View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/perl
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2018-12-07 23:22:10 UTC 2018-12-07
DSC file for 5.28.1-3

Author: Ubuntu Git Importer
Author Date: 2018-12-07 23:22:10 UTC

DSC file for 5.28.1-3

importer/debian/dsc 2018-12-07 22:44:28 UTC 2018-12-07
DSC file for 5.28.1-3

Author: Ubuntu Git Importer
Author Date: 2018-12-07 22:44:28 UTC

DSC file for 5.28.1-3

applied/debian/sid 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-applied version 5.28.1-3 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-applied version 5.28.1-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 364a5f2e96fbb62a07981c02283dddf635d9d080
Unapplied parent: b68e628baf6b25835a17e0f4ec960b6da2d688e7

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

debian/buster 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-unapplied version 5.28.1-3 to debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-unapplied version 5.28.1-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: b93db7de401bb4a32f8af73460cfdd35a6bc6a0b

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

applied/ubuntu/disco-proposed 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-applied version 5.28.1-3 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-applied version 5.28.1-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 364a5f2e96fbb62a07981c02283dddf635d9d080
Unapplied parent: b68e628baf6b25835a17e0f4ec960b6da2d688e7

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

debian/sid 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-unapplied version 5.28.1-3 to debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-unapplied version 5.28.1-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: b93db7de401bb4a32f8af73460cfdd35a6bc6a0b

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

ubuntu/disco-proposed 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-unapplied version 5.28.1-3 to debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-unapplied version 5.28.1-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: b93db7de401bb4a32f8af73460cfdd35a6bc6a0b

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

ubuntu/disco-devel 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-unapplied version 5.28.1-3 to debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-unapplied version 5.28.1-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: b93db7de401bb4a32f8af73460cfdd35a6bc6a0b

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

applied/debian/buster 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-applied version 5.28.1-3 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-applied version 5.28.1-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 364a5f2e96fbb62a07981c02283dddf635d9d080
Unapplied parent: b68e628baf6b25835a17e0f4ec960b6da2d688e7

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

applied/ubuntu/devel 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-applied version 5.28.1-3 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-applied version 5.28.1-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 364a5f2e96fbb62a07981c02283dddf635d9d080
Unapplied parent: b68e628baf6b25835a17e0f4ec960b6da2d688e7

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

applied/ubuntu/disco-devel 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-applied version 5.28.1-3 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-applied version 5.28.1-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 364a5f2e96fbb62a07981c02283dddf635d9d080
Unapplied parent: b68e628baf6b25835a17e0f4ec960b6da2d688e7

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

ubuntu/devel 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-unapplied version 5.28.1-3 to debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-unapplied version 5.28.1-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: b93db7de401bb4a32f8af73460cfdd35a6bc6a0b

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

applied/ubuntu/disco 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-applied version 5.28.1-3 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-applied version 5.28.1-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 364a5f2e96fbb62a07981c02283dddf635d9d080
Unapplied parent: b68e628baf6b25835a17e0f4ec960b6da2d688e7

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

ubuntu/disco 2018-12-07 22:37:07 UTC 2018-12-07
Import patches-unapplied version 5.28.1-3 to debian/sid

Author: Niko Tyni
Author Date: 2018-12-07 13:23:05 UTC

Import patches-unapplied version 5.28.1-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: b93db7de401bb4a32f8af73460cfdd35a6bc6a0b

New changelog entries:
  [ Dominic Hargreaves ]
  * Include upstream patches fixing perl -i (Closes: #914651)
  [ Niko Tyni ]
  * Re-adopt versioned Provides for the dual lived modules.
    (Closes: #758100)
    + upload with low urgency in the unlikely case that this hits
      new Debian infrastructure issues like it did in 2017

applied/ubuntu/cosmic-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: e6e5874b941e851620255751cee301f4ab55ea25
Unapplied parent: 9f5b4650078429744cb2a725bb995b27845a4ea0

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/bionic-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 15dc0346d28f207202675facc3830c76b1bf6e3a
Unapplied parent: 26e928952980fc97b34e79e513756f0a2eab9872

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/trusty-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e365e43ec0b0fc5738a91ccfe9ff45d493afb4d6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

ubuntu/xenial-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: aa6cc0020a7a5a4cd2fff10c9387ccefcfc0ebb6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/cosmic-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 02a910773961b673bc1b5d605a5debd5f4c60722

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/trusty-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 0e6b07f5f269c95dbb4cec0091f04b3731529786
Unapplied parent: ef0203b94d6b89512e8480201997ac0690b76ed8

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

applied/ubuntu/cosmic-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: e6e5874b941e851620255751cee301f4ab55ea25
Unapplied parent: 9f5b4650078429744cb2a725bb995b27845a4ea0

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/bionic-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 15dc0346d28f207202675facc3830c76b1bf6e3a
Unapplied parent: 26e928952980fc97b34e79e513756f0a2eab9872

