[ubuntu/xenial-updates] openjdk-8 8u222-b10-1ubuntu1~16.04.1 (Accepted)

2019-07-30 Thread Ubuntu Archive Robot
openjdk-8 (8u222-b10-1ubuntu1~16.04.1) xenial-security; urgency=medium

  * Backport from Eoan.

openjdk-8 (8u222-b10-1ubuntu2) eoan; urgency=medium

  * Improve and fix build tests and autopkgtests:
- Update debian/tests/hotspot,jdk,langtools to ignore
  jtreg-autopkgtest.sh return code.
- Create debian/tests/jtdiff-autopkgtest.in as it depends
  on debian/rules variables.
- debian/tests/jtreg-autopkgtest.sh:
  + Enable retry of failed tests to trim out flaky tests.
  + Fix unbound variable.
  + Force JT_JAVA otherwise jtreg will look for
/usr/lib/jvm/default-java which might not be installed
or be the right JVM to use.
  + Keep .jtr files from failed tests only.
- debian/tests/jtdiff-autopkgtest.sh:
  + Fail only if an actual regression is detected.
  + Force JT_JAVA otherwise jtreg will look for
/usr/lib/jvm/default-java which might not be installed
or be the right JVM to use.
  + Add the super-diff comparison from jtdiff.
- debian/rules:
  + Preserve all JTreport directories in the test output
directory.
  + Use JDK_DIR instead of JDK_TO_TEST for autopkgtest
generation.
  + Package all .jtr files from JTwork as jtreg-autopkgtest.sh
makes sure it contains only failing tests.

openjdk-8 (8u222-b10-1) unstable; urgency=high

  * Update to 8u222-b10 (except for AArch32, updated to b08).
- Security fixes:
  - S8191073: JpegImageReader throws IndexOutOfBoundsException when
trying to read image data from tables-only image.
  - S8208698, CVE-2019-2745: Improved ECC Implementation.
  - S8212328, CVE-2019-2762: Exceptional throw cases.
  - S8213431, CVE-2019-2766: Improve file protocol handling.
  - S8213432, CVE-2019-2769: Better copies of CopiesList.
  - S8216381, CVE-2019-2786: More limited privilege usage.
  - S8217563: Improve realm maintenance.
  - S8218863: Better endpoint checks.
  - S8218873: Improve JSSE endpoint checking.
  - S8218876, CVE-2019-7317: Improve PNG support options.
  - S8219018: Adjust positions of glyphs.
  - S8219020: Table alternate substitutions.
  - S8219775: Certificate validation improvements.
  - S8220192: Better outlook for SecureRandom.
  - S8220517: Enhanced GIF support.
  - S8221518, CVE-2019-2816: Normalize normalization.
  - S8223511, CVE-2019-2842: Extended AES support.

  [ Matthias Klose ]
  * Bump standards version.

  [ Tiago Stürmer Daitx ]
  * Backport fix for S8223511 for AArch32.

openjdk-8 (8u222-b07-3) unstable; urgency=medium

  * Upload to unstable.

openjdk-8 (8u222-b07-2) experimental; urgency=medium

  * Remove AArch32 patches, applied upstream.
  * Fix build dependencies for Ubuntu precise builds.

openjdk-8 (8u222-b07-1) experimental; urgency=medium

  * Update to 8u222-b07.

openjdk-8 (8u222-b05-1) experimental; urgency=medium

  [ Matthias Klose ]
  * Update to 8u222-b05 (except for AArch32).
  * Apply suggested hotspot fixes for AArch32.
  * Re-enable running the testsuite.

  [ Tiago Stürmer Daitx ]
  * Find any hs_err_pid files generated during the build and send to stdout.

openjdk-8 (8u222-b04-3) experimental; urgency=medium

  * Update ARM32 to jdk8u222-b04-aarch32-190603.
  * Regenerate the ppc64el patch.
  * Remove unused patches ppc64le-8036767 and zero-opt.

openjdk-8 (8u222-b04-1) experimental; urgency=medium

  * Update to 8u222-b04.
  * Update ARM32 to jdk8u212-b04-aarch32-190430.
  * Fix 32bit zero builds.

openjdk-8 (8u212-b03-3) UNRELEASED; urgency=medium

  * Use -a instead of -s for debhelper tools.

openjdk-8 (8u212-b03-2) unstable; urgency=medium

  * Don't apply the 8221355 fix for ARM builds.
  * Don't configure --with-vendor-name on stable releases.
  * Fix the jpeg runtime dependency for the build in unstable.

openjdk-8 (8u212-b03-1) unstable; urgency=medium

  [ Matthias Klose ]
  * Configure --with-vendor-name.
  * 8221355: Fix performance regression after JDK-8155635 backport into 8u.

  [ Tiago Stürmer Daitx ]
  * Update to 8u212-b03. LP: #1826001.
  * Security fixes:
- S8211936, CVE-2019-2602: Better String parsing.
- S8218453, CVE-2019-2684: More dynamic RMI interactions.
- S8219066, CVE-2019-2698: Fuzzing TrueType fonts: setCurrGlyphID().
  * Revert to GTK2 as default since GTK3 still has padding and component
issues:
- debian/rules: always Build-Depends on libgtk2.0-dev and Depends on
  libgtk2.0-0 instead of relying on gtk3 for some releases.
  * debian/control: add missing dependency on testng (required by the
testsuites).

  [ Andrej Shadura ]
  * debian/rules: check for nodoc instead of nodocs in DEB_BUILD_OPTIONS.
Closes: 922757.

  [ Matthias Klose ]
  * debian/rules, debian/tests/jtdiff-autopkgtest.sh,
debian/tests/jtreg-autopkgtest.in, debian/tests/jtreg-autopkgtest.sh:
only set the JDK under test and allow jtreg to use its default JDK
for running the tests.

  [ Thorste

[ubuntu/xenial-security] openjdk-8 8u222-b10-1ubuntu1~16.04.1 (Accepted)

2019-07-30 Thread Steve Beattie
openjdk-8 (8u222-b10-1ubuntu1~16.04.1) xenial-security; urgency=medium

  * Backport from Eoan.

openjdk-8 (8u222-b10-1ubuntu2) eoan; urgency=medium

  * Improve and fix build tests and autopkgtests:
- Update debian/tests/hotspot,jdk,langtools to ignore
  jtreg-autopkgtest.sh return code.
- Create debian/tests/jtdiff-autopkgtest.in as it depends
  on debian/rules variables.
- debian/tests/jtreg-autopkgtest.sh:
  + Enable retry of failed tests to trim out flaky tests.
  + Fix unbound variable.
  + Force JT_JAVA otherwise jtreg will look for
/usr/lib/jvm/default-java which might not be installed
or be the right JVM to use.
  + Keep .jtr files from failed tests only.
- debian/tests/jtdiff-autopkgtest.sh:
  + Fail only if an actual regression is detected.
  + Force JT_JAVA otherwise jtreg will look for
/usr/lib/jvm/default-java which might not be installed
or be the right JVM to use.
  + Add the super-diff comparison from jtdiff.
- debian/rules:
  + Preserve all JTreport directories in the test output
directory.
  + Use JDK_DIR instead of JDK_TO_TEST for autopkgtest
generation.
  + Package all .jtr files from JTwork as jtreg-autopkgtest.sh
makes sure it contains only failing tests.

openjdk-8 (8u222-b10-1) unstable; urgency=high

  * Update to 8u222-b10 (except for AArch32, updated to b08).
- Security fixes:
  - S8191073: JpegImageReader throws IndexOutOfBoundsException when
trying to read image data from tables-only image.
  - S8208698, CVE-2019-2745: Improved ECC Implementation.
  - S8212328, CVE-2019-2762: Exceptional throw cases.
  - S8213431, CVE-2019-2766: Improve file protocol handling.
  - S8213432, CVE-2019-2769: Better copies of CopiesList.
  - S8216381, CVE-2019-2786: More limited privilege usage.
  - S8217563: Improve realm maintenance.
  - S8218863: Better endpoint checks.
  - S8218873: Improve JSSE endpoint checking.
  - S8218876, CVE-2019-7317: Improve PNG support options.
  - S8219018: Adjust positions of glyphs.
  - S8219020: Table alternate substitutions.
  - S8219775: Certificate validation improvements.
  - S8220192: Better outlook for SecureRandom.
  - S8220517: Enhanced GIF support.
  - S8221518, CVE-2019-2816: Normalize normalization.
  - S8223511, CVE-2019-2842: Extended AES support.

