curtin (0.1.0~bzr387-0ubuntu1~14.04.1) trusty-proposed; urgency=medium
* sru current curtin (LP: #1577872)
* debian/new-upstream-snapshot, debian/README.source: add
new-upstream-snapshot and mention it in README.source
* debian/control: drop python from curtin-common Depends.
remove
maas (1.9.2+bzr4568-0ubuntu1~14.04.1) trusty-proposed; urgency=medium
* New Upstream Release, 1.9 (LP: #1509147):
- Support for Advanced Networking and Node Network Configuration:
+ Ability to declare Fabrics, Spaces, Subnets, VLANs and FANs.
+ Ability to assign subnets, fabrics
nova (1:2014.1.5-0ubuntu1.5) trusty; urgency=medium
* Fix live migration usage of the wrong connector (LP: #1475411)
- d/p/Fix-live-migrations-usage-of-the-wrong-connector-inf.patch
* Fix wrong used ProcessExecutionError exception (LP: #1308839)
- d/p/Fix-wrong-used-ProcessExecutionErr
mdadm (3.2.5-5ubuntu4.3) trusty; urgency=medium
* debian/source_mdadm.py: fix bytes versus strings mismatch that
caused the apport hook to fail (LP: #1583279)
Date: Wed, 18 May 2016 15:48:46 -0700
Changed-By: Steve Beattie
Maintainer: Ubuntu Developers
Signed-By: Tyler Hicks
https://laun
unity (7.2.6+14.04.20160408-0ubuntu1) trusty; urgency=medium
[ Andrea Azzarone ]
* Don't use SetActivate from gnome-screensaver as it will not only
deactivate the screensaver but also unlock the screen. (LP:
#1552537)
* Improve the "lock on suspend" logic to always keep in sync the
apt (1.0.1ubuntu2.14) trusty; urgency=medium
* When using the https transport mechanism, $no_proxy is ignored if apt is
getting it's proxy information from $https_proxy (as opposed to
Acquire::https::Proxy somewhere in apt config). If the source of proxy
information is Acquire::https
php5 (5.5.9+dfsg-1ubuntu4.17) trusty-security; urgency=medium
* SECURITY UPDATE: heap corruption in tar/zip/phar parser
- debian/patches/CVE-2016-4342.patch: remove UMR when size is 0 in
ext/phar/phar_object.c.
- CVE-2016-4342
* SECURITY UPDATE: uninitialized pointer in phar_make
php5 (5.5.9+dfsg-1ubuntu4.17) trusty-security; urgency=medium
* SECURITY UPDATE: heap corruption in tar/zip/phar parser
- debian/patches/CVE-2016-4342.patch: remove UMR when size is 0 in
ext/phar/phar_object.c.
- CVE-2016-4342
* SECURITY UPDATE: uninitialized pointer in phar_make
tardiff (0.1-2+deb8u2build0.14.04.1) trusty-security; urgency=medium
* fake sync from Debian
Date: 2016-05-24 13:25:15.330782+00:00
Changed-By: Marc Deslauriers
Maintainer: Axel Beckert
Signed-By: Ubuntu Archive Robot
https://launchpad.net/ubuntu/+source/tardiff/0.1-2+deb8u2build0.14.04.1
S
tardiff (0.1-2+deb8u2build0.14.04.1) trusty-security; urgency=medium
* fake sync from Debian
Date: 2016-05-24 13:25:15.330782+00:00
Changed-By: Marc Deslauriers
Maintainer: Axel Beckert
https://launchpad.net/ubuntu/+source/tardiff/0.1-2+deb8u2build0.14.04.1
Sorry, changesfile not available.--
10 matches
Mail list logo