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/trusty-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 0e6b07f5f269c95dbb4cec0091f04b3731529786
Unapplied parent: ef0203b94d6b89512e8480201997ac0690b76ed8

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

ubuntu/bionic-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 6b4b48ac61c3cd2c7b468710bc1f09b782f64246

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/cosmic-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-applied version 5.26.2-7ubuntu0.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: e6e5874b941e851620255751cee301f4ab55ea25
Unapplied parent: 9f5b4650078429744cb2a725bb995b27845a4ea0

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/trusty-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e365e43ec0b0fc5738a91ccfe9ff45d493afb4d6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

applied/ubuntu/bionic-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-applied version 5.26.1-6ubuntu0.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 15dc0346d28f207202675facc3830c76b1bf6e3a
Unapplied parent: 26e928952980fc97b34e79e513756f0a2eab9872

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/xenial-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: aa6cc0020a7a5a4cd2fff10c9387ccefcfc0ebb6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/xenial-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: cc3526a32a94854cdae63adbab7e9524932019c9
Unapplied parent: b9f4f78b9793c4836a47dd21ea21d231b4be337c

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/xenial-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: cc3526a32a94854cdae63adbab7e9524932019c9
Unapplied parent: b9f4f78b9793c4836a47dd21ea21d231b4be337c

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/bionic-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 6b4b48ac61c3cd2c7b468710bc1f09b782f64246

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/xenial-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-applied version 5.22.1-9ubuntu0.6 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: cc3526a32a94854cdae63adbab7e9524932019c9
Unapplied parent: b9f4f78b9793c4836a47dd21ea21d231b4be337c

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/xenial-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2018-11-19 18:29:35 UTC

Import patches-unapplied version 5.22.1-9ubuntu0.6 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: aa6cc0020a7a5a4cd2fff10c9387ccefcfc0ebb6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/cosmic-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 02a910773961b673bc1b5d605a5debd5f4c60722

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/bionic-updates 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:54:44 UTC

Import patches-unapplied version 5.26.1-6ubuntu0.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 6b4b48ac61c3cd2c7b468710bc1f09b782f64246

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

ubuntu/cosmic-devel 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2018-11-19 15:05:42 UTC

Import patches-unapplied version 5.26.2-7ubuntu0.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 02a910773961b673bc1b5d605a5debd5f4c60722

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow write / reg_node overrun
    - debian/patches/fixes/CVE-2018-18312.patch: fix logic in regcomp.c.
    - CVE-2018-18312
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313
  * SECURITY UPDATE: Heap-based buffer overflow
    - debian/patches/fixes/CVE-2018-18314.patch: fix extended charclass in
      pod/perldiag.pod, pod/perlrecharclass.pod, regcomp.c,
      t/lib/warnings/regcomp, t/re/reg_mesg.t, t/re/regex_sets.t.
    - CVE-2018-18314

applied/ubuntu/trusty-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-sec...

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-applied version 5.18.2-2ubuntu1.7 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 0e6b07f5f269c95dbb4cec0091f04b3731529786
Unapplied parent: ef0203b94d6b89512e8480201997ac0690b76ed8

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

ubuntu/trusty-security 2018-12-03 17:28:18 UTC 2018-12-03
Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Author: Marc Deslauriers
Author Date: 2018-11-20 14:27:15 UTC

Import patches-unapplied version 5.18.2-2ubuntu1.7 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e365e43ec0b0fc5738a91ccfe9ff45d493afb4d6

New changelog entries:
  * SECURITY UPDATE: Integer overflow leading to buffer overflow
    - debian/patches/fixes/CVE-2018-18311.patch: handle integer wrap in
      util.c.
    - CVE-2018-18311
  * SECURITY UPDATE: Heap-buffer-overflow read
    - debian/patches/fixes/CVE-2018-18313.patch: convert some strchr to
      memchr in regcomp.c.
    - CVE-2018-18313

ubuntu/cosmic 2018-08-12 16:41:55 UTC 2018-08-12
Import patches-unapplied version 5.26.2-7 to debian/sid

Author: Niko Tyni
Author Date: 2018-08-12 08:26:41 UTC

Import patches-unapplied version 5.26.2-7 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 9a2a5b6298f300a3e0724a1280775eaaf2833bf9

New changelog entries:
  * Temporarily skip GDBM_File fatal.t for gdbm >= 1.15 compatibility.
    (Closes: #904005)

ubuntu/cosmic-proposed 2018-08-12 16:41:55 UTC 2018-08-12
Import patches-unapplied version 5.26.2-7 to debian/sid

Author: Niko Tyni
Author Date: 2018-08-12 08:26:41 UTC

Import patches-unapplied version 5.26.2-7 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 9a2a5b6298f300a3e0724a1280775eaaf2833bf9

