View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/valgrind
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2019-08-01 15:38:34 UTC 2019-08-01
DSC file for 1:3.15.0-1ubuntu2

Author: Ubuntu Git Importer
Author Date: 2019-08-01 15:38:34 UTC

DSC file for 1:3.15.0-1ubuntu2

ubuntu/eoan-devel 2019-08-01 15:28:13 UTC 2019-08-01
Import patches-unapplied version 1:3.15.0-1ubuntu2 to ubuntu/eoan-proposed

Author: Steve Langasek
Author Date: 2019-08-01 15:22:37 UTC

Import patches-unapplied version 1:3.15.0-1ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 1f272e882c023139cb1605a2f0d1d455af8ae099

New changelog entries:
  * debian/patches/armv7-illegal-opcode.patch: fix a crash due to an
    unhandled thumb instruction on armhf. Closes LP: #1837068.

ubuntu/eoan-proposed 2019-08-01 15:28:13 UTC 2019-08-01
Import patches-unapplied version 1:3.15.0-1ubuntu2 to ubuntu/eoan-proposed

Author: Steve Langasek
Author Date: 2019-08-01 15:22:37 UTC

Import patches-unapplied version 1:3.15.0-1ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 1f272e882c023139cb1605a2f0d1d455af8ae099

New changelog entries:
  * debian/patches/armv7-illegal-opcode.patch: fix a crash due to an
    unhandled thumb instruction on armhf. Closes LP: #1837068.

applied/ubuntu/eoan 2019-08-01 15:28:13 UTC 2019-08-01
Import patches-applied version 1:3.15.0-1ubuntu2 to applied/ubuntu/eoan-proposed

Author: Steve Langasek
Author Date: 2019-08-01 15:22:37 UTC

Import patches-applied version 1:3.15.0-1ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 61948e64ff1a4401bc10166eb34472fd718f7f53
Unapplied parent: d343e290d68adbf93a919a06c1e61e1e9756acb4

New changelog entries:
  * debian/patches/armv7-illegal-opcode.patch: fix a crash due to an
    unhandled thumb instruction on armhf. Closes LP: #1837068.

applied/ubuntu/eoan-proposed 2019-08-01 15:28:13 UTC 2019-08-01
Import patches-applied version 1:3.15.0-1ubuntu2 to applied/ubuntu/eoan-proposed

Author: Steve Langasek
Author Date: 2019-08-01 15:22:37 UTC

Import patches-applied version 1:3.15.0-1ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 61948e64ff1a4401bc10166eb34472fd718f7f53
Unapplied parent: d343e290d68adbf93a919a06c1e61e1e9756acb4

New changelog entries:
  * debian/patches/armv7-illegal-opcode.patch: fix a crash due to an
    unhandled thumb instruction on armhf. Closes LP: #1837068.

applied/ubuntu/eoan-devel 2019-08-01 15:28:13 UTC 2019-08-01
Import patches-applied version 1:3.15.0-1ubuntu2 to applied/ubuntu/eoan-proposed

Author: Steve Langasek
Author Date: 2019-08-01 15:22:37 UTC

Import patches-applied version 1:3.15.0-1ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 61948e64ff1a4401bc10166eb34472fd718f7f53
Unapplied parent: d343e290d68adbf93a919a06c1e61e1e9756acb4

New changelog entries:
  * debian/patches/armv7-illegal-opcode.patch: fix a crash due to an
    unhandled thumb instruction on armhf. Closes LP: #1837068.

applied/ubuntu/devel 2019-08-01 15:28:13 UTC 2019-08-01
Import patches-applied version 1:3.15.0-1ubuntu2 to applied/ubuntu/eoan-proposed

Author: Steve Langasek
Author Date: 2019-08-01 15:22:37 UTC

Import patches-applied version 1:3.15.0-1ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 61948e64ff1a4401bc10166eb34472fd718f7f53
Unapplied parent: d343e290d68adbf93a919a06c1e61e1e9756acb4

New changelog entries:
  * debian/patches/armv7-illegal-opcode.patch: fix a crash due to an
    unhandled thumb instruction on armhf. Closes LP: #1837068.

ubuntu/eoan 2019-08-01 15:28:13 UTC 2019-08-01
Import patches-unapplied version 1:3.15.0-1ubuntu2 to ubuntu/eoan-proposed

Author: Steve Langasek
Author Date: 2019-08-01 15:22:37 UTC

Import patches-unapplied version 1:3.15.0-1ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 1f272e882c023139cb1605a2f0d1d455af8ae099

New changelog entries:
  * debian/patches/armv7-illegal-opcode.patch: fix a crash due to an
    unhandled thumb instruction on armhf. Closes LP: #1837068.

ubuntu/devel 2019-08-01 15:28:13 UTC 2019-08-01
Import patches-unapplied version 1:3.15.0-1ubuntu2 to ubuntu/eoan-proposed

Author: Steve Langasek
Author Date: 2019-08-01 15:22:37 UTC

Import patches-unapplied version 1:3.15.0-1ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 1f272e882c023139cb1605a2f0d1d455af8ae099

New changelog entries:
  * debian/patches/armv7-illegal-opcode.patch: fix a crash due to an
    unhandled thumb instruction on armhf. Closes LP: #1837068.

importer/debian/dsc 2019-07-17 09:06:42 UTC 2019-07-17
DSC file for 1:3.15.0-1

Author: Ubuntu Git Importer
Author Date: 2019-07-17 09:06:42 UTC

DSC file for 1:3.15.0-1

applied/debian/sid 2019-07-14 16:46:28 UTC 2019-07-14
Import patches-applied version 1:3.15.0-1 to applied/debian/sid

Author: Alessandro Ghedini
Author Date: 2019-07-14 10:23:29 UTC

Import patches-applied version 1:3.15.0-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 9e89b989dd4c60b1993e6ee0da581fa478e21924
Unapplied parent: f140a3c255ddda10a5c3342259e960b61b704be1

New changelog entries:
  * New upstream release
  * Refresh patches
  * Bump STandards-Version to 4.4.0 (no changes needed)
  * Add additional suppressions for helgrind+drd false positives with glibc 2.28.
    Thanks to Adam Borowski for the patch (Closes: #931315)
  * Fix handling of cache flush instructions on arm64.
    Thanks to Adam Borowski for the patch (Closes: #930708)
  * Remove trailing empty line in changelog
  * Update moved paths in copyright
  * Update 08_fix-spelling-in-manpage.patch
  * Update lintian overrides for dhat
  * Update moved paths in copyright
  * Update 08_fix-spelling-in-manpage.patch
  * Update lintian overrides for dhat

debian/sid 2019-07-14 16:46:28 UTC 2019-07-14
Import patches-unapplied version 1:3.15.0-1 to debian/sid

Author: Alessandro Ghedini
Author Date: 2019-07-14 10:23:29 UTC

Import patches-unapplied version 1:3.15.0-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: fb32345fec2ec78e1ff17849bbfac3258e232324

