Branches for Hardy

Name Status Last Modified Last Commit
lp:ubuntu/hardy/blender 2 Mature 2010-01-07 17:14:03 UTC
24. * Merge from Debian unstable. Remaini...

Author: Daniel Hahler
Revision Date: 2008-03-22 03:07:59 UTC

* Merge from Debian unstable. Remaining Ubuntu changes:
  - Add 30_gameengine-libgl-location-fix.dpatch: use correct libGL SONAME,
    otherwise blender will not start if e.g. libgl1-mesa-dev is missing
  - debian/control
    + Build-depends: python2.5-dev instead of 2.4
    + DebianMaintainerField
  - debian/patches/50_debian_build_config: use BF_PYTHON_VERSION=2.5
* debian/misc/blender-{fullscreen,windowed}.desktop:
  - Fix desktop files (add GenericName, drop extension for Icon, fix syntax
    for MimeType)
  - Add german translation

lp:ubuntu/hardy-security/blender 2 Mature 2009-07-26 02:19:19 UTC
25. * SECURITY UPDATE: Stack-based buffer...

Author: Stefan Lesicnik
Revision Date: 2009-01-21 10:01:23 UTC

* SECURITY UPDATE: Stack-based buffer overflow in the imb_loadhdr
  function in Blender 2.45 allows user-assisted remote attackers
  to execute arbitrary code via a .blend file that contains a crafted
  Radiance RGBE image (LP: #222592)
  - 20_CVE-2008-1102.diff: Upstream patch to address stack overflow.
  - CVE-2008-1102
* SECURITY UPDATE: Untrusted search path vulnerability in BPY_interface in
  Blender 2.46 allows local users to execute arbitrary code via a Trojan
  horse Python file in the current working directory, related to an
  erroneous setting of sys.path by the PySys_SetArgv function. (LP: #319501)
  - 01_sanitize_sys.path: Debian patch to no longer load modules from
    current dir. Slightly modified from Debian patch as per recommendation
    from debian patch author.
  - CVE-2008-4863

lp:ubuntu/hardy-updates/blender bug 2 Mature 2009-07-26 02:20:44 UTC
25. * SECURITY UPDATE: Stack-based buffer...

Author: Stefan Lesicnik
Revision Date: 2009-01-21 10:01:23 UTC

* SECURITY UPDATE: Stack-based buffer overflow in the imb_loadhdr
  function in Blender 2.45 allows user-assisted remote attackers
  to execute arbitrary code via a .blend file that contains a crafted
  Radiance RGBE image (LP: #222592)
  - 20_CVE-2008-1102.diff: Upstream patch to address stack overflow.
  - CVE-2008-1102
* SECURITY UPDATE: Untrusted search path vulnerability in BPY_interface in
  Blender 2.46 allows local users to execute arbitrary code via a Trojan
  horse Python file in the current working directory, related to an
  erroneous setting of sys.path by the PySys_SetArgv function. (LP: #319501)
  - 01_sanitize_sys.path: Debian patch to no longer load modules from
    current dir. Slightly modified from Debian patch as per recommendation
    from debian patch author.
  - CVE-2008-4863

13 of 3 results