  [ Matthias Klose ]
  * Bump standards version.

  [ Tiago Stürmer Daitx ]
  * Backport fix for S8223511 for AArch32.

openjdk-8 (8u222-b07-3) unstable; urgency=medium

  * Upload to unstable.

openjdk-8 (8u222-b07-2) experimental; urgency=medium

  * Remove AArch32 patches, applied upstream.
  * Fix build dependencies for Ubuntu precise builds.

openjdk-8 (8u222-b07-1) experimental; urgency=medium

  * Update to 8u222-b07.

openjdk-8 (8u222-b05-1) experimental; urgency=medium

  [ Matthias Klose ]
  * Update to 8u222-b05 (except for AArch32).
  * Apply suggested hotspot fixes for AArch32.
  * Re-enable running the testsuite.

  [ Tiago Stürmer Daitx ]
  * Find any hs_err_pid files generated during the build and send to stdout.

openjdk-8 (8u222-b04-3) experimental; urgency=medium

  * Update ARM32 to jdk8u222-b04-aarch32-190603.
  * Regenerate the ppc64el patch.
  * Remove unused patches ppc64le-8036767 and zero-opt.

openjdk-8 (8u222-b04-1) experimental; urgency=medium

  * Update to 8u222-b04.
  * Update ARM32 to jdk8u212-b04-aarch32-190430.
  * Fix 32bit zero builds.

openjdk-8 (8u212-b03-3) UNRELEASED; urgency=medium

  * Use -a instead of -s for debhelper tools.

openjdk-8 (8u212-b03-2) unstable; urgency=medium

  * Don't apply the 8221355 fix for ARM builds.
  * Don't configure --with-vendor-name on stable releases.
  * Fix the jpeg runtime dependency for the build in unstable.

openjdk-8 (8u212-b03-1) unstable; urgency=medium

  [ Matthias Klose ]
  * Configure --with-vendor-name.
  * 8221355: Fix performance regression after JDK-8155635 backport into 8u.

  [ Tiago Stürmer Daitx ]
  * Update to 8u212-b03. LP: #1826001.
  * Security fixes:
- S8211936, CVE-2019-2602: Better String parsing.
- S8218453, CVE-2019-2684: More dynamic RMI interactions.
- S8219066, CVE-2019-2698: Fuzzing TrueType fonts: setCurrGlyphID().
  * Revert to GTK2 as default since GTK3 still has padding and component
issues:
- debian/rules: always Build-Depends on libgtk2.0-dev and Depends on
  libgtk2.0-0 instead of relying on gtk3 for some releases.
  * debian/control: add missing dependency on testng (required by the
testsuites).

  [ Andrej Shadura ]
  * debian/rules: check for nodoc instead of nodocs in DEB_BUILD_OPTIONS.
Closes: 922757.

  [ Matthias Klose ]
  * debian/rules, debian/tests/jtdiff-autopkgtest.sh,
debian/tests/jtreg-autopkgtest.in, debian/tests/jtreg-autopkgtest.sh:
only set the JDK under test and allow jtreg to use its default JDK
for running the tests.

  [ Thorste

[ubuntu/xenial-proposed] spice-html5 0.1.4-1ubuntu1.16.04.1 (Accepted)

2019-07-30 Thread Dariusz Gadomski
spice-html5 (0.1.4-1ubuntu1.16.04.1) xenial; urgency=medium

  * d/p/fix-windows-spice-upside-down.patch
d/p/fix-windows-spice-upside-down-bitmaps.patch
Fix window spice upside down display (LP: #1836361)

Date: Mon, 22 Jul 2019 08:55:37 +0200
Changed-By: Dariusz Gadomski 
Maintainer: PKG OpenStack 
Signed-By: Dan Streetman 
https://launchpad.net/ubuntu/+source/spice-html5/0.1.4-1ubuntu1.16.04.1
Format: 1.8
Date: Mon, 22 Jul 2019 08:55:37 +0200
Source: spice-html5
Binary: spice-html5
Architecture: source
Version: 0.1.4-1ubuntu1.16.04.1
Distribution: xenial
Urgency: medium
Maintainer: PKG OpenStack 
Changed-By: Dariusz Gadomski 
Description:
 spice-html5 - Spice Web client which runs entirely within a modern browser
Launchpad-Bugs-Fixed: 1836361
Changes:
 spice-html5 (0.1.4-1ubuntu1.16.04.1) xenial; urgency=medium
 .
   * d/p/fix-windows-spice-upside-down.patch
 d/p/fix-windows-spice-upside-down-bitmaps.patch
 Fix window spice upside down display (LP: #1836361)
Checksums-Sha1:
 51b1decb5f305de8c40c1dd9311c69925a53f134 2123 
spice-html5_0.1.4-1ubuntu1.16.04.1.dsc
 1beebeb8ec6526b9d4a3dfd7feaa761046270e02 5324 
spice-html5_0.1.4-1ubuntu1.16.04.1.debian.tar.xz
Checksums-Sha256:
 269ee45822be8b0fcb4faddbaf5af0279cf892e57972019364e50b5244d7565e 2123 
spice-html5_0.1.4-1ubuntu1.16.04.1.dsc
 b3596dedc2101c467f36f5ab18ce28c27fb8631c231868d0fa36fcad84a47eae 5324 
spice-html5_0.1.4-1ubuntu1.16.04.1.debian.tar.xz
Files:
 4546b9a12a7725cde29cd1c1f0878b67 2123 web extra 
spice-html5_0.1.4-1ubuntu1.16.04.1.dsc
 8c2ae3da093dea64d7ddb615911f54d9 5324 web extra 
spice-html5_0.1.4-1ubuntu1.16.04.1.debian.tar.xz
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] software-properties 0.96.20.9 (Accepted)

2019-07-30 Thread Corey Bryant
software-properties (0.96.20.9) xenial; urgency=medium

  * cloudarchive: Update outdated WEB_LINK that is presented when
cloud archive is enabled (LP: #1836258).

