View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/perl
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2019-03-17 04:09:53 UTC 2019-03-17
DSC file for 5.28.1-5

Author: Ubuntu Git Importer
Author Date: 2019-03-17 04:09:53 UTC

DSC file for 5.28.1-5

importer/debian/dsc 2019-03-16 22:45:38 UTC 2019-03-16
DSC file for 5.28.1-5

Author: Ubuntu Git Importer
Author Date: 2019-03-16 22:45:38 UTC

DSC file for 5.28.1-5

ubuntu/devel 2019-03-16 22:36:44 UTC 2019-03-16
Import patches-unapplied version 5.28.1-5 to debian/sid

Author: Niko Tyni
Author Date: 2019-03-16 14:02:28 UTC

Import patches-unapplied version 5.28.1-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 02867352b87636fd49dfdb433a0b828d0ead8510

New changelog entries:
  * Patch perlbug to use "editor" as the default editor. (Closes: #922609)
  * Add a Breaks entry for older versions of libdist-inkt-perl.
    (Closes: #924506)
  * Add a README.Debian note about overriding the default perldoc formatter.
    (See: #917530)
  * Include arch-specific data for NDBM and GDBM autopkgtests.
    (Closes: #923409)
  * Break older versions of libmarc-charset-perl, broken by libgdbm changes.
    (Closes: #924719)
    + Build-Depend on a current libgdbm-dev to guarantee compatibility
      with the new LFS-enabled database binary format.
  * Fix crashing POSIX::mblen(). (Closes: #924517)

ubuntu/disco-proposed 2019-03-16 22:36:44 UTC 2019-03-16
Import patches-unapplied version 5.28.1-5 to debian/sid

Author: Niko Tyni
Author Date: 2019-03-16 14:02:28 UTC

Import patches-unapplied version 5.28.1-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 02867352b87636fd49dfdb433a0b828d0ead8510

New changelog entries:
  * Patch perlbug to use "editor" as the default editor. (Closes: #922609)
  * Add a Breaks entry for older versions of libdist-inkt-perl.
    (Closes: #924506)
  * Add a README.Debian note about overriding the default perldoc formatter.
    (See: #917530)
  * Include arch-specific data for NDBM and GDBM autopkgtests.
    (Closes: #923409)
  * Break older versions of libmarc-charset-perl, broken by libgdbm changes.
    (Closes: #924719)
    + Build-Depend on a current libgdbm-dev to guarantee compatibility
      with the new LFS-enabled database binary format.
  * Fix crashing POSIX::mblen(). (Closes: #924517)

applied/ubuntu/devel 2019-03-16 22:36:44 UTC 2019-03-16
Import patches-applied version 5.28.1-5 to applied/debian/sid

Author: Niko Tyni
Author Date: 2019-03-16 14:02:28 UTC

Import patches-applied version 5.28.1-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: e26dc8e83e25dbfc46f8b2a5dba051c420375675
Unapplied parent: 1c56f01a6b78ecd2a5f604ab8f83fb5e6746de37

New changelog entries:
  * Patch perlbug to use "editor" as the default editor. (Closes: #922609)
  * Add a Breaks entry for older versions of libdist-inkt-perl.
    (Closes: #924506)
  * Add a README.Debian note about overriding the default perldoc formatter.
    (See: #917530)
  * Include arch-specific data for NDBM and GDBM autopkgtests.
    (Closes: #923409)
  * Break older versions of libmarc-charset-perl, broken by libgdbm changes.
    (Closes: #924719)
    + Build-Depend on a current libgdbm-dev to guarantee compatibility
      with the new LFS-enabled database binary format.
  * Fix crashing POSIX::mblen(). (Closes: #924517)

ubuntu/disco-devel 2019-03-16 22:36:44 UTC 2019-03-16
Import patches-unapplied version 5.28.1-5 to debian/sid

Author: Niko Tyni
Author Date: 2019-03-16 14:02:28 UTC

Import patches-unapplied version 5.28.1-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 02867352b87636fd49dfdb433a0b828d0ead8510

New changelog entries:
  * Patch perlbug to use "editor" as the default editor. (Closes: #922609)
  * Add a Breaks entry for older versions of libdist-inkt-perl.
    (Closes: #924506)
  * Add a README.Debian note about overriding the default perldoc formatter.
    (See: #917530)
  * Include arch-specific data for NDBM and GDBM autopkgtests.
    (Closes: #923409)
  * Break older versions of libmarc-charset-perl, broken by libgdbm changes.
    (Closes: #924719)
    + Build-Depend on a current libgdbm-dev to guarantee compatibility
      with the new LFS-enabled database binary format.
  * Fix crashing POSIX::mblen(). (Closes: #924517)

applied/ubuntu/disco-devel 2019-03-16 22:36:44 UTC 2019-03-16
Import patches-applied version 5.28.1-5 to applied/debian/sid

Author: Niko Tyni
Author Date: 2019-03-16 14:02:28 UTC

Import patches-applied version 5.28.1-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: e26dc8e83e25dbfc46f8b2a5dba051c420375675
Unapplied parent: 1c56f01a6b78ecd2a5f604ab8f83fb5e6746de37