New changelog entries:
  * Temporarily skip GDBM_File fatal.t for gdbm >= 1.15 compatibility.
    (Closes: #904005)

applied/ubuntu/cosmic-proposed 2018-08-12 16:41:55 UTC 2018-08-12
Import patches-applied version 5.26.2-7 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-08-12 08:26:41 UTC

Import patches-applied version 5.26.2-7 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: d7cca1057e3e0bf5147c02c208b2ed07da1ba951
Unapplied parent: 8e3d5e77e469d0ecda17dbd00f1162fa2b2aaaa0

New changelog entries:
  * Temporarily skip GDBM_File fatal.t for gdbm >= 1.15 compatibility.
    (Closes: #904005)

applied/ubuntu/cosmic 2018-08-12 16:41:55 UTC 2018-08-12
Import patches-applied version 5.26.2-7 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-08-12 08:26:41 UTC

Import patches-applied version 5.26.2-7 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: d7cca1057e3e0bf5147c02c208b2ed07da1ba951
Unapplied parent: 8e3d5e77e469d0ecda17dbd00f1162fa2b2aaaa0

New changelog entries:
  * Temporarily skip GDBM_File fatal.t for gdbm >= 1.15 compatibility.
    (Closes: #904005)

applied/ubuntu/bionic-proposed 2018-07-19 09:23:58 UTC 2018-07-19
Import patches-applied version 5.26.1-6ubuntu0.2 to applied/ubuntu/bionic-pro...

Author: Balint Reczey
Author Date: 2018-07-18 14:21:03 UTC

Import patches-applied version 5.26.1-6ubuntu0.2 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 9eacf41f112fd180fef7cbaef18a6a83a61923cb
Unapplied parent: 56714f13489d9890effc4d97deff236a75f1c64c

New changelog entries:
  * No change rebuild to fix LP: #1574351

ubuntu/bionic-proposed 2018-07-19 09:23:58 UTC 2018-07-19
Import patches-unapplied version 5.26.1-6ubuntu0.2 to ubuntu/bionic-proposed

Author: Balint Reczey
Author Date: 2018-07-18 14:21:03 UTC

Import patches-unapplied version 5.26.1-6ubuntu0.2 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 24a2e13f360a1518e70afdfda6f21432f7b9e943

New changelog entries:
  * No change rebuild to fix LP: #1574351

debian/experimental 2018-07-16 22:26:58 UTC 2018-07-16
Import patches-unapplied version 5.28.0-2 to debian/experimental

Author: Niko Tyni
Author Date: 2018-07-16 08:22:42 UTC

Import patches-unapplied version 5.28.0-2 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 438133cb01fcdadd01e02dbccee438f20cc6974f

New changelog entries:
  * Amend debian/deprecate-with-apt.diff to for other Locale-Codes modules.
    (Closes: #903705)
  * Add upstream patch fixing file descriptor exhaustion with in-place edits.
    (Closes: #902925)
  * Patch away debugperl stack extension checks.
    (Closes: #902779)
  * Break older versions of libfilter-perl due to bundled Filter::Util::Call.
    (Closes: #884401)
  * Update some outdated links and information in debian/copyright.
  * Update cross build support files.

applied/debian/experimental 2018-07-16 22:26:58 UTC 2018-07-16
Import patches-applied version 5.28.0-2 to applied/debian/experimental

Author: Niko Tyni
Author Date: 2018-07-16 08:22:42 UTC

Import patches-applied version 5.28.0-2 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: d649775c76498fbcfb0c35622cb5d0bada7c778a
Unapplied parent: 11f03b8c19d6837d52488920d585a124f657e294

New changelog entries:
  * Amend debian/deprecate-with-apt.diff to for other Locale-Codes modules.
    (Closes: #903705)
  * Add upstream patch fixing file descriptor exhaustion with in-place edits.
    (Closes: #902925)
  * Patch away debugperl stack extension checks.
    (Closes: #902779)
  * Break older versions of libfilter-perl due to bundled Filter::Util::Call.
    (Closes: #884401)
  * Update some outdated links and information in debian/copyright.
  * Update cross build support files.

applied/debian/stretch 2018-07-14 11:06:01 UTC 2018-07-14
Import patches-applied version 5.24.1-3+deb9u4 to applied/debian/stretch

Author: Dominic Hargreaves
Author Date: 2018-06-10 17:37:28 UTC

Import patches-applied version 5.24.1-3+deb9u4 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: f334888e0234b441fe7eea04aa9ff1bda58f0324
Unapplied parent: 09137432da94502ad8c3bfa71163b5c57219fecf

New changelog entries:
  * [SECURITY] CVE-2018-12015: fix directory traversal vulnerability
    in Archive-Tar (Closes: #900834)
  * [SECURITY] CVE-2018-6797: buffer overflow related to regex
                              unicode semantics.
  * [SECURITY] CVE-2018-6798: heap buffer overflow when matching
                              malformed UTF-8 characters.
  * [SECURITY] CVE-2018-6913: heap buffer overflow with large data blocks.