Date: Fri, 12 Jul 2019 10:15:23 -0400
Changed-By: Corey Bryant 
Maintainer: Michael Vogt 
https://launchpad.net/ubuntu/+source/software-properties/0.96.20.9
Format: 1.8
Date: Fri, 12 Jul 2019 10:15:23 -0400
Source: software-properties
Architecture: source
Version: 0.96.20.9
Distribution: xenial
Urgency: medium
Maintainer: Michael Vogt 
Changed-By: Corey Bryant 
Launchpad-Bugs-Fixed: 1836258
Changes:
 software-properties (0.96.20.9) xenial; urgency=medium
 .
   * cloudarchive: Update outdated WEB_LINK that is presented when
 cloud archive is enabled (LP: #1836258).
Checksums-Sha1:
 df2675742e963b1ab47a61a529352958a62df9c0 2345 software-properties_0.96.20.9.dsc
 693f7a5e83bc22fe273852c65c7d3a81c0de4449 402148 
software-properties_0.96.20.9.tar.xz
 f1134a7daeec11cd3923411ac46a014b2310383e 7952 
software-properties_0.96.20.9_source.buildinfo
Checksums-Sha256:
 31f688674defc5dbe26d4915c151b08fb08571a0151d88badba0fb9f65ca59f7 2345 
software-properties_0.96.20.9.dsc
 e33c2c714d69558a3dbb3d1019cee90ccf198cf12ad5ff44711fc31dec33137c 402148 
software-properties_0.96.20.9.tar.xz
 37827f49b810ee95aa52da057f92da4809e4ed4ed8d44de2434805ab320de107 7952 
software-properties_0.96.20.9_source.buildinfo
Files:
 577829587c5d6dc6fc95f959f21d3aba 2345 admin optional 
software-properties_0.96.20.9.dsc
 a910a78c27aa9cdedf96643881e249fe 402148 admin optional 
software-properties_0.96.20.9.tar.xz
 f63ece032a3139c03d4da6d9af81d6d2 7952 admin optional 
software-properties_0.96.20.9_source.buildinfo
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-snapdragon 4.4.0.1122.114 (Accepted)

2019-07-30 Thread Andy Whitcroft
linux-meta-snapdragon (4.4.0.1122.114) xenial; urgency=medium

  * Bump ABI 4.4.0-1122

Date: 2019-07-30 14:48:55.171691+00:00
Changed-By: Jesse Sung 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-snapdragon/4.4.0.1122.114
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-snapdragon 4.4.0-1122.128 (Accepted)

2019-07-30 Thread Andy Whitcroft
linux-snapdragon (4.4.0-1122.128) xenial; urgency=medium

  * xenial/linux-snapdragon: 4.4.0-1122.128 -proposed tracker (LP: #1837598)

  * CVE-2018-5383
- [Config] enable CRYPTO_ECDH

  [ Ubuntu: 4.4.0-158.186 ]

  * xenial/linux: 4.4.0-158.186 -proposed tracker (LP: #1837609)
  * Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
- [Packaging] update helper scripts
  * ixgbe{vf} - Physical Function gets IRQ when VF checks link state
(LP: #1836760)
- ixgbevf: Use cached link state instead of re-reading the value for ethtool
  * CVE-2018-5383
- crypto: kpp - Key-agreement Protocol Primitives API (KPP)
- crypto: dh - Add DH software implementation
- crypto: ecdh - Add ECDH software support
- crypto: ecdh - make ecdh_shared_secret unique
- crypto: doc - add KPP documentation
- crypto: kpp, (ec)dh - fix typos
- crypto: ecc - remove unused function arguments
- crypto: ecc - remove unnecessary casts
- crypto: ecc - rename ecdh_make_pub_key()
- crypto: ecdh - add privkey generation support
- crypto: ecc - Fix NULL pointer deref. on no default_rng
- [Config] CRYPTO_ECDH=m
- Bluetooth: convert smp and selftest to crypto kpp API
- crypto: ecdh - add public key verification test
  * Xenial update: 4.4.185 upstream stable release (LP: #1836668)
- fs/binfmt_flat.c: make load_flat_shared_library() work
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck()
- tracing: Silence GCC 9 array bounds warning
- gcc-9: silence 'address-of-packed-member' warning
- usb: chipidea: udc: workaround for endpoint conflict issue
- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD
- apparmor: enforce nullbyte at end of tag string
- parport: Fix mem leak in parport_register_dev_model
- parisc: Fix compiler warnings in float emulation code
- IB/hfi1: Insure freeze_work work_struct is canceled on shutdown
- MIPS: uprobes: remove set but not used variable 'epc'
- net: hns: Fix loopback test failed at copper ports
- sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD
- scripts/checkstack.pl: Fix arm64 wrong or unknown architecture
- scsi: ufs: Check that space was properly alloced in copy_query_response
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages
- Btrfs: fix race between readahead and device replace/removal
- btrfs: start readahead also in seed devices
- can: flexcan: fix timeout when set small bitrate
- can: purge socket error queue on sock destruct
- ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX
- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections
- Bluetooth: Fix regression with minimum encryption key size alignment
- SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write
- cfg80211: fix memory leak of wiphy device name
- mac80211: drop robust management frames from unknown TA
- perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit
  set nul
- perf help: Remove needless use of strncpy()
- 9p/rdma: do not disconnect on down_interruptible EAGAIN
- 9p: acl: fix uninitialized iattr access
- 9p/rdma: remove useless check in cm_event_handler
- 9p: p9dirent_read: check network-provided name length
- net/9p: include trans_common.h to fix missing prototype warning.
- ovl: modify ovl_permission() to do checks on two inodes
- x86/speculation: Allow guests to use SSBD even if host does not
- cpu/speculation: Warn on unsupported mitigations= parameter
- sctp: change to hold sk after auth shkey is created successfully
- tipc: change to use register_pernet_device
- tipc: check msg->req data len in tipc_nl_compat_bearer_disable
- team: Always enable vlan tx offload
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop
- bonding: Always enable vlan tx offload
- net: check before dereferencing netdev_ops during busy poll
- Bluetooth: Fix faulty expression for minimum encryption key size check
- um: Compile with modern headers
- ASoC : cs4265 : readable register too low
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master
- ASoC: max98090: remove 24-bit format support if RJ is 0
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i]
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC
- scsi: hpsa: correct ioaccel2 chaining
- ARC: Assume multiplier is always present
- ARC: fix build warning in elf.h
- MIPS: math-emu: do not use bools for arithmetic
- mfd: omap-usb-tll: Fix register offsets
- swiotlb: Make linux/swiotlb.h standalone includible
- bug.h: work around GCC PR82365 in BUG()
- MIPS: Workaround GCC __builtin_unreachable reordering bug
- ptrace: Fi

[ubuntu/xenial-proposed] linux-meta-raspi2 4.4.0.1118.118 (Accepted)

2019-07-30 Thread Andy Whitcroft
linux-meta-raspi2 (4.4.0.1118.118) xenial; urgency=medium

  * Bump ABI 4.4.0-1118

Date: 2019-07-30 16:37:54.899292+00:00
Changed-By: Connor Kuehl 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-raspi2/4.4.0.1118.118
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-raspi2 4.4.0-1118.127 (Accepted)

2019-07-30 Thread Andy Whitcroft
linux-raspi2 (4.4.0-1118.127) xenial; urgency=medium

  * xenial/linux-raspi2: 4.4.0-1118.127 -proposed tracker (LP: #1837594)

  * CVE-2018-5383
- raspi2: [Config]: CRYPTO_ECDH=m

  [ Ubuntu: 4.4.0-158.186 ]

