View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/elfutils
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2018-11-21 04:20:05 UTC 2018-11-21
DSC file for 0.175-1

Author: Ubuntu Git Importer
Author Date: 2018-11-21 04:20:05 UTC

DSC file for 0.175-1

importer/debian/dsc 2018-11-20 04:39:19 UTC 2018-11-20
DSC file for 0.175-1

Author: Ubuntu Git Importer
Author Date: 2018-11-20 04:39:19 UTC

DSC file for 0.175-1

applied/debian/sid 2018-11-20 04:29:00 UTC 2018-11-20
Import patches-applied version 0.175-1 to applied/debian/sid

Author: Kurt Roeckx
Author Date: 2018-11-18 22:01:23 UTC

Import patches-applied version 0.175-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: deb0180c1c3a8b05c5b299ca1125b39653b8cda1
Unapplied parent: 06e3db0217dcbd7ae9770c08f643c7bd9bdc4d02

New changelog entries:
  * New upstream release
    - Build with gcc-8 (Closes: #911276)
    - Drop fix-gcc7-ftbfs.diff
    - Drop GNU_variable_value.patch
    - Drop locviews.patch
    - Update patches
  * Fixes CVE-2018-18521 (Closes: #911413)
  * Fixes CVE-2018-18520 (Closes: #911414)
  * Fixes CVE-2018-18310 (Closes: #911083)
  * Fixes CVE-2018-16403
  * Fixes CVE-2018-16402
  * Fixes CVE-2018-16062 (Closes: #907562)

ubuntu/disco-proposed 2018-11-20 04:29:00 UTC 2018-11-20
Import patches-unapplied version 0.175-1 to debian/sid

Author: Kurt Roeckx
Author Date: 2018-11-18 22:01:23 UTC

Import patches-unapplied version 0.175-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 93b3646c1f01fb8156ac3eaed16b9c413e9de6b5

New changelog entries:
  * New upstream release
    - Build with gcc-8 (Closes: #911276)
    - Drop fix-gcc7-ftbfs.diff
    - Drop GNU_variable_value.patch
    - Drop locviews.patch
    - Update patches
  * Fixes CVE-2018-18521 (Closes: #911413)
  * Fixes CVE-2018-18520 (Closes: #911414)
  * Fixes CVE-2018-18310 (Closes: #911083)
  * Fixes CVE-2018-16403
  * Fixes CVE-2018-16402
  * Fixes CVE-2018-16062 (Closes: #907562)

debian/sid 2018-11-20 04:29:00 UTC 2018-11-20
Import patches-unapplied version 0.175-1 to debian/sid

Author: Kurt Roeckx
Author Date: 2018-11-18 22:01:23 UTC

Import patches-unapplied version 0.175-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 93b3646c1f01fb8156ac3eaed16b9c413e9de6b5

New changelog entries:
  * New upstream release
    - Build with gcc-8 (Closes: #911276)
    - Drop fix-gcc7-ftbfs.diff
    - Drop GNU_variable_value.patch
    - Drop locviews.patch
    - Update patches
  * Fixes CVE-2018-18521 (Closes: #911413)
  * Fixes CVE-2018-18520 (Closes: #911414)
  * Fixes CVE-2018-18310 (Closes: #911083)
  * Fixes CVE-2018-16403
  * Fixes CVE-2018-16402
  * Fixes CVE-2018-16062 (Closes: #907562)

ubuntu/devel 2018-11-20 04:29:00 UTC 2018-11-20
Import patches-unapplied version 0.175-1 to debian/sid

Author: Kurt Roeckx
Author Date: 2018-11-18 22:01:23 UTC

Import patches-unapplied version 0.175-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 93b3646c1f01fb8156ac3eaed16b9c413e9de6b5

New changelog entries:
  * New upstream release
    - Build with gcc-8 (Closes: #911276)
    - Drop fix-gcc7-ftbfs.diff
    - Drop GNU_variable_value.patch
    - Drop locviews.patch
    - Update patches
  * Fixes CVE-2018-18521 (Closes: #911413)
  * Fixes CVE-2018-18520 (Closes: #911414)
  * Fixes CVE-2018-18310 (Closes: #911083)
  * Fixes CVE-2018-16403
  * Fixes CVE-2018-16402
  * Fixes CVE-2018-16062 (Closes: #907562)

applied/ubuntu/devel 2018-11-20 04:29:00 UTC 2018-11-20
Import patches-applied version 0.175-1 to applied/debian/sid

Author: Kurt Roeckx
Author Date: 2018-11-18 22:01:23 UTC

Import patches-applied version 0.175-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: deb0180c1c3a8b05c5b299ca1125b39653b8cda1
Unapplied parent: 06e3db0217dcbd7ae9770c08f643c7bd9bdc4d02

New changelog entries:
  * New upstream release
    - Build with gcc-8 (Closes: #911276)
    - Drop fix-gcc7-ftbfs.diff
    - Drop GNU_variable_value.patch
    - Drop locviews.patch
    - Update patches
  * Fixes CVE-2018-18521 (Closes: #911413)
  * Fixes CVE-2018-18520 (Closes: #911414)
  * Fixes CVE-2018-18310 (Closes: #911083)
  * Fixes CVE-2018-16403
  * Fixes CVE-2018-16402
  * Fixes CVE-2018-16062 (Closes: #907562)

applied/ubuntu/disco 2018-11-20 04:29:00 UTC 2018-11-20
Import patches-applied version 0.175-1 to applied/debian/sid

Author: Kurt Roeckx
Author Date: 2018-11-18 22:01:23 UTC

Import patches-applied version 0.175-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: deb0180c1c3a8b05c5b299ca1125b39653b8cda1
Unapplied parent: 06e3db0217dcbd7ae9770c08f643c7bd9bdc4d02

New changelog entries:
  * New upstream release
    - Build with gcc-8 (Closes: #911276)
    - Drop fix-gcc7-ftbfs.diff
    - Drop GNU_variable_value.patch
    - Drop locviews.patch
    - Update patches
  * Fixes CVE-2018-18521 (Closes: #911413)
  * Fixes CVE-2018-18520 (Closes: #911414)
  * Fixes CVE-2018-18310 (Closes: #911083)
  * Fixes CVE-2018-16403
  * Fixes CVE-2018-16402
  * Fixes CVE-2018-16062 (Closes: #907562)

applied/ubuntu/disco-devel 2018-11-20 04:29:00 UTC 2018-11-20
Import patches-applied version 0.175-1 to applied/debian/sid

Author: Kurt Roeckx
Author Date: 2018-11-18 22:01:23 UTC

Import patches-applied version 0.175-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: deb0180c1c3a8b05c5b299ca1125b39653b8cda1
Unapplied parent: 06e3db0217dcbd7ae9770c08f643c7bd9bdc4d02

