lenny to jessie upgrades.
  * debhelper.in/libc-alt.preinst: drop, we don't support lenny to jessie
    upgrades.
  * sysdeps/{amd64.mk,i386.mk,x32.mk}: enable lock elision.
  * expected-results-arm-linux-gnueabi-{armel,libc}: ignore basic-test.out
    test, as it is due to GCC bug #748616.
  * debian/control.in/main: build-depends on systemtap-sdt-dev on linux-any.
    debian/sysdeps/linux.mk: enable systemtap support. Closes: #700760.
  * patches/any/cvs-strtod.diff: new patch to fix strtod on some
    architectures, fixing a FTBFS on sparc.
  [ Samuel Thibault ]
  * Hurd fixes for new upstream
    - debian/patches/hurd-i386/libpthread_version.diff: Rebased.
    - debian/patches/hurd-i386/submitted-net.diff: Rebased.
    - debian/patches/hurd-i386/tg-elfosabi_gnu.diff: Fixed upstream.
    - debian/patches/hurd-i386/tg-pthread-atfork.diff: Fixed upstream.
    - debian/patches/hurd-i386/tg-tls-threadvar.diff: Rebased.
    - debian/patches/hurd-i386/tg-tls.diff: Rebased.
    - debian/patches/hurd-i386/unsubmitted-gnumach.defs.diff: Rebased.
    - update testsuite hurd-i386 results.
  [ Martin Pitt ]
  * Adjust autopkgtest to build the package within the test instead of
    having a simple "/bin/true" test. This avoids copying the sizable
    built tree between host and VM twice.
  [ Petr Salinger ]
  * kfreebsd/local-nscd-nosendfile-fix.diff: remove, fixed upstream.
  * kfreebsd/local-no-execfn.diff: new patch,
      to handle systems without AT_EXECFN
  * kfreebsd/local-sysdeps.diff: update to revision 5466 (from glibc-bsd).
  * kfreebsd/local-fbtl.diff: likewise.
  * update testsuite-checking/expected-results-*-kfreebsd-gnu-*

applied/ubuntu/utopic-devel 2014-04-12 09:43:13 UTC 2014-04-12
Import patches-applied version 2.19-0ubuntu6 to applied/ubuntu/trusty-proposed

Author: Adam Conrad
Author Date: 2014-04-12 07:47:43 UTC

Import patches-applied version 2.19-0ubuntu6 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: fed6aeab2105dba94f113dd5de730f4a70ccfeba
Unapplied parent: 424b8a39c9bcadf7fa7e98de7a099642e3ae46fc

New changelog entries:
  * debian/patches/arm64/submitted-setcontext.diff: Update to new version
    of Will's setcontext patch to fix sigmask handling bug (LP: #1306829)

ubuntu/devel 2014-04-12 09:43:13 UTC 2014-04-12
Import patches-unapplied version 2.19-0ubuntu6 to ubuntu/trusty-proposed

Author: Adam Conrad
Author Date: 2014-04-12 07:47:43 UTC

Import patches-unapplied version 2.19-0ubuntu6 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 26764ce1127420cc8af47aaded1a9ae10ee3c2bb

New changelog entries:
  * debian/patches/arm64/submitted-setcontext.diff: Update to new version
    of Will's setcontext patch to fix sigmask handling bug (LP: #1306829)

ubuntu/utopic-devel 2014-04-12 09:43:13 UTC 2014-04-12
Import patches-unapplied version 2.19-0ubuntu6 to ubuntu/trusty-proposed

Author: Adam Conrad
Author Date: 2014-04-12 07:47:43 UTC

Import patches-unapplied version 2.19-0ubuntu6 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 26764ce1127420cc8af47aaded1a9ae10ee3c2bb

New changelog entries:
  * debian/patches/arm64/submitted-setcontext.diff: Update to new version
    of Will's setcontext patch to fix sigmask handling bug (LP: #1306829)

applied/ubuntu/utopic 2014-04-12 09:43:13 UTC 2014-04-12
Import patches-applied version 2.19-0ubuntu6 to applied/ubuntu/trusty-proposed

Author: Adam Conrad
Author Date: 2014-04-12 07:47:43 UTC

Import patches-applied version 2.19-0ubuntu6 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: fed6aeab2105dba94f113dd5de730f4a70ccfeba
Unapplied parent: 424b8a39c9bcadf7fa7e98de7a099642e3ae46fc

New changelog entries:
  * debian/patches/arm64/submitted-setcontext.diff: Update to new version
    of Will's setcontext patch to fix sigmask handling bug (LP: #1306829)

ubuntu/trusty 2014-04-12 09:43:13 UTC 2014-04-12
Import patches-unapplied version 2.19-0ubuntu6 to ubuntu/trusty-proposed

Author: Adam Conrad
Author Date: 2014-04-12 07:47:43 UTC

Import patches-unapplied version 2.19-0ubuntu6 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 26764ce1127420cc8af47aaded1a9ae10ee3c2bb

New changelog entries:
  * debian/patches/arm64/submitted-setcontext.diff: Update to new version
    of Will's setcontext patch to fix sigmask handling bug (LP: #1306829)

applied/ubuntu/devel 2014-04-12 09:43:13 UTC 2014-04-12
Import patches-applied version 2.19-0ubuntu6 to applied/ubuntu/trusty-proposed

Author: Adam Conrad
Author Date: 2014-04-12 07:47:43 UTC

Import patches-applied version 2.19-0ubuntu6 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: fed6aeab2105dba94f113dd5de730f4a70ccfeba
Unapplied parent: 424b8a39c9bcadf7fa7e98de7a099642e3ae46fc

New changelog entries:
  * debian/patches/arm64/submitted-setcontext.diff: Update to new version
    of Will's setcontext patch to fix sigmask handling bug (LP: #1306829)

applied/ubuntu/trusty 2014-04-12 09:43:13 UTC 2014-04-12
Import patches-applied version 2.19-0ubuntu6 to applied/ubuntu/trusty-proposed

Author: Adam Conrad
Author Date: 2014-04-12 07:47:43 UTC

Import patches-applied version 2.19-0ubuntu6 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: fed6aeab2105dba94f113dd5de730f4a70ccfeba
Unapplied parent: 424b8a39c9bcadf7fa7e98de7a099642e3ae46fc

New changelog entries:
  * debian/patches/arm64/submitted-setcontext.diff: Update to new version
    of Will's setcontext patch to fix sigmask handling bug (LP: #1306829)

ubuntu/utopic 2014-04-12 09:43:13 UTC 2014-04-12
Import patches-unapplied version 2.19-0ubuntu6 to ubuntu/trusty-proposed

Author: Adam Conrad
Author Date: 2014-04-12 07:47:43 UTC

Import patches-unapplied version 2.19-0ubuntu6 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 26764ce1127420cc8af47aaded1a9ae10ee3c2bb

New changelog entries:
  * debian/patches/arm64/submitted-setcontext.diff: Update to new version
    of Will's setcontext patch to fix sigmask handling bug (LP: #1306829)

ubuntu/quantal-devel 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-unapplied version 2.15-0ubuntu20.2 to ubuntu/quantal-security

Author: Marc Deslauriers
Author Date: 2013-09-27 17:49:56 UTC

Import patches-unapplied version 2.15-0ubuntu20.2 to ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: ed9b06bdf0a9c59802fd1db8bb72f0842f9aa546

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/unix/readdir_r.c, add errcode to sysdeps/unix/dirstream.h,
      sysdeps/unix/opendir.c, sysdeps/unix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

applied/ubuntu/quantal-devel 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-applied version 2.15-0ubuntu20.2 to applied/ubuntu/quantal-sec...

Author: Marc Deslauriers
Author Date: 2013-09-27 17:49:56 UTC

Import patches-applied version 2.15-0ubuntu20.2 to applied/ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: 289415b33148f2c48d14114ae2e0c2732035f909
Unapplied parent: 196384eb140643d8e2c0c950d2f3925323e3d3dd

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/unix/readdir_r.c, add errcode to sysdeps/unix/dirstream.h,
      sysdeps/unix/opendir.c, sysdeps/unix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

applied/ubuntu/quantal-security 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-applied version 2.15-0ubuntu20.2 to applied/ubuntu/quantal-sec...