  * xenial/linux: 4.4.0-158.186 -proposed tracker (LP: #1837609)
  * Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
- [Packaging] update helper scripts
  * ixgbe{vf} - Physical Function gets IRQ when VF checks link state
(LP: #1836760)
- ixgbevf: Use cached link state instead of re-reading the value for ethtool
  * CVE-2018-5383
- crypto: kpp - Key-agreement Protocol Primitives API (KPP)
- crypto: dh - Add DH software implementation
- crypto: ecdh - Add ECDH software support
- crypto: ecdh - make ecdh_shared_secret unique
- crypto: doc - add KPP documentation
- crypto: kpp, (ec)dh - fix typos
- crypto: ecc - remove unused function arguments
- crypto: ecc - remove unnecessary casts
- crypto: ecc - rename ecdh_make_pub_key()
- crypto: ecdh - add privkey generation support
- crypto: ecc - Fix NULL pointer deref. on no default_rng
- [Config] CRYPTO_ECDH=m
- Bluetooth: convert smp and selftest to crypto kpp API
- crypto: ecdh - add public key verification test
  * Xenial update: 4.4.185 upstream stable release (LP: #1836668)
- fs/binfmt_flat.c: make load_flat_shared_library() work
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck()
- tracing: Silence GCC 9 array bounds warning
- gcc-9: silence 'address-of-packed-member' warning
- usb: chipidea: udc: workaround for endpoint conflict issue
- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD
- apparmor: enforce nullbyte at end of tag string
- parport: Fix mem leak in parport_register_dev_model
- parisc: Fix compiler warnings in float emulation code
- IB/hfi1: Insure freeze_work work_struct is canceled on shutdown
- MIPS: uprobes: remove set but not used variable 'epc'
- net: hns: Fix loopback test failed at copper ports
- sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD
- scripts/checkstack.pl: Fix arm64 wrong or unknown architecture
- scsi: ufs: Check that space was properly alloced in copy_query_response
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages
- Btrfs: fix race between readahead and device replace/removal
- btrfs: start readahead also in seed devices
- can: flexcan: fix timeout when set small bitrate
- can: purge socket error queue on sock destruct
- ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX
- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections
- Bluetooth: Fix regression with minimum encryption key size alignment
- SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write
- cfg80211: fix memory leak of wiphy device name
- mac80211: drop robust management frames from unknown TA
- perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit
  set nul
- perf help: Remove needless use of strncpy()
- 9p/rdma: do not disconnect on down_interruptible EAGAIN
- 9p: acl: fix uninitialized iattr access
- 9p/rdma: remove useless check in cm_event_handler
- 9p: p9dirent_read: check network-provided name length
- net/9p: include trans_common.h to fix missing prototype warning.
- ovl: modify ovl_permission() to do checks on two inodes
- x86/speculation: Allow guests to use SSBD even if host does not
- cpu/speculation: Warn on unsupported mitigations= parameter
- sctp: change to hold sk after auth shkey is created successfully
- tipc: change to use register_pernet_device
- tipc: check msg->req data len in tipc_nl_compat_bearer_disable
- team: Always enable vlan tx offload
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop
- bonding: Always enable vlan tx offload
- net: check before dereferencing netdev_ops during busy poll
- Bluetooth: Fix faulty expression for minimum encryption key size check
- um: Compile with modern headers
- ASoC : cs4265 : readable register too low
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master
- ASoC: max98090: remove 24-bit format support if RJ is 0
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i]
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC
- scsi: hpsa: correct ioaccel2 chaining
- ARC: Assume multiplier is always present
- ARC: fix build warning in elf.h
- MIPS: math-emu: do not use bools for arithmetic
- mfd: omap-usb-tll: Fix register offsets
- swiotlb: Make linux/swiotlb.h standalone includible
- bug.h: work around GCC PR82365 in BUG()
- MIPS: Workaround GCC __builtin_unreachable reordering bug
- ptrace: Fix ->

[ubuntu/xenial-updates] sox 14.4.1-5+deb8u4ubuntu0.1 (Accepted)

2019-07-30 Thread Ubuntu Archive Robot
sox (14.4.1-5+deb8u4ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Merge from Debian
- Fixes:
  - CVE-2019-8354
  - CVE-2019-8356
  - CVE-2019-8357
- Fixes overwritten by Debian:
  - CVE-2017-11332
  - CVE-2017-11358
  - CVE-2017-11359
  - CVE-2017-15370
  - CVE-2017-15371
  - CVE-2017-15372
  - CVE-2017-15642
  - CVE-2017-18189
- Ignored Debian's "override_dh_strip" in debian/rules as this change was
  made by mistake

sox (14.4.1-5+deb8u4) jessie-security; urgency=medium

  * Non-maintainer upload by the LTS Team.
  * CVE-2019-8354, CVE-2019-8355: buffer overflow in valloc functions.
  * CVE-2019-8356: stack-based buffer overflow in bitrv2().
  * CVE-2019-8357: NULL pointer dereference in lsx_make_lpf().

sox (14.4.1-5+deb8u3) jessie-security; urgency=high

  * Non-maintainer upload by the LTS Team.
  * CVE-2017-15371: reachable assertion in sox_append_comment() (formats.c)
(Closes: #878809).
  * CVE-2017-11359: divide-by-zero error wavwritehdr function (wav.c)
(Closes: #870328).
  * CVE-2017-11332: divide-by-zero error in startread function (wav.c).
  * CVE-2017-11358: invalid memory read in read_samples function (hcom.c).

sox (14.4.1-5+deb8u2) jessie-security; urgency=high

  * Non-maintainer upload by the LTS Team.
  * CVE-2017-15370: heap-based buffer overflow in the ImaExpandS function
of ima_rw.c (Closes: #878810).
  * CVE-2017-15372: stack-based buffer overflow in the
lsx_ms_adpcm_block_expand_i function of adpcm.c (Closes: #878808).
  * CVE-2017-18189: null pointer dereference caused by corrupt header
specifying zero channels, sending read_channels() into an infinite loop
(Closes: #881121).
  * CVE-2017-15642: use-after-free in output_message, triggered by crafted
aiff file (Closes: #882144).

sox (14.4.1-5+deb8u1) jessie-security; urgency=medium

  * Non-maintainer upload.
  * Add patches for CVE-2014-8145 to series file and really apply fixes.
Thanks to Mike Salvatore for spotting the issue. (Closes: #773720)

Date: 2019-07-30 17:01:14.288185+00:00
Changed-By: Eduardo dos Santos Barretto 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/sox/14.4.1-5+deb8u4ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] nss 2:3.28.4-0ubuntu0.16.04.7 (Accepted)

2019-07-30 Thread Vineetha Kamath
nss (2:3.28.4-0ubuntu0.16.04.7) xenial; urgency=medium

  * disable reading fips_enabled flag and enabling FIPS mode
automatically on a FIPS machine. libnss is not a FIPS
certified library. (LP: #1837734)

Date: Tue, 23 Jul 2019 11:38:29 -0400
Changed-By: Vineetha Kamath 
Maintainer: Ubuntu Developers 
Signed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.04.7
Format: 1.8
Date: Tue, 23 Jul 2019 11:38:29 -0400
Source: nss
Binary: libnss3 libnss3-1d libnss3-nssdb libnss3-tools libnss3-dev libnss3-dbg
Architecture: source
Version: 2:3.28.4-0ubuntu0.16.04.7
Distribution: xenial
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Vineetha Kamath 
Description:
 libnss3- Network Security Service libraries
 libnss3-1d - Network Security Service libraries - transitional package
 libnss3-dbg - Debugging symbols for the Network Security Service libraries
 libnss3-dev - Development files for the Network Security Service libraries
 libnss3-nssdb - Network Security Security libraries - shared databases
 libnss3-tools - Network Security Service tools
Launchpad-Bugs-Fixed: 1837734
Changes:
 nss (2:3.28.4-0ubuntu0.16.04.7) xenial; urgency=medium
 .
   * disable reading fips_enabled flag and enabling FIPS mode
 automatically on a FIPS machine. libnss is not a FIPS
 certified library. (LP: #1837734)
Checksums-Sha1:
 d9c0c184bfe98e155049f0edbd1bf0abbdd9842d 2444 nss_3.28.4-0ubuntu0.16.04.7.dsc
 9df495f1b4b7cc24e7737c551a6c8a870aa1c7f1 43268 
nss_3.28.4-0ubuntu0.16.04.7.debian.tar.xz
Checksums-Sha256:
 3827b1b649290ee90c54c0bad83eb56fcce46fb96437de50f1c64ca4567b4ffb 2444 
nss_3.28.4-0ubuntu0.16.04.7.dsc
 736a8c8ad2afeff0039910445b90278c8a273daede6b069680c36a46306ca926 43268 
nss_3.28.4-0ubuntu0.16.04.7.debian.tar.xz
Files:
 b5572b65386ee9d88065890898d4523d 2444 libs optional 
nss_3.28.4-0ubuntu0.16.04.7.dsc
 e46882507a621aa563fe0146b4de16a1 43268 libs optional 
nss_3.28.4-0ubuntu0.16.04.7.debian.tar.xz
Original-Maintainer: Maintainers of Mozilla-related packages 

-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] sox 14.4.1-5+deb8u4ubuntu0.1 (Accepted)

2019-07-30 Thread Eduardo dos Santos Barretto
sox (14.4.1-5+deb8u4ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Merge from Debian
- Fixes:
  - CVE-2019-8354
  - CVE-2019-8356
  - CVE-2019-8357
- Fixes overwritten by Debian:
  - CVE-2017-11332
  - CVE-2017-11358
  - CVE-2017-11359
  - CVE-2017-15370
  - CVE-2017-15371
  - CVE-2017-15372
  - CVE-2017-15642
  - CVE-2017-18189
- Ignored Debian's "override_dh_strip" in debian/rules as this change was
  made by mistake

sox (14.4.1-5+deb8u4) jessie-security; urgency=medium

  * Non-maintainer upload by the LTS Team.
  * CVE-2019-8354, CVE-2019-8355: buffer overflow in valloc functions.
  * CVE-2019-8356: stack-based buffer overflow in bitrv2().
  * CVE-2019-8357: NULL pointer dereference in lsx_make_lpf().

sox (14.4.1-5+deb8u3) jessie-security; urgency=high

  * Non-maintainer upload by the LTS Team.
  * CVE-2017-15371: reachable assertion in sox_append_comment() (formats.c)
(Closes: #878809).
  * CVE-2017-11359: divide-by-zero error wavwritehdr function (wav.c)
(Closes: #870328).
  * CVE-2017-11332: divide-by-zero error in startread function (wav.c).
  * CVE-2017-11358: invalid memory read in read_samples function (hcom.c).

sox (14.4.1-5+deb8u2) jessie-security; urgency=high

  * Non-maintainer upload by the LTS Team.
  * CVE-2017-15370: heap-based buffer overflow in the ImaExpandS function
of ima_rw.c (Closes: #878810).
  * CVE-2017-15372: stack-based buffer overflow in the
lsx_ms_adpcm_block_expand_i function of adpcm.c (Closes: #878808).
  * CVE-2017-18189: null pointer dereference caused by corrupt header
specifying zero channels, sending read_channels() into an infinite loop
(Closes: #881121).
  * CVE-2017-15642: use-after-free in output_message, triggered by crafted
aiff file (Closes: #882144).

sox (14.4.1-5+deb8u1) jessie-security; urgency=medium

  * Non-maintainer upload.
  * Add patches for CVE-2014-8145 to series file and really apply fixes.
Thanks to Mike Salvatore for spotting the issue. (Closes: #773720)

Date: 2019-07-30 17:01:14.288185+00:00
Changed-By: Eduardo dos Santos Barretto 
https://launchpad.net/ubuntu/+source/sox/14.4.1-5+deb8u4ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] openldap 2.4.42+dfsg-2ubuntu3.6 (Accepted)

2019-07-30 Thread Ubuntu Archive Robot
openldap (2.4.42+dfsg-2ubuntu3.6) xenial-security; urgency=medium

  * SECURITY UPDATE: rootDN proxyauthz not restricted to its own databases
- debian/patches/CVE-2019-13057-1.patch: add restriction to
  servers/slapd/saslauthz.c.
- debian/patches/CVE-2019-13057-2.patch: add tests to
  tests/data/idassert.out, tests/data/slapd-idassert.conf,
  tests/data/test-idassert1.ldif, tests/scripts/test028-idassert.
- debian/patches/CVE-2019-13057-3.patch: fix typo in
  tests/scripts/test028-idassert.
- debian/patches/CVE-2019-13057-4.patch: fix typo in
  tests/scripts/test028-idassert.
- CVE-2019-13057
  * SECURITY UPDATE: SASL SSF not initialized per connection
- debian/patches/CVE-2019-13565.patch: zero out sasl_ssf in
  connection_init in servers/slapd/connection.c.
- CVE-2019-13565

Date: 2019-07-29 18:22:13.397162+00:00
Changed-By: Marc Deslauriers 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/openldap/2.4.42+dfsg-2ubuntu3.6
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] openldap 2.4.42+dfsg-2ubuntu3.6 (Accepted)

2019-07-30 Thread Marc Deslauriers
openldap (2.4.42+dfsg-2ubuntu3.6) xenial-security; urgency=medium

  * SECURITY UPDATE: rootDN proxyauthz not restricted to its own databases
- debian/patches/CVE-2019-13057-1.patch: add restriction to
  servers/slapd/saslauthz.c.
- debian/patches/CVE-2019-13057-2.patch: add tests to
  tests/data/idassert.out, tests/data/slapd-idassert.conf,
  tests/data/test-idassert1.ldif, tests/scripts/test028-idassert.
- debian/patches/CVE-2019-13057-3.patch: fix typo in
  tests/scripts/test028-idassert.
- debian/patches/CVE-2019-13057-4.patch: fix typo in
  tests/scripts/test028-idassert.
- CVE-2019-13057
  * SECURITY UPDATE: SASL SSF not initialized per connection
- debian/patches/CVE-2019-13565.patch: zero out sasl_ssf in
  connection_init in servers/slapd/connection.c.
- CVE-2019-13565

openldap (2.4.42+dfsg-2ubuntu3.5) xenial; urgency=medium

  * Fix sysv-generator unit file by customizing parameters (LP: #1821343)
- d/slapd-remain-after-exit.conf: Override RemainAfterExit to allow
  correct systemctl status for slapd daemon.
- d/slapd.install: place override file in correct location.

openldap (2.4.42+dfsg-2ubuntu3.4) xenial; urgency=medium

  * d/apparmor-profile: update apparmor profile to allow reading of
files needed when slapd is behaving as a kerberos/gssapi client
and acquiring its own ticket. (LP: #1783183)

openldap (2.4.42+dfsg-2ubuntu3.3) xenial; urgency=medium

  [ Ryan Tandy ]
  * d/p/ITS-8648-check-result-of-ldap_int_initialize-in-ldap.patch,
d/p/ITS-8648-init-SASL-library-in-global-init.patch: Import upstream
patches to fix memory corruption caused by calling sasl_client_init()
multiple times and possibly concurrently.  (ITS#8648) (LP: #1688575)

Date: 2019-07-29 18:22:13.397162+00:00
Changed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/openldap/2.4.42+dfsg-2ubuntu3.6
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] qemu 1:2.5+dfsg-5ubuntu10.41 (Accepted)

2019-07-30 Thread Brian Murray
qemu (1:2.5+dfsg-5ubuntu10.41) xenial; urgency=medium

  * d/p/ubuntu/lp-1830243-s390-bios-Skip-bootmap-signature-entries.patch:
tolerate guests with secure boot loaders (LP: #1830243)

Date: 2019-07-16 09:55:10.848100+00:00
Changed-By: Christian Ehrhardt  
Signed-By: Brian Murray 
https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.41
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-signed-oracle 4.15.0-1019.21~16.04.1 (Accepted)

2019-07-30 Thread Łukasz Zemczak
linux-signed-oracle (4.15.0-1019.21~16.04.1) xenial; urgency=medium

  * Master version: 4.15.0-1019.21~16.04.1

Date: 2019-07-30 08:42:56.018710+00:00
Changed-By: Kleber Sacilotto de Souza 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-signed-oracle/4.15.0-1019.21~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-oracle 4.15.0.1019.13 (Accepted)

2019-07-30 Thread Łukasz Zemczak
linux-meta-oracle (4.15.0.1019.13) xenial; urgency=medium

  * Bump ABI 4.15.0-1019

Date: 2019-07-30 08:42:54.348220+00:00
Changed-By: Kleber Sacilotto de Souza 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta-oracle/4.15.0.1019.13
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-kvm 4.4.0.1053.53 (Accepted)

2019-07-30 Thread Łukasz Zemczak
linux-meta-kvm (4.4.0.1053.53) xenial; urgency=medium

  * Bump ABI 4.4.0-1053

Date: 2019-07-30 10:25:11.615978+00:00
Changed-By: Connor Kuehl 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta-kvm/4.4.0.1053.53
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-kvm 4.4.0-1053.60 (Accepted)

2019-07-30 Thread Łukasz Zemczak
linux-kvm (4.4.0-1053.60) xenial; urgency=medium

  * xenial/linux-kvm: 4.4.0-1053.60 -proposed tracker (LP: #1837591)

  * CVE-2018-5383
- kvm: [Config]: CRYPTO_ECDH=m

  * linux-kvm: please support kexec (LP: #1799791)
- [Config]: enable KEXEC and KEXEC_FILE

  [ Ubuntu: 4.4.0-158.186 ]

  * xenial/linux: 4.4.0-158.186 -proposed tracker (LP: #1837609)
  * Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
- [Packaging] update helper scripts
  * ixgbe{vf} - Physical Function gets IRQ when VF checks link state
(LP: #1836760)
- ixgbevf: Use cached link state instead of re-reading the value for ethtool
  * CVE-2018-5383
- crypto: kpp - Key-agreement Protocol Primitives API (KPP)
- crypto: dh - Add DH software implementation
- crypto: ecdh - Add ECDH software support
- crypto: ecdh - make ecdh_shared_secret unique
- crypto: doc - add KPP documentation
- crypto: kpp, (ec)dh - fix typos
- crypto: ecc - remove unused function arguments
- crypto: ecc - remove unnecessary casts
- crypto: ecc - rename ecdh_make_pub_key()
- crypto: ecdh - add privkey generation support
- crypto: ecc - Fix NULL pointer deref. on no default_rng
- [Config] CRYPTO_ECDH=m
- Bluetooth: convert smp and selftest to crypto kpp API
- crypto: ecdh - add public key verification test
  * Xenial update: 4.4.185 upstream stable release (LP: #1836668)
- fs/binfmt_flat.c: make load_flat_shared_library() work
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck()
- tracing: Silence GCC 9 array bounds warning
- gcc-9: silence 'address-of-packed-member' warning
- usb: chipidea: udc: workaround for endpoint conflict issue
- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD
- apparmor: enforce nullbyte at end of tag string
- parport: Fix mem leak in parport_register_dev_model
- parisc: Fix compiler warnings in float emulation code
- IB/hfi1: Insure freeze_work work_struct is canceled on shutdown
- MIPS: uprobes: remove set but not used variable 'epc'
- net: hns: Fix loopback test failed at copper ports
- sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD
- scripts/checkstack.pl: Fix arm64 wrong or unknown architecture
- scsi: ufs: Check that space was properly alloced in copy_query_response
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages
- Btrfs: fix race between readahead and device replace/removal
- btrfs: start readahead also in seed devices
- can: flexcan: fix timeout when set small bitrate
- can: purge socket error queue on sock destruct
- ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX
- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections
- Bluetooth: Fix regression with minimum encryption key size alignment
- SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write
- cfg80211: fix memory leak of wiphy device name
- mac80211: drop robust management frames from unknown TA
- perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit
  set nul
- perf help: Remove needless use of strncpy()
- 9p/rdma: do not disconnect on down_interruptible EAGAIN
- 9p: acl: fix uninitialized iattr access
- 9p/rdma: remove useless check in cm_event_handler
- 9p: p9dirent_read: check network-provided name length
- net/9p: include trans_common.h to fix missing prototype warning.
- ovl: modify ovl_permission() to do checks on two inodes
- x86/speculation: Allow guests to use SSBD even if host does not
- cpu/speculation: Warn on unsupported mitigations= parameter
- sctp: change to hold sk after auth shkey is created successfully
- tipc: change to use register_pernet_device
- tipc: check msg->req data len in tipc_nl_compat_bearer_disable
- team: Always enable vlan tx offload
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop
- bonding: Always enable vlan tx offload
- net: check before dereferencing netdev_ops during busy poll
- Bluetooth: Fix faulty expression for minimum encryption key size check
- um: Compile with modern headers
- ASoC : cs4265 : readable register too low
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master
- ASoC: max98090: remove 24-bit format support if RJ is 0
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i]
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC
- scsi: hpsa: correct ioaccel2 chaining
- ARC: Assume multiplier is always present
- ARC: fix build warning in elf.h
- MIPS: math-emu: do not use bools for arithmetic
- mfd: omap-usb-tll: Fix register offsets
- swiotlb: Make linux/swiotlb.h standalone includible
- bug.h: work around GCC PR82365 in BUG()

[ubuntu/xenial-proposed] linux-meta-hwe-edge 4.15.0.56.75 (Accepted)

2019-07-30 Thread Łukasz Zemczak
linux-meta-hwe-edge (4.15.0.56.75) xenial; urgency=medium

  * Bump ABI 4.15.0-56

Date: 2019-07-30 10:42:24.947680+00:00
Changed-By: Jesse Sung 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta-hwe-edge/4.15.0.56.75
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-meta-snapdragon 4.4.0.1121.113 (Accepted)

2019-07-30 Thread Andy Whitcroft
linux-meta-snapdragon (4.4.0.1121.113) xenial; urgency=medium

  * Bump ABI 4.4.0-1121

linux-meta-snapdragon (4.4.0.1120.112) xenial; urgency=medium

  * Bump ABI 4.4.0-1120

linux-meta-snapdragon (4.4.0.1119.111) xenial; urgency=medium

  * Bump ABI 4.4.0-1119

Date: 2019-07-23 11:00:30.007471+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-snapdragon/4.4.0.1121.113
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-snapdragon 4.4.0-1121.127 (Accepted)

2019-07-30 Thread Andy Whitcroft
linux-snapdragon (4.4.0-1121.127) xenial; urgency=medium

  * xenial/linux-snapdragon: 4.4.0-1121.127 -proposed tracker (LP: #1837474)

  * Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log

  [ Ubuntu: 4.4.0-157.185 ]

  * linux: 4.4.0-157.185 -proposed tracker (LP: #1837476)
  * systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage)
(LP: #1837235)
- Revert "block/bio: Do not zero user pages"
- Revert "block: Clear kernel memory before copying to user"
- Revert "bio_copy_from_iter(): get rid of copying iov_iter"

linux-snapdragon (4.4.0-1120.126) xenial; urgency=medium

  * linux-snapdragon: 4.4.0-1120.126 -proposed tracker (LP: #1836878)