New changelog entries:
  * New upstream release
    - Build with gcc-8 (Closes: #911276)
    - Drop fix-gcc7-ftbfs.diff
    - Drop GNU_variable_value.patch
    - Drop locviews.patch
    - Update patches
  * Fixes CVE-2018-18521 (Closes: #911413)
  * Fixes CVE-2018-18520 (Closes: #911414)
  * Fixes CVE-2018-18310 (Closes: #911083)
  * Fixes CVE-2018-16403
  * Fixes CVE-2018-16402
  * Fixes CVE-2018-16062 (Closes: #907562)

applied/ubuntu/disco-proposed 2018-11-20 04:29:00 UTC 2018-11-20
Import patches-applied version 0.175-1 to applied/debian/sid

Author: Kurt Roeckx
Author Date: 2018-11-18 22:01:23 UTC

Import patches-applied version 0.175-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: deb0180c1c3a8b05c5b299ca1125b39653b8cda1
Unapplied parent: 06e3db0217dcbd7ae9770c08f643c7bd9bdc4d02

New changelog entries:
  * New upstream release
    - Build with gcc-8 (Closes: #911276)
    - Drop fix-gcc7-ftbfs.diff
    - Drop GNU_variable_value.patch
    - Drop locviews.patch
    - Update patches
  * Fixes CVE-2018-18521 (Closes: #911413)
  * Fixes CVE-2018-18520 (Closes: #911414)
  * Fixes CVE-2018-18310 (Closes: #911083)
  * Fixes CVE-2018-16403
  * Fixes CVE-2018-16402
  * Fixes CVE-2018-16062 (Closes: #907562)

ubuntu/disco 2018-11-20 04:29:00 UTC 2018-11-20
Import patches-unapplied version 0.175-1 to debian/sid

Author: Kurt Roeckx
Author Date: 2018-11-18 22:01:23 UTC

Import patches-unapplied version 0.175-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 93b3646c1f01fb8156ac3eaed16b9c413e9de6b5

New changelog entries:
  * New upstream release
    - Build with gcc-8 (Closes: #911276)
    - Drop fix-gcc7-ftbfs.diff
    - Drop GNU_variable_value.patch
    - Drop locviews.patch
    - Update patches
  * Fixes CVE-2018-18521 (Closes: #911413)
  * Fixes CVE-2018-18520 (Closes: #911414)
  * Fixes CVE-2018-18310 (Closes: #911083)
  * Fixes CVE-2018-16403
  * Fixes CVE-2018-16402
  * Fixes CVE-2018-16062 (Closes: #907562)

ubuntu/disco-devel 2018-11-20 04:29:00 UTC 2018-11-20
Import patches-unapplied version 0.175-1 to debian/sid

Author: Kurt Roeckx
Author Date: 2018-11-18 22:01:23 UTC

Import patches-unapplied version 0.175-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 93b3646c1f01fb8156ac3eaed16b9c413e9de6b5

New changelog entries:
  * New upstream release
    - Build with gcc-8 (Closes: #911276)
    - Drop fix-gcc7-ftbfs.diff
    - Drop GNU_variable_value.patch
    - Drop locviews.patch
    - Update patches
  * Fixes CVE-2018-18521 (Closes: #911413)
  * Fixes CVE-2018-18520 (Closes: #911414)
  * Fixes CVE-2018-18310 (Closes: #911083)
  * Fixes CVE-2018-16403
  * Fixes CVE-2018-16402
  * Fixes CVE-2018-16062 (Closes: #907562)

importer/ubuntu/pristine-tar 2018-11-19 12:54:47 UTC 2018-11-19
Initial ubuntu pristine-tar branch.

Author: Ubuntu Git Importer
Author Date: 2018-11-19 12:54:47 UTC

Initial ubuntu pristine-tar branch.

importer/debian/pristine-tar 2018-11-19 12:45:53 UTC 2018-11-19
Initial debian pristine-tar branch.

Author: Ubuntu Git Importer
Author Date: 2018-11-19 12:45:53 UTC

Initial debian pristine-tar branch.

applied/ubuntu/cosmic-devel 2018-10-23 20:43:12 UTC 2018-10-23
Import patches-applied version 0.170-0.5.0ubuntu1 to applied/ubuntu/cosmic-pr...

Author: Michael Hudson-Doyle
Author Date: 2018-10-18 07:06:01 UTC

Import patches-applied version 0.170-0.5.0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: deb0180c1c3a8b05c5b299ca1125b39653b8cda1
Unapplied parent: 6995b5b60cd2f2d750398757064e7e90f054c869

New changelog entries:
  * Add d/patches/0001-aarch64-Add-default-cfi-rule-to-restore-SP-from-CFA-.patch
    to fix walking the stack of arm64 binaries compiled with GCC 8. (LP: #1798700)

applied/ubuntu/cosmic-proposed 2018-10-23 20:43:12 UTC 2018-10-23
Import patches-applied version 0.170-0.5.0ubuntu1 to applied/ubuntu/cosmic-pr...

Author: Michael Hudson-Doyle
Author Date: 2018-10-18 07:06:01 UTC

Import patches-applied version 0.170-0.5.0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: deb0180c1c3a8b05c5b299ca1125b39653b8cda1
Unapplied parent: 6995b5b60cd2f2d750398757064e7e90f054c869

New changelog entries:
  * Add d/patches/0001-aarch64-Add-default-cfi-rule-to-restore-SP-from-CFA-.patch
    to fix walking the stack of arm64 binaries compiled with GCC 8. (LP: #1798700)

ubuntu/cosmic-proposed 2018-10-23 20:43:12 UTC 2018-10-23
Import patches-unapplied version 0.170-0.5.0ubuntu1 to ubuntu/cosmic-proposed

Author: Michael Hudson-Doyle
Author Date: 2018-10-18 07:06:01 UTC

Import patches-unapplied version 0.170-0.5.0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 93b3646c1f01fb8156ac3eaed16b9c413e9de6b5

New changelog entries:
  * Add d/patches/0001-aarch64-Add-default-cfi-rule-to-restore-SP-from-CFA-.patch
    to fix walking the stack of arm64 binaries compiled with GCC 8. (LP: #1798700)

applied/ubuntu/cosmic-updates 2018-10-23 20:43:12 UTC 2018-10-23
Import patches-applied version 0.170-0.5.0ubuntu1 to applied/ubuntu/cosmic-pr...