New changelog entries:
  * Patch perlbug to use "editor" as the default editor. (Closes: #922609)
  * Add a Breaks entry for older versions of libdist-inkt-perl.
    (Closes: #924506)
  * Add a README.Debian note about overriding the default perldoc formatter.
    (See: #917530)
  * Include arch-specific data for NDBM and GDBM autopkgtests.
    (Closes: #923409)
  * Break older versions of libmarc-charset-perl, broken by libgdbm changes.
    (Closes: #924719)
    + Build-Depend on a current libgdbm-dev to guarantee compatibility
      with the new LFS-enabled database binary format.
  * Fix crashing POSIX::mblen(). (Closes: #924517)

debian/sid 2019-03-16 22:36:44 UTC 2019-03-16
Import patches-unapplied version 5.28.1-5 to debian/sid

Author: Niko Tyni
Author Date: 2019-03-16 14:02:28 UTC

Import patches-unapplied version 5.28.1-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 02867352b87636fd49dfdb433a0b828d0ead8510

New changelog entries:
  * Patch perlbug to use "editor" as the default editor. (Closes: #922609)
  * Add a Breaks entry for older versions of libdist-inkt-perl.
    (Closes: #924506)
  * Add a README.Debian note about overriding the default perldoc formatter.
    (See: #917530)
  * Include arch-specific data for NDBM and GDBM autopkgtests.
    (Closes: #923409)
  * Break older versions of libmarc-charset-perl, broken by libgdbm changes.
    (Closes: #924719)
    + Build-Depend on a current libgdbm-dev to guarantee compatibility
      with the new LFS-enabled database binary format.
  * Fix crashing POSIX::mblen(). (Closes: #924517)

applied/debian/sid 2019-03-16 22:36:44 UTC 2019-03-16
Import patches-applied version 5.28.1-5 to applied/debian/sid

Author: Niko Tyni
Author Date: 2019-03-16 14:02:28 UTC

Import patches-applied version 5.28.1-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: e26dc8e83e25dbfc46f8b2a5dba051c420375675
Unapplied parent: 1c56f01a6b78ecd2a5f604ab8f83fb5e6746de37

New changelog entries:
  * Patch perlbug to use "editor" as the default editor. (Closes: #922609)
  * Add a Breaks entry for older versions of libdist-inkt-perl.
    (Closes: #924506)
  * Add a README.Debian note about overriding the default perldoc formatter.
    (See: #917530)
  * Include arch-specific data for NDBM and GDBM autopkgtests.
    (Closes: #923409)
  * Break older versions of libmarc-charset-perl, broken by libgdbm changes.
    (Closes: #924719)
    + Build-Depend on a current libgdbm-dev to guarantee compatibility
      with the new LFS-enabled database binary format.
  * Fix crashing POSIX::mblen(). (Closes: #924517)

applied/ubuntu/disco-proposed 2019-03-16 22:36:44 UTC 2019-03-16
Import patches-applied version 5.28.1-5 to applied/debian/sid

Author: Niko Tyni
Author Date: 2019-03-16 14:02:28 UTC

Import patches-applied version 5.28.1-5 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: e26dc8e83e25dbfc46f8b2a5dba051c420375675
Unapplied parent: 1c56f01a6b78ecd2a5f604ab8f83fb5e6746de37

New changelog entries:
  * Patch perlbug to use "editor" as the default editor. (Closes: #922609)
  * Add a Breaks entry for older versions of libdist-inkt-perl.
    (Closes: #924506)
  * Add a README.Debian note about overriding the default perldoc formatter.
    (See: #917530)
  * Include arch-specific data for NDBM and GDBM autopkgtests.
    (Closes: #923409)
  * Break older versions of libmarc-charset-perl, broken by libgdbm changes.
    (Closes: #924719)
    + Build-Depend on a current libgdbm-dev to guarantee compatibility
      with the new LFS-enabled database binary format.
  * Fix crashing POSIX::mblen(). (Closes: #924517)

applied/debian/stretch 2019-02-16 17:15:26 UTC 2019-02-16
Import patches-applied version 5.24.1-3+deb9u5 to applied/debian/stretch

Author: Dominic Hargreaves
Author Date: 2018-11-29 11:11:57 UTC

Import patches-applied version 5.24.1-3+deb9u5 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 014f0a026a801691eced24cb72d9be78224edc12
Unapplied parent: e0a74301a5169de37eeb2aca554a23debf81db3c

New changelog entries:
  * [SECURITY] CVE-2018-18311: Integer overflow leading to buffer
    overflow and segmentation fault
  * [SECURITY] CVE-2018-18312: Heap-buffer-overflow write in S_regatom
    (regcomp.c)
  * [SECURITY] CVE-2018-18313: Heap-buffer-overflow read in regcomp.c
  * [SECURITY] CVE-2018-18314: Heap-based buffer overflow in extended
    character classes

debian/stretch 2019-02-16 17:15:26 UTC 2019-02-16
Import patches-unapplied version 5.24.1-3+deb9u5 to debian/stretch

Author: Dominic Hargreaves
Author Date: 2018-11-29 11:11:57 UTC

Import patches-unapplied version 5.24.1-3+deb9u5 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: b07c8fbf1b63a4de650fa9382ece1cd10edc09e6