  [ Ubuntu: 4.4.0-156.183 ]

  * linux: 4.4.0-156.183 -proposed tracker (LP: #1836880)
  * BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba (LP: #1836801)
- brcmfmac: add eth_type_trans back for PCIe full dongle

linux-snapdragon (4.4.0-1119.125) xenial; urgency=medium

  * linux-snapdragon: 4.4.0-1119.125 -proposed tracker (LP: #1834913)

  [ Ubuntu: 4.4.0-155.182 ]

  * linux: 4.4.0-155.182 -proposed tracker (LP: #1834918)
  * Geneve tunnels don't work when ipv6 is disabled (LP: #1794232)
- geneve: correctly handle ipv6.disable module parameter
  * Kernel modules generated incorrectly when system is localized to a non-
English language (LP: #1828084)
- scripts: override locale from environment when running recordmcount.pl
  * Handle overflow in proc_get_long of sysctl (LP: #1833935)
- sysctl: handle overflow in proc_get_long
  * Xenial update: 4.4.181 upstream stable release (LP: #1832661)
- x86/speculation/mds: Revert CPU buffer clear on double fault exit
- x86/speculation/mds: Improve CPU buffer clear documentation
- ARM: exynos: Fix a leaked reference by adding missing of_node_put
- crypto: vmx - fix copy-paste error in CTR mode
- crypto: crct10dif-generic - fix use via crypto_shash_digest()
- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()
- ALSA: usb-audio: Fix a memory leak bug
- ALSA: hda/hdmi - Consider eld_valid when reporting jack event
- ALSA: hda/realtek - EAPD turn on later
- ASoC: max98090: Fix restore of DAPM Muxes
- ASoC: RT5677-SPI: Disable 16Bit SPI Transfers
- mm/mincore.c: make mincore() more conservative
- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget
- mfd: da9063: Fix OTP control register names to match datasheets for
  DA9063/63L
- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler
- ext4: actually request zeroing of inode table after grow
- ext4: fix ext4_show_options for file systems w/o journal
- Btrfs: do not start a transaction at iterate_extent_inodes()
- bcache: fix a race between cache register and cacheset unregister
- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim()
- ipmi:ssif: compare block number correctly for multi-part return messages
- crypto: gcm - Fix error return code in crypto_gcm_create_common()
- crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
- crypto: chacha20poly1305 - set cra_name correctly
- crypto: salsa20 - don't access already-freed walk.iv
- crypto: arm/aes-neonbs - don't access already-freed walk.iv
- writeback: synchronize sync(2) against cgroup writeback membership 
switches
- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going
  into workqueue when umount
- ALSA: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug
- KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes
- net: avoid weird emergency message
- net/mlx4_core: Change the error print to info print
- ppp: deflate: Fix possible crash in deflate_init
- tipc: switch order of device registration to fix a crash
- tipc: fix modprobe tipc failed after switch order of device registration
- stm class: Fix channel free in stm output free path
- md: add mddev->pers to avoid potential NULL pointer dereference
- intel_th: msu: Fix single mode with IOMMU
- of: fix clang -Wunsequenced for be32_to_cpu()
- cifs: fix strcat buffer overflow and reduce raciness in
  smb21_set_oplock_level()
- media: ov6650: Fix sensor possibly not detected on probe
- NFS4: Fix v4.0 client state corruption when mount
- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider
- fuse: fix writepages on 32bit
- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate
- iommu/tegra-smmu: Fix invalid ASID bits on Tegra30/114
- ceph: flush dirty inodes before proceeding with remount
- tracing: Fix partial reading of trace event's id file
- memory: tegra: Fix integer overflow on tick value calculation
- perf intel-pt: Fix instructions sampling rate
- perf intel-pt: Fix improved sample timestamp
- perf intel-pt: Fix sample timestamp wrt non-taken branches
- fbdev: sm712f

[ubuntu/xenial-security] linux-azure 4.15.0-1052.57 (Accepted)

2019-07-30 Thread Andy Whitcroft
linux-azure (4.15.0-1052.57) xenial; urgency=medium

  * xenial/linux-azure: 4.15.0-1052.57 -proposed tracker (LP: #1837632)

  * kernel panic using CIFS share in smb2_push_mandatory_locks() (LP: #1795659)
- CIFS: keep FileInfo handle live during oplock break

Date: 2019-07-23 19:03:13.017153+00:00
Changed-By: Marcelo Cerri 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1052.57
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-signed-azure 4.15.0-1052.57 (Accepted)

2019-07-30 Thread Andy Whitcroft
linux-signed-azure (4.15.0-1052.57) xenial; urgency=medium

  * Master version: 4.15.0-1052.57

Date: 2019-07-23 19:04:07.604165+00:00
Changed-By: Marcelo Cerri 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-signed-azure/4.15.0-1052.57
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-meta-azure 4.15.0.1052.55 (Accepted)

2019-07-30 Thread Andy Whitcroft
linux-meta-azure (4.15.0.1052.55) xenial; urgency=medium

  * Bump ABI 4.15.0-1052

Date: 2019-07-23 19:04:05.773861+00:00
Changed-By: Marcelo Cerri 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-azure/4.15.0.1052.55
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-hwe 4.15.0.56.77 (Accepted)

2019-07-30 Thread Łukasz Zemczak
linux-meta-hwe (4.15.0.56.77) xenial; urgency=medium

  * Bump ABI 4.15.0-56

Date: 2019-07-29 14:17:52.645676+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta-hwe/4.15.0.56.77
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-signed-hwe 4.15.0-56.62~16.04.1 (Accepted)

2019-07-30 Thread Łukasz Zemczak
linux-signed-hwe (4.15.0-56.62~16.04.1) xenial; urgency=medium

  * Master version: 4.15.0-56.62~16.04.1

Date: 2019-07-29 14:17:50.709085+00:00
Changed-By: Stefan Bader 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-signed-hwe/4.15.0-56.62~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux_4.4.0-158.186_amd64.tar.gz - (Accepted)

2019-07-30 Thread Sultan Alsawaf
linux (4.4.0-158.186) xenial; urgency=medium

  * xenial/linux: 4.4.0-158.186 -proposed tracker (LP: #1837609)

  * Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
- [Packaging] update helper scripts

  * ixgbe{vf} - Physical Function gets IRQ when VF checks link state
(LP: #1836760)
- ixgbevf: Use cached link state instead of re-reading the value for ethtool

  * CVE-2018-5383
- crypto: kpp - Key-agreement Protocol Primitives API (KPP)
- crypto: dh - Add DH software implementation
- crypto: ecdh - Add ECDH software support
- crypto: ecdh - make ecdh_shared_secret unique
- crypto: doc - add KPP documentation
- crypto: kpp, (ec)dh - fix typos
- crypto: ecc - remove unused function arguments
- crypto: ecc - remove unnecessary casts
- crypto: ecc - rename ecdh_make_pub_key()
- crypto: ecdh - add privkey generation support
- crypto: ecc - Fix NULL pointer deref. on no default_rng
- [Config] CRYPTO_ECDH=m
- Bluetooth: convert smp and selftest to crypto kpp API
- crypto: ecdh - add public key verification test