New changelog entries:
  * New upstream release
  * Refresh patches
  * Bump STandards-Version to 4.4.0 (no changes needed)
  * Add additional suppressions for helgrind+drd false positives with glibc 2.28.
    Thanks to Adam Borowski for the patch (Closes: #931315)
  * Fix handling of cache flush instructions on arm64.
    Thanks to Adam Borowski for the patch (Closes: #930708)
  * Remove trailing empty line in changelog
  * Update moved paths in copyright
  * Update 08_fix-spelling-in-manpage.patch
  * Update lintian overrides for dhat
  * Update moved paths in copyright
  * Update 08_fix-spelling-in-manpage.patch
  * Update lintian overrides for dhat

ubuntu/disco-proposed 2019-02-24 14:03:12 UTC 2019-02-24
Import patches-unapplied version 1:3.14.0-2ubuntu6 to ubuntu/disco-proposed

Author: Steve Langasek
Author Date: 2019-02-24 05:52:20 UTC

Import patches-unapplied version 1:3.14.0-2ubuntu6 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 1f73c75b725a4e068ba8e2394e5e02cf481ad1ab

New changelog entries:
  * No-change rebuild against glibc 2.29 to update suppressions.

applied/ubuntu/disco 2019-02-24 14:03:12 UTC 2019-02-24
Import patches-applied version 1:3.14.0-2ubuntu6 to applied/ubuntu/disco-prop...

Author: Steve Langasek
Author Date: 2019-02-24 05:52:20 UTC

Import patches-applied version 1:3.14.0-2ubuntu6 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 785ab593ed3855cac730199f78c22d5595feb7ef
Unapplied parent: 4e4d5a1924935343c87e04c9f12ff567d5e65e3e

New changelog entries:
  * No-change rebuild against glibc 2.29 to update suppressions.

applied/ubuntu/disco-devel 2019-02-24 14:03:12 UTC 2019-02-24
Import patches-applied version 1:3.14.0-2ubuntu6 to applied/ubuntu/disco-prop...

Author: Steve Langasek
Author Date: 2019-02-24 05:52:20 UTC

Import patches-applied version 1:3.14.0-2ubuntu6 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 785ab593ed3855cac730199f78c22d5595feb7ef
Unapplied parent: 4e4d5a1924935343c87e04c9f12ff567d5e65e3e

New changelog entries:
  * No-change rebuild against glibc 2.29 to update suppressions.

applied/ubuntu/disco-proposed 2019-02-24 14:03:12 UTC 2019-02-24
Import patches-applied version 1:3.14.0-2ubuntu6 to applied/ubuntu/disco-prop...

Author: Steve Langasek
Author Date: 2019-02-24 05:52:20 UTC

Import patches-applied version 1:3.14.0-2ubuntu6 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 785ab593ed3855cac730199f78c22d5595feb7ef
Unapplied parent: 4e4d5a1924935343c87e04c9f12ff567d5e65e3e

New changelog entries:
  * No-change rebuild against glibc 2.29 to update suppressions.

ubuntu/disco 2019-02-24 14:03:12 UTC 2019-02-24
Import patches-unapplied version 1:3.14.0-2ubuntu6 to ubuntu/disco-proposed

Author: Steve Langasek
Author Date: 2019-02-24 05:52:20 UTC

Import patches-unapplied version 1:3.14.0-2ubuntu6 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 1f73c75b725a4e068ba8e2394e5e02cf481ad1ab

New changelog entries:
  * No-change rebuild against glibc 2.29 to update suppressions.

ubuntu/disco-devel 2019-02-24 14:03:12 UTC 2019-02-24
Import patches-unapplied version 1:3.14.0-2ubuntu6 to ubuntu/disco-proposed

Author: Steve Langasek
Author Date: 2019-02-24 05:52:20 UTC

Import patches-unapplied version 1:3.14.0-2ubuntu6 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 1f73c75b725a4e068ba8e2394e5e02cf481ad1ab

New changelog entries:
  * No-change rebuild against glibc 2.29 to update suppressions.

applied/debian/buster 2019-02-09 22:49:19 UTC 2019-02-09
Import patches-applied version 1:3.14.0-3 to applied/debian/sid

Author: Alessandro Ghedini
Author Date: 2019-02-09 19:14:13 UTC

Import patches-applied version 1:3.14.0-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 3e544e81b1a48ff9a0c8c0afae1f44de5e74385c
Unapplied parent: b1f5ca0472a294b5498294f6872569c37350f4e6

New changelog entries:
  * Add suppressions for helgrind+drd false positives with glibc 2.28.
    Thanks to Adam Borowski (Closes: #918023)
  * Bump debhlper compat level to 12
  * Bump Standards-Version to 4.3.0 (no changes needed)
  * Disable dh_dwz for now (seems to cause FTBFS)

debian/buster 2019-02-09 22:49:19 UTC 2019-02-09
Import patches-unapplied version 1:3.14.0-3 to debian/sid

Author: Alessandro Ghedini
Author Date: 2019-02-09 19:14:13 UTC

Import patches-unapplied version 1:3.14.0-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: f48ef9377668948c10adc883f37bfc19fd3bc772

New changelog entries:
  * Add suppressions for helgrind+drd false positives with glibc 2.28.
    Thanks to Adam Borowski (Closes: #918023)
  * Bump debhlper compat level to 12
  * Bump Standards-Version to 4.3.0 (no changes needed)
  * Disable dh_dwz for now (seems to cause FTBFS)

ubuntu/bionic-proposed 2018-10-23 15:48:17 UTC 2018-10-23
Import patches-unapplied version 1:3.13.0-2ubuntu2.1 to ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-10-22 12:43:55 UTC

Import patches-unapplied version 1:3.13.0-2ubuntu2.1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 5ad6a9164b09a69579d82d9e01002343d3cd7e62

New changelog entries:
  [ Matthias Klose ]
  * Apply post 3.13 PPC64 related patches. LP: #1781128.

applied/ubuntu/bionic-proposed 2018-10-23 15:48:17 UTC 2018-10-23
Import patches-applied version 1:3.13.0-2ubuntu2.1 to applied/ubuntu/bionic-p...

Author: Dimitri John Ledkov
Author Date: 2018-10-22 12:43:55 UTC

Import patches-applied version 1:3.13.0-2ubuntu2.1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: e9fd3a9d61abfcfe38cf6e99c928fa6340d651dc
Unapplied parent: 1b89a422d8c56bdc06d9d3f29277b1dcd2ce20ae

New changelog entries:
  [ Matthias Klose ]
  * Apply post 3.13 PPC64 related patches. LP: #1781128.

applied/ubuntu/bionic-devel 2018-10-23 15:48:17 UTC 2018-10-23
Import patches-applied version 1:3.13.0-2ubuntu2.1 to applied/ubuntu/bionic-p...

Author: Dimitri John Ledkov
Author Date: 2018-10-22 12:43:55 UTC

Import patches-applied version 1:3.13.0-2ubuntu2.1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: e9fd3a9d61abfcfe38cf6e99c928fa6340d651dc
Unapplied parent: 1b89a422d8c56bdc06d9d3f29277b1dcd2ce20ae

New changelog entries:
  [ Matthias Klose ]
  * Apply post 3.13 PPC64 related patches. LP: #1781128.

applied/ubuntu/bionic-updates 2018-10-23 15:48:17 UTC 2018-10-23
Import patches-applied version 1:3.13.0-2ubuntu2.1 to applied/ubuntu/bionic-p...

Author: Dimitri John Ledkov
Author Date: 2018-10-22 12:43:55 UTC

Import patches-applied version 1:3.13.0-2ubuntu2.1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: e9fd3a9d61abfcfe38cf6e99c928fa6340d651dc
Unapplied parent: 1b89a422d8c56bdc06d9d3f29277b1dcd2ce20ae

New changelog entries:
  [ Matthias Klose ]
  * Apply post 3.13 PPC64 related patches. LP: #1781128.

ubuntu/bionic-devel 2018-10-23 15:48:17 UTC 2018-10-23
Import patches-unapplied version 1:3.13.0-2ubuntu2.1 to ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-10-22 12:43:55 UTC

Import patches-unapplied version 1:3.13.0-2ubuntu2.1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 5ad6a9164b09a69579d82d9e01002343d3cd7e62

New changelog entries:
  [ Matthias Klose ]
  * Apply post 3.13 PPC64 related patches. LP: #1781128.

ubuntu/bionic-updates 2018-10-23 15:48:17 UTC 2018-10-23
Import patches-unapplied version 1:3.13.0-2ubuntu2.1 to ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-10-22 12:43:55 UTC

Import patches-unapplied version 1:3.13.0-2ubuntu2.1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 5ad6a9164b09a69579d82d9e01002343d3cd7e62

New changelog entries:
  [ Matthias Klose ]
  * Apply post 3.13 PPC64 related patches. LP: #1781128.

ubuntu/cosmic-devel 2018-08-27 20:18:18 UTC 2018-08-27
Import patches-unapplied version 1:3.13.0-2ubuntu6 to ubuntu/cosmic-proposed

Author: Steve Langasek
Author Date: 2018-08-27 20:14:33 UTC

Import patches-unapplied version 1:3.13.0-2ubuntu6 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 923023469250cae57ce7c551ecf9bec4a6914475

New changelog entries:
  * No-change rebuild against glibc 2.28 to update suppressions.

applied/ubuntu/cosmic-devel 2018-08-27 20:18:18 UTC 2018-08-27
Import patches-applied version 1:3.13.0-2ubuntu6 to applied/ubuntu/cosmic-pro...

Author: Steve Langasek
Author Date: 2018-08-27 20:14:33 UTC

Import patches-applied version 1:3.13.0-2ubuntu6 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 854927c879bad63ef72f997e723d0f5254562901
Unapplied parent: f8ae637cf3de7bcfd10fec7087319a6cc23ba54c

New changelog entries:
  * No-change rebuild against glibc 2.28 to update suppressions.

applied/ubuntu/cosmic-proposed 2018-08-27 20:18:18 UTC 2018-08-27
Import patches-applied version 1:3.13.0-2ubuntu6 to applied/ubuntu/cosmic-pro...

Author: Steve Langasek
Author Date: 2018-08-27 20:14:33 UTC

Import patches-applied version 1:3.13.0-2ubuntu6 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 854927c879bad63ef72f997e723d0f5254562901
Unapplied parent: f8ae637cf3de7bcfd10fec7087319a6cc23ba54c

New changelog entries:
  * No-change rebuild against glibc 2.28 to update suppressions.

ubuntu/cosmic 2018-08-27 20:18:18 UTC 2018-08-27
Import patches-unapplied version 1:3.13.0-2ubuntu6 to ubuntu/cosmic-proposed

Author: Steve Langasek
Author Date: 2018-08-27 20:14:33 UTC

Import patches-unapplied version 1:3.13.0-2ubuntu6 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 923023469250cae57ce7c551ecf9bec4a6914475

New changelog entries:
  * No-change rebuild against glibc 2.28 to update suppressions.

applied/ubuntu/cosmic 2018-08-27 20:18:18 UTC 2018-08-27
Import patches-applied version 1:3.13.0-2ubuntu6 to applied/ubuntu/cosmic-pro...

Author: Steve Langasek
Author Date: 2018-08-27 20:14:33 UTC

Import patches-applied version 1:3.13.0-2ubuntu6 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 854927c879bad63ef72f997e723d0f5254562901
Unapplied parent: f8ae637cf3de7bcfd10fec7087319a6cc23ba54c

New changelog entries:
  * No-change rebuild against glibc 2.28 to update suppressions.

ubuntu/cosmic-proposed 2018-08-27 20:18:18 UTC 2018-08-27
Import patches-unapplied version 1:3.13.0-2ubuntu6 to ubuntu/cosmic-proposed

Author: Steve Langasek
Author Date: 2018-08-27 20:14:33 UTC

Import patches-unapplied version 1:3.13.0-2ubuntu6 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 923023469250cae57ce7c551ecf9bec4a6914475

New changelog entries:
  * No-change rebuild against glibc 2.28 to update suppressions.

importer/ubuntu/pristine-tar 2018-03-21 22:11:02 UTC 2018-03-21
pristine-tar data for valgrind_3.13.0.orig.tar.bz2

Author: Ubuntu Git Importer
Author Date: 2018-03-21 22:11:02 UTC

pristine-tar data for valgrind_3.13.0.orig.tar.bz2

importer/debian/pristine-tar 2018-03-21 21:07:24 UTC 2018-03-21
pristine-tar data for valgrind_3.13.0.orig.tar.bz2

Author: Ubuntu Git Importer
Author Date: 2018-03-21 21:07:24 UTC

pristine-tar data for valgrind_3.13.0.orig.tar.bz2

ubuntu/bionic 2018-02-28 06:58:20 UTC 2018-02-28
Import patches-unapplied version 1:3.13.0-2ubuntu2 to ubuntu/bionic-proposed

Author: Steve Langasek
Author Date: 2018-02-28 06:52:04 UTC

Import patches-unapplied version 1:3.13.0-2ubuntu2 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 20a52e21ae597bbdcf4be32fc52e4109e65265f0

New changelog entries:
  * No-change rebuild against glibc 2.27 to update suppressions.

applied/ubuntu/bionic 2018-02-28 06:58:20 UTC 2018-02-28
Import patches-applied version 1:3.13.0-2ubuntu2 to applied/ubuntu/bionic-pro...

Author: Steve Langasek
Author Date: 2018-02-28 06:52:04 UTC

Import patches-applied version 1:3.13.0-2ubuntu2 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 053514145eeb93f02107c2d15af34461a3be3353
Unapplied parent: 555453dd5d0ab4e6195285db313ecca804979149

New changelog entries:
  * No-change rebuild against glibc 2.27 to update suppressions.

applied/ubuntu/artful-proposed 2017-10-25 12:03:13 UTC 2017-10-25
Import patches-applied version 1:3.13.0-1ubuntu3 to applied/ubuntu/artful-pro...

Author: Matthias Klose
Author Date: 2017-10-24 09:56:21 UTC

Import patches-applied version 1:3.13.0-1ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 4935f2ee1c1bbc5e6e3e4aa060111b36c9f2f037
Unapplied parent: 08ee9b458ad2d337d715339f09afda389021fd4e

New changelog entries:
  * SRU: Fix typo, syscall param epoll_pwait(sigmask) points to unaddressable
    byte(s). LP: #1726711.

applied/ubuntu/artful-devel 2017-10-25 12:03:13 UTC 2017-10-25
Import patches-applied version 1:3.13.0-1ubuntu3 to applied/ubuntu/artful-pro...

Author: Matthias Klose
Author Date: 2017-10-24 09:56:21 UTC

Import patches-applied version 1:3.13.0-1ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 4935f2ee1c1bbc5e6e3e4aa060111b36c9f2f037
Unapplied parent: 08ee9b458ad2d337d715339f09afda389021fd4e

New changelog entries:
  * SRU: Fix typo, syscall param epoll_pwait(sigmask) points to unaddressable
    byte(s). LP: #1726711.

applied/ubuntu/artful-updates 2017-10-25 12:03:13 UTC 2017-10-25
Import patches-applied version 1:3.13.0-1ubuntu3 to applied/ubuntu/artful-pro...

Author: Matthias Klose
Author Date: 2017-10-24 09:56:21 UTC

Import patches-applied version 1:3.13.0-1ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 4935f2ee1c1bbc5e6e3e4aa060111b36c9f2f037
Unapplied parent: 08ee9b458ad2d337d715339f09afda389021fd4e

New changelog entries:
  * SRU: Fix typo, syscall param epoll_pwait(sigmask) points to unaddressable
    byte(s). LP: #1726711.

ubuntu/artful-updates 2017-10-25 12:03:13 UTC 2017-10-25
Import patches-unapplied version 1:3.13.0-1ubuntu3 to ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-10-24 09:56:21 UTC

Import patches-unapplied version 1:3.13.0-1ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 89c273c15d1755953672c827553b69bc9f08bd87

New changelog entries:
  * SRU: Fix typo, syscall param epoll_pwait(sigmask) points to unaddressable
    byte(s). LP: #1726711.

ubuntu/artful-proposed 2017-10-25 12:03:13 UTC 2017-10-25
Import patches-unapplied version 1:3.13.0-1ubuntu3 to ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-10-24 09:56:21 UTC

Import patches-unapplied version 1:3.13.0-1ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 89c273c15d1755953672c827553b69bc9f08bd87

New changelog entries:
  * SRU: Fix typo, syscall param epoll_pwait(sigmask) points to unaddressable
    byte(s). LP: #1726711.

ubuntu/artful-devel 2017-10-25 12:03:13 UTC 2017-10-25
Import patches-unapplied version 1:3.13.0-1ubuntu3 to ubuntu/artful-proposed

Author: Matthias Klose
Author Date: 2017-10-24 09:56:21 UTC

Import patches-unapplied version 1:3.13.0-1ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 89c273c15d1755953672c827553b69bc9f08bd87

New changelog entries:
  * SRU: Fix typo, syscall param epoll_pwait(sigmask) points to unaddressable
    byte(s). LP: #1726711.

ubuntu/artful 2017-09-11 23:48:12 UTC 2017-09-11
Import patches-unapplied version 1:3.13.0-1ubuntu2 to ubuntu/artful-proposed

Author: Steve Langasek
Author Date: 2017-09-11 23:42:57 UTC

Import patches-unapplied version 1:3.13.0-1ubuntu2 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 16addc10cb81be2f90d9fbf9232016a00b04d296

New changelog entries:
  * No-change rebuild against glibc 2.26 to update suppressions.

applied/ubuntu/artful 2017-09-11 23:48:12 UTC 2017-09-11
Import patches-applied version 1:3.13.0-1ubuntu2 to applied/ubuntu/artful-pro...

Author: Steve Langasek
Author Date: 2017-09-11 23:42:57 UTC

Import patches-applied version 1:3.13.0-1ubuntu2 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 82806dcbe48dc00ba3b4989b0638c0981a7101f8
Unapplied parent: 94af41e536ea422616ce07ab3c22dc9459751e6f

New changelog entries:
  * No-change rebuild against glibc 2.26 to update suppressions.

applied/ubuntu/trusty-updates 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.10.1-1ubuntu3~14.5 to applied/ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:28:55 UTC

Import patches-applied version 1:3.10.1-1ubuntu3~14.5 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 157a1157ddadd5e9341f8e5fa862f75b414438e4
Unapplied parent: 581c2649381636a0359921b7db0662744961bc9f

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131
  * debian/patches/new_kernel.patch: fix building on newer kernels.

ubuntu/xenial-security 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.11.0-1ubuntu4.2 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2017-06-07 19:24:31 UTC

Import patches-unapplied version 1:3.11.0-1ubuntu4.2 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 233eab8a78eb828dd2f830cd3fd8f9088cbb8e9e

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

ubuntu/xenial-updates 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.11.0-1ubuntu4.2 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2017-06-07 19:24:31 UTC

Import patches-unapplied version 1:3.11.0-1ubuntu4.2 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 233eab8a78eb828dd2f830cd3fd8f9088cbb8e9e

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

ubuntu/zesty-security 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.12.0-1ubuntu1.1 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-06-07 18:49:09 UTC

Import patches-unapplied version 1:3.12.0-1ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 46daac52c675bb09e9061460a57f2a7b14870e8a

New changelog entries:
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491

ubuntu/yakkety-devel 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.12.0~svn20160714-1ubuntu2.1 to ubuntu/ya...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:18:08 UTC

Import patches-unapplied version 1:3.12.0~svn20160714-1ubuntu2.1 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 0d61f8b6260c3d167f27974fd4200937ab35916e

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

ubuntu/trusty-security 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.10.1-1ubuntu3~14.5 to ubuntu/trusty-secu...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:28:55 UTC

Import patches-unapplied version 1:3.10.1-1ubuntu3~14.5 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f57183eb20ee1ca238e200d3730adc998e168fcb

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131
  * debian/patches/new_kernel.patch: fix building on newer kernels.

ubuntu/yakkety-security 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.12.0~svn20160714-1ubuntu2.1 to ubuntu/ya...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:18:08 UTC

Import patches-unapplied version 1:3.12.0~svn20160714-1ubuntu2.1 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 0d61f8b6260c3d167f27974fd4200937ab35916e

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

ubuntu/yakkety-updates 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.12.0~svn20160714-1ubuntu2.1 to ubuntu/ya...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:18:08 UTC

Import patches-unapplied version 1:3.12.0~svn20160714-1ubuntu2.1 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 0d61f8b6260c3d167f27974fd4200937ab35916e

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

applied/ubuntu/xenial-security 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.11.0-1ubuntu4.2 to applied/ubuntu/xenial-s...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:24:31 UTC

Import patches-applied version 1:3.11.0-1ubuntu4.2 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: c35fb462649bc59d78065f555e238888d28a4263
Unapplied parent: 9353691b7fb56ba094be7b48e9b58300dac187ca

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

applied/ubuntu/yakkety-devel 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.12.0~svn20160714-1ubuntu2.1 to applied/ubu...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:18:08 UTC

Import patches-applied version 1:3.12.0~svn20160714-1ubuntu2.1 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: f8aa0519df4fb8a5cf4ea4df7353586968b2d018
Unapplied parent: d1317b635ebb47cb46f8de806b48eb45f444ae2f

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

applied/ubuntu/yakkety-security 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.12.0~svn20160714-1ubuntu2.1 to applied/ubu...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:18:08 UTC

Import patches-applied version 1:3.12.0~svn20160714-1ubuntu2.1 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: f8aa0519df4fb8a5cf4ea4df7353586968b2d018
Unapplied parent: d1317b635ebb47cb46f8de806b48eb45f444ae2f

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

applied/ubuntu/xenial-updates 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.11.0-1ubuntu4.2 to applied/ubuntu/xenial-s...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:24:31 UTC

Import patches-applied version 1:3.11.0-1ubuntu4.2 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: c35fb462649bc59d78065f555e238888d28a4263
Unapplied parent: 9353691b7fb56ba094be7b48e9b58300dac187ca

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

ubuntu/trusty-devel 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.10.1-1ubuntu3~14.5 to ubuntu/trusty-secu...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:28:55 UTC

Import patches-unapplied version 1:3.10.1-1ubuntu3~14.5 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f57183eb20ee1ca238e200d3730adc998e168fcb

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131
  * debian/patches/new_kernel.patch: fix building on newer kernels.

applied/ubuntu/yakkety-updates 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.12.0~svn20160714-1ubuntu2.1 to applied/ubu...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:18:08 UTC

Import patches-applied version 1:3.12.0~svn20160714-1ubuntu2.1 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: f8aa0519df4fb8a5cf4ea4df7353586968b2d018
Unapplied parent: d1317b635ebb47cb46f8de806b48eb45f444ae2f

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

ubuntu/zesty-devel 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.12.0-1ubuntu1.1 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-06-07 18:49:09 UTC

Import patches-unapplied version 1:3.12.0-1ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 46daac52c675bb09e9061460a57f2a7b14870e8a

New changelog entries:
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491

applied/ubuntu/zesty-devel 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.12.0-1ubuntu1.1 to applied/ubuntu/zesty-se...

Author: Marc Deslauriers
Author Date: 2017-06-07 18:49:09 UTC

Import patches-applied version 1:3.12.0-1ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 7412527a30c662efddf38368227891aaf6aff673
Unapplied parent: 4441d7575b43c9db3850921dfd4aa54e60851d75

New changelog entries:
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491

ubuntu/trusty-updates 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.10.1-1ubuntu3~14.5 to ubuntu/trusty-secu...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:28:55 UTC

Import patches-unapplied version 1:3.10.1-1ubuntu3~14.5 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f57183eb20ee1ca238e200d3730adc998e168fcb

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131
  * debian/patches/new_kernel.patch: fix building on newer kernels.

applied/ubuntu/xenial-devel 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.11.0-1ubuntu4.2 to applied/ubuntu/xenial-s...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:24:31 UTC

Import patches-applied version 1:3.11.0-1ubuntu4.2 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: c35fb462649bc59d78065f555e238888d28a4263
Unapplied parent: 9353691b7fb56ba094be7b48e9b58300dac187ca

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

applied/ubuntu/zesty-updates 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.12.0-1ubuntu1.1 to applied/ubuntu/zesty-se...

Author: Marc Deslauriers
Author Date: 2017-06-07 18:49:09 UTC

Import patches-applied version 1:3.12.0-1ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 7412527a30c662efddf38368227891aaf6aff673
Unapplied parent: 4441d7575b43c9db3850921dfd4aa54e60851d75

New changelog entries:
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491

applied/ubuntu/zesty-security 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.12.0-1ubuntu1.1 to applied/ubuntu/zesty-se...

Author: Marc Deslauriers
Author Date: 2017-06-07 18:49:09 UTC

Import patches-applied version 1:3.12.0-1ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 7412527a30c662efddf38368227891aaf6aff673
Unapplied parent: 4441d7575b43c9db3850921dfd4aa54e60851d75

New changelog entries:
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491

ubuntu/xenial-devel 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.11.0-1ubuntu4.2 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2017-06-07 19:24:31 UTC

Import patches-unapplied version 1:3.11.0-1ubuntu4.2 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 233eab8a78eb828dd2f830cd3fd8f9088cbb8e9e

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131

ubuntu/zesty-updates 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-unapplied version 1:3.12.0-1ubuntu1.1 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-06-07 18:49:09 UTC

Import patches-unapplied version 1:3.12.0-1ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 46daac52c675bb09e9061460a57f2a7b14870e8a

New changelog entries:
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491

applied/ubuntu/trusty-devel 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.10.1-1ubuntu3~14.5 to applied/ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:28:55 UTC

Import patches-applied version 1:3.10.1-1ubuntu3~14.5 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 157a1157ddadd5e9341f8e5fa862f75b414438e4
Unapplied parent: 581c2649381636a0359921b7db0662744961bc9f

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131
  * debian/patches/new_kernel.patch: fix building on newer kernels.

applied/ubuntu/trusty-security 2017-06-21 16:49:06 UTC 2017-06-21
Import patches-applied version 1:3.10.1-1ubuntu3~14.5 to applied/ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2017-06-07 19:28:55 UTC

Import patches-applied version 1:3.10.1-1ubuntu3~14.5 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 157a1157ddadd5e9341f8e5fa862f75b414438e4
Unapplied parent: 581c2649381636a0359921b7db0662744961bc9f

New changelog entries:
  * SECURITY UPDATE: integer overflow in string_appends
    - debian/patches/CVE-2016-2226.patch: check for overflow in
      coregrind/m_demangle/cplus-dem.c, add xmalloc_failed and xmemdup to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-2226
  * SECURITY UPDATE: use-after-free vulnerabilities
    - debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
      coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4487
    - CVE-2016-4488
  * SECURITY UPDATE: integer overflow in gnu_special
    - debian/patches/CVE-2016-4489.patch: handle case where consume_count
      returns -1 in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4489
  * SECURITY UPDATE: integer overflow after sanity checks
    - debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
      of long in coregrind/m_demangle/cp-demangle.c.
    - CVE-2016-4490
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-4491.patch: limit recursion in
      coregrind/m_demangle/cp-demangle.c, coregrind/m_demangle/demangle.h.
    - CVE-2016-4491
  * SECURITY UPDATE: buffer overflow in do_type
    - debian/patches/CVE-2016-4492_4493.patch: properly handle large values
      and overflow in coregrind/m_demangle/cplus-dem.c.
    - CVE-2016-4492
    - CVE-2016-4493
  * SECURITY UPDATE: denial of service via infinite recursion
    - debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
      coregrind/m_demangle/cplus-dem.c, add XDUPVEC to
      coregrind/m_demangle/vg_libciface.h.
    - CVE-2016-6131
  * debian/patches/new_kernel.patch: fix building on newer kernels.

ubuntu/zesty-proposed 2016-11-13 18:49:02 UTC 2016-11-13
Import patches-unapplied version 1:3.12.0-1ubuntu1 to ubuntu/zesty-proposed

Author: Steve Langasek
Author Date: 2016-11-13 18:09:58 UTC

Import patches-unapplied version 1:3.12.0-1ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 1a1737419a7ac7e143af9abcf8b603bb85c5473f