debian/stretch 2018-07-14 11:06:01 UTC 2018-07-14
Import patches-unapplied version 5.24.1-3+deb9u4 to debian/stretch

Author: Dominic Hargreaves
Author Date: 2018-06-10 17:37:28 UTC

Import patches-unapplied version 5.24.1-3+deb9u4 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: 38319e9d330e348157db7c7f9798f46df91d7017

New changelog entries:
  * [SECURITY] CVE-2018-12015: fix directory traversal vulnerability
    in Archive-Tar (Closes: #900834)
  * [SECURITY] CVE-2018-6797: buffer overflow related to regex
                              unicode semantics.
  * [SECURITY] CVE-2018-6798: heap buffer overflow when matching
                              malformed UTF-8 characters.
  * [SECURITY] CVE-2018-6913: heap buffer overflow with large data blocks.

debian/jessie 2018-06-23 17:25:19 UTC 2018-06-23
Import patches-unapplied version 5.20.2-3+deb8u11 to debian/jessie

Author: Dominic Hargreaves
Author Date: 2018-06-10 17:40:37 UTC

Import patches-unapplied version 5.20.2-3+deb8u11 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: e5dd886c223e559610eab7424a5543721a3cd49e

New changelog entries:
  * [SECURITY] CVE-2018-12015: fix directory traversal vulnerability
    in Archive-Tar (Closes: #900834)
  * [SECURITY] CVE-2018-6913: heap buffer overflow with large data blocks.

applied/debian/jessie 2018-06-23 17:25:19 UTC 2018-06-23
Import patches-applied version 5.20.2-3+deb8u11 to applied/debian/jessie

Author: Dominic Hargreaves
Author Date: 2018-06-10 17:40:37 UTC

Import patches-applied version 5.20.2-3+deb8u11 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: b76e0269419d142e57fb8dc1276dc7698ca131ce
Unapplied parent: 3b222b652f431c7fcc4dbe1f77be504bc137e354

New changelog entries:
  * [SECURITY] CVE-2018-12015: fix directory traversal vulnerability
    in Archive-Tar (Closes: #900834)
  * [SECURITY] CVE-2018-6913: heap buffer overflow with large data blocks.

ubuntu/artful-security 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: b5a9c7fd38530f622773b771c45c62696ad1e917

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

applied/ubuntu/artful-updates 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-sec...

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: f4f6feda05f41428303625df263d9e7c7b9b25a5
Unapplied parent: 018c02108eb913a908e1a7b7642dd2341b327c63

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

applied/ubuntu/artful-security 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-sec...

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: f4f6feda05f41428303625df263d9e7c7b9b25a5
Unapplied parent: 018c02108eb913a908e1a7b7642dd2341b327c63

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

applied/ubuntu/artful-devel 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-sec...

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-applied version 5.26.0-8ubuntu1.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: f4f6feda05f41428303625df263d9e7c7b9b25a5
Unapplied parent: 018c02108eb913a908e1a7b7642dd2341b327c63

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

ubuntu/artful-updates 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: b5a9c7fd38530f622773b771c45c62696ad1e917

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

ubuntu/artful-devel 2018-06-13 16:23:15 UTC 2018-06-13
Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-06-12 19:28:18 UTC

Import patches-unapplied version 5.26.0-8ubuntu1.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: b5a9c7fd38530f622773b771c45c62696ad1e917

New changelog entries:
  * SECURITY UPDATE: Directory traversal vulnerability
    - debian/patches/fixes/CVE-2018-12015.patch: fix ing
      cpan/Archive-Tar/lib/Archive/Tar.pm.
    - CVE-2018-12015

applied/ubuntu/bionic 2018-04-14 22:38:59 UTC 2018-04-14
Import patches-applied version 5.26.1-6 to applied/debian/sid

Author: Niko Tyni
Author Date: 2018-03-10 18:40:42 UTC

Import patches-applied version 5.26.1-6 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: f88933522db328034668938a7dffba07b945a6e9
Unapplied parent: 5b3a466eca41765f1ddc3430e91cdd212563e2de

New changelog entries:
  * [SECURITY] CVE-2018-6797: buffer overflow related to regex
                              unicode semantics.
  * [SECURITY] CVE-2018-6798: heap buffer overflow when matching
                              malformed UTF-8 characters.
  * [SECURITY] CVE-2018-6913: heap buffer overflow with large data blocks.

ubuntu/bionic 2018-04-14 22:38:59 UTC 2018-04-14
Import patches-unapplied version 5.26.1-6 to debian/sid

Author: Niko Tyni
Author Date: 2018-03-10 18:40:42 UTC

Import patches-unapplied version 5.26.1-6 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6a21acdb86b40cf9fae41095a5e09d3f06aa8901

New changelog entries:
  * [SECURITY] CVE-2018-6797: buffer overflow related to regex
                              unicode semantics.
  * [SECURITY] CVE-2018-6798: heap buffer overflow when matching
                              malformed UTF-8 characters.
  * [SECURITY] CVE-2018-6913: heap buffer overflow with large data blocks.

importer/ubuntu/pristine-tar 2018-03-06 16:10:32 UTC 2018-03-06
pristine-tar data for perl_5.26.0.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-06 16:10:32 UTC

pristine-tar data for perl_5.26.0.orig.tar.xz

importer/debian/pristine-tar 2018-03-06 13:56:08 UTC 2018-03-06
pristine-tar data for perl_5.26.0.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-06 13:56:08 UTC

pristine-tar data for perl_5.26.0.orig.tar.xz

applied/ubuntu/zesty-updates 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-secu...

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: df6187b7110bfcc5a75480ea17534995397b89c2
Unapplied parent: 829eec069933c1580b4a8b746d12d7af7c9b7065

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

applied/ubuntu/zesty-devel 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-secu...

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: df6187b7110bfcc5a75480ea17534995397b89c2
Unapplied parent: 829eec069933c1580b4a8b746d12d7af7c9b7065

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

applied/ubuntu/zesty-security 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-secu...

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-applied version 5.24.1-2ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: df6187b7110bfcc5a75480ea17534995397b89c2
Unapplied parent: 829eec069933c1580b4a8b746d12d7af7c9b7065

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

ubuntu/zesty-updates 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 89fdb8419286732d08a7d8a120a74732b0a51f8f

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

ubuntu/zesty-devel 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 89fdb8419286732d08a7d8a120a74732b0a51f8f

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

ubuntu/zesty-security 2017-11-13 13:28:31 UTC 2017-11-13
Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-11-10 14:07:03 UTC

Import patches-unapplied version 5.24.1-2ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 89fdb8419286732d08a7d8a120a74732b0a51f8f

New changelog entries:
  * SECURITY UPDATE: Buffer overflow via crafted regular expressiion
    - debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
      with invalid '\N{U+...}' escape in regcomp.c
    - CVE-2017-12883
  * SECURITY UPDATE: heap-based buffer overflow in S_regatom
    - debian/patches/fixes/CVE-2017-12837.patch: fix issue in regcomp.c
    - CVE-2017-12837

ubuntu/artful-proposed 2017-09-15 16:33:30 UTC 2017-09-15
Import patches-unapplied version 5.26.0-8ubuntu1 to ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-09-15 16:13:42 UTC

Import patches-unapplied version 5.26.0-8ubuntu1 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 10f0230bb890a1851d3f1ab266806a758ab4f81a

New changelog entries:
  * Build-depend on libc6-dev (>= 2.26).
  * Restore the SIGUNUSED signal. LP: #1717367.
  * Changes can be dropped with the next perl ABI bump, or with a perl
    upstream fix to restore ABI compatibility with glibc-2.26.

applied/ubuntu/artful-proposed 2017-09-15 16:33:30 UTC 2017-09-15
Import patches-applied version 5.26.0-8ubuntu1 to applied/ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-09-15 16:13:42 UTC

Import patches-applied version 5.26.0-8ubuntu1 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: e1078ce77c6823f2560bc74098186e6c7d620aed
Unapplied parent: 057d0395fdfc52a32c1b0dbe6151570156278ec0

New changelog entries:
  * Build-depend on libc6-dev (>= 2.26).
  * Restore the SIGUNUSED signal. LP: #1717367.
  * Changes can be dropped with the next perl ABI bump, or with a perl
    upstream fix to restore ABI compatibility with glibc-2.26.

ubuntu/artful 2017-09-15 16:33:30 UTC 2017-09-15
Import patches-unapplied version 5.26.0-8ubuntu1 to ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-09-15 16:13:42 UTC

Import patches-unapplied version 5.26.0-8ubuntu1 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 10f0230bb890a1851d3f1ab266806a758ab4f81a

New changelog entries:
  * Build-depend on libc6-dev (>= 2.26).
  * Restore the SIGUNUSED signal. LP: #1717367.
  * Changes can be dropped with the next perl ABI bump, or with a perl
    upstream fix to restore ABI compatibility with glibc-2.26.

applied/ubuntu/artful 2017-09-15 16:33:30 UTC 2017-09-15
Import patches-applied version 5.26.0-8ubuntu1 to applied/ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-09-15 16:13:42 UTC

Import patches-applied version 5.26.0-8ubuntu1 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: e1078ce77c6823f2560bc74098186e6c7d620aed
Unapplied parent: 057d0395fdfc52a32c1b0dbe6151570156278ec0