  * Xenial update: 4.4.185 upstream stable release (LP: #1836668)
- fs/binfmt_flat.c: make load_flat_shared_library() work
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck()
- tracing: Silence GCC 9 array bounds warning
- gcc-9: silence 'address-of-packed-member' warning
- usb: chipidea: udc: workaround for endpoint conflict issue
- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD
- apparmor: enforce nullbyte at end of tag string
- parport: Fix mem leak in parport_register_dev_model
- parisc: Fix compiler warnings in float emulation code
- IB/hfi1: Insure freeze_work work_struct is canceled on shutdown
- MIPS: uprobes: remove set but not used variable 'epc'
- net: hns: Fix loopback test failed at copper ports
- sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD
- scripts/checkstack.pl: Fix arm64 wrong or unknown architecture
- scsi: ufs: Check that space was properly alloced in copy_query_response
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages
- Btrfs: fix race between readahead and device replace/removal
- btrfs: start readahead also in seed devices
- can: flexcan: fix timeout when set small bitrate
- can: purge socket error queue on sock destruct
- ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX
- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections
- Bluetooth: Fix regression with minimum encryption key size alignment
- SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write
- cfg80211: fix memory leak of wiphy device name
- mac80211: drop robust management frames from unknown TA
- perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit
  set nul
- perf help: Remove needless use of strncpy()
- 9p/rdma: do not disconnect on down_interruptible EAGAIN
- 9p: acl: fix uninitialized iattr access
- 9p/rdma: remove useless check in cm_event_handler
- 9p: p9dirent_read: check network-provided name length
- net/9p: include trans_common.h to fix missing prototype warning.
- ovl: modify ovl_permission() to do checks on two inodes
- x86/speculation: Allow guests to use SSBD even if host does not
- cpu/speculation: Warn on unsupported mitigations= parameter
- sctp: change to hold sk after auth shkey is created successfully
- tipc: change to use register_pernet_device
- tipc: check msg->req data len in tipc_nl_compat_bearer_disable
- team: Always enable vlan tx offload
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop
- bonding: Always enable vlan tx offload
- net: check before dereferencing netdev_ops during busy poll
- Bluetooth: Fix faulty expression for minimum encryption key size check
- um: Compile with modern headers
- ASoC : cs4265 : readable register too low
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master
- ASoC: max98090: remove 24-bit format support if RJ is 0
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i]
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC
- scsi: hpsa: correct ioaccel2 chaining
- ARC: Assume multiplier is always present
- ARC: fix build warning in elf.h
- MIPS: math-emu: do not use bools for arithmetic
- mfd: omap-usb-tll: Fix register offsets
- swiotlb: Make linux/swiotlb.h standalone includible
- bug.h: work around GCC PR82365 in BUG()
- MIPS: Workaround GCC __builtin_unreachable reordering bug
- ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME
- crypto: user - prevent operating on larval algorithms
- ALSA: seq: fix incorrect order of dest_client/dest_ports 

[ubuntu/xenial-proposed] linux-signed 4.4.0-158.186 (Accepted)

2019-07-30 Thread Łukasz Zemczak
linux-signed (4.4.0-158.186) xenial; urgency=medium

  * Master version: 4.4.0-158.186

Date: 2019-07-29 19:01:03.929785+00:00
Changed-By: Sultan Alsawaf 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-signed/4.4.0-158.186
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta 4.4.0.158.166 (Accepted)

2019-07-30 Thread Łukasz Zemczak
linux-meta (4.4.0.158.166) xenial; urgency=medium

  * Bump ABI 4.4.0-158

Date: 2019-07-29 19:01:00.790833+00:00
Changed-By: Sultan Alsawaf 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/linux-meta/4.4.0.158.166
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux 4.4.0-158.186 (Accepted)

2019-07-30 Thread Łukasz Zemczak
linux (4.4.0-158.186) xenial; urgency=medium

  * xenial/linux: 4.4.0-158.186 -proposed tracker (LP: #1837609)

  * Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
- [Packaging] update helper scripts

  * ixgbe{vf} - Physical Function gets IRQ when VF checks link state
(LP: #1836760)
- ixgbevf: Use cached link state instead of re-reading the value for ethtool

  * CVE-2018-5383
- crypto: kpp - Key-agreement Protocol Primitives API (KPP)
- crypto: dh - Add DH software implementation
- crypto: ecdh - Add ECDH software support
- crypto: ecdh - make ecdh_shared_secret unique
- crypto: doc - add KPP documentation
- crypto: kpp, (ec)dh - fix typos
- crypto: ecc - remove unused function arguments
- crypto: ecc - remove unnecessary casts
- crypto: ecc - rename ecdh_make_pub_key()
- crypto: ecdh - add privkey generation support
- crypto: ecc - Fix NULL pointer deref. on no default_rng
- [Config] CRYPTO_ECDH=m
- Bluetooth: convert smp and selftest to crypto kpp API
- crypto: ecdh - add public key verification test

  * Xenial update: 4.4.185 upstream stable release (LP: #1836668)
- fs/binfmt_flat.c: make load_flat_shared_library() work
- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck()
- tracing: Silence GCC 9 array bounds warning
- gcc-9: silence 'address-of-packed-member' warning
- usb: chipidea: udc: workaround for endpoint conflict issue
- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD
- apparmor: enforce nullbyte at end of tag string
- parport: Fix mem leak in parport_register_dev_model
- parisc: Fix compiler warnings in float emulation code
- IB/hfi1: Insure freeze_work work_struct is canceled on shutdown
- MIPS: uprobes: remove set but not used variable 'epc'
- net: hns: Fix loopback test failed at copper ports
- sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD
- scripts/checkstack.pl: Fix arm64 wrong or unknown architecture
- scsi: ufs: Check that space was properly alloced in copy_query_response
- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event
- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages
- Btrfs: fix race between readahead and device replace/removal
- btrfs: start readahead also in seed devices
- can: flexcan: fix timeout when set small bitrate
- can: purge socket error queue on sock destruct
- ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX
- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections
- Bluetooth: Fix regression with minimum encryption key size alignment
- SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write
- cfg80211: fix memory leak of wiphy device name
- mac80211: drop robust management frames from unknown TA
- perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit
  set nul
- perf help: Remove needless use of strncpy()
- 9p/rdma: do not disconnect on down_interruptible EAGAIN
- 9p: acl: fix uninitialized iattr access
- 9p/rdma: remove useless check in cm_event_handler
- 9p: p9dirent_read: check network-provided name length
- net/9p: include trans_common.h to fix missing prototype warning.
- ovl: modify ovl_permission() to do checks on two inodes
- x86/speculation: Allow guests to use SSBD even if host does not
- cpu/speculation: Warn on unsupported mitigations= parameter
- sctp: change to hold sk after auth shkey is created successfully
- tipc: change to use register_pernet_device
- tipc: check msg->req data len in tipc_nl_compat_bearer_disable
- team: Always enable vlan tx offload
- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop
- bonding: Always enable vlan tx offload
- net: check before dereferencing netdev_ops during busy poll
- Bluetooth: Fix faulty expression for minimum encryption key size check
- um: Compile with modern headers
- ASoC : cs4265 : readable register too low
- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master
- ASoC: max98090: remove 24-bit format support if RJ is 0
- usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i]
- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC
- scsi: hpsa: correct ioaccel2 chaining
- ARC: Assume multiplier is always present
- ARC: fix build warning in elf.h
- MIPS: math-emu: do not use bools for arithmetic
- mfd: omap-usb-tll: Fix register offsets
- swiotlb: Make linux/swiotlb.h standalone includible
- bug.h: work around GCC PR82365 in BUG()
- MIPS: Workaround GCC __builtin_unreachable reordering bug
- ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME
- crypto: user - prevent operating on larval algorithms
- ALSA: seq: fix incorrect order of dest_client/dest_ports