Branches for Feisty

Name Status Last Modified Last Commit
lp:ubuntu/feisty/python2.5 1 Development 2009-12-09 12:33:16 UTC
27. Use apport_python_hook instead of app...

Author: Matthias Klose
Revision Date: 2007-04-12 12:27:43 UTC

Use apport_python_hook instead of apport.python_hook to speedup
the startup time of the interpreter. Ubuntu #105764.

lp:ubuntu/feisty-proposed/python2.5 1 Development 2009-12-09 12:33:37 UTC
28. * Python-2.5.1 release; changes compa...

Author: Matthias Klose
Revision Date: 2007-04-18 16:01:10 UTC

* Python-2.5.1 release; changes compared to the release candidate:
  - SF #1701207: svnversion_init assertion failed; revert bogus asserts
    (added to the wrong place) from rev 52501.
  - Revert SF #1615701 (rev 53655): dict.update() does *not* call
    __getitem__() or keys() if subclassed. This is to remain consistent
    with 2.5.
  - Revert 53667, bypass set specific optimizations for set and frozenset
    subclasses. This is to remain consistent with 2.5.
  - Describe undocumented third argument to touchline()
* Regenerate the documentation.

lp:ubuntu/feisty-security/python2.5 1 Development 2009-12-09 12:33:28 UTC
29. * SECURITY UPDATE: arbitrary code exe...

Author: Kees Cook
Revision Date: 2008-07-29 16:29:27 UTC

* SECURITY UPDATE: arbitrary code execution via multiple integer overflows.
* debian/rules, debian/patches/CVE-2008-1679.dpatch,
  debian/patches/CVE-2008-1721.dpatch, debian/patches/stringobject.dpatch:
  upstream fixes, thanks to Debian.
* debian/rules, debian/patches/CVE-2008-3143.dpatch,
  debian/patches/CVE-2008-3142.dpatch, debian/patches/CVE-2008-2316.dpatch,
  debian/patches/CVE-2008-2315.dpatch, debian/patches/CVE-2008-3144.dpatch:
  upstream fixes, thanks to Robert Buchholz.
* References
  CVE-2008-1679 CVE-2008-1721 CVE-2008-1887 CVE-2008-2315
  CVE-2008-2316 CVE-2008-3142 CVE-2008-3143 CVE-2008-3144

lp:ubuntu/feisty-updates/python2.5 1 Development 2009-12-09 12:33:48 UTC
29. * SECURITY UPDATE: arbitrary code exe...

Author: Kees Cook
Revision Date: 2008-07-29 16:29:27 UTC

* SECURITY UPDATE: arbitrary code execution via multiple integer overflows.
* debian/rules, debian/patches/CVE-2008-1679.dpatch,
  debian/patches/CVE-2008-1721.dpatch, debian/patches/stringobject.dpatch:
  upstream fixes, thanks to Debian.
* debian/rules, debian/patches/CVE-2008-3143.dpatch,
  debian/patches/CVE-2008-3142.dpatch, debian/patches/CVE-2008-2316.dpatch,
  debian/patches/CVE-2008-2315.dpatch, debian/patches/CVE-2008-3144.dpatch:
  upstream fixes, thanks to Robert Buchholz.
* References
  CVE-2008-1679 CVE-2008-1721 CVE-2008-1887 CVE-2008-2315
  CVE-2008-2316 CVE-2008-3142 CVE-2008-3143 CVE-2008-3144

14 of 4 results