New changelog entries:
  * Build-depend on libc6-dev (>= 2.26).
  * Restore the SIGUNUSED signal. LP: #1717367.
  * Changes can be dropped with the next perl ABI bump, or with a perl
    upstream fix to restore ABI compatibility with glibc-2.26.

applied/ubuntu/zesty-proposed 2017-03-18 19:03:31 UTC 2017-03-18
Import patches-applied version 5.24.1-2ubuntu1 to applied/ubuntu/zesty-proposed

Author: Gianfranco Costamagna
Author Date: 2017-03-18 17:00:39 UTC

Import patches-applied version 5.24.1-2ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 7f40aa84110aebab6558b22a5fa51cd0bdada2a3
Unapplied parent: 3cdb4eca7a73aec3599f4812416a41c245fd18e6

New changelog entries:
  * d/p/f/Compress-Raw-Zlib-2.071-Adapt-tests-to-zlib-1.2.11.patch,
    d/p/f/0001-Adapt-tests-to-zlib-1.2.11.patch:
    - backport upstream patch to fix t/02zlib.t because of new zlib

ubuntu/zesty 2017-03-18 19:03:31 UTC 2017-03-18
Import patches-unapplied version 5.24.1-2ubuntu1 to ubuntu/zesty-proposed

Author: Gianfranco Costamagna
Author Date: 2017-03-18 17:00:39 UTC

Import patches-unapplied version 5.24.1-2ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: ffc23e5fe69c30cbfe010fefe3c979ecc0d318d8

New changelog entries:
  * d/p/f/Compress-Raw-Zlib-2.071-Adapt-tests-to-zlib-1.2.11.patch,
    d/p/f/0001-Adapt-tests-to-zlib-1.2.11.patch:
    - backport upstream patch to fix t/02zlib.t because of new zlib

ubuntu/zesty-proposed 2017-03-18 19:03:31 UTC 2017-03-18
Import patches-unapplied version 5.24.1-2ubuntu1 to ubuntu/zesty-proposed

Author: Gianfranco Costamagna
Author Date: 2017-03-18 17:00:39 UTC

Import patches-unapplied version 5.24.1-2ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: ffc23e5fe69c30cbfe010fefe3c979ecc0d318d8

New changelog entries:
  * d/p/f/Compress-Raw-Zlib-2.071-Adapt-tests-to-zlib-1.2.11.patch,
    d/p/f/0001-Adapt-tests-to-zlib-1.2.11.patch:
    - backport upstream patch to fix t/02zlib.t because of new zlib

applied/ubuntu/zesty 2017-03-18 19:03:31 UTC 2017-03-18
Import patches-applied version 5.24.1-2ubuntu1 to applied/ubuntu/zesty-proposed

Author: Gianfranco Costamagna
Author Date: 2017-03-18 17:00:39 UTC

Import patches-applied version 5.24.1-2ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 7f40aa84110aebab6558b22a5fa51cd0bdada2a3
Unapplied parent: 3cdb4eca7a73aec3599f4812416a41c245fd18e6

New changelog entries:
  * d/p/f/Compress-Raw-Zlib-2.071-Adapt-tests-to-zlib-1.2.11.patch,
    d/p/f/0001-Adapt-tests-to-zlib-1.2.11.patch:
    - backport upstream patch to fix t/02zlib.t because of new zlib

applied/ubuntu/yakkety 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-applied version 5.22.2-3 to applied/debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-applied version 5.22.2-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: a3bea2dfe83252f0cae7a9fd5ff0cb656f4de8d4
Unapplied parent: 76b0cbf4b872b4f3f6ee5d837bcc5fc5c3896364

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

ubuntu/yakkety-devel 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-unapplied version 5.22.2-3 to debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-unapplied version 5.22.2-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: dd6306b7b2161ebcee63bb25dbf3110bb960d5e0

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

ubuntu/yakkety-proposed 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-unapplied version 5.22.2-3 to debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-unapplied version 5.22.2-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: dd6306b7b2161ebcee63bb25dbf3110bb960d5e0

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

applied/ubuntu/yakkety-devel 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-applied version 5.22.2-3 to applied/debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-applied version 5.22.2-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: a3bea2dfe83252f0cae7a9fd5ff0cb656f4de8d4
Unapplied parent: 76b0cbf4b872b4f3f6ee5d837bcc5fc5c3896364

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

applied/ubuntu/yakkety-proposed 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-applied version 5.22.2-3 to applied/debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-applied version 5.22.2-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: a3bea2dfe83252f0cae7a9fd5ff0cb656f4de8d4
Unapplied parent: 76b0cbf4b872b4f3f6ee5d837bcc5fc5c3896364

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

ubuntu/yakkety 2016-07-26 04:19:32 UTC 2016-07-26
Import patches-unapplied version 5.22.2-3 to debian/sid

Author: Dominic Hargreaves
Author Date: 2016-07-25 15:00:43 UTC

Import patches-unapplied version 5.22.2-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: dd6306b7b2161ebcee63bb25dbf3110bb960d5e0

