[ubuntu/xenial-proposed] livecd-rootfs 2.408.18 (Accepted)

2017-09-13 Thread Steve Langasek
livecd-rootfs (2.408.18) xenial; urgency=medium

  [ Robert C Jennings ]
  * Install udev before calls to udevadm

Date: Wed, 13 Sep 2017 22:10:11 -0700
Changed-By: Steve Langasek 
Maintainer: Ubuntu Developers 
https://launchpad.net/ubuntu/+source/livecd-rootfs/2.408.18
Format: 1.8
Date: Wed, 13 Sep 2017 22:10:11 -0700
Source: livecd-rootfs
Binary: livecd-rootfs
Architecture: source
Version: 2.408.18
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Steve Langasek 
Description:
 livecd-rootfs - construction script for the livecd rootfs
Changes:
 livecd-rootfs (2.408.18) xenial; urgency=medium
 .
   [ Robert C Jennings ]
   * Install udev before calls to udevadm
Checksums-Sha1:
 e42730cf53e024f2be84ab8ce06d643661a5a5f6 1578 livecd-rootfs_2.408.18.dsc
 6d48e018629373e43af22a952b9440423b106f8a 86112 livecd-rootfs_2.408.18.tar.xz
Checksums-Sha256:
 867265c2276ae6275c6aa7f3eb5cfcff46b3932e5385dca5c6d2d48f7fb43118 1578 
livecd-rootfs_2.408.18.dsc
 e2b91c50c45d7c6aa102de2ac86166dc8eb113a4a6bb4ad9fd1ee544a05679ac 86112 
livecd-rootfs_2.408.18.tar.xz
Files:
 93cdcca072a92c659b9defd3741d8560 1578 devel optional livecd-rootfs_2.408.18.dsc
 5509ddd967daab2c117ba66c5723bfcb 86112 devel optional 
livecd-rootfs_2.408.18.tar.xz
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] tcpdump 4.9.2-0ubuntu0.16.04.1 (Accepted)

2017-09-13 Thread Ubuntu Archive Robot
tcpdump (4.9.2-0ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: multiple security issues in tcpdump
- CVE-2017-13011: buffer overflow in util-print.c:
  bittok2str_internal().
- CVE-2017-12989: RESP parser infinite loop in print-resp.c:
  resp_get_length().
- CVE-2017-12990: ISAKMP parser infinite loops in print-isakmp.c,
  several functions.
- CVE-2017-12995 DNS parser infinite loop in print-domain.c:
  ns_print().
- CVE-2017-12997: LLDP parser infinite loop in print-lldp.c:
  lldp_private_8021_print().
- CVE-2017-12893: buffer over-read in smbutil.c:name_len().
- CVE-2017-12894: buffer over-read in addrtoname.c:
  lookup_bytestring().
- CVE-2017-12895: buffer over-read in print-icmp.c:icmp_print().
- CVE-2017-12896: buffer over-read in print-isakmp.c:
  isakmp_rfc3948_print().
- CVE-2017-12897: buffer over-read in print-isoclns.c:
  isoclns_print().
- CVE-2017-12898: buffer over-read in print-nfs.c:interp_reply().
- CVE-2017-12899: buffer over-read in print-decnet.c:
  decnet_print().
- CVE-2017-12900: buffer over-read in util-print.c:tok2strbuf().
- CVE-2017-12901: buffer over-read in print-eigrp.c:eigrp_print().
- CVE-2017-12902: buffer over-read in print-zephyr.c, several
  functions.
- CVE-2017-12985: buffer over-read in print-ip6.c:ip6_print().
- CVE-2017-12986: buffer over-read in print-rt6.c:rt6_print().
- CVE-2017-12987: buffer over-read in print-802_11.c:
  parse_elements().
- CVE-2017-12988: buffer over-read in print-telnet.c:
  telnet_parse().
- CVE-2017-12991: buffer over-read in print-bgp.c:bgp_attr_print().
- CVE-2017-12992: buffer over-read in print-ripng.c:ripng_print().
- CVE-2017-12993: buffer over-read in print-juniper.c, several
  functions.
- CVE-2017-12994: buffer over-read in print-bgp.c:bgp_attr_print().
- CVE-2017-12996: buffer over-read in print-pim.c:pimv2_print().
- CVE-2017-12998: buffer over-read in print-isoclns.c:
  isis_print_extd_ip_reach().
- CVE-2017-12999: buffer over-read in print-isoclns.c:isis_print().
- CVE-2017-13000: buffer over-read in print-802_15_4.c:
  ieee802_15_4_if_print().
- CVE-2017-13001: buffer over-read in print-nfs.c:nfs_printfh().
- CVE-2017-13002: buffer over-read in print-aodv.c:
  aodv_extension().
- CVE-2017-13003: buffer over-read in print-lmp.c:lmp_print().
- CVE-2017-13004: buffer over-read in print-juniper.c:
  juniper_parse_header().
- CVE-2017-13005: buffer over-read in print-nfs.c:xid_map_enter().
- CVE-2017-13006: buffer over-read in print-l2tp.c, several
  functions.
- CVE-2017-13007: buffer over-read in print-pktap.c:
  pktap_if_print().
- CVE-2017-13008: buffer over-read in print-802_11.c:
  parse_elements().
- CVE-2017-13009: buffer over-read in print-mobility.c:
  mobility_print().
- CVE-2017-13010: buffer over-read in print-beep.c:l_strnstart().
- CVE-2017-13012: buffer over-read in print-icmp.c:icmp_print().
- CVE-2017-13013: buffer over-read in print-arp.c, several
  functions.
- CVE-2017-13014: buffer over-read in print-wb.c:wb_prep(), several
  functions.
- CVE-2017-13015: buffer over-read in print-eap.c:eap_print().
- CVE-2017-13016: buffer over-read in print-isoclns.c:esis_print().
- CVE-2017-13017: buffer over-read in print-dhcp6.c:
  dhcp6opt_print().
- CVE-2017-13018: buffer over-read in print-pgm.c:pgm_print().
- CVE-2017-13019: buffer over-read in print-pgm.c:pgm_print().
- CVE-2017-13020: buffer over-read in print-vtp.c:vtp_print().
- CVE-2017-13021: buffer over-read in print-icmp6.c:icmp6_print().
- CVE-2017-13022: buffer over-read in print-ip.c:ip_printroute().
- CVE-2017-13023, CVE-2017-13024, CVE-2017-13025: multiple buffer
  over-reads in print-mobility.c:mobility_opt_print().
- CVE-2017-13026: buffer over-read in print-isoclns.c, several functions.
- CVE-2017-13027: buffer over-read in print-lldp.c:
  lldp_mgmt_addr_tlv_print().
- CVE-2017-13028: buffer over-read in print-bootp.c:bootp_print().
- CVE-2017-13029: buffer over-read in print-ppp.c:
  print_ccp_config_options().
- CVE-2017-13030: buffer over-read in print-pim.c, several functions.
- CVE-2017-13031: buffer over-read in print-frag6.c:frag6_print().
- CVE-2017-13032: buffer over-read in print-radius.c:print_attr_string().
- CVE-2017-13033: buffer over-read in print-vtp.c:vtp_print().
- CVE-2017-13034: buffer over-read in print-pgm.c:pgm_print().
- CVE-2017-13035: buffer over-read in print-isoclns.c:isis_print_id().
- CVE-2017-13036: buffer over-read in print-ospf6.c:ospf6_decode_v3().
- CVE-2017-13037: buffer over-read in print-ip.c:ip_printts().
- CVE-2017-13038: buffer over-read in print-ppp.c:handle_mlppp().
- CVE-2017-13039: buffer over-read in print-isakmp.c, several
  