New changelog entries:
  * [SECURITY] CVE-2018-18311: Integer overflow leading to buffer
    overflow and segmentation fault
  * [SECURITY] CVE-2018-18312: Heap-buffer-overflow write in S_regatom
    (regcomp.c)
  * [SECURITY] CVE-2018-18313: Heap-buffer-overflow read in regcomp.c
  * [SECURITY] CVE-2018-18314: Heap-based buffer overflow in extended
    character classes

applied/debian/buster 2019-02-02 22:39:47 UTC 2019-02-02
Import patches-applied version 5.28.1-4 to applied/debian/sid

Author: Niko Tyni
Author Date: 2019-02-02 16:30:38 UTC

Import patches-applied version 5.28.1-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: a736c20f478672e9f3d03c0e9f611379e6819c2d
Unapplied parent: 5c8ce74c1fa0b2ae7c9f1a769da7ff82c63527c1

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing piped open (Closes: #916313)
  [ Niko Tyni ]
  * Revert to upstream changes for disabling Storable probing.

debian/buster 2019-02-02 22:39:47 UTC 2019-02-02
Import patches-unapplied version 5.28.1-4 to debian/sid

Author: Niko Tyni
Author Date: 2019-02-02 16:30:38 UTC

Import patches-unapplied version 5.28.1-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: e7ee6f21794d853734b7260a1d731fd7f5134295

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing piped open (Closes: #916313)
  [ Niko Tyni ]
  * Revert to upstream changes for disabling Storable probing.

applied/ubuntu/disco 2019-02-02 22:39:47 UTC 2019-02-02
Import patches-applied version 5.28.1-4 to applied/debian/sid

Author: Niko Tyni
Author Date: 2019-02-02 16:30:38 UTC

Import patches-applied version 5.28.1-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: a736c20f478672e9f3d03c0e9f611379e6819c2d
Unapplied parent: 5c8ce74c1fa0b2ae7c9f1a769da7ff82c63527c1

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing piped open (Closes: #916313)
  [ Niko Tyni ]
  * Revert to upstream changes for disabling Storable probing.

ubuntu/disco 2019-02-02 22:39:47 UTC 2019-02-02
Import patches-unapplied version 5.28.1-4 to debian/sid

Author: Niko Tyni
Author Date: 2019-02-02 16:30:38 UTC

Import patches-unapplied version 5.28.1-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: e7ee6f21794d853734b7260a1d731fd7f5134295

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing piped open (Closes: #916313)
  [ Niko Tyni ]
  * Revert to upstream changes for disabling Storable probing.

applied/ubuntu/xenial-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: cc3526a32a94854cdae63adbab7e9524932019c9
Unapplied parent: b9f4f78b9793c4836a47dd21ea21d231b4be337c

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/trusty-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 0e6b07f5f269c95dbb4cec0091f04b3731529786
Unapplied parent: ef0203b94d6b89512e8480201997ac0690b76ed8

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

ubuntu/trusty-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e365e43ec0b0fc5738a91ccfe9ff45d493afb4d6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

ubuntu/xenial-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: aa6cc0020a7a5a4cd2fff10c9387ccefcfc0ebb6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/cosmic-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 02a910773961b673bc1b5d605a5debd5f4c60722

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/trusty-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 0e6b07f5f269c95dbb4cec0091f04b3731529786
Unapplied parent: ef0203b94d6b89512e8480201997ac0690b76ed8

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

applied/ubuntu/cosmic-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: e6e5874b941e851620255751cee301f4ab55ea25
Unapplied parent: 9f5b4650078429744cb2a725bb995b27845a4ea0

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/cosmic-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: e6e5874b941e851620255751cee301f4ab55ea25
Unapplied parent: 9f5b4650078429744cb2a725bb995b27845a4ea0

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/cosmic-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: e6e5874b941e851620255751cee301f4ab55ea25
Unapplied parent: 9f5b4650078429744cb2a725bb995b27845a4ea0

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/trusty-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e365e43ec0b0fc5738a91ccfe9ff45d493afb4d6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

applied/ubuntu/bionic-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 15dc0346d28f207202675facc3830c76b1bf6e3a
Unapplied parent: 26e928952980fc97b34e79e513756f0a2eab9872

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/bionic-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 15dc0346d28f207202675facc3830c76b1bf6e3a
Unapplied parent: 26e928952980fc97b34e79e513756f0a2eab9872

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/trusty-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 0e6b07f5f269c95dbb4cec0091f04b3731529786
Unapplied parent: ef0203b94d6b89512e8480201997ac0690b76ed8

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

ubuntu/bionic-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 6b4b48ac61c3cd2c7b468710bc1f09b782f64246

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/bionic-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 15dc0346d28f207202675facc3830c76b1bf6e3a
Unapplied parent: 26e928952980fc97b34e79e513756f0a2eab9872

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/cosmic-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 02a910773961b673bc1b5d605a5debd5f4c60722

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/xenial-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: aa6cc0020a7a5a4cd2fff10c9387ccefcfc0ebb6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/xenial-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: cc3526a32a94854cdae63adbab7e9524932019c9
Unapplied parent: b9f4f78b9793c4836a47dd21ea21d231b4be337c

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/bionic-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 6b4b48ac61c3cd2c7b468710bc1f09b782f64246

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/bionic-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 6b4b48ac61c3cd2c7b468710bc1f09b782f64246

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/cosmic-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 02a910773961b673bc1b5d605a5debd5f4c60722

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/xenial-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: cc3526a32a94854cdae63adbab7e9524932019c9
Unapplied parent: b9f4f78b9793c4836a47dd21ea21d231b4be337c

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/xenial-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: aa6cc0020a7a5a4cd2fff10c9387ccefcfc0ebb6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/trusty-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e365e43ec0b0fc5738a91ccfe9ff45d493afb4d6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

ubuntu/cosmic 2018-08-12 16:41:55 UTC 2018-08-12
Import patches-unapplied version 5.26.2-7 to debian/sid

Author: Niko Tyni
Author Date: 2018-08-12 08:26:41 UTC

Import patches-unapplied version 5.26.2-7 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 9a2a5b6298f300a3e0724a1280775eaaf2833bf9

New changelog entries:
  * Temporarily skip GDBM_File fatal.t for gdbm >= 1.15 compatibility.
    (Closes: #904005)

ubuntu/cosmic-proposed 2018-08-12 16:41:55 UTC 2018-08-12
Import patches-unapplied version 5.26.2-7 to debian/sid

Author: Niko Tyni
Author Date: 2018-08-12 08:26:41 UTC

Import patches-unapplied version 5.26.2-7 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 9a2a5b6298f300a3e0724a1280775eaaf2833bf9

New changelog entries:
  * Temporarily skip GDBM_File fatal.t for gdbm >= 1.15 compatibility.
    (Closes: #904005)

applied/ubuntu/cosmic-proposed 2018-08-12 16:41:55 UTC 2018-08-12
Import patches-applied version 5.26.2-7 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-08-12 08:26:41 UTC

Import patches-applied version 5.26.2-7 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: d7cca1057e3e0bf5147c02c208b2ed07da1ba951
Unapplied parent: 8e3d5e77e469d0ecda17dbd00f1162fa2b2aaaa0

New changelog entries:
  * Temporarily skip GDBM_File fatal.t for gdbm >= 1.15 compatibility.
    (Closes: #904005)

applied/ubuntu/cosmic 2018-08-12 16:41:55 UTC 2018-08-12
Import patches-applied version 5.26.2-7 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-08-12 08:26:41 UTC

Import patches-applied version 5.26.2-7 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: d7cca1057e3e0bf5147c02c208b2ed07da1ba951
Unapplied parent: 8e3d5e77e469d0ecda17dbd00f1162fa2b2aaaa0

New changelog entries:
  * Temporarily skip GDBM_File fatal.t for gdbm >= 1.15 compatibility.
    (Closes: #904005)

applied/ubuntu/bionic-proposed 2018-07-19 09:23:58 UTC 2018-07-19
Import patches-applied version 5.26.1-6ubuntu0.2 to applied/ubuntu/bionic-pro...

Author: Balint Reczey
Author Date: 2018-07-18 14:21:03 UTC

Import patches-applied version 5.26.1-6ubuntu0.2 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 9eacf41f112fd180fef7cbaef18a6a83a61923cb
Unapplied parent: 56714f13489d9890effc4d97deff236a75f1c64c

New changelog entries:
  * No change rebuild to fix LP: #1574351

ubuntu/bionic-proposed 2018-07-19 09:23:58 UTC 2018-07-19
Import patches-unapplied version 5.26.1-6ubuntu0.2 to ubuntu/bionic-proposed

Author: Balint Reczey
Author Date: 2018-07-18 14:21:03 UTC

Import patches-unapplied version 5.26.1-6ubuntu0.2 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 24a2e13f360a1518e70afdfda6f21432f7b9e943

New changelog entries:
  * No change rebuild to fix LP: #1574351

debian/experimental 2018-07-16 22:26:58 UTC 2018-07-16
Import patches-unapplied version 5.28.0-2 to debian/experimental

Author: Niko Tyni
Author Date: 2018-07-16 08:22:42 UTC

Import patches-unapplied version 5.28.0-2 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 438133cb01fcdadd01e02dbccee438f20cc6974f

New changelog entries:
  * Amend debian/deprecate-with-apt.diff to for other Locale-Codes modules.
    (Closes: #903705)
  * Add upstream patch fixing file descriptor exhaustion with in-place edits.
    (Closes: #902925)
  * Patch away debugperl stack extension checks.
    (Closes: #902779)
  * Break older versions of libfilter-perl due to bundled Filter::Util::Call.
    (Closes: #884401)
  * Update some outdated links and information in debian/copyright.
  * Update cross build support files.

applied/debian/experimental 2018-07-16 22:26:58 UTC 2018-07-16
Import patches-applied version 5.28.0-2 to applied/debian/experimental

Author: Niko Tyni
Author Date: 2018-07-16 08:22:42 UTC

Import patches-applied version 5.28.0-2 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: d649775c76498fbcfb0c35622cb5d0bada7c778a
Unapplied parent: 11f03b8c19d6837d52488920d585a124f657e294