Author: Marc Deslauriers
Author Date: 2013-09-27 17:49:56 UTC

Import patches-applied version 2.15-0ubuntu20.2 to applied/ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: 289415b33148f2c48d14114ae2e0c2732035f909
Unapplied parent: 196384eb140643d8e2c0c950d2f3925323e3d3dd

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/unix/readdir_r.c, add errcode to sysdeps/unix/dirstream.h,
      sysdeps/unix/opendir.c, sysdeps/unix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

applied/ubuntu/quantal-updates 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-applied version 2.15-0ubuntu20.2 to applied/ubuntu/quantal-sec...

Author: Marc Deslauriers
Author Date: 2013-09-27 17:49:56 UTC

Import patches-applied version 2.15-0ubuntu20.2 to applied/ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: 289415b33148f2c48d14114ae2e0c2732035f909
Unapplied parent: 196384eb140643d8e2c0c950d2f3925323e3d3dd

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/unix/readdir_r.c, add errcode to sysdeps/unix/dirstream.h,
      sysdeps/unix/opendir.c, sysdeps/unix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

applied/ubuntu/raring-devel 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-applied version 2.17-0ubuntu5.1 to applied/ubuntu/raring-security

Author: Marc Deslauriers
Author Date: 2013-09-27 13:07:13 UTC

Import patches-applied version 2.17-0ubuntu5.1 to applied/ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 095b8812b5d3a76b83eca3e7b7ba447b9ae2f6a0
Unapplied parent: da93a19d3de0ea4d93abac20305d56f41569dec5

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/posix/readdir_r.c, add errcode to sysdeps/posix/dirstream.h,
      sysdeps/posix/opendir.c, sysdeps/posix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

applied/ubuntu/raring-security 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-applied version 2.17-0ubuntu5.1 to applied/ubuntu/raring-security

Author: Marc Deslauriers
Author Date: 2013-09-27 13:07:13 UTC

Import patches-applied version 2.17-0ubuntu5.1 to applied/ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 095b8812b5d3a76b83eca3e7b7ba447b9ae2f6a0
Unapplied parent: da93a19d3de0ea4d93abac20305d56f41569dec5

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/posix/readdir_r.c, add errcode to sysdeps/posix/dirstream.h,
      sysdeps/posix/opendir.c, sysdeps/posix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

applied/ubuntu/raring-updates 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-applied version 2.17-0ubuntu5.1 to applied/ubuntu/raring-security

Author: Marc Deslauriers
Author Date: 2013-09-27 13:07:13 UTC

Import patches-applied version 2.17-0ubuntu5.1 to applied/ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 095b8812b5d3a76b83eca3e7b7ba447b9ae2f6a0
Unapplied parent: da93a19d3de0ea4d93abac20305d56f41569dec5

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/posix/readdir_r.c, add errcode to sysdeps/posix/dirstream.h,
      sysdeps/posix/opendir.c, sysdeps/posix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

ubuntu/raring-updates 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-unapplied version 2.17-0ubuntu5.1 to ubuntu/raring-security

Author: Marc Deslauriers
Author Date: 2013-09-27 13:07:13 UTC

Import patches-unapplied version 2.17-0ubuntu5.1 to ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: af16aebde19e28959b88a83e81cedab29f0e51ed

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/posix/readdir_r.c, add errcode to sysdeps/posix/dirstream.h,
      sysdeps/posix/opendir.c, sysdeps/posix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

ubuntu/raring-security 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-unapplied version 2.17-0ubuntu5.1 to ubuntu/raring-security

Author: Marc Deslauriers
Author Date: 2013-09-27 13:07:13 UTC

Import patches-unapplied version 2.17-0ubuntu5.1 to ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: af16aebde19e28959b88a83e81cedab29f0e51ed

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/posix/readdir_r.c, add errcode to sysdeps/posix/dirstream.h,
      sysdeps/posix/opendir.c, sysdeps/posix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

ubuntu/raring-devel 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-unapplied version 2.17-0ubuntu5.1 to ubuntu/raring-security

Author: Marc Deslauriers
Author Date: 2013-09-27 13:07:13 UTC

Import patches-unapplied version 2.17-0ubuntu5.1 to ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: af16aebde19e28959b88a83e81cedab29f0e51ed

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/posix/readdir_r.c, add errcode to sysdeps/posix/dirstream.h,
      sysdeps/posix/opendir.c, sysdeps/posix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

ubuntu/quantal-updates 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-unapplied version 2.15-0ubuntu20.2 to ubuntu/quantal-security

Author: Marc Deslauriers
Author Date: 2013-09-27 17:49:56 UTC

Import patches-unapplied version 2.15-0ubuntu20.2 to ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: ed9b06bdf0a9c59802fd1db8bb72f0842f9aa546

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/unix/readdir_r.c, add errcode to sysdeps/unix/dirstream.h,
      sysdeps/unix/opendir.c, sysdeps/unix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

ubuntu/quantal-security 2013-10-21 16:08:38 UTC 2013-10-21
Import patches-unapplied version 2.15-0ubuntu20.2 to ubuntu/quantal-security

Author: Marc Deslauriers
Author Date: 2013-09-27 17:49:56 UTC

Import patches-unapplied version 2.15-0ubuntu20.2 to ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: ed9b06bdf0a9c59802fd1db8bb72f0842f9aa546

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    strcoll overflows
    - debian/patches/any/CVE-2012-44xx.diff: fix overflows in
      string/strcoll_l.c, add test to string/tst-strcoll-overflow.c,
      string/Makefile.
    - CVE-2012-4412
    - CVE-2012-4424
  * SECURITY UPDATE: denial of service in regular expression matcher
    - debian/patches/any/CVE-2013-0242.diff: fix buffer overrun in
      posix/regexec.c, add test to posix/bug-regex34.c, posix/Makefile.
    - CVE-2013-0242
  * SECURITY UPDATE: denial of service in getaddrinfo
    - debian/patches/any/CVE-2013-1914.diff: fix overflow in
      sysdeps/posix/getaddrinfo.c.
    - CVE-2013-1914
  * SECURITY UPDATE: denial of service and possible code execution via
    readdir_r
    - debian/patches/any/CVE-2013-4237.diff: enforce NAME_MAX limit in
      sysdeps/unix/readdir_r.c, add errcode to sysdeps/unix/dirstream.h,
      sysdeps/unix/opendir.c, sysdeps/unix/rewinddir.c, remove
      GETDENTS_64BIT_ALIGNED from
      sysdeps/unix/sysv/linux/i386/readdir64_r.c,
      sysdeps/unix/sysv/linux/wordsize-64/readdir_r.c.
    - CVE-2013-4237
  * SECURITY UPDATE: denial of service and possible code execution via
    overflows in memory allocator
    - debian/patches/any/CVE-2013-4332.diff: check for overflows in
      malloc/malloc.c.
    - CVE-2013-4332

ubuntu/saucy-devel 2013-10-12 04:03:26 UTC 2013-10-12
Import patches-unapplied version 2.17-93ubuntu4 to ubuntu/saucy-proposed

Author: Adam Conrad
Author Date: 2013-10-12 03:06:21 UTC

Import patches-unapplied version 2.17-93ubuntu4 to ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: da320e0616fe6d060d7f180bd17e5c8d162a2a51

New changelog entries:
  * patches/arm64/cvs-setjmp-clobber.diff: __sigsetjmp clobbers register
    x1 before making the tail call to __sigjmp_save, which causes the
    latter to always save the signal mask. Backport git patch to fix.
  * patches/series: Revert the CVE-2013-2207 pt_chown fix until we come
    up with a sane plan to avoid users shooting themselves in the foot.
  * debhelper.in/libc-bin.install: Install pt_chown again for the above.