Author: Michael Hudson-Doyle
Author Date: 2018-10-18 07:06:01 UTC

Import patches-applied version 0.170-0.5.0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: deb0180c1c3a8b05c5b299ca1125b39653b8cda1
Unapplied parent: 6995b5b60cd2f2d750398757064e7e90f054c869

New changelog entries:
  * Add d/patches/0001-aarch64-Add-default-cfi-rule-to-restore-SP-from-CFA-.patch
    to fix walking the stack of arm64 binaries compiled with GCC 8. (LP: #1798700)

ubuntu/cosmic-devel 2018-10-23 20:43:12 UTC 2018-10-23
Import patches-unapplied version 0.170-0.5.0ubuntu1 to ubuntu/cosmic-proposed

Author: Michael Hudson-Doyle
Author Date: 2018-10-18 07:06:01 UTC

Import patches-unapplied version 0.170-0.5.0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 93b3646c1f01fb8156ac3eaed16b9c413e9de6b5

New changelog entries:
  * Add d/patches/0001-aarch64-Add-default-cfi-rule-to-restore-SP-from-CFA-.patch
    to fix walking the stack of arm64 binaries compiled with GCC 8. (LP: #1798700)

ubuntu/cosmic-updates 2018-10-23 20:43:12 UTC 2018-10-23
Import patches-unapplied version 0.170-0.5.0ubuntu1 to ubuntu/cosmic-proposed

Author: Michael Hudson-Doyle
Author Date: 2018-10-18 07:06:01 UTC

Import patches-unapplied version 0.170-0.5.0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 93b3646c1f01fb8156ac3eaed16b9c413e9de6b5

New changelog entries:
  * Add d/patches/0001-aarch64-Add-default-cfi-rule-to-restore-SP-from-CFA-.patch
    to fix walking the stack of arm64 binaries compiled with GCC 8. (LP: #1798700)

applied/ubuntu/cosmic 2018-06-24 22:28:53 UTC 2018-06-24
Import patches-applied version 0.170-0.5 to applied/debian/sid

Author: Helmut Grohne
Author Date: 2018-06-24 18:54:50 UTC

Import patches-applied version 0.170-0.5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 3630e16ddb5693d31477fcbad2e33b1b4d04e80a
Unapplied parent: 95a537909913ef0ae4cf19aef7d53b30ba0f978a

New changelog entries:
  * Non-maintainer upload acked by Kurt Roeckx.
  * Fix FTCBFS: Add zlib1g-dev:native to Build-Depends. (Closes: #901748)

ubuntu/cosmic 2018-06-24 22:28:53 UTC 2018-06-24
Import patches-unapplied version 0.170-0.5 to debian/sid

Author: Helmut Grohne
Author Date: 2018-06-24 18:54:50 UTC

Import patches-unapplied version 0.170-0.5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 588d2ade1216dfe5b1da9bbb9e1a1b2eb4e10d5a

New changelog entries:
  * Non-maintainer upload acked by Kurt Roeckx.
  * Fix FTCBFS: Add zlib1g-dev:native to Build-Depends. (Closes: #901748)

applied/debian/buster 2018-06-24 22:28:53 UTC 2018-06-24
Import patches-applied version 0.170-0.5 to applied/debian/sid

Author: Helmut Grohne
Author Date: 2018-06-24 18:54:50 UTC

Import patches-applied version 0.170-0.5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 3630e16ddb5693d31477fcbad2e33b1b4d04e80a
Unapplied parent: 95a537909913ef0ae4cf19aef7d53b30ba0f978a

New changelog entries:
  * Non-maintainer upload acked by Kurt Roeckx.
  * Fix FTCBFS: Add zlib1g-dev:native to Build-Depends. (Closes: #901748)

debian/buster 2018-06-24 22:28:53 UTC 2018-06-24
Import patches-unapplied version 0.170-0.5 to debian/sid

Author: Helmut Grohne
Author Date: 2018-06-24 18:54:50 UTC

Import patches-unapplied version 0.170-0.5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 588d2ade1216dfe5b1da9bbb9e1a1b2eb4e10d5a

New changelog entries:
  * Non-maintainer upload acked by Kurt Roeckx.
  * Fix FTCBFS: Add zlib1g-dev:native to Build-Depends. (Closes: #901748)

applied/ubuntu/trusty-security 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-applied version 0.158-0ubuntu5.3 to applied/ubuntu/trusty-secu...

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-applied version 0.158-0ubuntu5.3 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e36b4a405bb6649c0d1cb1db5f5626e44aff4775
Unapplied parent: 36814baafadd7e9328d1c54c1e802ec7f7d083b3

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607-1.patch: Sanity check hash section contents
      before processing. Based on upstream patch.
    - debian/patches/CVE-2017-7607-2.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

ubuntu/xenial-updates 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-unapplied version 0.165-3ubuntu1.1 to ubuntu/xenial-security

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-unapplied version 0.165-3ubuntu1.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 9eab65c7011609077d44f0196bb7e056e6b399ae

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7609.patch: Check compression ratio before
      trying to allocate output buffer. Based on upstream patch.
    - CVE-2017-7609
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

ubuntu/xenial-security 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-unapplied version 0.165-3ubuntu1.1 to ubuntu/xenial-security

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-unapplied version 0.165-3ubuntu1.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 9eab65c7011609077d44f0196bb7e056e6b399ae

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7609.patch: Check compression ratio before
      trying to allocate output buffer. Based on upstream patch.
    - CVE-2017-7609
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

ubuntu/xenial-devel 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-unapplied version 0.165-3ubuntu1.1 to ubuntu/xenial-security

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-unapplied version 0.165-3ubuntu1.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 9eab65c7011609077d44f0196bb7e056e6b399ae

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7609.patch: Check compression ratio before
      trying to allocate output buffer. Based on upstream patch.
    - CVE-2017-7609
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

ubuntu/trusty-updates 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-unapplied version 0.158-0ubuntu5.3 to ubuntu/trusty-security

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-unapplied version 0.158-0ubuntu5.3 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f508ce6029a8ef2305871070a153fecf8b7633f6

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607-1.patch: Sanity check hash section contents
      before processing. Based on upstream patch.
    - debian/patches/CVE-2017-7607-2.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

ubuntu/trusty-security 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-unapplied version 0.158-0ubuntu5.3 to ubuntu/trusty-security

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-unapplied version 0.158-0ubuntu5.3 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f508ce6029a8ef2305871070a153fecf8b7633f6

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607-1.patch: Sanity check hash section contents
      before processing. Based on upstream patch.
    - debian/patches/CVE-2017-7607-2.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

ubuntu/trusty-devel 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-unapplied version 0.158-0ubuntu5.3 to ubuntu/trusty-security

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-unapplied version 0.158-0ubuntu5.3 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f508ce6029a8ef2305871070a153fecf8b7633f6

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607-1.patch: Sanity check hash section contents
      before processing. Based on upstream patch.
    - debian/patches/CVE-2017-7607-2.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

applied/ubuntu/trusty-devel 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-applied version 0.158-0ubuntu5.3 to applied/ubuntu/trusty-secu...

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-applied version 0.158-0ubuntu5.3 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e36b4a405bb6649c0d1cb1db5f5626e44aff4775
Unapplied parent: 36814baafadd7e9328d1c54c1e802ec7f7d083b3

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607-1.patch: Sanity check hash section contents
      before processing. Based on upstream patch.
    - debian/patches/CVE-2017-7607-2.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

applied/ubuntu/trusty-updates 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-applied version 0.158-0ubuntu5.3 to applied/ubuntu/trusty-secu...

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-applied version 0.158-0ubuntu5.3 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e36b4a405bb6649c0d1cb1db5f5626e44aff4775
Unapplied parent: 36814baafadd7e9328d1c54c1e802ec7f7d083b3

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607-1.patch: Sanity check hash section contents
      before processing. Based on upstream patch.
    - debian/patches/CVE-2017-7607-2.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

applied/ubuntu/xenial-updates 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-applied version 0.165-3ubuntu1.1 to applied/ubuntu/xenial-secu...

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-applied version 0.165-3ubuntu1.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 45343b7150df5dc6a7f69b353fa64a9042da6a91
Unapplied parent: c89c71e83141196b0012620057a0d575135817c4

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7609.patch: Check compression ratio before
      trying to allocate output buffer. Based on upstream patch.
    - CVE-2017-7609
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

applied/ubuntu/xenial-security 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-applied version 0.165-3ubuntu1.1 to applied/ubuntu/xenial-secu...

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-applied version 0.165-3ubuntu1.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 45343b7150df5dc6a7f69b353fa64a9042da6a91
Unapplied parent: c89c71e83141196b0012620057a0d575135817c4

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7609.patch: Check compression ratio before
      trying to allocate output buffer. Based on upstream patch.
    - CVE-2017-7609
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

applied/ubuntu/xenial-devel 2018-06-05 14:13:13 UTC 2018-06-05
Import patches-applied version 0.165-3ubuntu1.1 to applied/ubuntu/xenial-secu...

Author: Tyler Hicks
Author Date: 2017-05-17 23:27:15 UTC

Import patches-applied version 0.165-3ubuntu1.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 45343b7150df5dc6a7f69b353fa64a9042da6a91
Unapplied parent: c89c71e83141196b0012620057a0d575135817c4

New changelog entries:
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
      an ELF file for sanity checks. Based on upstream patch.
    - CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
      trying to malloc and read data. Based on upstream patch.
    - CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7607.patch: Fix off by one sanity check in
      handle_gnu_hash. Based on upstream patch.
    - CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7608.patch: Use the empty string for note names
      with zero size. Based on upstream patch.
    - CVE-2017-7608
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7609.patch: Check compression ratio before
      trying to allocate output buffer. Based on upstream patch.
    - CVE-2017-7609
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7610.patch: Don't check section group without
      flags word. Based on upstream patch.
    - CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7611.patch: Check symbol table data is big
      enough before checking. Based on upstream patch.
    - CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
    crafted ELF files
    - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
      hash sections. Based on upstream patch.
    - CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
    crafted ELF files
    - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
      shdrs available. Based on upstream patch.
    - CVE-2017-7613

applied/ubuntu/bionic-proposed 2018-04-09 16:29:50 UTC 2018-04-09
Import patches-applied version 0.170-0.4 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-04-09 12:21:19 UTC

Import patches-applied version 0.170-0.4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 86bde18f5b7d98f4b42869e8088c1365b7f10f5f
Unapplied parent: 77c8d91442625ac476dc405a687d9589b5792c4b

New changelog entries:
  * Non-maintainer upload.
  * Backport patches for DWARF locview support (Mark Wielaard).

ubuntu/bionic 2018-04-09 16:29:50 UTC 2018-04-09
Import patches-unapplied version 0.170-0.4 to debian/sid

Author: Matthias Klose
Author Date: 2018-04-09 12:21:19 UTC

Import patches-unapplied version 0.170-0.4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 5e3b2ccb732a814a60c2b866b155ebf60193b0c2

New changelog entries:
  * Non-maintainer upload.
  * Backport patches for DWARF locview support (Mark Wielaard).

ubuntu/bionic-proposed 2018-04-09 16:29:50 UTC 2018-04-09
Import patches-unapplied version 0.170-0.4 to debian/sid

Author: Matthias Klose
Author Date: 2018-04-09 12:21:19 UTC

Import patches-unapplied version 0.170-0.4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 5e3b2ccb732a814a60c2b866b155ebf60193b0c2

New changelog entries:
  * Non-maintainer upload.
  * Backport patches for DWARF locview support (Mark Wielaard).

ubuntu/bionic-devel 2018-04-09 16:29:50 UTC 2018-04-09
Import patches-unapplied version 0.170-0.4 to debian/sid

Author: Matthias Klose
Author Date: 2018-04-09 12:21:19 UTC

Import patches-unapplied version 0.170-0.4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 5e3b2ccb732a814a60c2b866b155ebf60193b0c2

New changelog entries:
  * Non-maintainer upload.
  * Backport patches for DWARF locview support (Mark Wielaard).

applied/ubuntu/bionic-devel 2018-04-09 16:29:50 UTC 2018-04-09
Import patches-applied version 0.170-0.4 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-04-09 12:21:19 UTC

Import patches-applied version 0.170-0.4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 86bde18f5b7d98f4b42869e8088c1365b7f10f5f
Unapplied parent: 77c8d91442625ac476dc405a687d9589b5792c4b

New changelog entries:
  * Non-maintainer upload.
  * Backport patches for DWARF locview support (Mark Wielaard).

applied/ubuntu/bionic 2018-04-09 16:29:50 UTC 2018-04-09
Import patches-applied version 0.170-0.4 to applied/debian/sid

Author: Matthias Klose
Author Date: 2018-04-09 12:21:19 UTC

Import patches-applied version 0.170-0.4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 86bde18f5b7d98f4b42869e8088c1365b7f10f5f
Unapplied parent: 77c8d91442625ac476dc405a687d9589b5792c4b

New changelog entries:
  * Non-maintainer upload.
  * Backport patches for DWARF locview support (Mark Wielaard).

ubuntu/artful 2017-09-12 04:30:14 UTC 2017-09-12
Import patches-unapplied version 0.170-0.1 to debian/sid

Author: Matthias Klose
Author Date: 2017-09-11 22:07:19 UTC

Import patches-unapplied version 0.170-0.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 9c48a36eeadffb99104f80d4f830369127804e87

New changelog entries:
  * Non-maintainer upload.
  * New upstream release
  * Fix fallthrough warnings exposed by GCC 7. Closes: #853387.
  * Bump standards version.
  * Configure with --disable-silent-rules.
  * Update libdw1 symbols file.

applied/ubuntu/artful-proposed 2017-09-12 04:30:14 UTC 2017-09-12
Import patches-applied version 0.170-0.1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-09-11 22:07:19 UTC

Import patches-applied version 0.170-0.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 0a2d57f918be95e2969b5d12a3933cd83162dfa4
Unapplied parent: 633a948cf711f99f94c517c55cc5d5b2ecbf6735

New changelog entries:
  * Non-maintainer upload.
  * New upstream release
  * Fix fallthrough warnings exposed by GCC 7. Closes: #853387.
  * Bump standards version.
  * Configure with --disable-silent-rules.
  * Update libdw1 symbols file.

applied/ubuntu/artful-devel 2017-09-12 04:30:14 UTC 2017-09-12
Import patches-applied version 0.170-0.1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-09-11 22:07:19 UTC

Import patches-applied version 0.170-0.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 0a2d57f918be95e2969b5d12a3933cd83162dfa4
Unapplied parent: 633a948cf711f99f94c517c55cc5d5b2ecbf6735

New changelog entries:
  * Non-maintainer upload.
  * New upstream release
  * Fix fallthrough warnings exposed by GCC 7. Closes: #853387.
  * Bump standards version.
  * Configure with --disable-silent-rules.
  * Update libdw1 symbols file.

ubuntu/artful-devel 2017-09-12 04:30:14 UTC 2017-09-12
Import patches-unapplied version 0.170-0.1 to debian/sid

Author: Matthias Klose
Author Date: 2017-09-11 22:07:19 UTC

Import patches-unapplied version 0.170-0.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 9c48a36eeadffb99104f80d4f830369127804e87

New changelog entries:
  * Non-maintainer upload.
  * New upstream release
  * Fix fallthrough warnings exposed by GCC 7. Closes: #853387.
  * Bump standards version.
  * Configure with --disable-silent-rules.
  * Update libdw1 symbols file.

applied/ubuntu/artful 2017-09-12 04:30:14 UTC 2017-09-12
Import patches-applied version 0.170-0.1 to applied/debian/sid

Author: Matthias Klose
Author Date: 2017-09-11 22:07:19 UTC

Import patches-applied version 0.170-0.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 0a2d57f918be95e2969b5d12a3933cd83162dfa4
Unapplied parent: 633a948cf711f99f94c517c55cc5d5b2ecbf6735

New changelog entries:
  * Non-maintainer upload.
  * New upstream release
  * Fix fallthrough warnings exposed by GCC 7. Closes: #853387.
  * Bump standards version.
  * Configure with --disable-silent-rules.
  * Update libdw1 symbols file.

ubuntu/artful-proposed 2017-09-12 04:30:14 UTC 2017-09-12
Import patches-unapplied version 0.170-0.1 to debian/sid

Author: Matthias Klose
Author Date: 2017-09-11 22:07:19 UTC

Import patches-unapplied version 0.170-0.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 9c48a36eeadffb99104f80d4f830369127804e87

New changelog entries:
  * Non-maintainer upload.
  * New upstream release
  * Fix fallthrough warnings exposed by GCC 7. Closes: #853387.
  * Bump standards version.
  * Configure with --disable-silent-rules.
  * Update libdw1 symbols file.

debian/stretch 2017-05-27 16:12:42 UTC 2017-05-27
Import patches-unapplied version 0.168-1 to debian/sid

Author: Kurt Roeckx
Author Date: 2017-05-27 13:05:37 UTC

Import patches-unapplied version 0.168-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d0c909d1dbe4f9b51427b971166b39647a95358f

New changelog entries:
  * Fix CVE-2017-7607 (Closes: #859996)
  * Fix CVE-2017-7608 (Closes: #859995)
  * Fix CVE-2017-7609 (Closes: #859994)
  * Fix CVE-2017-7610 (Closes: #859993)
  * Fix CVE-2017-7611 (Closes: #859992)
  * Fix CVE-2017-7612 (Closes: #859991)
  * Fix CVE-2017-7613 (Closes: #859990)

applied/debian/stretch 2017-05-27 16:12:42 UTC 2017-05-27
Import patches-applied version 0.168-1 to applied/debian/sid

Author: Kurt Roeckx
Author Date: 2017-05-27 13:05:37 UTC

Import patches-applied version 0.168-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: f5b56a80bb5d47cbe7d9c4f8bde0ab16e9774172
Unapplied parent: 5ab4008f3f3e7f889481fe7cd09ce7983a1c7608

New changelog entries:
  * Fix CVE-2017-7607 (Closes: #859996)
  * Fix CVE-2017-7608 (Closes: #859995)
  * Fix CVE-2017-7609 (Closes: #859994)
  * Fix CVE-2017-7610 (Closes: #859993)
  * Fix CVE-2017-7611 (Closes: #859992)
  * Fix CVE-2017-7612 (Closes: #859991)
  * Fix CVE-2017-7613 (Closes: #859990)

ubuntu/zesty-proposed 2016-12-29 22:11:54 UTC 2016-12-29
Import patches-unapplied version 0.168-0.2 to debian/sid

Author: Matthias Klose
Author Date: 2016-12-29 13:23:54 UTC

Import patches-unapplied version 0.168-0.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: fa9b8991571129d77a05d97f19eef0ac9656d549

New changelog entries:
  * debian/copyright: Update to the current licensing, as introduced
    with elfutils 0.154.
  * Drop the m68k_backend.diff patch.

applied/ubuntu/zesty-devel 2016-12-29 22:11:54 UTC 2016-12-29
Import patches-applied version 0.168-0.2 to applied/debian/sid

Author: Matthias Klose
Author Date: 2016-12-29 13:23:54 UTC

Import patches-applied version 0.168-0.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 6470e5b4e28fda671d7e74ceccc30507f36932f0
Unapplied parent: 1a51a450d8d2a0b5a717a381b994190f147bb1e8

New changelog entries:
  * debian/copyright: Update to the current licensing, as introduced
    with elfutils 0.154.
  * Drop the m68k_backend.diff patch.

applied/ubuntu/zesty-proposed 2016-12-29 22:11:54 UTC 2016-12-29
Import patches-applied version 0.168-0.2 to applied/debian/sid

Author: Matthias Klose
Author Date: 2016-12-29 13:23:54 UTC

Import patches-applied version 0.168-0.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 6470e5b4e28fda671d7e74ceccc30507f36932f0
Unapplied parent: 1a51a450d8d2a0b5a717a381b994190f147bb1e8

New changelog entries:
  * debian/copyright: Update to the current licensing, as introduced
    with elfutils 0.154.
  * Drop the m68k_backend.diff patch.

ubuntu/zesty-devel 2016-12-29 22:11:54 UTC 2016-12-29
Import patches-unapplied version 0.168-0.2 to debian/sid

Author: Matthias Klose
Author Date: 2016-12-29 13:23:54 UTC

Import patches-unapplied version 0.168-0.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: fa9b8991571129d77a05d97f19eef0ac9656d549

New changelog entries:
  * debian/copyright: Update to the current licensing, as introduced
    with elfutils 0.154.
  * Drop the m68k_backend.diff patch.

debian/experimental 2016-12-29 10:10:15 UTC 2016-12-29
Import patches-unapplied version 0.168-0.1 to debian/experimental

Author: Matthias Klose
Author Date: 2016-12-29 05:09:04 UTC

Import patches-unapplied version 0.168-0.1 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: c8fa32b1b201c959bdedd7cfd8b7a1a9e33561e3

New changelog entries:
  * Non-maintainer upload.
  * New upstream release
    - m68k_backend.diff: Don't apply.
    - testsuite-amd64-fix-backtrace-native.patch: Remove, applied upstream.
    - Refresh patches.
    - Build failure on non Linux targets fixed. Closes: #816394.
  * Update libdw1 symbols file.
  * Improve DEB_BUILD_OPTIONS=nocheck handling (Helmut Grohne). See #832456.
    - Don't treat DEB_BUILD_OPTIONS=casinocheck as nocheck.
    - Don't default to nocheck for cross building.
    - Annotate Build-Depends: gcc-multilib with <!nocheck> profile.
  * Update reference to new sourceware.org home.

applied/debian/experimental 2016-12-29 10:10:15 UTC 2016-12-29
Import patches-applied version 0.168-0.1 to applied/debian/experimental

Author: Matthias Klose
Author Date: 2016-12-29 05:09:04 UTC

Import patches-applied version 0.168-0.1 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 62d9d1d703676deb1188717c4a970587a0e962a7
Unapplied parent: 6b894b9b9d4f21fc1f9074bb94315e9e5990b2c3

New changelog entries:
  * Non-maintainer upload.
  * New upstream release
    - m68k_backend.diff: Don't apply.
    - testsuite-amd64-fix-backtrace-native.patch: Remove, applied upstream.
    - Refresh patches.
    - Build failure on non Linux targets fixed. Closes: #816394.
  * Update libdw1 symbols file.
  * Improve DEB_BUILD_OPTIONS=nocheck handling (Helmut Grohne). See #832456.
    - Don't treat DEB_BUILD_OPTIONS=casinocheck as nocheck.
    - Don't default to nocheck for cross building.
    - Annotate Build-Depends: gcc-multilib with <!nocheck> profile.
  * Update reference to new sourceware.org home.

ubuntu/yakkety 2016-08-10 11:29:20 UTC 2016-08-10
Import patches-unapplied version 0.166-2ubuntu1 to ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-08-10 11:17:23 UTC

Import patches-unapplied version 0.166-2ubuntu1 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 36eba940b49116169d372c557e87a9b4436e09f7

New changelog entries:
  * Don't run the run-backtrace-native-biarch test.

ubuntu/yakkety-devel 2016-08-10 11:29:20 UTC 2016-08-10
Import patches-unapplied version 0.166-2ubuntu1 to ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-08-10 11:17:23 UTC

Import patches-unapplied version 0.166-2ubuntu1 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 36eba940b49116169d372c557e87a9b4436e09f7

New changelog entries:
  * Don't run the run-backtrace-native-biarch test.

ubuntu/yakkety-proposed 2016-08-10 11:29:20 UTC 2016-08-10
Import patches-unapplied version 0.166-2ubuntu1 to ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-08-10 11:17:23 UTC

Import patches-unapplied version 0.166-2ubuntu1 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 36eba940b49116169d372c557e87a9b4436e09f7

New changelog entries:
  * Don't run the run-backtrace-native-biarch test.

ubuntu/zesty 2016-08-10 11:29:20 UTC 2016-08-10
Import patches-unapplied version 0.166-2ubuntu1 to ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-08-10 11:17:23 UTC

Import patches-unapplied version 0.166-2ubuntu1 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 36eba940b49116169d372c557e87a9b4436e09f7

New changelog entries:
  * Don't run the run-backtrace-native-biarch test.

applied/ubuntu/zesty 2016-08-10 11:29:20 UTC 2016-08-10
Import patches-applied version 0.166-2ubuntu1 to applied/ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-08-10 11:17:23 UTC

Import patches-applied version 0.166-2ubuntu1 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 4eb830426be52dfe8771af8ca0b361eb4dc769df
Unapplied parent: a2498c37a7581a3c2d8a88317ffa84c595b10e6c

New changelog entries:
  * Don't run the run-backtrace-native-biarch test.

applied/ubuntu/yakkety-proposed 2016-08-10 11:29:20 UTC 2016-08-10
Import patches-applied version 0.166-2ubuntu1 to applied/ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-08-10 11:17:23 UTC

Import patches-applied version 0.166-2ubuntu1 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 4eb830426be52dfe8771af8ca0b361eb4dc769df
Unapplied parent: a2498c37a7581a3c2d8a88317ffa84c595b10e6c

New changelog entries:
  * Don't run the run-backtrace-native-biarch test.

applied/ubuntu/yakkety-devel 2016-08-10 11:29:20 UTC 2016-08-10
Import patches-applied version 0.166-2ubuntu1 to applied/ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-08-10 11:17:23 UTC

Import patches-applied version 0.166-2ubuntu1 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 4eb830426be52dfe8771af8ca0b361eb4dc769df
Unapplied parent: a2498c37a7581a3c2d8a88317ffa84c595b10e6c

New changelog entries:
  * Don't run the run-backtrace-native-biarch test.

applied/ubuntu/yakkety 2016-08-10 11:29:20 UTC 2016-08-10
Import patches-applied version 0.166-2ubuntu1 to applied/ubuntu/yakkety-proposed

Author: Matthias Klose
Author Date: 2016-08-10 11:17:23 UTC

Import patches-applied version 0.166-2ubuntu1 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 4eb830426be52dfe8771af8ca0b361eb4dc769df
Unapplied parent: a2498c37a7581a3c2d8a88317ffa84c595b10e6c

New changelog entries:
  * Don't run the run-backtrace-native-biarch test.

ubuntu/xenial 2016-02-19 16:03:40 UTC 2016-02-19
Import patches-unapplied version 0.165-3ubuntu1 to ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-02-19 15:57:49 UTC

Import patches-unapplied version 0.165-3ubuntu1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: f6adf155b608fa50e30a05f540f5ef0e1bda8338

New changelog entries:
  * Fix finding the debug info for Ubuntu kernels (Mark Wielaard). LP: #1537125.

ubuntu/xenial-proposed 2016-02-19 16:03:40 UTC 2016-02-19
Import patches-unapplied version 0.165-3ubuntu1 to ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-02-19 15:57:49 UTC

Import patches-unapplied version 0.165-3ubuntu1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: f6adf155b608fa50e30a05f540f5ef0e1bda8338

New changelog entries:
  * Fix finding the debug info for Ubuntu kernels (Mark Wielaard). LP: #1537125.

applied/ubuntu/xenial 2016-02-19 16:03:40 UTC 2016-02-19
Import patches-applied version 0.165-3ubuntu1 to applied/ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-02-19 15:57:49 UTC

Import patches-applied version 0.165-3ubuntu1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 3fd6a8add675dfbd4d60451cc2d2702425313fb2
Unapplied parent: fe65f32c5cbc40d21dc9cf2072a7b710a6675592

