libffi (3.1~rc1+r3.0.13-12ubuntu0.2) trusty-security; urgency=medium
* SECURITY UPDATE: executable stack
- debian/patches/CVE-2017-1000376.patch: add missing GNU stack markings
in src/x86/win32.S.
- debian/patches/pax_status.patch: check /proc/self/status for PaX
status in
libffi (3.1~rc1+r3.0.13-12ubuntu0.2) trusty-security; urgency=medium
* SECURITY UPDATE: executable stack
- debian/patches/CVE-2017-1000376.patch: add missing GNU stack markings
in src/x86/win32.S.
- debian/patches/pax_status.patch: check /proc/self/status for PaX
status in
xorg-server (2:1.15.1-0ubuntu2.10) trusty-security; urgency=medium
* SECURITY UPDATE: DoS or segment overwrite via shmseg resource id
- debian/patches/CVE-2017-13721.patch: validate shmseg resource id in
Xext/shm.c.
- CVE-2017-13721
* SECURITY UPDATE: buffer overflow via XKB
xorg-server-lts-xenial (2:1.18.3-1ubuntu2.3~trusty3) trusty-security;
urgency=medium
* SECURITY UPDATE: DoS or segment overwrite via shmseg resource id
- debian/patches/CVE-2017-13721.patch: validate shmseg resource id in
Xext/shm.c.
- CVE-2017-13721
* SECURITY UPDATE: buffer
xorg-server-lts-xenial (2:1.18.3-1ubuntu2.3~trusty3) trusty-security;
urgency=medium
* SECURITY UPDATE: DoS or segment overwrite via shmseg resource id
- debian/patches/CVE-2017-13721.patch: validate shmseg resource id in
Xext/shm.c.
- CVE-2017-13721
* SECURITY UPDATE: buffer
xorg-server (2:1.15.1-0ubuntu2.10) trusty-security; urgency=medium
* SECURITY UPDATE: DoS or segment overwrite via shmseg resource id
- debian/patches/CVE-2017-13721.patch: validate shmseg resource id in
Xext/shm.c.
- CVE-2017-13721
* SECURITY UPDATE: buffer overflow via XKB
initramfs-tools (0.103ubuntu4.9) trusty; urgency=low
[ Andy Whitcroft ]
* hook-functions: include backported bnxt driver. (LP: #1712491)
Date: Wed, 30 Aug 2017 11:10:40 +0100
Changed-By: Dan Streetman
Maintainer: Ubuntu Kernel Team
snapd (2.28.4~14.04) trusty; urgency=medium
* New upstream release, LP: #1714984
- interfaces/opengl: don't udev tag nvidia devices and use snap-
confine instead
- debian: fix replaces/breaks for snap-xdg-open (thanks to apw!)
snapd (2.28.3~14.04) trusty; urgency=medium
* New