applied/ubuntu/saucy-proposed 2013-10-12 04:03:26 UTC 2013-10-12
Import patches-applied version 2.17-93ubuntu4 to applied/ubuntu/saucy-proposed

Author: Adam Conrad
Author Date: 2013-10-12 03:06:21 UTC

Import patches-applied version 2.17-93ubuntu4 to applied/ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 34e215a10f52eef97573b7e0975ed5010762030f
Unapplied parent: c0c5d9a1ecfed7693319920748f59378a27f1ebc

New changelog entries:
  * patches/arm64/cvs-setjmp-clobber.diff: __sigsetjmp clobbers register
    x1 before making the tail call to __sigjmp_save, which causes the
    latter to always save the signal mask. Backport git patch to fix.
  * patches/series: Revert the CVE-2013-2207 pt_chown fix until we come
    up with a sane plan to avoid users shooting themselves in the foot.
  * debhelper.in/libc-bin.install: Install pt_chown again for the above.

applied/ubuntu/saucy-devel 2013-10-12 04:03:26 UTC 2013-10-12
Import patches-applied version 2.17-93ubuntu4 to applied/ubuntu/saucy-proposed

Author: Adam Conrad
Author Date: 2013-10-12 03:06:21 UTC

Import patches-applied version 2.17-93ubuntu4 to applied/ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 34e215a10f52eef97573b7e0975ed5010762030f
Unapplied parent: c0c5d9a1ecfed7693319920748f59378a27f1ebc

New changelog entries:
  * patches/arm64/cvs-setjmp-clobber.diff: __sigsetjmp clobbers register
    x1 before making the tail call to __sigjmp_save, which causes the
    latter to always save the signal mask. Backport git patch to fix.
  * patches/series: Revert the CVE-2013-2207 pt_chown fix until we come
    up with a sane plan to avoid users shooting themselves in the foot.
  * debhelper.in/libc-bin.install: Install pt_chown again for the above.

ubuntu/saucy-proposed 2013-10-12 04:03:26 UTC 2013-10-12
Import patches-unapplied version 2.17-93ubuntu4 to ubuntu/saucy-proposed

Author: Adam Conrad
Author Date: 2013-10-12 03:06:21 UTC

Import patches-unapplied version 2.17-93ubuntu4 to ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: da320e0616fe6d060d7f180bd17e5c8d162a2a51

New changelog entries:
  * patches/arm64/cvs-setjmp-clobber.diff: __sigsetjmp clobbers register
    x1 before making the tail call to __sigjmp_save, which causes the
    latter to always save the signal mask. Backport git patch to fix.
  * patches/series: Revert the CVE-2013-2207 pt_chown fix until we come
    up with a sane plan to avoid users shooting themselves in the foot.
  * debhelper.in/libc-bin.install: Install pt_chown again for the above.

applied/ubuntu/saucy 2013-10-12 04:03:26 UTC 2013-10-12
Import patches-applied version 2.17-93ubuntu4 to applied/ubuntu/saucy-proposed

Author: Adam Conrad
Author Date: 2013-10-12 03:06:21 UTC

Import patches-applied version 2.17-93ubuntu4 to applied/ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 34e215a10f52eef97573b7e0975ed5010762030f
Unapplied parent: c0c5d9a1ecfed7693319920748f59378a27f1ebc

New changelog entries:
  * patches/arm64/cvs-setjmp-clobber.diff: __sigsetjmp clobbers register
    x1 before making the tail call to __sigjmp_save, which causes the
    latter to always save the signal mask. Backport git patch to fix.
  * patches/series: Revert the CVE-2013-2207 pt_chown fix until we come
    up with a sane plan to avoid users shooting themselves in the foot.
  * debhelper.in/libc-bin.install: Install pt_chown again for the above.

ubuntu/saucy 2013-10-12 04:03:26 UTC 2013-10-12
Import patches-unapplied version 2.17-93ubuntu4 to ubuntu/saucy-proposed

Author: Adam Conrad
Author Date: 2013-10-12 03:06:21 UTC

Import patches-unapplied version 2.17-93ubuntu4 to ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: da320e0616fe6d060d7f180bd17e5c8d162a2a51

New changelog entries:
  * patches/arm64/cvs-setjmp-clobber.diff: __sigsetjmp clobbers register
    x1 before making the tail call to __sigjmp_save, which causes the
    latter to always save the signal mask. Backport git patch to fix.
  * patches/series: Revert the CVE-2013-2207 pt_chown fix until we come
    up with a sane plan to avoid users shooting themselves in the foot.
  * debhelper.in/libc-bin.install: Install pt_chown again for the above.

applied/ubuntu/raring-proposed 2013-04-18 10:33:21 UTC 2013-04-18
Import patches-applied version 2.17-0ubuntu5 to applied/ubuntu/raring-proposed

Author: Adam Conrad
Author Date: 2013-04-18 04:53:13 UTC

Import patches-applied version 2.17-0ubuntu5 to applied/ubuntu/raring-proposed

Imported using git-ubuntu import.

Changelog parent: 80f930575e230bfb110c429dbd21cedf7fda5165
Unapplied parent: dfbaae1110810b406eab4c9793427ec845e86be5

New changelog entries:
  * debian/debhelper.in/libc.postint: Switch from 'awk gsub' to 'tr -d' to
    avoid warnings when the awk alternative points to gawk (LP: #1156923)
  * debian/patches/any/submitted-setfsid-wur.diff: Drop __wur from setfsuid
    and setfsgid functions to avoid -Werror=unused-result (Closes: #701422)
  * debian/patches/i386/cvs-simd-exception.diff: Pull patch from upstream
    to fix a performance regression in i386 SIMD exceptions (LP: #1157244)
  * debian/patches/svn-updates.diff: Update to r22884 of eglibc-2_17 branch
  * debian/testsuite-checking/compare.sh: Disable hard testsuite failures
    for release to avoid stable updates exploding as buildd kernels change

applied/ubuntu/raring 2013-04-18 10:33:21 UTC 2013-04-18
Import patches-applied version 2.17-0ubuntu5 to applied/ubuntu/raring-proposed

Author: Adam Conrad
Author Date: 2013-04-18 04:53:13 UTC

Import patches-applied version 2.17-0ubuntu5 to applied/ubuntu/raring-proposed

Imported using git-ubuntu import.

Changelog parent: 80f930575e230bfb110c429dbd21cedf7fda5165
Unapplied parent: dfbaae1110810b406eab4c9793427ec845e86be5

New changelog entries:
  * debian/debhelper.in/libc.postint: Switch from 'awk gsub' to 'tr -d' to
    avoid warnings when the awk alternative points to gawk (LP: #1156923)
  * debian/patches/any/submitted-setfsid-wur.diff: Drop __wur from setfsuid
    and setfsgid functions to avoid -Werror=unused-result (Closes: #701422)
  * debian/patches/i386/cvs-simd-exception.diff: Pull patch from upstream
    to fix a performance regression in i386 SIMD exceptions (LP: #1157244)
  * debian/patches/svn-updates.diff: Update to r22884 of eglibc-2_17 branch
  * debian/testsuite-checking/compare.sh: Disable hard testsuite failures
    for release to avoid stable updates exploding as buildd kernels change

ubuntu/raring 2013-04-18 10:33:21 UTC 2013-04-18
Import patches-unapplied version 2.17-0ubuntu5 to ubuntu/raring-proposed

Author: Adam Conrad
Author Date: 2013-04-18 04:53:13 UTC

Import patches-unapplied version 2.17-0ubuntu5 to ubuntu/raring-proposed

Imported using git-ubuntu import.