[ubuntu/xenial-security] tcpdump 4.9.2-0ubuntu0.16.04.1 (Accepted)

2017-09-13 Thread Steve Beattie
tcpdump (4.9.2-0ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: multiple security issues in tcpdump
- CVE-2017-13011: buffer overflow in util-print.c:
  bittok2str_internal().
- CVE-2017-12989: RESP parser infinite loop in print-resp.c:
  resp_get_length().
- CVE-2017-12990: ISAKMP parser infinite loops in print-isakmp.c,
  several functions.
- CVE-2017-12995 DNS parser infinite loop in print-domain.c:
  ns_print().
- CVE-2017-12997: LLDP parser infinite loop in print-lldp.c:
  lldp_private_8021_print().
- CVE-2017-12893: buffer over-read in smbutil.c:name_len().
- CVE-2017-12894: buffer over-read in addrtoname.c:
  lookup_bytestring().
- CVE-2017-12895: buffer over-read in print-icmp.c:icmp_print().
- CVE-2017-12896: buffer over-read in print-isakmp.c:
  isakmp_rfc3948_print().
- CVE-2017-12897: buffer over-read in print-isoclns.c:
  isoclns_print().
- CVE-2017-12898: buffer over-read in print-nfs.c:interp_reply().
- CVE-2017-12899: buffer over-read in print-decnet.c:
  decnet_print().
- CVE-2017-12900: buffer over-read in util-print.c:tok2strbuf().
- CVE-2017-12901: buffer over-read in print-eigrp.c:eigrp_print().
- CVE-2017-12902: buffer over-read in print-zephyr.c, several
  functions.
- CVE-2017-12985: buffer over-read in print-ip6.c:ip6_print().
- CVE-2017-12986: buffer over-read in print-rt6.c:rt6_print().
- CVE-2017-12987: buffer over-read in print-802_11.c:
  parse_elements().
- CVE-2017-12988: buffer over-read in print-telnet.c:
  telnet_parse().
- CVE-2017-12991: buffer over-read in print-bgp.c:bgp_attr_print().
- CVE-2017-12992: buffer over-read in print-ripng.c:ripng_print().
- CVE-2017-12993: buffer over-read in print-juniper.c, several
  functions.
- CVE-2017-12994: buffer over-read in print-bgp.c:bgp_attr_print().
- CVE-2017-12996: buffer over-read in print-pim.c:pimv2_print().
- CVE-2017-12998: buffer over-read in print-isoclns.c:
  isis_print_extd_ip_reach().
- CVE-2017-12999: buffer over-read in print-isoclns.c:isis_print().
- CVE-2017-13000: buffer over-read in print-802_15_4.c:
  ieee802_15_4_if_print().
- CVE-2017-13001: buffer over-read in print-nfs.c:nfs_printfh().
- CVE-2017-13002: buffer over-read in print-aodv.c:
  aodv_extension().
- CVE-2017-13003: buffer over-read in print-lmp.c:lmp_print().
- CVE-2017-13004: buffer over-read in print-juniper.c:
  juniper_parse_header().
- CVE-2017-13005: buffer over-read in print-nfs.c:xid_map_enter().
- CVE-2017-13006: buffer over-read in print-l2tp.c, several
  functions.
- CVE-2017-13007: buffer over-read in print-pktap.c:
  pktap_if_print().
- CVE-2017-13008: buffer over-read in print-802_11.c:
  parse_elements().
- CVE-2017-13009: buffer over-read in print-mobility.c:
  mobility_print().
- CVE-2017-13010: buffer over-read in print-beep.c:l_strnstart().
- CVE-2017-13012: buffer over-read in print-icmp.c:icmp_print().
- CVE-2017-13013: buffer over-read in print-arp.c, several
  functions.
- CVE-2017-13014: buffer over-read in print-wb.c:wb_prep(), several
  functions.
- CVE-2017-13015: buffer over-read in print-eap.c:eap_print().
- CVE-2017-13016: buffer over-read in print-isoclns.c:esis_print().
- CVE-2017-13017: buffer over-read in print-dhcp6.c:
  dhcp6opt_print().
- CVE-2017-13018: buffer over-read in print-pgm.c:pgm_print().
- CVE-2017-13019: buffer over-read in print-pgm.c:pgm_print().
- CVE-2017-13020: buffer over-read in print-vtp.c:vtp_print().
- CVE-2017-13021: buffer over-read in print-icmp6.c:icmp6_print().
- CVE-2017-13022: buffer over-read in print-ip.c:ip_printroute().
- CVE-2017-13023, CVE-2017-13024, CVE-2017-13025: multiple buffer
  over-reads in print-mobility.c:mobility_opt_print().
- CVE-2017-13026: buffer over-read in print-isoclns.c, several functions.
- CVE-2017-13027: buffer over-read in print-lldp.c:
  lldp_mgmt_addr_tlv_print().
- CVE-2017-13028: buffer over-read in print-bootp.c:bootp_print().
- CVE-2017-13029: buffer over-read in print-ppp.c:
  print_ccp_config_options().
- CVE-2017-13030: buffer over-read in print-pim.c, several functions.
- CVE-2017-13031: buffer over-read in print-frag6.c:frag6_print().
- CVE-2017-13032: buffer over-read in print-radius.c:print_attr_string().
- CVE-2017-13033: buffer over-read in print-vtp.c:vtp_print().
- CVE-2017-13034: buffer over-read in print-pgm.c:pgm_print().
- CVE-2017-13035: buffer over-read in print-isoclns.c:isis_print_id().
- CVE-2017-13036: buffer over-read in print-ospf6.c:ospf6_decode_v3().
- CVE-2017-13037: buffer over-read in print-ip.c:ip_printts().
- CVE-2017-13038: buffer over-read in print-ppp.c:handle_mlppp().
- CVE-2017-13039: buffer over-read in print-isakmp.c, several
  