New changelog entries:
  * [SECURITY] CVE-2016-1238: opportunistic loading of optional
    modules can make many programs unintentionally load code
    from the current working directory (which might be changed to
    another directory without the user realising).
    + allow user configurable removal of "." from @INC in
      /etc/perl/sitecustomize.pl for a transitional period. (See: #588017)
    + backport patches from [perl #127834] to fix known vulnerabilities
      even if the user does not configure "." to be removed from @INC
    + backport patches from [perl #127810] to fix various classes of
      build failures in perl and CPAN modules if "." is removed from
      @INC

debian/wheezy 2016-04-02 23:40:07 UTC 2016-04-02
Import patches-unapplied version 5.14.2-21+deb7u3 to debian/wheezy

Author: Dominic Hargreaves
Author Date: 2016-02-26 23:20:43 UTC

Import patches-unapplied version 5.14.2-21+deb7u3 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: d54be0b185dba644cd33510f93c00ee9345293a6

New changelog entries:
  * Work around a t/op/stat.t failure on GNU/kFreeBSD, possibly related
    to softupdates. Fix by Steven Chamberlain. (Closes: #796798)
  * [SECURITY] CVE-2016-2381 fix duplicate environment variable taint
    checking issue

applied/debian/wheezy 2016-04-02 23:40:07 UTC 2016-04-02
Import patches-applied version 5.14.2-21+deb7u3 to applied/debian/wheezy

Author: Dominic Hargreaves
Author Date: 2016-02-26 23:20:43 UTC

Import patches-applied version 5.14.2-21+deb7u3 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 10ab5c6dd9d5fdad1e7095e9731e9e923f74fbc5
Unapplied parent: 3208b62d6241e5678568a06b4c7ca490e8798a0b

New changelog entries:
  * Work around a t/op/stat.t failure on GNU/kFreeBSD, possibly related
    to softupdates. Fix by Steven Chamberlain. (Closes: #796798)
  * [SECURITY] CVE-2016-2381 fix duplicate environment variable taint
    checking issue

ubuntu/xenial-proposed 2016-03-13 22:20:48 UTC 2016-03-13
Import patches-unapplied version 5.22.1-9 to debian/sid

Author: Niko Tyni
Author Date: 2016-03-13 11:54:18 UTC

Import patches-unapplied version 5.22.1-9 to debian/sid

Imported using git-ubuntu import.

Changelog parent: b03e3abcdb69cf905cb357c1c09e8e44fb23175e

New changelog entries:
  * Add cross build support files for alpha, hppa, sparc64, x32, mips,
    and hurd-i386. (Closes: #816217)
  * Use the standard library from the build tree, fixing non-cross
    bootstrapping. (Closes: #817948)

applied/ubuntu/xenial-proposed 2016-03-13 22:20:48 UTC 2016-03-13
Import patches-applied version 5.22.1-9 to applied/debian/sid

Author: Niko Tyni
Author Date: 2016-03-13 11:54:18 UTC

Import patches-applied version 5.22.1-9 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ab8033045773480de5ed9579f3a2000c8e83a51b
Unapplied parent: 00d307ee04d51ca37a4779a94c9b63f80b8e32f0

New changelog entries:
  * Add cross build support files for alpha, hppa, sparc64, x32, mips,
    and hurd-i386. (Closes: #816217)
  * Use the standard library from the build tree, fixing non-cross
    bootstrapping. (Closes: #817948)

ubuntu/xenial 2016-03-13 22:20:48 UTC 2016-03-13
Import patches-unapplied version 5.22.1-9 to debian/sid

Author: Niko Tyni
Author Date: 2016-03-13 11:54:18 UTC

Import patches-unapplied version 5.22.1-9 to debian/sid

Imported using git-ubuntu import.

Changelog parent: b03e3abcdb69cf905cb357c1c09e8e44fb23175e

New changelog entries:
  * Add cross build support files for alpha, hppa, sparc64, x32, mips,
    and hurd-i386. (Closes: #816217)
  * Use the standard library from the build tree, fixing non-cross
    bootstrapping. (Closes: #817948)

applied/ubuntu/xenial 2016-03-13 22:20:48 UTC 2016-03-13
Import patches-applied version 5.22.1-9 to applied/debian/sid

Author: Niko Tyni
Author Date: 2016-03-13 11:54:18 UTC

Import patches-applied version 5.22.1-9 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ab8033045773480de5ed9579f3a2000c8e83a51b
Unapplied parent: 00d307ee04d51ca37a4779a94c9b63f80b8e32f0

New changelog entries:
  * Add cross build support files for alpha, hppa, sparc64, x32, mips,
    and hurd-i386. (Closes: #816217)
  * Use the standard library from the build tree, fixing non-cross
    bootstrapping. (Closes: #817948)

ubuntu/wily-devel 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 92c5042b4a8834486b8a543c1b4c145cafcd6f85

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

ubuntu/wily-updates 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 92c5042b4a8834486b8a543c1b4c145cafcd6f85

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

ubuntu/precise-security 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: f8672394dc1f63dc248a4e69a7d5b11509c799aa

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

ubuntu/wily-security 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-unapplied version 5.20.2-6ubuntu0.2 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 92c5042b4a8834486b8a543c1b4c145cafcd6f85

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/wily-devel 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 1a11a1f3977a27fb82abba06f7310370b1e85489
Unapplied parent: 2f8b5e7c454ecb18f243f4a80fdf66160a184f15

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/precise-updates 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-se...