Changelog parent: b53349f3d5b129eb9e82570322961d9f87d49a64

New changelog entries:
  * debian/debhelper.in/libc.postint: Switch from 'awk gsub' to 'tr -d' to
    avoid warnings when the awk alternative points to gawk (LP: #1156923)
  * debian/patches/any/submitted-setfsid-wur.diff: Drop __wur from setfsuid
    and setfsgid functions to avoid -Werror=unused-result (Closes: #701422)
  * debian/patches/i386/cvs-simd-exception.diff: Pull patch from upstream
    to fix a performance regression in i386 SIMD exceptions (LP: #1157244)
  * debian/patches/svn-updates.diff: Update to r22884 of eglibc-2_17 branch
  * debian/testsuite-checking/compare.sh: Disable hard testsuite failures
    for release to avoid stable updates exploding as buildd kernels change

ubuntu/raring-proposed 2013-04-18 10:33:21 UTC 2013-04-18
Import patches-unapplied version 2.17-0ubuntu5 to ubuntu/raring-proposed

Author: Adam Conrad
Author Date: 2013-04-18 04:53:13 UTC

Import patches-unapplied version 2.17-0ubuntu5 to ubuntu/raring-proposed

Imported using git-ubuntu import.

Changelog parent: b53349f3d5b129eb9e82570322961d9f87d49a64

New changelog entries:
  * debian/debhelper.in/libc.postint: Switch from 'awk gsub' to 'tr -d' to
    avoid warnings when the awk alternative points to gawk (LP: #1156923)
  * debian/patches/any/submitted-setfsid-wur.diff: Drop __wur from setfsuid
    and setfsgid functions to avoid -Werror=unused-result (Closes: #701422)
  * debian/patches/i386/cvs-simd-exception.diff: Pull patch from upstream
    to fix a performance regression in i386 SIMD exceptions (LP: #1157244)
  * debian/patches/svn-updates.diff: Update to r22884 of eglibc-2_17 branch
  * debian/testsuite-checking/compare.sh: Disable hard testsuite failures
    for release to avoid stable updates exploding as buildd kernels change

ubuntu/quantal-proposed 2013-01-28 11:03:13 UTC 2013-01-28
Import patches-unapplied version 2.15-0ubuntu20.1 to ubuntu/quantal-proposed

Author: Adam Conrad
Author Date: 2013-01-27 23:46:30 UTC

Import patches-unapplied version 2.15-0ubuntu20.1 to ubuntu/quantal-proposed

Imported using git-ubuntu import.

Changelog parent: b47ba6950f23d3dc528da9bb941c2645ae822998

New changelog entries:
  * Add patch ubuntu/local-disable-nscd-netgroup-caching.diff to
    disable netgroup caching in the default config (LP: #1068889)
  * Backport any/cvs-malloc-deadlock.diff from upstream to prevent
    glibc deadlocking in mallock arena retry paths (LP: #1081734)
  * Fix futex issue (BZ #13844), backport from 2.16 (LP: #1091186)
  * Drop patch any/local-disable-nscd-host-caching.diff, as this
    bug was apparently resolved upstream a while ago (LP: #613662)
  * Add patch any/cvs-ld-self-load.diff to restore ld.so's ability
    to load itself, a behaviour accidentally removed (LP: #1088677)
  * Drop dangling libnss_db.so symlink in libc6-dev (LP: #1088773)

applied/ubuntu/quantal-proposed 2013-01-28 11:03:13 UTC 2013-01-28
Import patches-applied version 2.15-0ubuntu20.1 to applied/ubuntu/quantal-pro...

Author: Adam Conrad
Author Date: 2013-01-27 23:46:30 UTC

Import patches-applied version 2.15-0ubuntu20.1 to applied/ubuntu/quantal-proposed

Imported using git-ubuntu import.

Changelog parent: c4a9c9ef39235421b7ea733382b71a35f24dae8a
Unapplied parent: ed9b06bdf0a9c59802fd1db8bb72f0842f9aa546

New changelog entries:
  * Add patch ubuntu/local-disable-nscd-netgroup-caching.diff to
    disable netgroup caching in the default config (LP: #1068889)
  * Backport any/cvs-malloc-deadlock.diff from upstream to prevent
    glibc deadlocking in mallock arena retry paths (LP: #1081734)
  * Fix futex issue (BZ #13844), backport from 2.16 (LP: #1091186)
  * Drop patch any/local-disable-nscd-host-caching.diff, as this
    bug was apparently resolved upstream a while ago (LP: #613662)
  * Add patch any/cvs-ld-self-load.diff to restore ld.so's ability
    to load itself, a behaviour accidentally removed (LP: #1088677)
  * Drop dangling libnss_db.so symlink in libc6-dev (LP: #1088773)

applied/ubuntu/lucid-proposed 2012-11-15 20:33:15 UTC 2012-11-15
Import patches-applied version 2.11.1-0ubuntu7.12 to applied/ubuntu/lucid-pro...

Author: Adam Conrad
Author Date: 2012-11-14 23:14:37 UTC

Import patches-applied version 2.11.1-0ubuntu7.12 to applied/ubuntu/lucid-proposed

Imported using git-ubuntu import.

Changelog parent: b5ff6e877c0c0ccc4c7d5cd9c3140dff461b5036
Unapplied parent: eceb5354ea0e0d03d24f5e044f00857ea2a0a4e2

New changelog entries:
  * Pull three interdependent patches from Debian to fix AVX detection
    problems on kernels or CPUs that lack support for it (LP: #979003):
    - amd64/cvs-avx-detection.diff: Improved detection on old kernels.
    - amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.
    - amd64/cvs-avx-osxsave.diff: Disable AVX without OSXAVE support.
  * Also backport amd64/submitted-tst-audit6-avx.diff from oneiric to
    skip tests if AVX extensions are not available on the build host.
  * Use non-deprecated --reject-format=unified QUILT_PATCH_OPTS option.

ubuntu/lucid-proposed 2012-11-15 20:33:15 UTC 2012-11-15
Import patches-unapplied version 2.11.1-0ubuntu7.12 to ubuntu/lucid-proposed

Author: Adam Conrad
Author Date: 2012-11-14 23:14:37 UTC

Import patches-unapplied version 2.11.1-0ubuntu7.12 to ubuntu/lucid-proposed

Imported using git-ubuntu import.

Changelog parent: 53fb72b405af09fc3da9fa219014f9662c6c4c8f

New changelog entries:
  * Pull three interdependent patches from Debian to fix AVX detection
    problems on kernels or CPUs that lack support for it (LP: #979003):
    - amd64/cvs-avx-detection.diff: Improved detection on old kernels.
    - amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.
    - amd64/cvs-avx-osxsave.diff: Disable AVX without OSXAVE support.
  * Also backport amd64/submitted-tst-audit6-avx.diff from oneiric to
    skip tests if AVX extensions are not available on the build host.
  * Use non-deprecated --reject-format=unified QUILT_PATCH_OPTS option.

applied/ubuntu/oneiric-updates 2012-11-15 20:03:16 UTC 2012-11-15
Import patches-applied version 2.13-20ubuntu5.3 to applied/ubuntu/oneiric-pro...

Author: Adam Conrad
Author Date: 2012-11-14 23:03:25 UTC

Import patches-applied version 2.13-20ubuntu5.3 to applied/ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: 8f754983edcae3e6120d51870828410014e28989
Unapplied parent: 59e3afa223df2be1a32272cd5a7d6111a2f9a930

New changelog entries:
  * Pull three interdependent patches from Debian to fix AVX detection
    problems on kernels or CPUs that lack support for it (LP: #979003):
    - amd64/cvs-avx-detection.diff: Improved detection on old kernels.
    - amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.
    - amd64/cvs-avx-osxsave.diff: Disable AVX without OSXAVE support.

applied/ubuntu/oneiric-devel 2012-11-15 20:03:16 UTC 2012-11-15
Import patches-applied version 2.13-20ubuntu5.3 to applied/ubuntu/oneiric-pro...