New changelog entries:
  * Amend debian/deprecate-with-apt.diff to for other Locale-Codes modules.
    (Closes: #903705)
  * Add upstream patch fixing file descriptor exhaustion with in-place edits.
    (Closes: #902925)
  * Patch away debugperl stack extension checks.
    (Closes: #902779)
  * Break older versions of libfilter-perl due to bundled Filter::Util::Call.
    (Closes: #884401)
  * Update some outdated links and information in debian/copyright.
  * Update cross build support files.

debian/jessie 2018-06-23 17:25:19 UTC 2018-06-23
Import patches-unapplied version 5.20.2-3+deb8u11 to debian/jessie

Author: Dominic Hargreaves
Author Date: 2018-06-10 17:40:37 UTC

Import patches-unapplied version 5.20.2-3+deb8u11 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: e5dd886c223e559610eab7424a5543721a3cd49e

New changelog entries:
  * [SECURITY] CVE-2018-12015: fix directory traversal vulnerability
    in Archive-Tar (Closes: #900834)
  * [SECURITY] CVE-2018-6913: heap buffer overflow with large data blocks.

applied/debian/jessie 2018-06-23 17:25:19 UTC 2018-06-23
Import patches-applied version 5.20.2-3+deb8u11 to applied/debian/jessie

Author: Dominic Hargreaves
Author Date: 2018-06-10 17:40:37 UTC

Import patches-applied version 5.20.2-3+deb8u11 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: b76e0269419d142e57fb8dc1276dc7698ca131ce
Unapplied parent: 3b222b652f431c7fcc4dbe1f77be504bc137e354

New changelog entries:
  * [SECURITY] CVE-2018-12015: fix directory traversal vulnerability
    in Archive-Tar (Closes: #900834)
  * [SECURITY] CVE-2018-6913: heap buffer overflow with large data blocks.

ubuntu/artful-security 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: b5a9c7fd38530f622773b771c45c62696ad1e917

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

applied/ubuntu/artful-updates 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-sec...

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: f4f6feda05f41428303625df263d9e7c7b9b25a5
Unapplied parent: 018c02108eb913a908e1a7b7642dd2341b327c63

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

applied/ubuntu/artful-security 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-sec...

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: f4f6feda05f41428303625df263d9e7c7b9b25a5
Unapplied parent: 018c02108eb913a908e1a7b7642dd2341b327c63

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

applied/ubuntu/artful-devel 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-sec...

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: f4f6feda05f41428303625df263d9e7c7b9b25a5
Unapplied parent: 018c02108eb913a908e1a7b7642dd2341b327c63

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

ubuntu/artful-updates 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: b5a9c7fd38530f622773b771c45c62696ad1e917

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

ubuntu/artful-devel 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: b5a9c7fd38530f622773b771c45c62696ad1e917

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

applied/ubuntu/bionic 2018-04-14 22:38:59 UTC 2018-04-14
Import patches-applied version 5.26.1-6 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-03-10 18:40:42 UTC

Import patches-applied version 5.26.1-6 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: f88933522db328034668938a7dffba07b945a6e9
Unapplied parent: 5b3a466eca41765f1ddc3430e91cdd212563e2de

New changelog entries:
  * [SECURITY] CVE-2018-6797: buffer overflow related to regex
                              unicode semantics.
  * [SECURITY] CVE-2018-6798: heap buffer overflow when matching
                              malformed UTF-8 characters.
  * [SECURITY] CVE-2018-6913: heap buffer overflow with large data blocks.

ubuntu/bionic 2018-04-14 22:38:59 UTC 2018-04-14
Import patches-unapplied version 5.26.1-6 to debian/sid

Author: Niko Tyni
Author Date: 2018-03-10 18:40:42 UTC

Import patches-unapplied version 5.26.1-6 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6a21acdb86b40cf9fae41095a5e09d3f06aa8901

New changelog entries:
  * [SECURITY] CVE-2018-6797: buffer overflow related to regex
                              unicode semantics.
  * [SECURITY] CVE-2018-6798: heap buffer overflow when matching
                              malformed UTF-8 characters.
  * [SECURITY] CVE-2018-6913: heap buffer overflow with large data blocks.

importer/ubuntu/pristine-tar 2018-03-06 16:10:32 UTC 2018-03-06
pristine-tar data for perl_5.26.0.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-06 16:10:32 UTC

pristine-tar data for perl_5.26.0.orig.tar.xz

importer/debian/pristine-tar 2018-03-06 13:56:08 UTC 2018-03-06
pristine-tar data for perl_5.26.0.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-06 13:56:08 UTC

pristine-tar data for perl_5.26.0.orig.tar.xz

applied/ubuntu/zesty-updates 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-secu...

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: df6187b7110bfcc5a75480ea17534995397b89c2
Unapplied parent: 829eec069933c1580b4a8b746d12d7af7c9b7065

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

applied/ubuntu/zesty-devel 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-secu...

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: df6187b7110bfcc5a75480ea17534995397b89c2
Unapplied parent: 829eec069933c1580b4a8b746d12d7af7c9b7065

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

applied/ubuntu/zesty-security 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-secu...

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: df6187b7110bfcc5a75480ea17534995397b89c2
Unapplied parent: 829eec069933c1580b4a8b746d12d7af7c9b7065

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

ubuntu/zesty-updates 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 89fdb8419286732d08a7d8a120a74732b0a51f8f

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

ubuntu/zesty-devel 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 89fdb8419286732d08a7d8a120a74732b0a51f8f

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

ubuntu/zesty-security 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 89fdb8419286732d08a7d8a120a74732b0a51f8f

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

ubuntu/artful-proposed 2017-09-15 16:33:30 UTC 2017-09-15
Import patches-unapplied version 5.26.0-8ubuntu1 to ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-09-15 16:13:42 UTC

Import patches-unapplied version 5.26.0-8ubuntu1 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 10f0230bb890a1851d3f1ab266806a758ab4f81a

New changelog entries:
  * Build-depend on libc6-dev (>= 2.26).
  * Restore the SIGUNUSED signal. LP: #1717367.
  * Changes can be dropped with the next perl ABI bump, or with a perl
    upstream fix to restore ABI compatibility with glibc-2.26.

applied/ubuntu/artful-proposed 2017-09-15 16:33:30 UTC 2017-09-15
Import patches-applied version 5.26.0-8ubuntu1 to applied/ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-09-15 16:13:42 UTC

Import patches-applied version 5.26.0-8ubuntu1 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: e1078ce77c6823f2560bc74098186e6c7d620aed
Unapplied parent: 057d0395fdfc52a32c1b0dbe6151570156278ec0

New changelog entries:
  * Build-depend on libc6-dev (>= 2.26).
  * Restore the SIGUNUSED signal. LP: #1717367.
  * Changes can be dropped with the next perl ABI bump, or with a perl
    upstream fix to restore ABI compatibility with glibc-2.26.

ubuntu/artful 2017-09-15 16:33:30 UTC 2017-09-15
Import patches-unapplied version 5.26.0-8ubuntu1 to ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-09-15 16:13:42 UTC

Import patches-unapplied version 5.26.0-8ubuntu1 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 10f0230bb890a1851d3f1ab266806a758ab4f81a

New changelog entries:
  * Build-depend on libc6-dev (>= 2.26).
  * Restore the SIGUNUSED signal. LP: #1717367.
  * Changes can be dropped with the next perl ABI bump, or with a perl
    upstream fix to restore ABI compatibility with glibc-2.26.

applied/ubuntu/artful 2017-09-15 16:33:30 UTC 2017-09-15
Import patches-applied version 5.26.0-8ubuntu1 to applied/ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-09-15 16:13:42 UTC

Import patches-applied version 5.26.0-8ubuntu1 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: e1078ce77c6823f2560bc74098186e6c7d620aed
Unapplied parent: 057d0395fdfc52a32c1b0dbe6151570156278ec0

New changelog entries:
  * Build-depend on libc6-dev (>= 2.26).
  * Restore the SIGUNUSED signal. LP: #1717367.
  * Changes can be dropped with the next perl ABI bump, or with a perl
    upstream fix to restore ABI compatibility with glibc-2.26.

applied/ubuntu/zesty-proposed 2017-03-18 19:03:31 UTC 2017-03-18
Import patches-applied version 5.24.1-2ubuntu1 to applied/ubuntu/zesty-proposed

Author: Gianfranco Costamagna
Author Date: 2017-03-18 17:00:39 UTC

Import patches-applied version 5.24.1-2ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 7f40aa84110aebab6558b22a5fa51cd0bdada2a3
Unapplied parent: 3cdb4eca7a73aec3599f4812416a41c245fd18e6

New changelog entries:
  * d/p/f/Compress-Raw-Zlib-2.071-Adapt-tests-to-zlib-1.2.11.patch,
    d/p/f/0001-Adapt-tests-to-zlib-1.2.11.patch:
    - backport upstream patch to fix t/02zlib.t because of new zlib

ubuntu/zesty 2017-03-18 19:03:31 UTC 2017-03-18
Import patches-unapplied version 5.24.1-2ubuntu1 to ubuntu/zesty-proposed

Author: Gianfranco Costamagna
Author Date: 2017-03-18 17:00:39 UTC

Import patches-unapplied version 5.24.1-2ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: ffc23e5fe69c30cbfe010fefe3c979ecc0d318d8

New changelog entries:
  * d/p/f/Compress-Raw-Zlib-2.071-Adapt-tests-to-zlib-1.2.11.patch,
    d/p/f/0001-Adapt-tests-to-zlib-1.2.11.patch:
    - backport upstream patch to fix t/02zlib.t because of new zlib

ubuntu/zesty-proposed 2017-03-18 19:03:31 UTC 2017-03-18
Import patches-unapplied version 5.24.1-2ubuntu1 to ubuntu/zesty-proposed

Author: Gianfranco Costamagna
Author Date: 2017-03-18 17:00:39 UTC

Import patches-unapplied version 5.24.1-2ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: ffc23e5fe69c30cbfe010fefe3c979ecc0d318d8

New changelog entries:
  * d/p/f/Compress-Raw-Zlib-2.071-Adapt-tests-to-zlib-1.2.11.patch,
    d/p/f/0001-Adapt-tests-to-zlib-1.2.11.patch:
    - backport upstream patch to fix t/02zlib.t because of new zlib

applied/ubuntu/zesty 2017-03-18 19:03:31 UTC 2017-03-18
Import patches-applied version 5.24.1-2ubuntu1 to applied/ubuntu/zesty-proposed

Author: Gianfranco Costamagna
Author Date: 2017-03-18 17:00:39 UTC

Import patches-applied version 5.24.1-2ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 7f40aa84110aebab6558b22a5fa51cd0bdada2a3
Unapplied parent: 3cdb4eca7a73aec3599f4812416a41c245fd18e6

New changelog entries:
  * d/p/f/Compress-Raw-Zlib-2.071-Adapt-tests-to-zlib-1.2.11.patch,
    d/p/f/0001-Adapt-tests-to-zlib-1.2.11.patch:
    - backport upstream patch to fix t/02zlib.t because of new zlib

applied/ubuntu/yakkety 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-applied version 5.22.2-3 to applied/debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-applied version 5.22.2-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: a3bea2dfe83252f0cae7a9fd5ff0cb656f4de8d4
Unapplied parent: 76b0cbf4b872b4f3f6ee5d837bcc5fc5c3896364

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

ubuntu/yakkety-devel 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-unapplied version 5.22.2-3 to debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-unapplied version 5.22.2-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: dd6306b7b2161ebcee63bb25dbf3110bb960d5e0

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

ubuntu/yakkety-proposed 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-unapplied version 5.22.2-3 to debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-unapplied version 5.22.2-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: dd6306b7b2161ebcee63bb25dbf3110bb960d5e0

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

applied/ubuntu/yakkety-devel 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-applied version 5.22.2-3 to applied/debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-applied version 5.22.2-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: a3bea2dfe83252f0cae7a9fd5ff0cb656f4de8d4
Unapplied parent: 76b0cbf4b872b4f3f6ee5d837bcc5fc5c3896364

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

applied/ubuntu/yakkety-proposed 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-applied version 5.22.2-3 to applied/debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-applied version 5.22.2-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: a3bea2dfe83252f0cae7a9fd5ff0cb656f4de8d4
Unapplied parent: 76b0cbf4b872b4f3f6ee5d837bcc5fc5c3896364

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

ubuntu/yakkety 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-unapplied version 5.22.2-3 to debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-unapplied version 5.22.2-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: dd6306b7b2161ebcee63bb25dbf3110bb960d5e0

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

debian/wheezy 2016-04-02 23:40:07 UTC 2016-04-02
Import patches-unapplied version 5.14.2-21+deb7u3 to debian/wheezy

Author: Dominic Hargreaves
Author Date: 2016-02-26 23:20:43 UTC

Import patches-unapplied version 5.14.2-21+deb7u3 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: d54be0b185dba644cd33510f93c00ee9345293a6

New changelog entries:
  * Work around a t/op/stat.t failure on GNU/kFreeBSD, possibly related
    to softupdates. Fix by Steven Chamberlain. (Closes: #796798)
  * [SECURITY] CVE-2016-2381 fix duplicate environment variable taint
    checking issue

applied/debian/wheezy 2016-04-02 23:40:07 UTC 2016-04-02
Import patches-applied version 5.14.2-21+deb7u3 to applied/debian/wheezy

Author: Dominic Hargreaves
Author Date: 2016-02-26 23:20:43 UTC

Import patches-applied version 5.14.2-21+deb7u3 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 10ab5c6dd9d5fdad1e7095e9731e9e923f74fbc5
Unapplied parent: 3208b62d6241e5678568a06b4c7ca490e8798a0b

New changelog entries:
  * Work around a t/op/stat.t failure on GNU/kFreeBSD, possibly related
    to softupdates. Fix by Steven Chamberlain. (Closes: #796798)
  * [SECURITY] CVE-2016-2381 fix duplicate environment variable taint
    checking issue

ubuntu/xenial-proposed 2016-03-13 22:20:48 UTC 2016-03-13
Import patches-unapplied version 5.22.1-9 to debian/sid

Author: Niko Tyni
Author Date: 2016-03-13 11:54:18 UTC

Import patches-unapplied version 5.22.1-9 to debian/sid

Imported using git-ubuntu import.

Changelog parent: b03e3abcdb69cf905cb357c1c09e8e44fb23175e

New changelog entries:
  * Add cross build support files for alpha, hppa, sparc64, x32, mips,
    and hurd-i386. (Closes: #816217)
  * Use the standard library from the build tree, fixing non-cross
    bootstrapping. (Closes: #817948)

applied/ubuntu/xenial-proposed 2016-03-13 22:20:48 UTC 2016-03-13
Import patches-applied version 5.22.1-9 to applied/debian/sid

Author: Niko Tyni
Author Date: 2016-03-13 11:54:18 UTC

Import patches-applied version 5.22.1-9 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ab8033045773480de5ed9579f3a2000c8e83a51b
Unapplied parent: 00d307ee04d51ca37a4779a94c9b63f80b8e32f0

New changelog entries:
  * Add cross build support files for alpha, hppa, sparc64, x32, mips,
    and hurd-i386. (Closes: #816217)
  * Use the standard library from the build tree, fixing non-cross
    bootstrapping. (Closes: #817948)

ubuntu/xenial 2016-03-13 22:20:48 UTC 2016-03-13
Import patches-unapplied version 5.22.1-9 to debian/sid

Author: Niko Tyni
Author Date: 2016-03-13 11:54:18 UTC

Import patches-unapplied version 5.22.1-9 to debian/sid

Imported using git-ubuntu import.

Changelog parent: b03e3abcdb69cf905cb357c1c09e8e44fb23175e

New changelog entries:
  * Add cross build support files for alpha, hppa, sparc64, x32, mips,
    and hurd-i386. (Closes: #816217)
  * Use the standard library from the build tree, fixing non-cross
    bootstrapping. (Closes: #817948)

applied/ubuntu/xenial 2016-03-13 22:20:48 UTC 2016-03-13
Import patches-applied version 5.22.1-9 to applied/debian/sid

Author: Niko Tyni
Author Date: 2016-03-13 11:54:18 UTC

Import patches-applied version 5.22.1-9 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ab8033045773480de5ed9579f3a2000c8e83a51b
Unapplied parent: 00d307ee04d51ca37a4779a94c9b63f80b8e32f0

New changelog entries:
  * Add cross build support files for alpha, hppa, sparc64, x32, mips,
    and hurd-i386. (Closes: #816217)
  * Use the standard library from the build tree, fixing non-cross
    bootstrapping. (Closes: #817948)

ubuntu/wily-devel 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 92c5042b4a8834486b8a543c1b4c145cafcd6f85

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

ubuntu/wily-updates 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 92c5042b4a8834486b8a543c1b4c145cafcd6f85

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

ubuntu/precise-security 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: f8672394dc1f63dc248a4e69a7d5b11509c799aa

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

ubuntu/wily-security 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 92c5042b4a8834486b8a543c1b4c145cafcd6f85

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/wily-devel 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 1a11a1f3977a27fb82abba06f7310370b1e85489
Unapplied parent: 2f8b5e7c454ecb18f243f4a80fdf66160a184f15

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/precise-updates 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-se...

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b4d31911db12e3cecbf018d2be1d1665a5785d35
Unapplied parent: 189df01463865e4a760ddb7536853d336af0cbf1

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/precise-security 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-se...

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b4d31911db12e3cecbf018d2be1d1665a5785d35
Unapplied parent: 189df01463865e4a760ddb7536853d336af0cbf1

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/precise-devel 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-se...

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b4d31911db12e3cecbf018d2be1d1665a5785d35
Unapplied parent: 189df01463865e4a760ddb7536853d336af0cbf1

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/wily-security 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 1a11a1f3977a27fb82abba06f7310370b1e85489
Unapplied parent: 2f8b5e7c454ecb18f243f4a80fdf66160a184f15

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/wily-updates 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 1a11a1f3977a27fb82abba06f7310370b1e85489
Unapplied parent: 2f8b5e7c454ecb18f243f4a80fdf66160a184f15

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

ubuntu/precise-devel 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: f8672394dc1f63dc248a4e69a7d5b11509c799aa

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

ubuntu/precise-updates 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: f8672394dc1f63dc248a4e69a7d5b11509c799aa

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/vivid-devel 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 5.20.2-2ubuntu0.1 to applied/ubuntu/vivid-secu...

Author: Marc Deslauriers
Author Date: 2016-01-20 14:08:09 UTC

Import patches-applied version 5.20.2-2ubuntu0.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 8380769308aeb13f8a85f7cfa20682dba7d01153
Unapplied parent: 12e7c84e28ac4d38e5d609a87257fb793667a27a

New changelog entries:
  * SECURITY UPDATE: canonpath function doesn't preserve taint
    - debian/patches/fixes/CVE-2015-8607_file_spec_taint_fix.diff: ensure
      File::Spec::canonpath() preserves taint in dist/PathTools/Cwd.xs,
      added tests to dist/PathTools/t/taint.t.
    - CVE-2015-8607

applied/ubuntu/vivid-updates 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 5.20.2-2ubuntu0.1 to applied/ubuntu/vivid-secu...

Author: Marc Deslauriers
Author Date: 2016-01-20 14:08:09 UTC

Import patches-applied version 5.20.2-2ubuntu0.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 8380769308aeb13f8a85f7cfa20682dba7d01153
Unapplied parent: 12e7c84e28ac4d38e5d609a87257fb793667a27a

New changelog entries:
  * SECURITY UPDATE: canonpath function doesn't preserve taint
    - debian/patches/fixes/CVE-2015-8607_file_spec_taint_fix.diff: ensure
      File::Spec::canonpath() preserves taint in dist/PathTools/Cwd.xs,
      added tests to dist/PathTools/t/taint.t.
    - CVE-2015-8607

1100 of 260 results

Other repositories

Name Last Modified
lp:ubuntu/+source/perl 2019-03-17
11 of 1 result
You can't create new repositories for perl in Ubuntu.