New changelog entries:
  * Fix finding the debug info for Ubuntu kernels (Mark Wielaard). LP: #1537125.

applied/ubuntu/xenial-proposed 2016-02-19 16:03:40 UTC 2016-02-19
Import patches-applied version 0.165-3ubuntu1 to applied/ubuntu/xenial-proposed

Author: Matthias Klose
Author Date: 2016-02-19 15:57:49 UTC

Import patches-applied version 0.165-3ubuntu1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 3fd6a8add675dfbd4d60451cc2d2702425313fb2
Unapplied parent: fe65f32c5cbc40d21dc9cf2072a7b710a6675592

New changelog entries:
  * Fix finding the debug info for Ubuntu kernels (Mark Wielaard). LP: #1537125.

ubuntu/wily 2015-08-08 10:08:26 UTC 2015-08-08
Import patches-unapplied version 0.163-4ubuntu1 to ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-08-08 10:04:39 UTC

Import patches-unapplied version 0.163-4ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: bdcc7c880eac50a244f17f2095fa7c38a6a94481

New changelog entries:
  * Disable the 0003-Add-mips-n64-relocation-format-hack patch (thanks
    to Mark Wielaard). See #794488.

applied/ubuntu/wily 2015-08-08 10:08:26 UTC 2015-08-08
Import patches-applied version 0.163-4ubuntu1 to applied/ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-08-08 10:04:39 UTC

Import patches-applied version 0.163-4ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 9b7716241425c8a036df37642b863ff6496d9cc2
Unapplied parent: a458b51760d129c38f28b9590be2c36264ad2b1b

New changelog entries:
  * Disable the 0003-Add-mips-n64-relocation-format-hack patch (thanks
    to Mark Wielaard). See #794488.

applied/ubuntu/wily-proposed 2015-08-08 10:08:26 UTC 2015-08-08
Import patches-applied version 0.163-4ubuntu1 to applied/ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-08-08 10:04:39 UTC

Import patches-applied version 0.163-4ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 9b7716241425c8a036df37642b863ff6496d9cc2
Unapplied parent: a458b51760d129c38f28b9590be2c36264ad2b1b

New changelog entries:
  * Disable the 0003-Add-mips-n64-relocation-format-hack patch (thanks
    to Mark Wielaard). See #794488.

ubuntu/wily-proposed 2015-08-08 10:08:26 UTC 2015-08-08
Import patches-unapplied version 0.163-4ubuntu1 to ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-08-08 10:04:39 UTC

Import patches-unapplied version 0.163-4ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: bdcc7c880eac50a244f17f2095fa7c38a6a94481

New changelog entries:
  * Disable the 0003-Add-mips-n64-relocation-format-hack patch (thanks
    to Mark Wielaard). See #794488.

ubuntu/wily-devel 2015-08-08 10:08:26 UTC 2015-08-08
Import patches-unapplied version 0.163-4ubuntu1 to ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-08-08 10:04:39 UTC

Import patches-unapplied version 0.163-4ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: bdcc7c880eac50a244f17f2095fa7c38a6a94481

New changelog entries:
  * Disable the 0003-Add-mips-n64-relocation-format-hack patch (thanks
    to Mark Wielaard). See #794488.

applied/ubuntu/wily-devel 2015-08-08 10:08:26 UTC 2015-08-08
Import patches-applied version 0.163-4ubuntu1 to applied/ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-08-08 10:04:39 UTC

Import patches-applied version 0.163-4ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 9b7716241425c8a036df37642b863ff6496d9cc2
Unapplied parent: a458b51760d129c38f28b9590be2c36264ad2b1b

New changelog entries:
  * Disable the 0003-Add-mips-n64-relocation-format-hack patch (thanks
    to Mark Wielaard). See #794488.

debian/jessie 2015-02-14 04:13:21 UTC 2015-02-14
Import patches-unapplied version 0.159-4.2 to debian/sid

Author: Michael Gilbert
Author Date: 2015-02-13 22:30:44 UTC

Import patches-unapplied version 0.159-4.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 25cdfc9121bd8f4ec1be8fb7710fd2a19a12cd78

New changelog entries:
  * Non-maintainer upload.
  * Apply an upstream patch to fix the build failure on arm64 (closes: #776523).

applied/debian/jessie 2015-02-14 04:13:21 UTC 2015-02-14
Import patches-applied version 0.159-4.2 to applied/debian/sid

Author: Michael Gilbert
Author Date: 2015-02-13 22:30:44 UTC

Import patches-applied version 0.159-4.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 3ad41a18bbec93801efdc00f12d98e0f1bafc066
Unapplied parent: 030b12970bca1b41098120542a9a2f7c2dbe9aa9

New changelog entries:
  * Non-maintainer upload.
  * Apply an upstream patch to fix the build failure on arm64 (closes: #776523).

applied/ubuntu/vivid-devel 2015-01-26 09:18:22 UTC 2015-01-26
Import patches-applied version 0.160-0ubuntu3 to applied/ubuntu/vivid-proposed

Author: Tyler Hicks
Author Date: 2015-01-23 22:24:20 UTC

Import patches-applied version 0.160-0ubuntu3 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 484a58beab4b14293a108e52070e456de0299359
Unapplied parent: fec21d0d7dea95f4f38b5d21170cb75a3e57aa72

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive (LP: #1414206)
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/vivid 2015-01-26 09:18:22 UTC 2015-01-26
Import patches-applied version 0.160-0ubuntu3 to applied/ubuntu/vivid-proposed

Author: Tyler Hicks
Author Date: 2015-01-23 22:24:20 UTC

Import patches-applied version 0.160-0ubuntu3 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 484a58beab4b14293a108e52070e456de0299359
Unapplied parent: fec21d0d7dea95f4f38b5d21170cb75a3e57aa72

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive (LP: #1414206)
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/vivid-proposed 2015-01-26 09:18:22 UTC 2015-01-26
Import patches-applied version 0.160-0ubuntu3 to applied/ubuntu/vivid-proposed

Author: Tyler Hicks
Author Date: 2015-01-23 22:24:20 UTC

Import patches-applied version 0.160-0ubuntu3 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 484a58beab4b14293a108e52070e456de0299359
Unapplied parent: fec21d0d7dea95f4f38b5d21170cb75a3e57aa72

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive (LP: #1414206)
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/vivid-proposed 2015-01-26 09:18:22 UTC 2015-01-26
Import patches-unapplied version 0.160-0ubuntu3 to ubuntu/vivid-proposed

Author: Tyler Hicks
Author Date: 2015-01-23 22:24:20 UTC

Import patches-unapplied version 0.160-0ubuntu3 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: ac2d0c82886e6e417f7d85bb988754dcbd7b9d0d

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive (LP: #1414206)
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/vivid 2015-01-26 09:18:22 UTC 2015-01-26
Import patches-unapplied version 0.160-0ubuntu3 to ubuntu/vivid-proposed

Author: Tyler Hicks
Author Date: 2015-01-23 22:24:20 UTC

Import patches-unapplied version 0.160-0ubuntu3 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: ac2d0c82886e6e417f7d85bb988754dcbd7b9d0d

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive (LP: #1414206)
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/vivid-devel 2015-01-26 09:18:22 UTC 2015-01-26
Import patches-unapplied version 0.160-0ubuntu3 to ubuntu/vivid-proposed

Author: Tyler Hicks
Author Date: 2015-01-23 22:24:20 UTC

Import patches-unapplied version 0.160-0ubuntu3 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: ac2d0c82886e6e417f7d85bb988754dcbd7b9d0d

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive (LP: #1414206)
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/utopic-devel 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-applied version 0.160-0ubuntu2.1 to applied/ubuntu/utopic-secu...