Author: Adam Conrad
Author Date: 2012-11-14 23:03:25 UTC

Import patches-applied version 2.13-20ubuntu5.3 to applied/ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: 8f754983edcae3e6120d51870828410014e28989
Unapplied parent: 59e3afa223df2be1a32272cd5a7d6111a2f9a930

New changelog entries:
  * Pull three interdependent patches from Debian to fix AVX detection
    problems on kernels or CPUs that lack support for it (LP: #979003):
    - amd64/cvs-avx-detection.diff: Improved detection on old kernels.
    - amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.
    - amd64/cvs-avx-osxsave.diff: Disable AVX without OSXAVE support.

applied/ubuntu/oneiric-proposed 2012-11-15 20:03:16 UTC 2012-11-15
Import patches-applied version 2.13-20ubuntu5.3 to applied/ubuntu/oneiric-pro...

Author: Adam Conrad
Author Date: 2012-11-14 23:03:25 UTC

Import patches-applied version 2.13-20ubuntu5.3 to applied/ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: 8f754983edcae3e6120d51870828410014e28989
Unapplied parent: 59e3afa223df2be1a32272cd5a7d6111a2f9a930

New changelog entries:
  * Pull three interdependent patches from Debian to fix AVX detection
    problems on kernels or CPUs that lack support for it (LP: #979003):
    - amd64/cvs-avx-detection.diff: Improved detection on old kernels.
    - amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.
    - amd64/cvs-avx-osxsave.diff: Disable AVX without OSXAVE support.

ubuntu/oneiric-updates 2012-11-15 20:03:16 UTC 2012-11-15
Import patches-unapplied version 2.13-20ubuntu5.3 to ubuntu/oneiric-proposed

Author: Adam Conrad
Author Date: 2012-11-14 23:03:25 UTC

Import patches-unapplied version 2.13-20ubuntu5.3 to ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: cfe3329362ec56ac8ada3aa77fb0bd6163ee23ad

New changelog entries:
  * Pull three interdependent patches from Debian to fix AVX detection
    problems on kernels or CPUs that lack support for it (LP: #979003):
    - amd64/cvs-avx-detection.diff: Improved detection on old kernels.
    - amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.
    - amd64/cvs-avx-osxsave.diff: Disable AVX without OSXAVE support.

ubuntu/oneiric-proposed 2012-11-15 20:03:16 UTC 2012-11-15
Import patches-unapplied version 2.13-20ubuntu5.3 to ubuntu/oneiric-proposed

Author: Adam Conrad
Author Date: 2012-11-14 23:03:25 UTC

Import patches-unapplied version 2.13-20ubuntu5.3 to ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: cfe3329362ec56ac8ada3aa77fb0bd6163ee23ad

New changelog entries:
  * Pull three interdependent patches from Debian to fix AVX detection
    problems on kernels or CPUs that lack support for it (LP: #979003):
    - amd64/cvs-avx-detection.diff: Improved detection on old kernels.
    - amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.
    - amd64/cvs-avx-osxsave.diff: Disable AVX without OSXAVE support.

ubuntu/oneiric-devel 2012-11-15 20:03:16 UTC 2012-11-15
Import patches-unapplied version 2.13-20ubuntu5.3 to ubuntu/oneiric-proposed

Author: Adam Conrad
Author Date: 2012-11-14 23:03:25 UTC

Import patches-unapplied version 2.13-20ubuntu5.3 to ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: cfe3329362ec56ac8ada3aa77fb0bd6163ee23ad

New changelog entries:
  * Pull three interdependent patches from Debian to fix AVX detection
    problems on kernels or CPUs that lack support for it (LP: #979003):
    - amd64/cvs-avx-detection.diff: Improved detection on old kernels.
    - amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.
    - amd64/cvs-avx-osxsave.diff: Disable AVX without OSXAVE support.

ubuntu/quantal 2012-10-04 01:33:19 UTC 2012-10-04
Import patches-unapplied version 2.15-0ubuntu20 to ubuntu/quantal-proposed

Author: Adam Conrad
Author Date: 2012-10-03 21:58:02 UTC

Import patches-unapplied version 2.15-0ubuntu20 to ubuntu/quantal-proposed

Imported using git-ubuntu import.

Changelog parent: fddcba05ec81e01a096f1d53faca6dc8bddd35ce

New changelog entries:
  * Backport fixes for dbl-64 and ldbl-128 issues (LP: #1000498)
  * Backport another FMA support patch from glibc master branch.
  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

applied/ubuntu/quantal 2012-10-04 01:33:19 UTC 2012-10-04
Import patches-applied version 2.15-0ubuntu20 to applied/ubuntu/quantal-proposed

Author: Adam Conrad
Author Date: 2012-10-03 21:58:02 UTC

Import patches-applied version 2.15-0ubuntu20 to applied/ubuntu/quantal-proposed

Imported using git-ubuntu import.

Changelog parent: a21b2d2fcb05d3d4a3b0a5c59ea4be548b0da953
Unapplied parent: b47ba6950f23d3dc528da9bb941c2645ae822998

New changelog entries:
  * Backport fixes for dbl-64 and ldbl-128 issues (LP: #1000498)
  * Backport another FMA support patch from glibc master branch.
  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

applied/ubuntu/natty-updates 2012-10-02 04:33:22 UTC 2012-10-02
Import patches-applied version 2.13-0ubuntu13.2 to applied/ubuntu/natty-security

Author: Steve Beattie
Author Date: 2012-09-20 22:45:17 UTC

Import patches-applied version 2.13-0ubuntu13.2 to applied/ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: ed9b4ca24b01db10639374742513adb13073236c
Unapplied parent: 694c94aa67d9eb8bb1142ce716a59de5aaafd2cc

New changelog entries:
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3404.patch: Fix allocation when
      handling positional parameters in printf.
    - CVE-2012-3404
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3405.patch: fix extension of array
    - CVE-2012-3405
  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

applied/ubuntu/oneiric-security 2012-10-02 04:33:22 UTC 2012-10-02
Import patches-applied version 2.13-20ubuntu5.2 to applied/ubuntu/oneiric-sec...

Author: Steve Beattie
Author Date: 2012-09-19 05:16:46 UTC

Import patches-applied version 2.13-20ubuntu5.2 to applied/ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: 3d8bde0f524fbc7ea60f3093f9c7eddb10c8f851
Unapplied parent: cfe3329362ec56ac8ada3aa77fb0bd6163ee23ad

New changelog entries:
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3404.patch: Fix allocation when
      handling positional parameters in printf.
    - CVE-2012-3404
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3405.patch: fix extension of array
    - CVE-2012-3405
  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

applied/ubuntu/natty-devel 2012-10-02 04:33:22 UTC 2012-10-02
Import patches-applied version 2.13-0ubuntu13.2 to applied/ubuntu/natty-security

Author: Steve Beattie
Author Date: 2012-09-20 22:45:17 UTC

Import patches-applied version 2.13-0ubuntu13.2 to applied/ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: ed9b4ca24b01db10639374742513adb13073236c
Unapplied parent: 694c94aa67d9eb8bb1142ce716a59de5aaafd2cc

New changelog entries:
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3404.patch: Fix allocation when
      handling positional parameters in printf.
    - CVE-2012-3404
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3405.patch: fix extension of array
    - CVE-2012-3405
  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

applied/ubuntu/natty-security 2012-10-02 04:33:22 UTC 2012-10-02
Import patches-applied version 2.13-0ubuntu13.2 to applied/ubuntu/natty-security

Author: Steve Beattie
Author Date: 2012-09-20 22:45:17 UTC

Import patches-applied version 2.13-0ubuntu13.2 to applied/ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: ed9b4ca24b01db10639374742513adb13073236c
Unapplied parent: 694c94aa67d9eb8bb1142ce716a59de5aaafd2cc

New changelog entries:
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3404.patch: Fix allocation when
      handling positional parameters in printf.
    - CVE-2012-3404
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3405.patch: fix extension of array
    - CVE-2012-3405
  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

ubuntu/oneiric-security 2012-10-02 04:33:22 UTC 2012-10-02
Import patches-unapplied version 2.13-20ubuntu5.2 to ubuntu/oneiric-security

Author: Steve Beattie
Author Date: 2012-09-19 05:16:46 UTC

Import patches-unapplied version 2.13-20ubuntu5.2 to ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: 4ba754b32f71ed5f4ee4c580003ea33e1003f8cc

New changelog entries:
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3404.patch: Fix allocation when
      handling positional parameters in printf.
    - CVE-2012-3404
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3405.patch: fix extension of array
    - CVE-2012-3405
  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

ubuntu/natty-devel 2012-10-02 04:33:22 UTC 2012-10-02
Import patches-unapplied version 2.13-0ubuntu13.2 to ubuntu/natty-security

Author: Steve Beattie
Author Date: 2012-09-20 22:45:17 UTC

Import patches-unapplied version 2.13-0ubuntu13.2 to ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: ca88281ee23956f11fe145a76ee812b397b8bf50

New changelog entries:
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3404.patch: Fix allocation when
      handling positional parameters in printf.
    - CVE-2012-3404
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3405.patch: fix extension of array
    - CVE-2012-3405
  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

ubuntu/natty-security 2012-10-02 04:33:22 UTC 2012-10-02
Import patches-unapplied version 2.13-0ubuntu13.2 to ubuntu/natty-security

Author: Steve Beattie
Author Date: 2012-09-20 22:45:17 UTC

Import patches-unapplied version 2.13-0ubuntu13.2 to ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: ca88281ee23956f11fe145a76ee812b397b8bf50

New changelog entries:
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3404.patch: Fix allocation when
      handling positional parameters in printf.
    - CVE-2012-3404
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3405.patch: fix extension of array
    - CVE-2012-3405
  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

ubuntu/natty-updates 2012-10-02 04:33:22 UTC 2012-10-02
Import patches-unapplied version 2.13-0ubuntu13.2 to ubuntu/natty-security

Author: Steve Beattie
Author Date: 2012-09-20 22:45:17 UTC

Import patches-unapplied version 2.13-0ubuntu13.2 to ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: ca88281ee23956f11fe145a76ee812b397b8bf50

New changelog entries:
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3404.patch: Fix allocation when
      handling positional parameters in printf.
    - CVE-2012-3404
  * SECURITY UPDATE: buffer overflow in vfprintf handling
    - debian/patches/any/CVE-2012-3405.patch: fix extension of array
    - CVE-2012-3405
  * SECURITY UPDATE: stack buffer overflow in vfprintf handling
    (LP: #1031301)
    - debian/patches/any/CVE-2012-3406.patch: switch to malloc when
      array grows too large to handle via alloca extension
    - CVE-2012-3406
  * SECURITY UPDATE: stdlib strtod integer/buffer overflows
    - debian/patches/any/CVE-2012-3480.patch: rearrange calculations
      and modify types to void integer overflows
    - CVE-2012-3480

applied/debian/squeeze 2012-09-29 16:11:42 UTC 2012-09-29
Import patches-applied version 2.11.3-4 to applied/debian/squeeze

Author: Aurelien Jarno
Author Date: 2012-06-06 16:03:02 UTC

Import patches-applied version 2.11.3-4 to applied/debian/squeeze

Imported using git-ubuntu import.

Changelog parent: efef65da2ad9978112ab7f6151e82fbfbf18c56b
Unapplied parent: 186580b38b012b79dbded813140c0234360c71f2

New changelog entries:
  * Enable patches/any/cvs-dlopen-tls.diff, not enabled by mistake. Closes:
    #637239.
  * patches/any/cvs-FORTIFY_SOURCE-format-strings.diff: new patch from
    upstream to fix FORTIFY_SOURCE format string protection bypass. Closes:
    #660611.
  * patches/any/local-sunrpc-dos.diff: fix a DoS in RPC implementation
    (CVE-2011-4609). Closes: #671478.

debian/squeeze 2012-09-29 16:11:42 UTC 2012-09-29
Import patches-unapplied version 2.11.3-4 to debian/squeeze

Author: Aurelien Jarno
Author Date: 2012-06-06 16:03:02 UTC

Import patches-unapplied version 2.11.3-4 to debian/squeeze

Imported using git-ubuntu import.

Changelog parent: 3bbc812e6f8d6de17d6dc3a30c3ed5ec9ecd25c2

New changelog entries:
  * Enable patches/any/cvs-dlopen-tls.diff, not enabled by mistake. Closes:
    #637239.
  * patches/any/cvs-FORTIFY_SOURCE-format-strings.diff: new patch from
    upstream to fix FORTIFY_SOURCE format string protection bypass. Closes:
    #660611.
  * patches/any/local-sunrpc-dos.diff: fix a DoS in RPC implementation
    (CVE-2011-4609). Closes: #671478.

ubuntu/precise 2012-04-19 23:33:42 UTC 2012-04-19
Import patches-unapplied version 2.15-0ubuntu10 to ubuntu/precise-proposed

Author: Steve Langasek
Author Date: 2012-04-19 22:50:02 UTC

Import patches-unapplied version 2.15-0ubuntu10 to ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 42f0c3b6eab48b571863b4e0dedd7fe2766042f0

New changelog entries:
  * kdm is not meant to be restarted, only warned about; moving the restart
    code to the preinst is causing kdm restarts that will break the desktop
    in the middle of the upgrade. Zero out our list of services between the
    two uses of the variable. LP: #985735.

applied/ubuntu/precise 2012-04-19 23:33:42 UTC 2012-04-19
Import patches-applied version 2.15-0ubuntu10 to applied/ubuntu/precise-proposed

Author: Steve Langasek
Author Date: 2012-04-19 22:50:02 UTC

Import patches-applied version 2.15-0ubuntu10 to applied/ubuntu/precise-proposed

Imported using git-ubuntu import.

Changelog parent: 0fce7c8ac197326e2ee0df44e8f808cc20a46485
Unapplied parent: b2215a8822d203ce1e6018e6b710cea704e3cdc6

New changelog entries:
  * kdm is not meant to be restarted, only warned about; moving the restart
    code to the preinst is causing kdm restarts that will break the desktop
    in the middle of the upgrade. Zero out our list of services between the
    two uses of the variable. LP: #985735.

ubuntu/maverick-updates 2012-03-09 03:37:46 UTC 2012-03-09
Import patches-unapplied version 2.12.1-0ubuntu10.4 to ubuntu/maverick-security

Author: Steve Beattie
Author Date: 2012-03-06 20:12:55 UTC

Import patches-unapplied version 2.12.1-0ubuntu10.4 to ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: 48eae73aff4c6645e09c8a21058e47357a802af0

New changelog entries:
  * SECURITY UPDATE: timezone header parsing integer overflow (LP: #906961)
    - debian/patches/any/glibc-CVE-2009-5029.patch: Check values from
      TZ file header
    - CVE-2009-5029
  * SECURITY UPDATE: memory consumption denial of service in fnmatch
    - debian/patches/any/glibc-CVE-2011-1071.patch: avoid too much
      stack use in fnmatch.
    - CVE-2011-1071
  * SECURITY UPDATE: /etc/mtab corruption denial of service
    - debian/patches/any/glibc-CVE-2011-1089.patch: Report write
      error in addmnt even for cached streams
    - CVE-2011-1089
  * SECURITY UPDATE: insufficient locale environment sanitization
    - debian/patches/any/glibc-CVE-2011-1095.patch: escape contents of
      LANG environment variable.
    - CVE-2011-1095
  * SECURITY UPDATE: ld.so insecure handling of privileged programs'
    RPATHs with $ORIGIN
    - debian/patches/any/glibc-CVE-2011-1658.patch: improve handling of
      RPATH and ORIGIN
    - CVE-2011-1658
  * SECURITY UPDATE: fnmatch integer overflow
    - debian/patches/any/glibc-CVE-2011-1659.patch: check size of
      pattern in wide character representation
    - CVE-2011-1659
  * SECURITY UPDATE: DoS in RPC implementation (LP: #901716)
    - debian/patches/any/glibc-CVE-2011-4609.patch: nanosleep when too
      many open fds is detected
    - CVE-2011-4609
  * SECURITY UPDATE: vfprintf nargs overflow leading to FORTIFY
    check bypass
    - debian/patches/any/glibc-CVE-2012-0864.patch: check for integer
      overflow
    - CVE-2012-0864

applied/ubuntu/maverick-updates 2012-03-09 03:37:46 UTC 2012-03-09
Import patches-applied version 2.12.1-0ubuntu10.4 to applied/ubuntu/maverick-...

Author: Steve Beattie
Author Date: 2012-03-06 20:12:55 UTC

Import patches-applied version 2.12.1-0ubuntu10.4 to applied/ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: a1b25a2838cd22e64ec8f1f9fbf3e83a260186df
Unapplied parent: 3c712cbc63db8404f4673668e93ba8664d943426

New changelog entries:
  * SECURITY UPDATE: timezone header parsing integer overflow (LP: #906961)
    - debian/patches/any/glibc-CVE-2009-5029.patch: Check values from
      TZ file header
    - CVE-2009-5029
  * SECURITY UPDATE: memory consumption denial of service in fnmatch
    - debian/patches/any/glibc-CVE-2011-1071.patch: avoid too much
      stack use in fnmatch.
    - CVE-2011-1071
  * SECURITY UPDATE: /etc/mtab corruption denial of service
    - debian/patches/any/glibc-CVE-2011-1089.patch: Report write
      error in addmnt even for cached streams
    - CVE-2011-1089
  * SECURITY UPDATE: insufficient locale environment sanitization
    - debian/patches/any/glibc-CVE-2011-1095.patch: escape contents of
      LANG environment variable.
    - CVE-2011-1095
  * SECURITY UPDATE: ld.so insecure handling of privileged programs'
    RPATHs with $ORIGIN
    - debian/patches/any/glibc-CVE-2011-1658.patch: improve handling of
      RPATH and ORIGIN
    - CVE-2011-1658
  * SECURITY UPDATE: fnmatch integer overflow
    - debian/patches/any/glibc-CVE-2011-1659.patch: check size of
      pattern in wide character representation
    - CVE-2011-1659
  * SECURITY UPDATE: DoS in RPC implementation (LP: #901716)
    - debian/patches/any/glibc-CVE-2011-4609.patch: nanosleep when too
      many open fds is detected
    - CVE-2011-4609
  * SECURITY UPDATE: vfprintf nargs overflow leading to FORTIFY
    check bypass
    - debian/patches/any/glibc-CVE-2012-0864.patch: check for integer
      overflow
    - CVE-2012-0864

ubuntu/maverick-security 2012-03-09 03:37:46 UTC 2012-03-09
Import patches-unapplied version 2.12.1-0ubuntu10.4 to ubuntu/maverick-security

Author: Steve Beattie
Author Date: 2012-03-06 20:12:55 UTC

Import patches-unapplied version 2.12.1-0ubuntu10.4 to ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: 48eae73aff4c6645e09c8a21058e47357a802af0

New changelog entries:
  * SECURITY UPDATE: timezone header parsing integer overflow (LP: #906961)
    - debian/patches/any/glibc-CVE-2009-5029.patch: Check values from
      TZ file header
    - CVE-2009-5029
  * SECURITY UPDATE: memory consumption denial of service in fnmatch
    - debian/patches/any/glibc-CVE-2011-1071.patch: avoid too much
      stack use in fnmatch.
    - CVE-2011-1071
  * SECURITY UPDATE: /etc/mtab corruption denial of service
    - debian/patches/any/glibc-CVE-2011-1089.patch: Report write
      error in addmnt even for cached streams
    - CVE-2011-1089
  * SECURITY UPDATE: insufficient locale environment sanitization
    - debian/patches/any/glibc-CVE-2011-1095.patch: escape contents of
      LANG environment variable.
    - CVE-2011-1095
  * SECURITY UPDATE: ld.so insecure handling of privileged programs'
    RPATHs with $ORIGIN
    - debian/patches/any/glibc-CVE-2011-1658.patch: improve handling of
      RPATH and ORIGIN
    - CVE-2011-1658
  * SECURITY UPDATE: fnmatch integer overflow
    - debian/patches/any/glibc-CVE-2011-1659.patch: check size of
      pattern in wide character representation
    - CVE-2011-1659
  * SECURITY UPDATE: DoS in RPC implementation (LP: #901716)
    - debian/patches/any/glibc-CVE-2011-4609.patch: nanosleep when too
      many open fds is detected
    - CVE-2011-4609
  * SECURITY UPDATE: vfprintf nargs overflow leading to FORTIFY
    check bypass
    - debian/patches/any/glibc-CVE-2012-0864.patch: check for integer
      overflow
    - CVE-2012-0864

applied/ubuntu/maverick-devel 2012-03-09 03:37:46 UTC 2012-03-09
Import patches-applied version 2.12.1-0ubuntu10.4 to applied/ubuntu/maverick-...

Author: Steve Beattie
Author Date: 2012-03-06 20:12:55 UTC

Import patches-applied version 2.12.1-0ubuntu10.4 to applied/ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: a1b25a2838cd22e64ec8f1f9fbf3e83a260186df
Unapplied parent: 3c712cbc63db8404f4673668e93ba8664d943426

New changelog entries:
  * SECURITY UPDATE: timezone header parsing integer overflow (LP: #906961)
    - debian/patches/any/glibc-CVE-2009-5029.patch: Check values from
      TZ file header
    - CVE-2009-5029
  * SECURITY UPDATE: memory consumption denial of service in fnmatch
    - debian/patches/any/glibc-CVE-2011-1071.patch: avoid too much
      stack use in fnmatch.
    - CVE-2011-1071
  * SECURITY UPDATE: /etc/mtab corruption denial of service
    - debian/patches/any/glibc-CVE-2011-1089.patch: Report write
      error in addmnt even for cached streams
    - CVE-2011-1089
  * SECURITY UPDATE: insufficient locale environment sanitization
    - debian/patches/any/glibc-CVE-2011-1095.patch: escape contents of
      LANG environment variable.
    - CVE-2011-1095
  * SECURITY UPDATE: ld.so insecure handling of privileged programs'
    RPATHs with $ORIGIN
    - debian/patches/any/glibc-CVE-2011-1658.patch: improve handling of
      RPATH and ORIGIN
    - CVE-2011-1658
  * SECURITY UPDATE: fnmatch integer overflow
    - debian/patches/any/glibc-CVE-2011-1659.patch: check size of
      pattern in wide character representation
    - CVE-2011-1659
  * SECURITY UPDATE: DoS in RPC implementation (LP: #901716)
    - debian/patches/any/glibc-CVE-2011-4609.patch: nanosleep when too
      many open fds is detected
    - CVE-2011-4609
  * SECURITY UPDATE: vfprintf nargs overflow leading to FORTIFY
    check bypass
    - debian/patches/any/glibc-CVE-2012-0864.patch: check for integer
      overflow
    - CVE-2012-0864

ubuntu/maverick-devel 2012-03-09 03:37:46 UTC 2012-03-09
Import patches-unapplied version 2.12.1-0ubuntu10.4 to ubuntu/maverick-security

Author: Steve Beattie
Author Date: 2012-03-06 20:12:55 UTC

Import patches-unapplied version 2.12.1-0ubuntu10.4 to ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: 48eae73aff4c6645e09c8a21058e47357a802af0

New changelog entries:
  * SECURITY UPDATE: timezone header parsing integer overflow (LP: #906961)
    - debian/patches/any/glibc-CVE-2009-5029.patch: Check values from
      TZ file header
    - CVE-2009-5029
  * SECURITY UPDATE: memory consumption denial of service in fnmatch
    - debian/patches/any/glibc-CVE-2011-1071.patch: avoid too much
      stack use in fnmatch.
    - CVE-2011-1071
  * SECURITY UPDATE: /etc/mtab corruption denial of service
    - debian/patches/any/glibc-CVE-2011-1089.patch: Report write
      error in addmnt even for cached streams
    - CVE-2011-1089
  * SECURITY UPDATE: insufficient locale environment sanitization
    - debian/patches/any/glibc-CVE-2011-1095.patch: escape contents of
      LANG environment variable.
    - CVE-2011-1095
  * SECURITY UPDATE: ld.so insecure handling of privileged programs'
    RPATHs with $ORIGIN
    - debian/patches/any/glibc-CVE-2011-1658.patch: improve handling of
      RPATH and ORIGIN
    - CVE-2011-1658
  * SECURITY UPDATE: fnmatch integer overflow
    - debian/patches/any/glibc-CVE-2011-1659.patch: check size of
      pattern in wide character representation
    - CVE-2011-1659
  * SECURITY UPDATE: DoS in RPC implementation (LP: #901716)
    - debian/patches/any/glibc-CVE-2011-4609.patch: nanosleep when too
      many open fds is detected
    - CVE-2011-4609
  * SECURITY UPDATE: vfprintf nargs overflow leading to FORTIFY
    check bypass
    - debian/patches/any/glibc-CVE-2012-0864.patch: check for integer
      overflow
    - CVE-2012-0864

applied/ubuntu/maverick-security 2012-03-09 03:37:46 UTC 2012-03-09
Import patches-applied version 2.12.1-0ubuntu10.4 to applied/ubuntu/maverick-...

Author: Steve Beattie
Author Date: 2012-03-06 20:12:55 UTC

Import patches-applied version 2.12.1-0ubuntu10.4 to applied/ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: a1b25a2838cd22e64ec8f1f9fbf3e83a260186df
Unapplied parent: 3c712cbc63db8404f4673668e93ba8664d943426

New changelog entries:
  * SECURITY UPDATE: timezone header parsing integer overflow (LP: #906961)
    - debian/patches/any/glibc-CVE-2009-5029.patch: Check values from
      TZ file header
    - CVE-2009-5029
  * SECURITY UPDATE: memory consumption denial of service in fnmatch
    - debian/patches/any/glibc-CVE-2011-1071.patch: avoid too much
      stack use in fnmatch.
    - CVE-2011-1071
  * SECURITY UPDATE: /etc/mtab corruption denial of service
    - debian/patches/any/glibc-CVE-2011-1089.patch: Report write
      error in addmnt even for cached streams
    - CVE-2011-1089
  * SECURITY UPDATE: insufficient locale environment sanitization
    - debian/patches/any/glibc-CVE-2011-1095.patch: escape contents of
      LANG environment variable.
    - CVE-2011-1095
  * SECURITY UPDATE: ld.so insecure handling of privileged programs'
    RPATHs with $ORIGIN
    - debian/patches/any/glibc-CVE-2011-1658.patch: improve handling of
      RPATH and ORIGIN
    - CVE-2011-1658
  * SECURITY UPDATE: fnmatch integer overflow
    - debian/patches/any/glibc-CVE-2011-1659.patch: check size of
      pattern in wide character representation
    - CVE-2011-1659
  * SECURITY UPDATE: DoS in RPC implementation (LP: #901716)
    - debian/patches/any/glibc-CVE-2011-4609.patch: nanosleep when too
      many open fds is detected
    - CVE-2011-4609
  * SECURITY UPDATE: vfprintf nargs overflow leading to FORTIFY
    check bypass
    - debian/patches/any/glibc-CVE-2012-0864.patch: check for integer
      overflow
    - CVE-2012-0864

ubuntu/oneiric 2011-10-04 20:13:22 UTC 2011-10-04
Import patches-unapplied version 2.13-20ubuntu5 to ubuntu/oneiric

Author: Matthias Klose
Author Date: 2011-10-04 15:48:26 UTC

Import patches-unapplied version 2.13-20ubuntu5 to ubuntu/oneiric

Imported using git-ubuntu import.

Changelog parent: 47d2cb5c0dddaf1bc3a90215c8052d1d88823a36

New changelog entries:
  * libc6-dev: Don't break the current {gnat,gcj}-4.4-base versons. LP: #853688.

applied/ubuntu/oneiric 2011-10-04 20:13:22 UTC 2011-10-04
Import patches-applied version 2.13-20ubuntu5 to applied/ubuntu/oneiric

Author: Matthias Klose
Author Date: 2011-10-04 15:48:26 UTC

Import patches-applied version 2.13-20ubuntu5 to applied/ubuntu/oneiric

Imported using git-ubuntu import.

Changelog parent: 4405428631d35039d2dbbc01ad1d019b70d34028
Unapplied parent: 6a226e9f0e40b3760382b276e2d148ad0be8398c

New changelog entries:
  * libc6-dev: Don't break the current {gnat,gcj}-4.4-base versons. LP: #853688.

ubuntu/natty 2011-04-11 10:04:53 UTC 2011-04-11
Import patches-unapplied version 2.13-0ubuntu13 to ubuntu/natty

Author: Steve Langasek
Author Date: 2011-04-11 09:15:33 UTC

Import patches-unapplied version 2.13-0ubuntu13 to ubuntu/natty

Imported using git-ubuntu import.

Changelog parent: 1dbad3a3d726b0f8f480b762433396ef31f94c8e

New changelog entries:
  * debian/sysdeps/linux.mk: detect when linux-libc-dev has moved its
    headers to the multiarch dir, and create the symlink to the right place
    so we can find those headers for building. LP: #750585.

applied/ubuntu/natty 2011-04-11 10:04:53 UTC 2011-04-11
Import patches-applied version 2.13-0ubuntu13 to applied/ubuntu/natty

Author: Steve Langasek
Author Date: 2011-04-11 09:15:33 UTC

Import patches-applied version 2.13-0ubuntu13 to applied/ubuntu/natty

Imported using git-ubuntu import.

Changelog parent: 6ff08c73a826a9105041102d5a972453b57dcf78
Unapplied parent: 09bae5f468d325c4edcd6e2ae6fcb996d310db57

New changelog entries:
  * debian/sysdeps/linux.mk: detect when linux-libc-dev has moved its
    headers to the multiarch dir, and create the symlink to the right place
    so we can find those headers for building. LP: #750585.

ubuntu/maverick-proposed 2011-03-30 21:05:05 UTC 2011-03-30
Import patches-unapplied version 2.12.1-0ubuntu10.3 to ubuntu/maverick-proposed

Author: Matthias Klose
Author Date: 2011-03-27 16:57:07 UTC

Import patches-unapplied version 2.12.1-0ubuntu10.3 to ubuntu/maverick-proposed

Imported using git-ubuntu import.

Changelog parent: 48eae73aff4c6645e09c8a21058e47357a802af0

New changelog entries:
  * Re-enable the upstream change:
    2010-06-02 Kirill A. Shutemov <kirill@shutemov.name>
        * elf/dl-reloc.c: Flush cache after solving TEXTRELs if arch
        requires it.
    Working OpenJDK ARM assembler interpreter. LP: #605042.

applied/ubuntu/maverick-proposed 2011-03-30 21:05:05 UTC 2011-03-30
Import patches-applied version 2.12.1-0ubuntu10.3 to applied/ubuntu/maverick-...

Author: Matthias Klose
Author Date: 2011-03-27 16:57:07 UTC

Import patches-applied version 2.12.1-0ubuntu10.3 to applied/ubuntu/maverick-proposed

Imported using git-ubuntu import.

Changelog parent: a1b25a2838cd22e64ec8f1f9fbf3e83a260186df
Unapplied parent: e3b1c369dd43ea45509f01d7d2d824a39aa8ab94

New changelog entries:
  * Re-enable the upstream change:
    2010-06-02 Kirill A. Shutemov <kirill@shutemov.name>
        * elf/dl-reloc.c: Flush cache after solving TEXTRELs if arch
        requires it.
    Working OpenJDK ARM assembler interpreter. LP: #605042.

1100 of 114 results

Other repositories

Name Last Modified
lp:ubuntu/+source/eglibc 2018-03-06
11 of 1 result
You can't create new repositories for eglibc in Ubuntu.