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Lower over-inflated valgrind-dbg Recommends to Suggests instead.
    - Don't strip vgpreload* on ARM; this results in unusable stack traces
      without valgrind-dbg.
    - Configure with --enable-only64bit on AArch64.
  * Dropped changes, included upstream:
    - Cherry-pick upstream patch to fix assertions on arm.

ubuntu/zesty 2016-11-13 18:49:02 UTC 2016-11-13
Import patches-unapplied version 1:3.12.0-1ubuntu1 to ubuntu/zesty-proposed

Author: Steve Langasek
Author Date: 2016-11-13 18:09:58 UTC

Import patches-unapplied version 1:3.12.0-1ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 1a1737419a7ac7e143af9abcf8b603bb85c5473f

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Lower over-inflated valgrind-dbg Recommends to Suggests instead.
    - Don't strip vgpreload* on ARM; this results in unusable stack traces
      without valgrind-dbg.
    - Configure with --enable-only64bit on AArch64.
  * Dropped changes, included upstream:
    - Cherry-pick upstream patch to fix assertions on arm.

applied/ubuntu/zesty-proposed 2016-11-13 18:49:02 UTC 2016-11-13
Import patches-applied version 1:3.12.0-1ubuntu1 to applied/ubuntu/zesty-prop...

Author: Steve Langasek
Author Date: 2016-11-13 18:09:58 UTC

Import patches-applied version 1:3.12.0-1ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: bb6198ef05bd1a5fe75acf9f1481593b397c797c
Unapplied parent: b8867df41d1698e1be24fe6e281fb7def431e981

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Lower over-inflated valgrind-dbg Recommends to Suggests instead.
    - Don't strip vgpreload* on ARM; this results in unusable stack traces
      without valgrind-dbg.
    - Configure with --enable-only64bit on AArch64.
  * Dropped changes, included upstream:
    - Cherry-pick upstream patch to fix assertions on arm.

applied/ubuntu/zesty 2016-11-13 18:49:02 UTC 2016-11-13
Import patches-applied version 1:3.12.0-1ubuntu1 to applied/ubuntu/zesty-prop...

Author: Steve Langasek
Author Date: 2016-11-13 18:09:58 UTC

Import patches-applied version 1:3.12.0-1ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: bb6198ef05bd1a5fe75acf9f1481593b397c797c
Unapplied parent: b8867df41d1698e1be24fe6e281fb7def431e981

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Lower over-inflated valgrind-dbg Recommends to Suggests instead.
    - Don't strip vgpreload* on ARM; this results in unusable stack traces
      without valgrind-dbg.
    - Configure with --enable-only64bit on AArch64.
  * Dropped changes, included upstream:
    - Cherry-pick upstream patch to fix assertions on arm.

applied/ubuntu/yakkety-proposed 2016-08-11 22:44:09 UTC 2016-08-11
Import patches-applied version 1:3.12.0~svn20160714-1ubuntu2 to applied/ubunt...

Author: Dimitri John Ledkov
Author Date: 2016-08-11 22:18:04 UTC

Import patches-applied version 1:3.12.0~svn20160714-1ubuntu2 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 4e97472f5d48ffd09b5a9ebfb4a689cd65314578
Unapplied parent: 08eeb84682e930b2406155e05bdc8bef6ba4858e

New changelog entries:
  * Cherry-pick upstream patch to fix assertions on arm. LP: #1612429

applied/ubuntu/yakkety 2016-08-11 22:44:09 UTC 2016-08-11
Import patches-applied version 1:3.12.0~svn20160714-1ubuntu2 to applied/ubunt...

Author: Dimitri John Ledkov
Author Date: 2016-08-11 22:18:04 UTC

Import patches-applied version 1:3.12.0~svn20160714-1ubuntu2 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 4e97472f5d48ffd09b5a9ebfb4a689cd65314578
Unapplied parent: 08eeb84682e930b2406155e05bdc8bef6ba4858e

New changelog entries:
  * Cherry-pick upstream patch to fix assertions on arm. LP: #1612429

ubuntu/yakkety-proposed 2016-08-11 22:44:09 UTC 2016-08-11
Import patches-unapplied version 1:3.12.0~svn20160714-1ubuntu2 to ubuntu/yakk...

Author: Dimitri John Ledkov
Author Date: 2016-08-11 22:18:04 UTC

Import patches-unapplied version 1:3.12.0~svn20160714-1ubuntu2 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 8fba3a667442180dc5a4839a201251036a79f424

New changelog entries:
  * Cherry-pick upstream patch to fix assertions on arm. LP: #1612429

ubuntu/yakkety 2016-08-11 22:44:09 UTC 2016-08-11
Import patches-unapplied version 1:3.12.0~svn20160714-1ubuntu2 to ubuntu/yakk...

Author: Dimitri John Ledkov
Author Date: 2016-08-11 22:18:04 UTC

Import patches-unapplied version 1:3.12.0~svn20160714-1ubuntu2 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 8fba3a667442180dc5a4839a201251036a79f424

New changelog entries:
  * Cherry-pick upstream patch to fix assertions on arm. LP: #1612429

applied/debian/stretch 2016-07-15 10:22:45 UTC 2016-07-15
Import patches-applied version 1:3.12.0~svn20160714-1 to applied/debian/sid

Author: Alessandro Ghedini
Author Date: 2016-07-14 23:15:43 UTC

Import patches-applied version 1:3.12.0~svn20160714-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: ba4a718d3bc8c0e3bd397da4110ebacdb07298ac
Unapplied parent: a28f21327cd204f79e4db3c7728e55e4b1f27151

New changelog entries:
  * New upstream snapshot release
    - Add support for compressed debuginfo (Closes: #810295)
  * Drop MIPS patches (merged/fixed upstream)
  * Refresh patches
  * Add smoke test for autopkgtest
    Thanks to dann frazier for the patch (Closes: #819813)
  * Update 07_fix-spelling-in-binary.patch
  * Update Standards-Version to 3.9.8 (no changes needed)
  * Update Vcs-* URLs

debian/stretch 2016-07-15 10:22:45 UTC 2016-07-15
Import patches-unapplied version 1:3.12.0~svn20160714-1 to debian/sid

Author: Alessandro Ghedini
Author Date: 2016-07-14 23:15:43 UTC

Import patches-unapplied version 1:3.12.0~svn20160714-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 073693f448b5071cb345892b29fdb3c40eae3dd6

New changelog entries:
  * New upstream snapshot release
    - Add support for compressed debuginfo (Closes: #810295)
  * Drop MIPS patches (merged/fixed upstream)
  * Refresh patches
  * Add smoke test for autopkgtest
    Thanks to dann frazier for the patch (Closes: #819813)
  * Update 07_fix-spelling-in-binary.patch
  * Update Standards-Version to 3.9.8 (no changes needed)
  * Update Vcs-* URLs

applied/ubuntu/xenial-proposed 2016-05-21 00:03:38 UTC 2016-05-21
Import patches-applied version 1:3.11.0-1ubuntu4.1 to applied/ubuntu/xenial-p...

Author: Dimitri John Ledkov
Author Date: 2016-05-20 03:31:09 UTC

Import patches-applied version 1:3.11.0-1ubuntu4.1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 4f245e29c6ce4885f1df58ab8a866691e29d87a7
Unapplied parent: 5bb0208d8fd1b3b9eb1cce55dc5c18c790a91738

New changelog entries:
  * Recompile to resolve miscompilation on s390x architecture. LP:
    #1572613

ubuntu/xenial-proposed 2016-05-21 00:03:38 UTC 2016-05-21
Import patches-unapplied version 1:3.11.0-1ubuntu4.1 to ubuntu/xenial-proposed

Author: Dimitri John Ledkov
Author Date: 2016-05-20 03:31:09 UTC

Import patches-unapplied version 1:3.11.0-1ubuntu4.1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: ead9f386cc845f8e6cde0486668fdba1dd3e1fd1

New changelog entries:
  * Recompile to resolve miscompilation on s390x architecture. LP:
    #1572613

applied/ubuntu/xenial 2016-04-12 16:44:14 UTC 2016-04-12
Import patches-applied version 1:3.11.0-1ubuntu4 to applied/ubuntu/xenial-pro...

Author: dann frazier
Author Date: 2016-04-12 15:40:46 UTC

Import patches-applied version 1:3.11.0-1ubuntu4 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 757f5bad2a681b21c26a993c178804c9ac7a19fb
Unapplied parent: 5c87fe84a6d7b9103485e13a17b86f523e613f9b

New changelog entries:
  * Add additional fix required for popcnt support. LP: #1569391.

ubuntu/xenial 2016-04-12 16:44:14 UTC 2016-04-12
Import patches-unapplied version 1:3.11.0-1ubuntu4 to ubuntu/xenial-proposed

Author: dann frazier
Author Date: 2016-04-12 15:40:46 UTC

Import patches-unapplied version 1:3.11.0-1ubuntu4 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 2e406807c4cfe54b0f37a78a9806d964b0ccb600

New changelog entries:
  * Add additional fix required for popcnt support. LP: #1569391.

applied/ubuntu/vivid-devel 2015-10-07 14:24:01 UTC 2015-10-07
Import patches-applied version 1:3.10.1-1ubuntu3~15.04 to applied/ubuntu/vivi...

Author: Matthias Klose
Author Date: 2015-09-26 06:57:45 UTC

Import patches-applied version 1:3.10.1-1ubuntu3~15.04 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 4b571581337c598497853c273ba280f4a8da0917
Unapplied parent: 01cf90c3427a5a5ddcdaba9d37e509ab3abcd5c0

New changelog entries:
  * SRU. Backport the 1.10 series to 14.04 for ppc64el support. LP: #1386524.
  * Also fixes segfault on ppc64el, LP: #1377796.

applied/ubuntu/trusty-proposed 2015-10-07 14:24:01 UTC 2015-10-07
Import patches-applied version 1:3.10.1-1ubuntu3~14.04 to applied/ubuntu/trus...

Author: Matthias Klose
Author Date: 2015-07-15 07:37:42 UTC

Import patches-applied version 1:3.10.1-1ubuntu3~14.04 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 4b571581337c598497853c273ba280f4a8da0917
Unapplied parent: 8018bd3e80bd815792f2044787c8d3faab5f10b8

New changelog entries:
  * SRU. Backport the 1.10 series to 14.04 for ppc64el support. LP: #1386524.
  * Also fixes segfault on ppc64el, LP: #1377796.

applied/ubuntu/vivid-proposed 2015-10-07 14:24:01 UTC 2015-10-07
Import patches-applied version 1:3.10.1-1ubuntu3~15.04 to applied/ubuntu/vivi...

Author: Matthias Klose
Author Date: 2015-09-26 06:57:45 UTC

Import patches-applied version 1:3.10.1-1ubuntu3~15.04 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 4b571581337c598497853c273ba280f4a8da0917
Unapplied parent: 01cf90c3427a5a5ddcdaba9d37e509ab3abcd5c0

New changelog entries:
  * SRU. Backport the 1.10 series to 14.04 for ppc64el support. LP: #1386524.
  * Also fixes segfault on ppc64el, LP: #1377796.

applied/ubuntu/vivid-updates 2015-10-07 14:24:01 UTC 2015-10-07
Import patches-applied version 1:3.10.1-1ubuntu3~15.04 to applied/ubuntu/vivi...

Author: Matthias Klose
Author Date: 2015-09-26 06:57:45 UTC

Import patches-applied version 1:3.10.1-1ubuntu3~15.04 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 4b571581337c598497853c273ba280f4a8da0917
Unapplied parent: 01cf90c3427a5a5ddcdaba9d37e509ab3abcd5c0

New changelog entries:
  * SRU. Backport the 1.10 series to 14.04 for ppc64el support. LP: #1386524.
  * Also fixes segfault on ppc64el, LP: #1377796.

ubuntu/trusty-proposed 2015-10-07 14:24:01 UTC 2015-10-07
Import patches-unapplied version 1:3.10.1-1ubuntu3~14.04 to ubuntu/trusty-pro...

Author: Matthias Klose
Author Date: 2015-07-15 07:37:42 UTC

Import patches-unapplied version 1:3.10.1-1ubuntu3~14.04 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: e3fad6e3ceae3532fd8e5e651862ce4253c953d5

New changelog entries:
  * SRU. Backport the 1.10 series to 14.04 for ppc64el support. LP: #1386524.
  * Also fixes segfault on ppc64el, LP: #1377796.

ubuntu/vivid-devel 2015-10-07 14:24:01 UTC 2015-10-07
Import patches-unapplied version 1:3.10.1-1ubuntu3~15.04 to ubuntu/vivid-prop...

Author: Matthias Klose
Author Date: 2015-09-26 06:57:45 UTC

Import patches-unapplied version 1:3.10.1-1ubuntu3~15.04 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: e3fad6e3ceae3532fd8e5e651862ce4253c953d5

New changelog entries:
  * SRU. Backport the 1.10 series to 14.04 for ppc64el support. LP: #1386524.
  * Also fixes segfault on ppc64el, LP: #1377796.

ubuntu/vivid-proposed 2015-10-07 14:24:01 UTC 2015-10-07
Import patches-unapplied version 1:3.10.1-1ubuntu3~15.04 to ubuntu/vivid-prop...

Author: Matthias Klose
Author Date: 2015-09-26 06:57:45 UTC

Import patches-unapplied version 1:3.10.1-1ubuntu3~15.04 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: e3fad6e3ceae3532fd8e5e651862ce4253c953d5

New changelog entries:
  * SRU. Backport the 1.10 series to 14.04 for ppc64el support. LP: #1386524.
  * Also fixes segfault on ppc64el, LP: #1377796.

ubuntu/vivid-updates 2015-10-07 14:24:01 UTC 2015-10-07
Import patches-unapplied version 1:3.10.1-1ubuntu3~15.04 to ubuntu/vivid-prop...

Author: Matthias Klose
Author Date: 2015-09-26 06:57:45 UTC

Import patches-unapplied version 1:3.10.1-1ubuntu3~15.04 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: e3fad6e3ceae3532fd8e5e651862ce4253c953d5

New changelog entries:
  * SRU. Backport the 1.10 series to 14.04 for ppc64el support. LP: #1386524.
  * Also fixes segfault on ppc64el, LP: #1377796.

applied/ubuntu/wily 2015-09-30 11:59:03 UTC 2015-09-30
Import patches-applied version 1:3.11.0-1ubuntu1 to applied/ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-09-30 11:06:33 UTC

Import patches-applied version 1:3.11.0-1ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: ba4a718d3bc8c0e3bd397da4110ebacdb07298ac
Unapplied parent: 16e97c3da776b2343a00b2f034cfc959e7bde5e5

New changelog entries:
  * Merge with Debian; remaining changes:
    - Remove valgrind-mpi package from Ubuntu and any references to it, as
      mpi-default-dev is in universe for the time being.
    - Lower over-inflated valgrind-dbg Recommends to Suggests instead.
    - Don't strip vgpreload* on ARM; this results in unusable stack traces
      without valgrind-dbg.
    - Configure with --enable-only64bit on AArch64.

applied/ubuntu/wily-proposed 2015-09-30 11:59:03 UTC 2015-09-30
Import patches-applied version 1:3.11.0-1ubuntu1 to applied/ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-09-30 11:06:33 UTC

Import patches-applied version 1:3.11.0-1ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: ba4a718d3bc8c0e3bd397da4110ebacdb07298ac
Unapplied parent: 16e97c3da776b2343a00b2f034cfc959e7bde5e5

New changelog entries:
  * Merge with Debian; remaining changes:
    - Remove valgrind-mpi package from Ubuntu and any references to it, as
      mpi-default-dev is in universe for the time being.
    - Lower over-inflated valgrind-dbg Recommends to Suggests instead.
    - Don't strip vgpreload* on ARM; this results in unusable stack traces
      without valgrind-dbg.
    - Configure with --enable-only64bit on AArch64.

applied/ubuntu/wily-devel 2015-09-30 11:59:03 UTC 2015-09-30
Import patches-applied version 1:3.11.0-1ubuntu1 to applied/ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-09-30 11:06:33 UTC

Import patches-applied version 1:3.11.0-1ubuntu1 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: ba4a718d3bc8c0e3bd397da4110ebacdb07298ac
Unapplied parent: 16e97c3da776b2343a00b2f034cfc959e7bde5e5

New changelog entries:
  * Merge with Debian; remaining changes:
    - Remove valgrind-mpi package from Ubuntu and any references to it, as
      mpi-default-dev is in universe for the time being.
    - Lower over-inflated valgrind-dbg Recommends to Suggests instead.
    - Don't strip vgpreload* on ARM; this results in unusable stack traces
      without valgrind-dbg.
    - Configure with --enable-only64bit on AArch64.

ubuntu/wily-proposed 2015-09-30 11:59:03 UTC 2015-09-30
Import patches-unapplied version 1:3.11.0-1ubuntu1 to ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-09-30 11:06:33 UTC

Import patches-unapplied version 1:3.11.0-1ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 073693f448b5071cb345892b29fdb3c40eae3dd6

New changelog entries:
  * Merge with Debian; remaining changes:
    - Remove valgrind-mpi package from Ubuntu and any references to it, as
      mpi-default-dev is in universe for the time being.
    - Lower over-inflated valgrind-dbg Recommends to Suggests instead.
    - Don't strip vgpreload* on ARM; this results in unusable stack traces
      without valgrind-dbg.
    - Configure with --enable-only64bit on AArch64.

ubuntu/wily-devel 2015-09-30 11:59:03 UTC 2015-09-30
Import patches-unapplied version 1:3.11.0-1ubuntu1 to ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-09-30 11:06:33 UTC

Import patches-unapplied version 1:3.11.0-1ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 073693f448b5071cb345892b29fdb3c40eae3dd6

New changelog entries:
  * Merge with Debian; remaining changes:
    - Remove valgrind-mpi package from Ubuntu and any references to it, as
      mpi-default-dev is in universe for the time being.
    - Lower over-inflated valgrind-dbg Recommends to Suggests instead.
    - Don't strip vgpreload* on ARM; this results in unusable stack traces
      without valgrind-dbg.
    - Configure with --enable-only64bit on AArch64.

ubuntu/wily 2015-09-30 11:59:03 UTC 2015-09-30
Import patches-unapplied version 1:3.11.0-1ubuntu1 to ubuntu/wily-proposed

Author: Matthias Klose
Author Date: 2015-09-30 11:06:33 UTC

Import patches-unapplied version 1:3.11.0-1ubuntu1 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 073693f448b5071cb345892b29fdb3c40eae3dd6

New changelog entries:
  * Merge with Debian; remaining changes:
    - Remove valgrind-mpi package from Ubuntu and any references to it, as
      mpi-default-dev is in universe for the time being.
    - Lower over-inflated valgrind-dbg Recommends to Suggests instead.
    - Don't strip vgpreload* on ARM; this results in unusable stack traces
      without valgrind-dbg.
    - Configure with --enable-only64bit on AArch64.

applied/ubuntu/vivid 2015-03-26 21:43:34 UTC 2015-03-26
Import patches-applied version 1:3.10.1-1ubuntu2 to applied/ubuntu/vivid-prop...

Author: Matthias Klose
Author Date: 2015-03-26 21:10:58 UTC

Import patches-applied version 1:3.10.1-1ubuntu2 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: a6ffc2ddebddec96cfc3f1e4c4e9f0d7ae4951f9
Unapplied parent: a107518e0256140805f5aca48add0f3fb1d2ce3f

New changelog entries:
  * Build for glibc-2.21. LP: #1435261.

ubuntu/vivid 2015-03-26 21:43:34 UTC 2015-03-26
Import patches-unapplied version 1:3.10.1-1ubuntu2 to ubuntu/vivid-proposed

Author: Matthias Klose
Author Date: 2015-03-26 21:10:58 UTC

Import patches-unapplied version 1:3.10.1-1ubuntu2 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: a1df71f8102b810734621e4163794526b81f7e14

New changelog entries:
  * Build for glibc-2.21. LP: #1435261.

applied/debian/jessie 2014-11-16 16:23:40 UTC 2014-11-16
Import patches-applied version 1:3.10.0-4 to applied/debian/sid

Author: Alessandro Ghedini
Author Date: 2014-11-16 09:52:29 UTC

Import patches-applied version 1:3.10.0-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 657ca7d79a0955ac5b3d84c7663e9cb965a72819
Unapplied parent: 0a7c2f50183eb430adcf5f1d90c9c5892d45d2ef

New changelog entries:
  * Call dh_shlibdeps unconditionally

debian/jessie 2014-11-16 16:23:40 UTC 2014-11-16
Import patches-unapplied version 1:3.10.0-4 to debian/sid

Author: Alessandro Ghedini
Author Date: 2014-11-16 09:52:29 UTC

Import patches-unapplied version 1:3.10.0-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 4276f8a4a9ce220e8045cf7580f1bd93f6bd259a

New changelog entries:
  * Call dh_shlibdeps unconditionally

1100 of 200 results

Other repositories

Name Last Modified
lp:ubuntu/+source/valgrind 2019-08-01
11 of 1 result
You can't create new repositories for valgrind in Ubuntu.