[ubuntu/xenial-proposed] gcc-5 5.4.0-6ubuntu1~16.04.5 (Accepted)

2017-09-13 Thread Matthias Klose
gcc-5 (5.4.0-6ubuntu1~16.04.5) xenial-proposed; urgency=medium

  * SRU
  * Fix PR target/77267 (x86), taken from the trunk. LP: #1623418.
  * Fix hangs w/ asan binaries on arm64 (Dann Frazier). LP: #1709727.
  * Linaro branch only: Fix PR target/79041, aarch64 backend emitting
R_AARCH64_ADR_PREL_PG_HI21 relocation despite -mpc-relative-literal-loads
option being used (Dan Frazier). LP: #1695093.

Date: Wed, 23 Aug 2017 11:35:00 +0200
Changed-By: Matthias Klose 
Maintainer: Ubuntu Core developers 
https://launchpad.net/ubuntu/+source/gcc-5/5.4.0-6ubuntu1~16.04.5
Format: 1.8
Date: Wed, 23 Aug 2017 11:35:00 +0200
Source: gcc-5
Binary: gcc-5-base libgcc-5-dev libgcc4 libgcc4-dbg lib64gcc-5-dev 
lib32gcc-5-dev libhfgcc-5-dev libsfgcc-5-dev libn32gcc-5-dev libx32gcc-5-dev 
gcc-5 gcc-5-multilib gcc-5-test-results gcc-5-plugin-dev gcc-5-hppa64-linux-gnu 
cpp-5 cpp-5-doc gcc-5-locales g++-5 g++-5-multilib libgomp1 libgomp1-dbg 
lib32gomp1 lib32gomp1-dbg lib64gomp1 lib64gomp1-dbg libn32gomp1 libn32gomp1-dbg 
libx32gomp1 libx32gomp1-dbg libhfgomp1 libhfgomp1-dbg libsfgomp1 libsfgomp1-dbg 
libitm1 libitm1-dbg lib32itm1 lib32itm1-dbg lib64itm1 lib64itm1-dbg libx32itm1 
libx32itm1-dbg libhfitm1 libhfitm1-dbg libsfitm1 libsfitm1-dbg libatomic1 
libatomic1-dbg lib32atomic1 lib32atomic1-dbg lib64atomic1 lib64atomic1-dbg 
libn32atomic1 libn32atomic1-dbg libx32atomic1 libx32atomic1-dbg libhfatomic1 
libhfatomic1-dbg libsfatomic1 libsfatomic1-dbg libasan2 libasan2-dbg lib32asan2 
lib32asan2-dbg lib64asan2 lib64asan2-dbg libx32asan2 libx32asan2-dbg libhfasan2 
libhfasan2-dbg libsfasan2 libsfasan2-dbg liblsan0 liblsan0-dbg
 lib32lsan0 lib32lsan0-dbg libx32lsan0 libx32lsan0-dbg libtsan0 libtsan0-dbg 
libubsan0 libubsan0-dbg lib32ubsan0 lib32ubsan0-dbg lib64ubsan0 lib64ubsan0-dbg 
libx32ubsan0 libx32ubsan0-dbg libhfubsan0 libhfubsan0-dbg libsfubsan0 
libsfubsan0-dbg libcilkrts5 libcilkrts5-dbg lib32cilkrts5 lib32cilkrts5-dbg 
lib64cilkrts5 lib64cilkrts5-dbg libx32cilkrts5 libx32cilkrts5-dbg libmpx0 
libmpx0-dbg lib32mpx0 lib32mpx0-dbg lib64mpx0 lib64mpx0-dbg libquadmath0 
libquadmath0-dbg lib32quadmath0 lib32quadmath0-dbg lib64quadmath0 
lib64quadmath0-dbg libx32quadmath0 libx32quadmath0-dbg libhfquadmath0 
libhfquadmath0-dbg libsfquadmath0 libsfquadmath0-dbg libcc1-0 libgccjit0 
libgccjit-5-dbg libgccjit-5-doc libgccjit-5-dev gobjc++-5 gobjc++-5-multilib 
gobjc-5 gobjc-5-multilib libobjc-5-dev lib64objc-5-dev lib32objc-5-dev 
libn32objc-5-dev libx32objc-5-dev libhfobjc-5-dev libsfobjc-5-dev libobjc4 
libobjc4-dbg lib64objc4 lib64objc4-dbg lib32objc4 lib32objc4-dbg libn32objc4 
libn32objc4-dbg
 libx32objc4 libx32objc4-dbg libhfobjc4 libhfobjc4-dbg libsfobjc4 
libsfobjc4-dbg gfortran-5 gfortran-5-multilib gfortran-5-doc libgfortran-5-dev 
lib64gfortran-5-dev lib32gfortran-5-dev libn32gfortran-5-dev 
libx32gfortran-5-dev libhfgfortran-5-dev libsfgfortran-5-dev libgfortran3 
libgfortran3-dbg lib64gfortran3 lib64gfortran3-dbg lib32gfortran3 
lib32gfortran3-dbg libn32gfortran3 libn32gfortran3-dbg libx32gfortran3 
libx32gfortran3-dbg libhfgfortran3 libhfgfortran3-dbg libsfgfortran3 
libsfgfortran3-dbg gccgo-5 gccgo-5-multilib gccgo-5-doc libgo7 libgo7-dbg 
lib64go7 lib64go7-dbg lib32go7 lib32go7-dbg libn32go7 libn32go7-dbg libx32go7 
libx32go7-dbg gcj-5 gcj-5-jdk gcj-5-jre-headless gcj-5-jre libgcj16 
gcj-5-jre-lib libgcj16-awt libgcj16-dev libgcj16-dbg gcj-5-source libgcj-doc 
libstdc++6 lib32stdc++6 lib64stdc++6 libn32stdc++6 libx32stdc++6 libhfstdc++6 
libsfstdc++6 libstdc++-5-dev libstdc++-5-pic libstdc++6-5-dbg lib32stdc++-5-dev 
lib32stdc++6-5-dbg lib64stdc++-5-dev
 lib64stdc++6-5-dbg libn32stdc++-5-dev libn32stdc++6-5-dbg libx32stdc++-5-dev 
libx32stdc++6-5-dbg libhfstdc++-5-dev libhfstdc++6-5-dbg libsfstdc++-5-dev 
libsfstdc++6-5-dbg libstdc++-5-doc gnat-5 gnat-5-sjlj libgnat-5 libgnat-5-dbg 
libgnatvsn5-dev libgnatvsn5 libgnatvsn5-dbg libgnatprj5-dev libgnatprj5 
libgnatprj5-dbg gnat-5-doc gdc-5 gdc-5-multilib libphobos-5-dev 
lib64phobos-5-dev lib32phobos-5-dev libx32phobos-5-dev libhfphobos-5-dev 
libsfphobos-5-dev fixincludes gcc-5-doc
 gcc-5-source
Architecture: source
Version: 5.4.0-6ubuntu1~16.04.5
Distribution: xenial-proposed
Urgency: medium
Maintainer: Ubuntu Core developers 
Changed-By: Matthias Klose 
Description:
 cpp-5  - GNU C preprocessor
 cpp-5-doc  - Documentation for the GNU C preprocessor (cpp)
 fixincludes - Fix non-ANSI header files
 g++-5  - GNU C++ compiler
 g++-5-multilib - GNU C++ compiler (multilib support)
 gcc-5  - GNU C compiler
 gcc-5-base - GCC, the GNU Compiler Collection (base package)
 gcc-5-doc  - Documentation for the GNU compilers (gcc, gobjc, g++)
 gcc-5-hppa64-linux-gnu - GNU C compiler (cross compiler for hppa64)
 gcc-5-locales - GCC, the GNU compiler collection (native language support 
files)
 gcc-5-multilib - GNU C compiler (multilib support)
 

[ubuntu/xenial-proposed] linux-meta-snapdragon 4.4.0.1076.68 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-meta-snapdragon (4.4.0.1076.68) xenial; urgency=medium

  * Bump ABI 4.4.0-1076

Date: 2017-09-12 16:43:04.146374+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta-snapdragon/4.4.0.1076.68
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-snapdragon 4.4.0-1076.81 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-snapdragon (4.4.0-1076.81) xenial; urgency=low

  * linux-snapdragon: 4.4.0-1076.81 -proposed tracker (LP: #1716619)

  [ Ubuntu: 4.4.0-96.119 ]

  * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613)
  * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399)
- s390/mm: no local TLB flush for clearing-by-ASCE IDTE
- SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space
- SAUCE: s390/mm: fix race on mm->context.flush_mm
  * CVE-2017-1000251
- Bluetooth: Properly check L2CAP config option output buffer length

Date: 2017-09-12 16:42:12.795464+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1076.81
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] livecd-rootfs 2.408.17 (Accepted)

2017-09-13 Thread Steve Langasek
livecd-rootfs (2.408.17) xenial; urgency=medium

  [ Robert C Jennings ]
  * live-build/ubuntu-cpc/functions: Add a function, teardown_mountpoint,
to reverse the work done in setup_mountpoint.  Lack of this function
has forced users of setup_mountpoint to implement this separately
and the implementations have diverged. (LP: #1716992)
  * live-build/ubuntu-cpc/functions: Remove umount_settle function.
The was only used where teardown_mountpoint was lacking.

Date: Wed, 13 Sep 2017 12:21:30 -0700
Changed-By: Steve Langasek 
Maintainer: Ubuntu Developers 
https://launchpad.net/ubuntu/+source/livecd-rootfs/2.408.17
Format: 1.8
Date: Wed, 13 Sep 2017 12:21:30 -0700
Source: livecd-rootfs
Binary: livecd-rootfs
Architecture: source
Version: 2.408.17
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Steve Langasek 
Description:
 livecd-rootfs - construction script for the livecd rootfs
Launchpad-Bugs-Fixed: 1716992
Changes:
 livecd-rootfs (2.408.17) xenial; urgency=medium
 .
   [ Robert C Jennings ]
   * live-build/ubuntu-cpc/functions: Add a function, teardown_mountpoint,
 to reverse the work done in setup_mountpoint.  Lack of this function
 has forced users of setup_mountpoint to implement this separately
 and the implementations have diverged. (LP: #1716992)
   * live-build/ubuntu-cpc/functions: Remove umount_settle function.
 The was only used where teardown_mountpoint was lacking.
Checksums-Sha1:
 39c3d7ee422729b2594e06059246259b61cc 1578 livecd-rootfs_2.408.17.dsc
 653684652ec79baceec118a229464b22c32a1616 86076 livecd-rootfs_2.408.17.tar.xz
Checksums-Sha256:
 32798235ff19f1f90af427913415111809ce419be6235274d40f357b44c4661b 1578 
livecd-rootfs_2.408.17.dsc
 19a039ffeb4c312f2be874586d1162fd0186dc76c982eba30b2e0cca353005cb 86076 
livecd-rootfs_2.408.17.tar.xz
Files:
 2508b57c4ff02127ffee83e63abfe989 1578 devel optional livecd-rootfs_2.408.17.dsc
 9467e4f4bf1347ca5860213694be1dcf 86076 devel optional 
livecd-rootfs_2.408.17.tar.xz
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-raspi2 4.4.0.1074.74 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-meta-raspi2 (4.4.0.1074.74) xenial; urgency=medium

  * Bump ABI 4.4.0-1074

Date: 2017-09-12 15:57:21.611647+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta-raspi2/4.4.0.1074.74
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-raspi2 4.4.0-1074.82 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-raspi2 (4.4.0-1074.82) xenial; urgency=low

  * linux-raspi2: 4.4.0-1074.82 -proposed tracker (LP: #1716618)

  [ Ubuntu: 4.4.0-96.119 ]

  * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613)
  * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399)
- s390/mm: no local TLB flush for clearing-by-ASCE IDTE
- SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space
- SAUCE: s390/mm: fix race on mm->context.flush_mm
  * CVE-2017-1000251
- Bluetooth: Properly check L2CAP config option output buffer length

Date: 2017-09-12 15:56:15.343503+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1074.82
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-kvm 4.4.0.1007.7 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-meta-kvm (4.4.0.1007.7) xenial; urgency=medium

  * Bump ABI 4.4.0-1007

Date: 2017-09-12 18:26:56.081215+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta-kvm/4.4.0.1007.7
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-kvm 4.4.0-1007.12 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-kvm (4.4.0-1007.12) xenial; urgency=low

  * linux-kvm: 4.4.0-1007.12 -proposed tracker (LP: #1716622)

  [ Ubuntu: 4.4.0-96.119 ]

  * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613)
  * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399)
- s390/mm: no local TLB flush for clearing-by-ASCE IDTE
- SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space
- SAUCE: s390/mm: fix race on mm->context.flush_mm
  * CVE-2017-1000251
- Bluetooth: Properly check L2CAP config option output buffer length

Date: 2017-09-12 18:26:13.931159+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1007.12
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-gke 4.4.0.1031.32 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-meta-gke (4.4.0.1031.32) xenial; urgency=medium

  * Bump ABI 4.4.0-1031

Date: 2017-09-12 18:01:19.652109+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta-gke/4.4.0.1031.32
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-gke 4.4.0-1031.31 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-gke (4.4.0-1031.31) xenial; urgency=low

  * linux-gke: 4.4.0-1031.31 -proposed tracker (LP: #1716621)

  [ Ubuntu: 4.4.0-96.119 ]

  * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613)
  * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399)
- s390/mm: no local TLB flush for clearing-by-ASCE IDTE
- SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space
- SAUCE: s390/mm: fix race on mm->context.flush_mm
  * CVE-2017-1000251
- Bluetooth: Properly check L2CAP config option output buffer length

Date: 2017-09-12 18:00:18.657190+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-gke/4.4.0-1031.31
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-gcp 4.10.0.1006.8 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-meta-gcp (4.10.0.1006.8) xenial; urgency=medium

  * Bump ABI 4.10.0-1006

Date: 2017-09-13 09:46:45.324117+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.10.0.1006.8
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-gcp 4.10.0-1006.6 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-gcp (4.10.0-1006.6) xenial; urgency=low

  * linux-gcp: 4.10.0-1006.6 -proposed tracker (LP: #1716609)

  [ Ubuntu: 4.10.0-35.39 ]

  * linux: 4.10.0-35.39 -proposed tracker (LP: #1716606)
  * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399)
- SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space
- SAUCE: s390/mm: fix race on mm->context.flush_mm
  * CVE-2017-1000251
- Bluetooth: Properly check L2CAP config option output buffer length

Date: 2017-09-13 09:46:13.390199+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-gcp/4.10.0-1006.6
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-aws 4.4.0.1035.37 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-meta-aws (4.4.0.1035.37) xenial; urgency=medium

  * Bump ABI 4.4.0-1035

Date: 2017-09-12 17:25:06.157923+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta-aws/4.4.0.1035.37
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-aws 4.4.0-1035.44 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-aws (4.4.0-1035.44) xenial; urgency=low

  * linux-aws: 4.4.0-1035.44 -proposed tracker (LP: #1716620)

  [ Ubuntu: 4.4.0-96.119 ]

  * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613)
  * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399)
- s390/mm: no local TLB flush for clearing-by-ASCE IDTE
- SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space
- SAUCE: s390/mm: fix race on mm->context.flush_mm
  * CVE-2017-1000251
- Bluetooth: Properly check L2CAP config option output buffer length

Date: 2017-09-12 17:24:13.944098+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1035.44
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-signed 4.4.0-96.119 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-signed (4.4.0-96.119) xenial; urgency=medium

  * Version 4.4.0-96.119

Date: 2017-09-12 14:56:15.356763+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-signed/4.4.0-96.119
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta 4.4.0.96.101 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux-meta (4.4.0.96.101) xenial; urgency=medium

  * Bump ABI 4.4.0-96

Date: 2017-09-12 14:56:12.778175+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta/4.4.0.96.101
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux_4.4.0-96.119_amd64.tar.gz - (Accepted)

2017-09-13 Thread Stefan Bader
linux (4.4.0-96.119) xenial; urgency=low

  * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613)

  * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399)
- s390/mm: no local TLB flush for clearing-by-ASCE IDTE
- SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space
- SAUCE: s390/mm: fix race on mm->context.flush_mm

  * CVE-2017-1000251
- Bluetooth: Properly check L2CAP config option output buffer length

Date: Tue, 12 Sep 2017 15:40:01 +0200
Changed-By: Stefan Bader 
Maintainer: Launchpad Build Daemon 