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b4d31911db12e3cecbf018d2be1d1665a5785d35
Unapplied parent: 189df01463865e4a760ddb7536853d336af0cbf1

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/precise-security 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-se...

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b4d31911db12e3cecbf018d2be1d1665a5785d35
Unapplied parent: 189df01463865e4a760ddb7536853d336af0cbf1

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/precise-devel 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-se...

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-applied version 5.14.2-6ubuntu2.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: b4d31911db12e3cecbf018d2be1d1665a5785d35
Unapplied parent: 189df01463865e4a760ddb7536853d336af0cbf1

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/wily-security 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 1a11a1f3977a27fb82abba06f7310370b1e85489
Unapplied parent: 2f8b5e7c454ecb18f243f4a80fdf66160a184f15

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/wily-updates 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-03-01 13:48:24 UTC

Import patches-applied version 5.20.2-6ubuntu0.2 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 1a11a1f3977a27fb82abba06f7310370b1e85489
Unapplied parent: 2f8b5e7c454ecb18f243f4a80fdf66160a184f15

New changelog entries:
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/fixes/CVE-2016-2381.patch: remove duplicate
      environment variables from environ in perl.c.
    - CVE-2016-2381

ubuntu/precise-devel 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: f8672394dc1f63dc248a4e69a7d5b11509c799aa

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

ubuntu/precise-updates 2016-03-02 13:34:03 UTC 2016-03-02
Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-03-01 16:02:10 UTC

Import patches-unapplied version 5.14.2-6ubuntu2.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: f8672394dc1f63dc248a4e69a7d5b11509c799aa

New changelog entries:
  * SECURITY UPDATE: denial of service via regular expression invalid
    backreference
    - debian/patches/CVE-2013-7422.patch: properly handle big
      backreferences in regcomp.c.
    - CVE-2013-7422
  * SECURITY UPDATE: denial of service in Data::Dumper
    - debian/patches/CVE-2014-4330.patch: limit recursion in MANIFEST,
      dist/Data-Dumper/Dumper.pm, dist/Data-Dumper/Dumper.xs,
      dist/Data-Dumper/t/recurse.t.
    - CVE-2014-4330
  * SECURITY UPDATE: environment variable confusion issue
    - debian/patches/CVE-2016-2381.patch: remove duplicate environment
      variables from environ in perl.c.
    - CVE-2016-2381

applied/ubuntu/vivid-devel 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 5.20.2-2ubuntu0.1 to applied/ubuntu/vivid-secu...

Author: Marc Deslauriers
Author Date: 2016-01-20 14:08:09 UTC

Import patches-applied version 5.20.2-2ubuntu0.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 8380769308aeb13f8a85f7cfa20682dba7d01153
Unapplied parent: 12e7c84e28ac4d38e5d609a87257fb793667a27a

New changelog entries:
  * SECURITY UPDATE: canonpath function doesn't preserve taint
    - debian/patches/fixes/CVE-2015-8607_file_spec_taint_fix.diff: ensure
      File::Spec::canonpath() preserves taint in dist/PathTools/Cwd.xs,
      added tests to dist/PathTools/t/taint.t.
    - CVE-2015-8607

applied/ubuntu/vivid-updates 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 5.20.2-2ubuntu0.1 to applied/ubuntu/vivid-secu...

Author: Marc Deslauriers
Author Date: 2016-01-20 14:08:09 UTC

Import patches-applied version 5.20.2-2ubuntu0.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 8380769308aeb13f8a85f7cfa20682dba7d01153
Unapplied parent: 12e7c84e28ac4d38e5d609a87257fb793667a27a

New changelog entries:
  * SECURITY UPDATE: canonpath function doesn't preserve taint
    - debian/patches/fixes/CVE-2015-8607_file_spec_taint_fix.diff: ensure
      File::Spec::canonpath() preserves taint in dist/PathTools/Cwd.xs,
      added tests to dist/PathTools/t/taint.t.
    - CVE-2015-8607

1100 of 260 results

Other repositories

Name Last Modified
lp:ubuntu/+source/perl 2018-12-16
11 of 1 result
You can't create new repositories for perl in Ubuntu.