[ubuntu/mantic-proposed] llvm-toolchain-14 1:14.0.6-12ubuntu1 (Accepted)
Nishit Majithia
nishit.majithia at canonical.com
Mon Jul 31 05:46:52 UTC 2023
llvm-toolchain-14 (1:14.0.6-12ubuntu1) mantic; urgency=medium
* SECURITY UPDATE: canonicalize pass crashed with segmentation fault
- debian/patches/CVE-2023-29932.patch: Use default attributes for
intrinsics
- CVE-2023-29932
* SECURITY UPDATE: convert-scf-to-spirv Pass crashed with segmentation
fault
- debian/patches/CVE-2023-29934.patch: Account for type conversion
failures in scf-to-spirv
- CVE-2023-29934
* SECURITY UPDATE: spirv-lower-abi-attrs crashes with segmentation faults
- debian/patches/CVE-2023-29939.patch: Fix crash in
spirv-lower-abi-attributes when the are no SPIR-V env attributes
- CVE-2023-29939
Date: Fri, 14 Jul 2023 12:42:04 +0530
Changed-By: Nishit Majithia <nishit.majithia at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Alex Murray <alex.murray at canonical.com>
https://launchpad.net/ubuntu/+source/llvm-toolchain-14/1:14.0.6-12ubuntu1
-------------- next part --------------
Format: 1.8
Date: Fri, 14 Jul 2023 12:42:04 +0530
Source: llvm-toolchain-14
Built-For-Profiles: noudeb
Architecture: source
Version: 1:14.0.6-12ubuntu1
Distribution: mantic
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Nishit Majithia <nishit.majithia at canonical.com>
Changes:
llvm-toolchain-14 (1:14.0.6-12ubuntu1) mantic; urgency=medium
.
* SECURITY UPDATE: canonicalize pass crashed with segmentation fault
- debian/patches/CVE-2023-29932.patch: Use default attributes for
intrinsics
- CVE-2023-29932
* SECURITY UPDATE: convert-scf-to-spirv Pass crashed with segmentation
fault
- debian/patches/CVE-2023-29934.patch: Account for type conversion
failures in scf-to-spirv
- CVE-2023-29934
* SECURITY UPDATE: spirv-lower-abi-attrs crashes with segmentation faults
- debian/patches/CVE-2023-29939.patch: Fix crash in
spirv-lower-abi-attributes when the are no SPIR-V env attributes
- CVE-2023-29939
Checksums-Sha1:
51c47166049f2b4d4ea1fc39da03cd10668b287d 7498 llvm-toolchain-14_14.0.6-12ubuntu1.dsc
595087653d658a7776835b87aafd67200e9e999e 165300 llvm-toolchain-14_14.0.6-12ubuntu1.debian.tar.xz
6bacb0428a47dbaa8bf38048ece48db7c521408c 12338 llvm-toolchain-14_14.0.6-12ubuntu1_source.buildinfo
Checksums-Sha256:
34cbe31c02839fbcb34ac0b0d452692c6c8ca7e3008a8cf2354a92008ea56d24 7498 llvm-toolchain-14_14.0.6-12ubuntu1.dsc
7b7567f897965842a85a196898ed39d1c4c8d841b84ceeb7b9aa918c02399582 165300 llvm-toolchain-14_14.0.6-12ubuntu1.debian.tar.xz
47644d03c5984b315f2a3c97bed514129f403225729474b8a5d57ae5df2538b2 12338 llvm-toolchain-14_14.0.6-12ubuntu1_source.buildinfo
Files:
67c701fe6e835e87caa19f961b1385be 7498 devel optional llvm-toolchain-14_14.0.6-12ubuntu1.dsc
7a40ef8befe5faf893a729d5cc4bb554 165300 devel optional llvm-toolchain-14_14.0.6-12ubuntu1.debian.tar.xz
a72e6911cb53a972e90087a3d8b30a39 12338 devel optional llvm-toolchain-14_14.0.6-12ubuntu1_source.buildinfo
Original-Maintainer: LLVM Packaging Team <pkg-llvm-team at lists.alioth.debian.org>
More information about the mantic-changes
mailing list