Format: 1.8
Date: Tue, 12 Sep 2017 15:40:01 +0200
Source: linux
Binary: linux-source-4.4.0 linux-doc linux-headers-4.4.0-96 linux-libc-dev 
linux-tools-common linux-tools-4.4.0-96 linux-cloud-tools-common 
linux-cloud-tools-4.4.0-96 linux-image-4.4.0-96-generic 
linux-image-extra-4.4.0-96-generic linux-headers-4.4.0-96-generic 
linux-image-4.4.0-96-generic-dbgsym linux-tools-4.4.0-96-generic 
linux-cloud-tools-4.4.0-96-generic linux-udebs-generic 
linux-image-4.4.0-96-generic-lpae linux-image-extra-4.4.0-96-generic-lpae 
linux-headers-4.4.0-96-generic-lpae linux-image-4.4.0-96-generic-lpae-dbgsym 
linux-tools-4.4.0-96-generic-lpae linux-cloud-tools-4.4.0-96-generic-lpae 
linux-udebs-generic-lpae linux-image-4.4.0-96-lowlatency 
linux-image-extra-4.4.0-96-lowlatency linux-headers-4.4.0-96-lowlatency 
linux-image-4.4.0-96-lowlatency-dbgsym linux-tools-4.4.0-96-lowlatency 
linux-cloud-tools-4.4.0-96-lowlatency linux-udebs-lowlatency 
linux-image-4.4.0-96-powerpc-e500mc linux-image-extra-4.4.0-96-powerpc-e500mc 
linux-headers-4.4.0-96-powerpc-e500mc
 linux-image-4.4.0-96-powerpc-e500mc-dbgsym linux-tools-4.4.0-96-powerpc-e500mc 
linux-cloud-tools-4.4.0-96-powerpc-e500mc linux-udebs-powerpc-e500mc 
linux-image-4.4.0-96-powerpc-smp linux-image-extra-4.4.0-96-powerpc-smp 
linux-headers-4.4.0-96-powerpc-smp linux-image-4.4.0-96-powerpc-smp-dbgsym 
linux-tools-4.4.0-96-powerpc-smp linux-cloud-tools-4.4.0-96-powerpc-smp 
linux-udebs-powerpc-smp linux-image-4.4.0-96-powerpc64-emb 
linux-image-extra-4.4.0-96-powerpc64-emb linux-headers-4.4.0-96-powerpc64-emb 
linux-image-4.4.0-96-powerpc64-emb-dbgsym linux-tools-4.4.0-96-powerpc64-emb 
linux-cloud-tools-4.4.0-96-powerpc64-emb linux-udebs-powerpc64-emb 
linux-image-4.4.0-96-powerpc64-smp linux-image-extra-4.4.0-96-powerpc64-smp 
linux-headers-4.4.0-96-powerpc64-smp linux-image-4.4.0-96-powerpc64-smp-dbgsym 
linux-tools-4.4.0-96-powerpc64-smp linux-cloud-tools-4.4.0-96-powerpc64-smp 
linux-udebs-powerpc64-smp kernel-image-4.4.0-96-generic-di 
nic-modules-4.4.0-96-generic-di
 nic-shared-modules-4.4.0-96-generic-di serial-modules-4.4.0-96-generic-di 
ppp-modules-4.4.0-96-generic-di pata-modules-4.4.0-96-generic-di 
firewire-core-modules-4.4.0-96-generic-di scsi-modules-4.4.0-96-generic-di 
plip-modules-4.4.0-96-generic-di floppy-modules-4.4.0-96-generic-di 
fat-modules-4.4.0-96-generic-di nfs-modules-4.4.0-96-generic-di 
md-modules-4.4.0-96-generic-di multipath-modules-4.4.0-96-generic-di 
usb-modules-4.4.0-96-generic-di pcmcia-storage-modules-4.4.0-96-generic-di 
fb-modules-4.4.0-96-generic-di input-modules-4.4.0-96-generic-di 
mouse-modules-4.4.0-96-generic-di irda-modules-4.4.0-96-generic-di 
parport-modules-4.4.0-96-generic-di nic-pcmcia-modules-4.4.0-96-generic-di 
pcmcia-modules-4.4.0-96-generic-di nic-usb-modules-4.4.0-96-generic-di 
sata-modules-4.4.0-96-generic-di crypto-modules-4.4.0-96-generic-di 
speakup-modules-4.4.0-96-generic-di virtio-modules-4.4.0-96-generic-di 
fs-core-modules-4.4.0-96-generic-di
 fs-secondary-modules-4.4.0-96-generic-di 
storage-core-modules-4.4.0-96-generic-di block-modules-4.4.0-96-generic-di 
message-modules-4.4.0-96-generic-di vlan-modules-4.4.0-96-generic-di
 ipmi-modules-4.4.0-96-generic-di
Architecture: amd64 all amd64_translations
Version: 4.4.0-96.119
Distribution: xenial
Urgency: low
Maintainer: Launchpad Build Daemon 
Changed-By: Stefan Bader 
Description:
 block-modules-4.4.0-96-generic-di - Block storage devices (udeb)
 crypto-modules-4.4.0-96-generic-di - crypto modules (udeb)
 fat-modules-4.4.0-96-generic-di - FAT filesystem support (udeb)
 fb-modules-4.4.0-96-generic-di - Framebuffer modules (udeb)
 firewire-core-modules-4.4.0-96-generic-di - Firewire (IEEE-1394) Support (udeb)
 floppy-modules-4.4.0-96-generic-di - Floppy driver support (udeb)
 fs-core-modules-4.4.0-96-generic-di - Base filesystem modules (udeb)
 fs-secondary-modules-4.4.0-96-generic-di - Extra filesystem modules (udeb)
 input-modules-4.4.0-96-generic-di - Support for various input methods (udeb)
 ipmi-modules-4.4.0-96-generic-di - ipmi modules (udeb)
 irda-modules-4.4.0-96-generic-di - Support for Infrared protocols (udeb)
 kernel-image-4.4.0-96-generic-di - Linux kernel binary image for the Debian 
installer (udeb)
 linux-cloud-tools-4.4.0-96 - Linux kernel version specific cloud tools for 

[ubuntu/xenial-proposed] linux 4.4.0-96.119 (Accepted)

2017-09-13 Thread Łukasz Zemczak
linux (4.4.0-96.119) xenial; urgency=low

  * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613)

  * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399)
- s390/mm: no local TLB flush for clearing-by-ASCE IDTE
- SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space
- SAUCE: s390/mm: fix race on mm->context.flush_mm

  * CVE-2017-1000251
- Bluetooth: Properly check L2CAP config option output buffer length

Date: 2017-09-12 14:55:15.812109+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux/4.4.0-96.119
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] livecd-rootfs 2.408.16 (Accepted)

2017-09-13 Thread Steve Langasek
livecd-rootfs (2.408.16) xenial; urgency=medium

  * live-build/ubuntu-cpc/functions: call apt-get update in the chroot
after mounting a blank /var/lib/apt, so that further operations work
as expected; otherwise, 'apt-get purge ^grub-.*' fails on s390x because
no such packages are known to apt.
  * live-build/ubuntu-cpc/hooks/030-root-tarball.binary: correct a missing
unmount of /var/{lib,cache}/apt on cleanup, detected via autopkgtests.

livecd-rootfs (2.408.15) xenial; urgency=medium

  [ Mathieu Trudel-Lapierre ]
  * Drop preloading of grub modules that are built into the grub signed
image.  This is functionally a no-op, changed only to clean up the code.

  [ Steve Langasek ]
  * live-build/ubuntu-cpc/functions: mount tmpfs on /var/cache/apt and
/var/lib/apt, so we don't have to leave empty space in our derivative
images for packages that have been downloaded/installed/removed.  This
normally isn't relevant for the installed system, since the root
filesystem will auto-expand in place on the target disk, but lets us
ship smaller images.
  * live-build/ubuntu-cpc/hooks/033-disk-image-uefi.binary: call apt-get
update *before* installing packages, not after.

  [ Colin Watson ]
  * Mount and unmount /dev recursively, to cope with setups where there are
interesting bind-mounts under /dev (e.g. loop devices bind-mounted by
LXD).  LP: #1716465.

  [ Balint Reczey ]
  * Fix suppression of kpartx error.  LP: #1684090.

Date: 2017-09-12 21:24:11.290245+00:00
Changed-By: Steve Langasek 
https://launchpad.net/ubuntu/+source/livecd-rootfs/2.408.16
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/partner/xenial] google-cloud-sdk 169.0.0-0ubuntu1~16.04.0 (Accepted)

2017-09-13 Thread Steve Langasek
google-cloud-sdk (169.0.0-0ubuntu1~16.04.0) xenial; urgency=medium

  * Backport to xenial.
  * New upstream release
  * debian/rules:
- Actually update the get-pristine-tarball rule. Previously the modification
  got lost and wasn't included.

google-cloud-sdk (166.0.0-0ubuntu1) artful; urgency=medium

  * New upstream release
  * debian/rules:
- Modify the get-pristine-tarball rule to use the for_packagers tarballs
  instead of the user-targetted ones.
  * Drop debian/patches/disable-component-manager.patch:
- The for_packagers tarball ships with the updater disabled by default.

google-cloud-sdk (163.0.0-0ubuntu1) artful; urgency=medium

  * New upstream release

Date: 2017-09-11 15:39:56.350111+00:00
Changed-By: Łukasz Zemczak 
Signed-By: Steve Langasek 
https://launchpad.net/ubuntu/+source/google-cloud-sdk/169.0.0-0ubuntu1~16.04.0
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] qemu 1:2.5+dfsg-5ubuntu10.15 (Accepted)

2017-09-13 Thread Ubuntu Archive Robot
qemu (1:2.5+dfsg-5ubuntu10.15) xenial-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via virtFS
- debian/patches/CVE-2017-7493.patch: forbid client access to metadata
  in hw/9pfs/virtio-9p-local.c.
- CVE-2017-7493
  * SECURITY UPDATE: DoS via message ring page count
- debian/patches/CVE-2017-8112.patch: check page count in
  hw/scsi/vmw_pvscsi.c.
- CVE-2017-8112
  * SECURITY UPDATE: DoS via OOB read in MegaSAS
- debian/patches/CVE-2017-8380.patch: avoid off-by-one in
  hw/scsi/megasas.c.
- CVE-2017-8380
  * SECURITY UPDATE: DoS in USB OHCI emulation
- debian/patches/CVE-2017-9330.patch: fix error code in
  hw/usb/hcd-ohci.c.
- CVE-2017-9330
  * SECURITY UPDATE: DoS in IDE AHCI emulation
- debian/patches/CVE-2017-9373-1.patch: add cleanup function in
  hw/ide/core.c, hw/ide/internal.h.
- debian/patches/CVE-2017-9373-2.patch: call cleanup function in
  hw/ide/ahci.c.
- CVE-2017-9373
  * SECURITY UPDATE: DoS in USB EHCI emulation
- debian/patches/CVE-2017-9374.patch: fix memory leak in
  hw/usb/hcd-ehci-pci.c, hw/usb/hcd-ehci.c, hw/usb/hcd-ehci.h.
- CVE-2017-9374
  * SECURITY UPDATE: DoS in USB xHCI emulation
- debian/patches/CVE-2017-9375.patch: guard against recursive calls in
  hw/usb/hcd-xhci.c.
- CVE-2017-9375
  * SECURITY UPDATE: DoS in MegaSAS
- debian/patches/CVE-2017-9503-1.patch: add test to
  tests/Makefile, tests/megasas-test.c.
- debian/patches/CVE-2017-9503-2.patch: do not read sense length more
  than once in hw/scsi/megasas.c.
- debian/patches/CVE-2017-9503-3.patch: do not read iovec count more
  than once in hw/scsi/megasas.c.
- debian/patches/CVE-2017-9503-4.patch: do not read DCMD opcode more
  than once in hw/scsi/megasas.c.
- debian/patches/CVE-2017-9503-5.patch: do not read command more than
  once in hw/scsi/megasas.c.
- debian/patches/CVE-2017-9503-6.patch: do not read SCSI req parameters
  more than once in hw/scsi/megasas.c.
- debian/patches/CVE-2017-9503-7.patch: always store SCSIRequest* into
  MegasasCmd in hw/scsi/megasas.c, added test to tests/megasas-test.c.
- CVE-2017-9503
  * SECURITY UPDATE: DoS via incorrect SIGPIPE handling
- debian/patches/CVE-2017-10664.patch: ignore SIGPIPE in qemu-nbd.c.
- CVE-2017-10664
  * SECURITY UPDATE: stack overflow in usbredir_log_data
- debian/patches/CVE-2017-10806.patch: use qemu_hexdump in
  hw/usb/redirect.c.
- CVE-2017-10806
  * SECURITY UPDATE: memory disclosure in Xen block-interface responses
- debian/patches/CVE-2017-10911.patch: fill the fields directly in
  hw/block/xen_disk.c.
- CVE-2017-10911
  * SECURITY UPDATE: DoS via crafted DHCP options string
- debian/patches/CVE-2017-11434.patch: check length in slirp/bootp.c.
- CVE-2017-11434
  * SECURITY UPDATE: DoS via flushing empty CDROM drives
- debian/patches/CVE-2017-12809.patch: don't flush empty drives in
  hw/ide/core.c.
- CVE-2017-12809

Date: 2017-08-22 17:03:20.073927+00:00
Changed-By: Marc Deslauriers 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.15
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] qemu 1:2.5+dfsg-5ubuntu10.15 (Accepted)

2017-09-13 Thread Marc Deslauriers
qemu (1:2.5+dfsg-5ubuntu10.15) xenial-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via virtFS
- debian/patches/CVE-2017-7493.patch: forbid client access to metadata
  in hw/9pfs/virtio-9p-local.c.
- CVE-2017-7493
  * SECURITY UPDATE: DoS via message ring page count
- debian/patches/CVE-2017-8112.patch: check page count in
  hw/scsi/vmw_pvscsi.c.
- CVE-2017-8112
  * SECURITY UPDATE: DoS via OOB read in MegaSAS
- debian/patches/CVE-2017-8380.patch: avoid off-by-one in
  hw/scsi/megasas.c.
- CVE-2017-8380
  * SECURITY UPDATE: DoS in USB OHCI emulation
- debian/patches/CVE-2017-9330.patch: fix error code in
  hw/usb/hcd-ohci.c.
- CVE-2017-9330
  * SECURITY UPDATE: DoS in IDE AHCI emulation
- debian/patches/CVE-2017-9373-1.patch: add cleanup function in
  hw/ide/core.c, hw/ide/internal.h.
- debian/patches/CVE-2017-9373-2.patch: call cleanup function in
  hw/ide/ahci.c.
- CVE-2017-9373
  * SECURITY UPDATE: DoS in USB EHCI emulation
- debian/patches/CVE-2017-9374.patch: fix memory leak in
  hw/usb/hcd-ehci-pci.c, hw/usb/hcd-ehci.c, hw/usb/hcd-ehci.h.
- CVE-2017-9374
  * SECURITY UPDATE: DoS in USB xHCI emulation
- debian/patches/CVE-2017-9375.patch: guard against recursive calls in
  hw/usb/hcd-xhci.c.
- CVE-2017-9375
  * SECURITY UPDATE: DoS in MegaSAS
- debian/patches/CVE-2017-9503-1.patch: add test to
  tests/Makefile, tests/megasas-test.c.
- debian/patches/CVE-2017-9503-2.patch: do not read sense length more
  than once in hw/scsi/megasas.c.
- debian/patches/CVE-2017-9503-3.patch: do not read iovec count more
  than once in hw/scsi/megasas.c.
- debian/patches/CVE-2017-9503-4.patch: do not read DCMD opcode more
  than once in hw/scsi/megasas.c.
- debian/patches/CVE-2017-9503-5.patch: do not read command more than
  once in hw/scsi/megasas.c.
- debian/patches/CVE-2017-9503-6.patch: do not read SCSI req parameters
  more than once in hw/scsi/megasas.c.
- debian/patches/CVE-2017-9503-7.patch: always store SCSIRequest* into
  MegasasCmd in hw/scsi/megasas.c, added test to tests/megasas-test.c.
- CVE-2017-9503
  * SECURITY UPDATE: DoS via incorrect SIGPIPE handling
- debian/patches/CVE-2017-10664.patch: ignore SIGPIPE in qemu-nbd.c.
- CVE-2017-10664
  * SECURITY UPDATE: stack overflow in usbredir_log_data
- debian/patches/CVE-2017-10806.patch: use qemu_hexdump in
  hw/usb/redirect.c.
- CVE-2017-10806
  * SECURITY UPDATE: memory disclosure in Xen block-interface responses
- debian/patches/CVE-2017-10911.patch: fill the fields directly in
  hw/block/xen_disk.c.
- CVE-2017-10911
  * SECURITY UPDATE: DoS via crafted DHCP options string
- debian/patches/CVE-2017-11434.patch: check length in slirp/bootp.c.
- CVE-2017-11434
  * SECURITY UPDATE: DoS via flushing empty CDROM drives
- debian/patches/CVE-2017-12809.patch: don't flush empty drives in
  hw/ide/core.c.
- CVE-2017-12809

Date: 2017-08-22 17:03:20.073927+00:00
Changed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.15
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] plymouth 0.9.2-3ubuntu13.2 (Accepted)

2017-09-13 Thread Steve Langasek
plymouth (0.9.2-3ubuntu13.2) xenial; urgency=medium

  * Remove dependency on initramfs-tools | dracut.  LP: #1716825.

Date: Tue, 12 Sep 2017 22:25:47 -0700
Changed-By: Steve Langasek 
Maintainer: Ubuntu Developers 
https://launchpad.net/ubuntu/+source/plymouth/0.9.2-3ubuntu13.2
Format: 1.8
Date: Tue, 12 Sep 2017 22:25:47 -0700
Source: plymouth
Binary: plymouth plymouth-x11 plymouth-dbg libplymouth4 libplymouth-dev 
plymouth-label plymouth-themes plymouth-theme-ubuntu-logo 
plymouth-theme-ubuntu-text
Architecture: source
Version: 0.9.2-3ubuntu13.2
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Steve Langasek 
Description:
 libplymouth-dev - graphical boot animation and logger - development files
 libplymouth4 - graphical boot animation and logger - shared libraries
 plymouth   - boot animation, logger and I/O multiplexer
 plymouth-dbg - boot animation, logger and I/O multiplexer - debug symbols
 plymouth-label - boot animation, logger and I/O multiplexer - label control
 plymouth-theme-ubuntu-logo - boot animation, logger and I/O multiplexer - 
ubuntu theme
 plymouth-theme-ubuntu-text - boot animation, logger and I/O multiplexer - 
ubuntu text theme
 plymouth-themes - boot animation, logger and I/O multiplexer - themes
 plymouth-x11 - boot animation, logger and I/O multiplexer - X11 renderer
Launchpad-Bugs-Fixed: 1716825
Changes:
 plymouth (0.9.2-3ubuntu13.2) xenial; urgency=medium
 .
   * Remove dependency on initramfs-tools | dracut.  LP: #1716825.
Checksums-Sha1:
 605a51780ec2918392495d8377eb944ce9e62a02 2744 plymouth_0.9.2-3ubuntu13.2.dsc
 fa4fadf86d6391b895424556602823c899048416 76120 
plymouth_0.9.2-3ubuntu13.2.debian.tar.xz
Checksums-Sha256:
 73c591d3a4a7c17ddc5870aee9fc92b6363d50afc445920292284983ae06 2744 
plymouth_0.9.2-3ubuntu13.2.dsc
 18746cfbbf2cfd5ceaf0e1a2513b9f77b3d7cbced184e452895b280f0ac1a8f5 76120 
plymouth_0.9.2-3ubuntu13.2.debian.tar.xz
Files:
 be67184ead14c246655e17445018ae30 2744 misc optional 
plymouth_0.9.2-3ubuntu13.2.dsc
 e3fc9951859f08af77adb071add9d8ce 76120 misc optional 
plymouth_0.9.2-3ubuntu13.2.debian.tar.xz
Original-Maintainer: Laurent Bigonville 
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes