[ubuntu/xenial-proposed] linux-meta-aws-hwe 4.15.0.1042.42 (Accepted)

2019-06-20 Thread Steve Langasek
linux-meta-aws-hwe (4.15.0.1042.42) xenial; urgency=medium

  * Bump ABI 4.15.0-1042

Date: 2019-06-20 15:33:59.690883+00:00
Changed-By: Jesse Sung 
Signed-By: Steve Langasek 
https://launchpad.net/ubuntu/+source/linux-meta-aws-hwe/4.15.0.1042.42
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-aws-hwe 4.15.0-1042.44~16.04.1 (Accepted)

2019-06-20 Thread Steve Langasek
linux-aws-hwe (4.15.0-1042.44~16.04.1) xenial; urgency=medium

  * linux-aws-hwe: 4.15.0-1042.44~16.04.1 -proposed tracker (LP: #1832547)

  [ Ubuntu: 4.15.0-1042.44 ]

  * linux-aws: 4.15.0-1042.44 -proposed tracker (LP: #1832552)
  * linux: 4.15.0-53.57 -proposed tracker (LP: #1832578)
  * CVE-2019-11479
- SAUCE: tcp: add tcp_min_snd_mss sysctl
- SAUCE: tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
  * CVE-2019-11085
- drm/i915/gvt: Fix mmap range check
- drm/i915: make mappable struct resource centric
- drm/i915/gvt: Fix aperture read/write emulation when enable x-no-mmap=on
  * CVE-2019-11884
- Bluetooth: hidp: fix buffer overflow
  * af_alg06 test from crypto test suite in LTP failed with kernel oops on B/C
(LP: #1829725)
- crypto: authenc - fix parsing key with misaligned rta_len
  * CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130 // CVE-2019-11091
- SAUCE: Synchronize MDS mitigations with upstream
- Documentation: Correct the possible MDS sysfs values
- x86/speculation/mds: Fix documentation typo
  * CVE-2019-11091
- x86/mds: Add MDSUM variant to the MDS documentation
  * alignment test in powerpc from ubuntu_kernel_selftests failed on B/C Power9
(LP: #1813118)
- selftests/powerpc: Remove Power9 copy_unaligned test
  * TRACE_syscall.ptrace_syscall_dropped in seccomp from ubuntu_kernel_selftests
failed on B/C PowerPC (LP: #1812796)
- selftests/seccomp: Enhance per-arch ptrace syscall skip tests
  * Add powerpc/alignment_handler test for selftests (LP: #1828935)
- selftests/powerpc: Add alignment handler selftest
- selftests/powerpc: Fix to use ucontext_t instead of struct ucontext
  * Cannot build kernel 4.15.0-48.51 due to an in-source-tree ZFS module.
(LP: #1828763)
- SAUCE: (noup) Update zfs to 0.7.5-1ubuntu16.5
  * Eletrical noise occurred when external headset enter powersaving mode on a
DEll machine (LP: #1828798)
- ALSA: hda/realtek - Reduce click noise on Dell Precision 5820 headphone
- ALSA: hda/realtek - Fixup headphone noise via runtime suspend
  * [18.04/18.10] File libperf-jvmti.so is missing in linux-tools-common deb on
Ubuntu (LP: #1761379)
- [Packaging] Support building libperf-jvmti.so
  * TCP : race condition on socket ownership in tcp_close() (LP: #1830813)
- tcp: do not release socket ownership in tcp_close()
  * bionic: netlink: potential shift overflow in netlink_bind() (LP: #1831103)
- netlink: Don't shift on 64 for ngroups
  * Add support to Comet Lake LPSS (LP: #1830175)
- mfd: intel-lpss: Add Intel Comet Lake PCI IDs
  * Reduce NAPI weight in hns driver from 256 to 64 (LP: #1830587)
- net: hns: Use NAPI_POLL_WEIGHT for hns driver
  * x86: add support for AMD Rome (LP: #1819485)
- x86: irq_remapping: Move irq remapping mode enum
- iommu/amd: Add support for higher 64-bit IOMMU Control Register
- iommu/amd: Add support for IOMMU XT mode
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs
- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs
- x86/amd_nb: Add PCI device IDs for family 17h, model 30h
- x86/MCE/AMD: Fix the thresholding machinery initialization order
- x86/amd_nb: Add support for newer PCI topologies
  * nx842 - CRB request time out (-110) when uninstall NX modules and initiate
NX request (LP: #1827755)
- crypto/nx: Initialize 842 high and normal RxFIFO control registers
  * Require improved hypervisor detection patch in Ubuntu 18.04 (LP: #1829972)
- s390/early: improve machine detection

Date: 2019-06-20 15:33:17.293984+00:00
Changed-By: Jesse Sung 
Signed-By: Steve Langasek 
https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1042.44~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] qemu 1:2.5+dfsg-5ubuntu10.40 (Accepted)

2019-06-20 Thread Steve Langasek
qemu (1:2.5+dfsg-5ubuntu10.40) xenial; urgency=medium

  * Restore patches that caused regression
- d/p/lp1823458/add-VirtIONet-vhost_stopped-flag-to-prevent-multiple.patch
- d/p/lp1823458/do-not-call-vhost_net_cleanup-on-running-net-from-ch.patch
  * Fix regression introduced by above patches (LP: #1829380)
- d/p/lp1829380.patch

  [ Rafael David Tinoco ]
  * d/p/lp1828288/target-i386-Set-AMD-alias-bits-after-filtering-CPUID.patch
- Fix issues with CPUID_EXT2_AMD_ALIASES allowing guests using
  cpu passthrough to boot. (LP: #1828288)

Date: 2019-05-16 20:27:09.894698+00:00
Changed-By: Dan Streetman 
Signed-By: Steve Langasek 
https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.40
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] ec2-hibinit-agent 1.0.0-0ubuntu4~16.04.2 (Accepted)

2019-06-20 Thread Steve Langasek
ec2-hibinit-agent (1.0.0-0ubuntu4~16.04.2) xenial; urgency=medium

  * Drop 0007-Match-ACPI-sleep-action-in-a-very-liberal-way.patch.
It turned out LP: #1831103 was responsible for the missing SBTN event
and where it was fixed two events were handled causing two hibernations.
  * Call swapoff via systemd-run to avoid the command getting killed on timeout.
Also stop swap after restarting systemd-networkd to recover network
connectivity earlier.
  * debian/hibinit-agent.system-sleep: Restart systemd-networkd with --no-block
to finish running the hook faster.
  * Drop 0007-Match-ACPI-sleep-action-in-a-very-liberal-way.patch.
It turned out LP: #1831103 was responsible for the missing SBTN event
and where it was fixed two events were handled causing two hibernations.
  * Call swapoff via systemd-run to avoid the command getting killed on timeout.
Also stop swap after restarting systemd-networkd to recover network
connectivity earlier.
  * debian/hibinit-agent.system-sleep: Restart systemd-networkd with --no-block
to finish running the hook faster.

ec2-hibinit-agent (1.0.0-0ubuntu4~16.04.1) xenial; urgency=medium

  * Restart systemd-networkd on resuming from hibernation.
On resume the system sometimes does not restore network connections
and this is a way of reliably triggering the restoration. (LP: #1830427)

Date: 2019-06-07 15:23:09.636006+00:00
Changed-By: Balint Reczey 
Signed-By: Steve Langasek 
https://launchpad.net/ubuntu/+source/ec2-hibinit-agent/1.0.0-0ubuntu4~16.04.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] intel-microcode 3.20190618.0ubuntu0.16.04.1 (Accepted)

2019-06-20 Thread Ubuntu Archive Robot
intel-microcode (3.20190618.0ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20190618
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ Updated Microcodes:
  sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432
  sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456
  sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360
+ Add MDS mitigation support for Sandy Bridge server and Core-X
  processor families.(LP: #1830123)

intel-microcode (3.20190514.0ubuntu0.18.04.3) bionic-security; urgency=medium

  * Update to final 20190514 microcode update. (LP: #1829745)
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ New Microcodes:
  sig 0x00030678, pf_mask 0x02, 2019-04-22, rev 0x0838, size 52224
  sig 0x00030678, pf_mask 0x0c, 2019-04-22, rev 0x0838, size 52224
  sig 0x00030679, pf_mask 0x0f, 2019-04-23, rev 0x090c, size 52224
  sig 0x000406c3, pf_mask 0x01, 2019-04-23, rev 0x0368, size 69632
  sig 0x000406c4, pf_mask 0x01, 2019-04-23, rev 0x0411, size 68608
+ Add MDS mitigation support for Cherry Trail and Bay Trail
  processor families.

  [ Dimitri John Ledkov ]
  * Do not override preset defaults from auto-exported conf snippets
loaded by initramfs-tools. This thus allows other hooks, or
alternative confdir override the built-in defaults at mkinitramfs
time. Specifically to support generating installer/golden/bare-metal
initrds with all microcodes for any hardware.

intel-microcode (3.20190514.0ubuntu0.18.04.2) bionic-security; urgency=medium

  * SECURITY UPDATE: new upstream datafile 20190507
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ New Microcodes:
  sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x310, size 47104
  sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x41c, size 47104
  sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x521, size 47104
+ Updated Microcodes:
  sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288
  sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336
  sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552
  sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456
  sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384
  sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408
  sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816
  sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432
  sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504
  sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600
  sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336
  sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352
  sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb36, size 30720
  sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x25e, size 32768
  sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768
  sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x717, size 24576
  sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf15, size 23552
  sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe0d, size 19456
  sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408
  sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352
  sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264
  sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728
  sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304
  sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328
  sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328
  sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304
  sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280
  sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328
  sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304
  sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328
  sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304
  sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280
+ Reinstated Microcodes:
  sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720

Date: 2019-06-20 16:22:13.785683+00:00
Changed-By: Steve Beattie 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/intel-microcode/3.20190618.0ubuntu0.16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] intel-microcode 3.20190618.0ubuntu0.16.04.1 (Accepted)

2019-06-20 Thread Steve Beattie
intel-microcode (3.20190618.0ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20190618
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ Updated Microcodes:
  sig 0x000206d6, pf_mask 0x6d, 2019-05-21, rev 0x061f, size 18432
  sig 0x000206d7, pf_mask 0x6d, 2019-05-21, rev 0x0718, size 19456
  sig 0x000506ca, pf_mask 0x03, 2019-03-01, rev 0x0016, size 15360
+ Add MDS mitigation support for Sandy Bridge server and Core-X
  processor families.(LP: #1830123)

intel-microcode (3.20190514.0ubuntu0.18.04.3) bionic-security; urgency=medium

  * Update to final 20190514 microcode update. (LP: #1829745)
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ New Microcodes:
  sig 0x00030678, pf_mask 0x02, 2019-04-22, rev 0x0838, size 52224
  sig 0x00030678, pf_mask 0x0c, 2019-04-22, rev 0x0838, size 52224
  sig 0x00030679, pf_mask 0x0f, 2019-04-23, rev 0x090c, size 52224
  sig 0x000406c3, pf_mask 0x01, 2019-04-23, rev 0x0368, size 69632
  sig 0x000406c4, pf_mask 0x01, 2019-04-23, rev 0x0411, size 68608
+ Add MDS mitigation support for Cherry Trail and Bay Trail
  processor families.

  [ Dimitri John Ledkov ]
  * Do not override preset defaults from auto-exported conf snippets
loaded by initramfs-tools. This thus allows other hooks, or
alternative confdir override the built-in defaults at mkinitramfs
time. Specifically to support generating installer/golden/bare-metal
initrds with all microcodes for any hardware.

intel-microcode (3.20190514.0ubuntu0.18.04.2) bionic-security; urgency=medium

  * SECURITY UPDATE: new upstream datafile 20190507
- CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091
+ New Microcodes:
  sig 0x00050655, pf_mask 0xb7, 2018-11-16, rev 0x310, size 47104
  sig 0x00050656, pf_mask 0xbf, 2019-01-28, rev 0x41c, size 47104
  sig 0x00050657, pf_mask 0xbf, 2019-02-27, rev 0x521, size 47104
+ Updated Microcodes:
  sig 0x000206a7, pf_mask 0x12, 2019-02-17, rev 0x002f, size 12288
  sig 0x000306a9, pf_mask 0x12, 2019-02-13, rev 0x0021, size 14336
  sig 0x000306c3, pf_mask 0x32, 2019-02-26, rev 0x0027, size 23552
  sig 0x000306d4, pf_mask 0xc0, 2019-03-07, rev 0x002d, size 19456
  sig 0x000306e4, pf_mask 0xed, 2019-03-14, rev 0x042e, size 16384
  sig 0x000306e7, pf_mask 0xed, 2019-03-14, rev 0x0715, size 17408
  sig 0x000306f2, pf_mask 0x6f, 2019-03-01, rev 0x0043, size 34816
  sig 0x000306f4, pf_mask 0x80, 2019-03-01, rev 0x0014, size 18432
  sig 0x00040651, pf_mask 0x72, 2019-02-26, rev 0x0025, size 21504
  sig 0x00040661, pf_mask 0x32, 2019-02-26, rev 0x001b, size 25600
  sig 0x00040671, pf_mask 0x22, 2019-03-07, rev 0x0020, size 14336
  sig 0x000406e3, pf_mask 0xc0, 2019-04-01, rev 0x00cc, size 100352
  sig 0x000406f1, pf_mask 0xef, 2019-03-02, rev 0xb36, size 30720
  sig 0x00050654, pf_mask 0xb7, 2019-04-02, rev 0x25e, size 32768
  sig 0x00050662, pf_mask 0x10, 2019-03-23, rev 0x001a, size 32768
  sig 0x00050663, pf_mask 0x10, 2019-03-23, rev 0x717, size 24576
  sig 0x00050664, pf_mask 0x10, 2019-03-23, rev 0xf15, size 23552
  sig 0x00050665, pf_mask 0x10, 2019-03-23, rev 0xe0d, size 19456
  sig 0x000506c9, pf_mask 0x03, 2019-01-15, rev 0x0038, size 17408
  sig 0x000506e3, pf_mask 0x36, 2019-04-01, rev 0x00cc, size 100352
  sig 0x000506f1, pf_mask 0x01, 2019-03-21, rev 0x002e, size 11264
  sig 0x000706a1, pf_mask 0x01, 2019-01-02, rev 0x002e, size 73728
  sig 0x000806e9, pf_mask 0x10, 2019-04-01, rev 0x00b4, size 98304
  sig 0x000806e9, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328
  sig 0x000806ea, pf_mask 0xc0, 2019-04-01, rev 0x00b4, size 99328
  sig 0x000806eb, pf_mask 0xd0, 2019-03-30, rev 0x00b8, size 98304
  sig 0x000806ec, pf_mask 0x94, 2019-03-30, rev 0x00b8, size 97280
  sig 0x000906e9, pf_mask 0x2a, 2019-04-01, rev 0x00b4, size 99328
  sig 0x000906ea, pf_mask 0x22, 2019-04-01, rev 0x00b4, size 98304
  sig 0x000906eb, pf_mask 0x02, 2019-04-01, rev 0x00b4, size 99328
  sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304
  sig 0x000906ed, pf_mask 0x22, 2019-03-17, rev 0x00b8, size 97280
+ Reinstated Microcodes:
  sig 0x00050653, pf_mask 0x97, 2018-01-29, rev 0x1000140, size 30720

Date: 2019-06-20 16:22:13.785683+00:00
Changed-By: Steve Beattie 
https://launchpad.net/ubuntu/+source/intel-microcode/3.20190618.0ubuntu0.16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] mosquitto 1.4.8-1ubuntu0.16.04.7 (Accepted)

2019-06-20 Thread Ubuntu Archive Robot
mosquitto (1.4.8-1ubuntu0.16.04.7) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS (client disconnect) via invalid UTF-8 strings
- debian/patches/add-validate-utf8.patch: Add validate UTF-8
- debian/patches/CVE-2017-7653.patch: Add UTF-8 tests, plus some validation
  fixes
- CVE-2017-7653
  * SECURITY UPDATE: Memory leak in the Mosquitto Broker allows unauthenticated
clients to send crafted CONNECT packets which could cause DoS
- debian/patches/CVE-2017-7654.patch: Fix memory leak that could be caused
  by a malicious CONNECT packet
- CVE-2017-7654

Date: 2019-06-19 19:08:13.166199+00:00
Changed-By: Eduardo dos Santos Barretto 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/mosquitto/1.4.8-1ubuntu0.16.04.7
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] mosquitto 1.4.8-1ubuntu0.16.04.7 (Accepted)

2019-06-20 Thread Eduardo dos Santos Barretto
mosquitto (1.4.8-1ubuntu0.16.04.7) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS (client disconnect) via invalid UTF-8 strings
- debian/patches/add-validate-utf8.patch: Add validate UTF-8
- debian/patches/CVE-2017-7653.patch: Add UTF-8 tests, plus some validation
  fixes
- CVE-2017-7653
  * SECURITY UPDATE: Memory leak in the Mosquitto Broker allows unauthenticated
clients to send crafted CONNECT packets which could cause DoS
- debian/patches/CVE-2017-7654.patch: Fix memory leak that could be caused
  by a malicious CONNECT packet
- CVE-2017-7654

Date: 2019-06-19 19:08:13.166199+00:00
Changed-By: Eduardo dos Santos Barretto 
https://launchpad.net/ubuntu/+source/mosquitto/1.4.8-1ubuntu0.16.04.7
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] thunderbird 1:60.7.1+build1-0ubuntu0.16.04.1 (Accepted)

2019-06-20 Thread Ubuntu Archive Robot
thunderbird (1:60.7.1+build1-0ubuntu0.16.04.1) xenial; urgency=medium

  * New upstream stable release (60.7.1build1)

Date: 2019-06-13 10:27:14.345780+00:00
Changed-By: Olivier Tilloy 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/thunderbird/1:60.7.1+build1-0ubuntu0.16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] thunderbird 1:60.7.1+build1-0ubuntu0.16.04.1 (Accepted)

2019-06-20 Thread Chris Coulson
thunderbird (1:60.7.1+build1-0ubuntu0.16.04.1) xenial; urgency=medium

  * New upstream stable release (60.7.1build1)

Date: 2019-06-13 10:27:14.345780+00:00
Changed-By: Olivier Tilloy 
Signed-By: Chris Coulson 
https://launchpad.net/ubuntu/+source/thunderbird/1:60.7.1+build1-0ubuntu0.16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] sssd 1.13.4-1ubuntu1.15 (Accepted)

2019-06-20 Thread Andreas Hasenack
sssd (1.13.4-1ubuntu1.15) xenial; urgency=medium

  * d/libsss-sudo.postinst: Add sss entry to nsswitch only on initial install.
(LP: #1781991)

Date: Tue, 28 May 2019 10:49:17 -0300
Changed-By: Andreas Hasenack 
Maintainer: Ubuntu Developers 
https://launchpad.net/ubuntu/+source/sssd/1.13.4-1ubuntu1.15
Format: 1.8
Date: Tue, 28 May 2019 10:49:17 -0300
Source: sssd
Binary: sssd sssd-common sssd-ad sssd-ad-common sssd-dbus sssd-ipa sssd-krb5 
sssd-krb5-common sssd-ldap sssd-proxy sssd-tools libnss-sss libpam-sss 
libipa-hbac0 libipa-hbac-dev libsss-idmap0 libsss-idmap-dev libsss-nss-idmap0 
libsss-nss-idmap-dev libsss-sudo libsss-simpleifp0 libsss-simpleifp-dev 
libwbclient-sssd libwbclient-sssd-dev python-libipa-hbac 
python-libsss-nss-idmap python-sss python3-libipa-hbac python3-libsss-nss-idmap 
python3-sss
Architecture: source
Version: 1.13.4-1ubuntu1.15
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Andreas Hasenack 
Description:
 libipa-hbac-dev - FreeIPA HBAC Evaluator library
 libipa-hbac0 - FreeIPA HBAC Evaluator library
 libnss-sss - Nss library for the System Security Services Daemon
 libpam-sss - Pam module for the System Security Services Daemon
 libsss-idmap-dev - ID mapping library for SSSD -- development files
 libsss-idmap0 - ID mapping library for SSSD
 libsss-nss-idmap-dev - SID based lookups library for SSSD -- development files
 libsss-nss-idmap0 - SID based lookups library for SSSD
 libsss-simpleifp-dev - SSSD D-Bus responder helper library -- development files
 libsss-simpleifp0 - SSSD D-Bus responder helper library
 libsss-sudo - Communicator library for sudo
 libwbclient-sssd - SSSD libwbclient implementation
 libwbclient-sssd-dev - SSSD libwbclient implementation -- development files
 python-libipa-hbac - Python bindings for the FreeIPA HBAC Evaluator library
 python-libsss-nss-idmap - Python bindings for the SID lookups library
 python-sss - Python module for the System Security Services Daemon
 python3-libipa-hbac - Python3 bindings for the FreeIPA HBAC Evaluator library
 python3-libsss-nss-idmap - Python3 bindings for the SID lookups library
 python3-sss - Python3 module for the System Security Services Daemon
 sssd   - System Security Services Daemon -- metapackage
 sssd-ad- System Security Services Daemon -- Active Directory back end
 sssd-ad-common - System Security Services Daemon -- PAC responder
 sssd-common - System Security Services Daemon -- common files
 sssd-dbus  - System Security Services Daemon -- D-Bus responder
 sssd-ipa   - System Security Services Daemon -- IPA back end
 sssd-krb5  - System Security Services Daemon -- Kerberos back end
 sssd-krb5-common - System Security Services Daemon -- Kerberos helpers
 sssd-ldap  - System Security Services Daemon -- LDAP back end
 sssd-proxy - System Security Services Daemon -- proxy back end
 sssd-tools - System Security Services Daemon -- tools
Launchpad-Bugs-Fixed: 1781991
Changes:
 sssd (1.13.4-1ubuntu1.15) xenial; urgency=medium
 .
   * d/libsss-sudo.postinst: Add sss entry to nsswitch only on initial install.
 (LP: #1781991)
Checksums-Sha1:
 510be1d9269b516d0e938047dca3f2018f6d6b81 4530 sssd_1.13.4-1ubuntu1.15.dsc
 e2d8611b0f21e2d5ee3c51ef86b37c50010f76fe 1463352 
sssd_1.13.4-1ubuntu1.15.diff.gz
Checksums-Sha256:
 c617734a41dca359c5fdcce969b35760f03dbc473cdbee7526bc7118fb3cb768 4530 
sssd_1.13.4-1ubuntu1.15.dsc
 747f365888ee685468d4988b6400b4cfe857ed6f05d42ca697aa8d01a36d3b56 1463352 
sssd_1.13.4-1ubuntu1.15.diff.gz
Files:
 475f49ed4ccd95b491cb9e01271b6228 4530 utils extra sssd_1.13.4-1ubuntu1.15.dsc
 0bbdedd58adcbcc5f7c3ebc54f1ac421 1463352 utils extra 
sssd_1.13.4-1ubuntu1.15.diff.gz
Original-Maintainer: Debian SSSD Team 
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes