[ubuntu/eoan-proposed] wget 1.20.1-1.1ubuntu1 (Accepted)

Steve Langasek steve.langasek at ubuntu.com
Sun May 5 04:04:14 UTC 2019


wget (1.20.1-1.1ubuntu1) eoan; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Don't Build-Depend on libgnutls28-dev.
    - Pass --with-ssl=openssl
    - Enable parallel builds.
    - debian/patches/disable-SSLv3.patch: properly detect SSLv3 being
      disabled on Ubuntu because the method still exists for ABI reasons.
    - debian/control: add pkg-config to Build-Depends.
  * Dropped changes, included in Debian:
    - debian/patches/CVE-2019-5953-*.patch: fix buffer overflow in
      src/iri.c.

wget (1.20.1-1.1) unstable; urgency=high

  * Non-maintainer upload.
  * Fix a buffer overflow vulnerability (CVE-2019-5953) (Closes: #926389)

Date: Sat, 04 May 2019 21:00:19 -0700
Changed-By: Steve Langasek <steve.langasek at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/wget/1.20.1-1.1ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 04 May 2019 21:00:19 -0700
Source: wget
Architecture: source
Version: 1.20.1-1.1ubuntu1
Distribution: eoan
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Steve Langasek <steve.langasek at ubuntu.com>
Closes: 926389
Changes:
 wget (1.20.1-1.1ubuntu1) eoan; urgency=low
 .
   * Merge from Debian unstable.  Remaining changes:
     - Don't Build-Depend on libgnutls28-dev.
     - Pass --with-ssl=openssl
     - Enable parallel builds.
     - debian/patches/disable-SSLv3.patch: properly detect SSLv3 being
       disabled on Ubuntu because the method still exists for ABI reasons.
     - debian/control: add pkg-config to Build-Depends.
   * Dropped changes, included in Debian:
     - debian/patches/CVE-2019-5953-*.patch: fix buffer overflow in
       src/iri.c.
 .
 wget (1.20.1-1.1) unstable; urgency=high
 .
   * Non-maintainer upload.
   * Fix a buffer overflow vulnerability (CVE-2019-5953) (Closes: #926389)
Checksums-Sha1:
 34aa4078962a6ec2eee82cad9169c6469bcf7111 2291 wget_1.20.1-1.1ubuntu1.dsc
 1f10e689f5d8cb14cd388bbd58c1c3a7335e53a0 63936 wget_1.20.1-1.1ubuntu1.debian.tar.xz
 74575d237b48942c8101fc1f31f48ddeb6cccb07 6731 wget_1.20.1-1.1ubuntu1_source.buildinfo
Checksums-Sha256:
 1efd8f6788bda12c6210b7dd7c2682826ce42c81fbecbd26192bcd54e7e39bf5 2291 wget_1.20.1-1.1ubuntu1.dsc
 19ec21c63d1057a340432d1437556649bfda8225580cac00f8645f56a22a03b7 63936 wget_1.20.1-1.1ubuntu1.debian.tar.xz
 7f794e84d08d80eb0828cc72520f77a0d990ea7dff3f6e72f530513b0d12afbe 6731 wget_1.20.1-1.1ubuntu1_source.buildinfo
Files:
 5f7bfe1737a17b06d72f6c9728d50047 2291 web standard wget_1.20.1-1.1ubuntu1.dsc
 5863cc6d3f8b55a17f7da79e12286e8c 63936 web standard wget_1.20.1-1.1ubuntu1.debian.tar.xz
 7ee56e6b0e0d6b325006a0ff5ae59d44 6731 web standard wget_1.20.1-1.1ubuntu1_source.buildinfo
Original-Maintainer: Noël Köthe <noel at debian.org>

-----BEGIN PGP SIGNATURE-----
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=PymO
-----END PGP SIGNATURE-----


More information about the Eoan-changes mailing list