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:49 UTC

Import patches-applied version 0.160-0ubuntu2.1 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: 484a58beab4b14293a108e52070e456de0299359
Unapplied parent: 8b5c0ea0e08a95c387f094f69b5a658d82e2eae5

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/precise-security 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-unapplied version 0.152-1ubuntu3.1 to ubuntu/precise-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:54 UTC

Import patches-unapplied version 0.152-1ubuntu3.1 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: ceff04f6adf83dcae39468e94311af715b3e6609

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/precise-updates 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-unapplied version 0.152-1ubuntu3.1 to ubuntu/precise-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:54 UTC

Import patches-unapplied version 0.152-1ubuntu3.1 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: ceff04f6adf83dcae39468e94311af715b3e6609

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/lucid-updates 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-unapplied version 0.143-1ubuntu0.1 to ubuntu/lucid-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:51 UTC

Import patches-unapplied version 0.143-1ubuntu0.1 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 1fd63a8f251cac148396394fd4acc3cb95b44e5f

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/lucid-security 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-unapplied version 0.143-1ubuntu0.1 to ubuntu/lucid-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:51 UTC

Import patches-unapplied version 0.143-1ubuntu0.1 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 1fd63a8f251cac148396394fd4acc3cb95b44e5f

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/lucid-devel 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-unapplied version 0.143-1ubuntu0.1 to ubuntu/lucid-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:51 UTC

Import patches-unapplied version 0.143-1ubuntu0.1 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 1fd63a8f251cac148396394fd4acc3cb95b44e5f

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/precise-devel 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-applied version 0.152-1ubuntu3.1 to applied/ubuntu/precise-sec...

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:54 UTC

Import patches-applied version 0.152-1ubuntu3.1 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b3618e3f3dc528d31db37a442ce5036b2f3495f1
Unapplied parent: 140fce44447653ff845345423387104eaaff2fe3

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/lucid-devel 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-applied version 0.143-1ubuntu0.1 to applied/ubuntu/lucid-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:51 UTC

Import patches-applied version 0.143-1ubuntu0.1 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 1e93b7cb3eade4fa9494379016661e9a56b79453
Unapplied parent: 2de7feed0be6322e034d37f1cd24e83ac3f261ee

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/lucid-security 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-applied version 0.143-1ubuntu0.1 to applied/ubuntu/lucid-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:51 UTC

Import patches-applied version 0.143-1ubuntu0.1 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 1e93b7cb3eade4fa9494379016661e9a56b79453
Unapplied parent: 2de7feed0be6322e034d37f1cd24e83ac3f261ee

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/lucid-updates 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-applied version 0.143-1ubuntu0.1 to applied/ubuntu/lucid-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:51 UTC

Import patches-applied version 0.143-1ubuntu0.1 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 1e93b7cb3eade4fa9494379016661e9a56b79453
Unapplied parent: 2de7feed0be6322e034d37f1cd24e83ac3f261ee

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/utopic-devel 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-unapplied version 0.160-0ubuntu2.1 to ubuntu/utopic-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:49 UTC

Import patches-unapplied version 0.160-0ubuntu2.1 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: ac2d0c82886e6e417f7d85bb988754dcbd7b9d0d

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/precise-security 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-applied version 0.152-1ubuntu3.1 to applied/ubuntu/precise-sec...

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:54 UTC

Import patches-applied version 0.152-1ubuntu3.1 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b3618e3f3dc528d31db37a442ce5036b2f3495f1
Unapplied parent: 140fce44447653ff845345423387104eaaff2fe3

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/utopic-security 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-unapplied version 0.160-0ubuntu2.1 to ubuntu/utopic-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:49 UTC

Import patches-unapplied version 0.160-0ubuntu2.1 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: ac2d0c82886e6e417f7d85bb988754dcbd7b9d0d

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/precise-updates 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-applied version 0.152-1ubuntu3.1 to applied/ubuntu/precise-sec...

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:54 UTC

Import patches-applied version 0.152-1ubuntu3.1 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b3618e3f3dc528d31db37a442ce5036b2f3495f1
Unapplied parent: 140fce44447653ff845345423387104eaaff2fe3

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/utopic-updates 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-unapplied version 0.160-0ubuntu2.1 to ubuntu/utopic-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:49 UTC

Import patches-unapplied version 0.160-0ubuntu2.1 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: ac2d0c82886e6e417f7d85bb988754dcbd7b9d0d

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/utopic-updates 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-applied version 0.160-0ubuntu2.1 to applied/ubuntu/utopic-secu...

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:49 UTC

Import patches-applied version 0.160-0ubuntu2.1 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: 484a58beab4b14293a108e52070e456de0299359
Unapplied parent: 8b5c0ea0e08a95c387f094f69b5a658d82e2eae5

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

applied/ubuntu/utopic-security 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-applied version 0.160-0ubuntu2.1 to applied/ubuntu/utopic-secu...

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:49 UTC

Import patches-applied version 0.160-0ubuntu2.1 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: 484a58beab4b14293a108e52070e456de0299359
Unapplied parent: 8b5c0ea0e08a95c387f094f69b5a658d82e2eae5

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

ubuntu/precise-devel 2015-01-23 01:03:25 UTC 2015-01-23
Import patches-unapplied version 0.152-1ubuntu3.1 to ubuntu/precise-security

Author: Tyler Hicks
Author Date: 2015-01-20 21:22:54 UTC

Import patches-unapplied version 0.152-1ubuntu3.1 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: ceff04f6adf83dcae39468e94311af715b3e6609

New changelog entries:
  * SECURITY UPDATE: Directory traversal via crafted ar archive
    - debian/patches/CVE-2014-9447.patch: Prevent root directory traversal
      while extracting ar archives
    - CVE-2014-9447

1100 of 180 results

Other repositories

Name Last Modified
lp:ubuntu/+source/elfutils 2018-12-03
11 of 1 result
You can't create new repositories for elfutils in Ubuntu.