[ubuntu/trusty-updates] libffi 3.1~rc1+r3.0.13-12ubuntu0.2 (Accepted)

2017-10-12 Thread Ubuntu Archive Robot
libffi (3.1~rc1+r3.0.13-12ubuntu0.2) trusty-security; urgency=medium * SECURITY UPDATE: executable stack - debian/patches/CVE-2017-1000376.patch: add missing GNU stack markings in src/x86/win32.S. - debian/patches/pax_status.patch: check /proc/self/status for PaX status in

[ubuntu/trusty-security] libffi 3.1~rc1+r3.0.13-12ubuntu0.2 (Accepted)

2017-10-12 Thread Marc Deslauriers
libffi (3.1~rc1+r3.0.13-12ubuntu0.2) trusty-security; urgency=medium * SECURITY UPDATE: executable stack - debian/patches/CVE-2017-1000376.patch: add missing GNU stack markings in src/x86/win32.S. - debian/patches/pax_status.patch: check /proc/self/status for PaX status in

[ubuntu/trusty-updates] xorg-server 2:1.15.1-0ubuntu2.10 (Accepted)

2017-10-12 Thread Ubuntu Archive Robot
xorg-server (2:1.15.1-0ubuntu2.10) trusty-security; urgency=medium * SECURITY UPDATE: DoS or segment overwrite via shmseg resource id - debian/patches/CVE-2017-13721.patch: validate shmseg resource id in Xext/shm.c. - CVE-2017-13721 * SECURITY UPDATE: buffer overflow via XKB

[ubuntu/trusty-updates] xorg-server-lts-xenial 2:1.18.3-1ubuntu2.3~trusty3 (Accepted)

2017-10-12 Thread Ubuntu Archive Robot
xorg-server-lts-xenial (2:1.18.3-1ubuntu2.3~trusty3) trusty-security; urgency=medium * SECURITY UPDATE: DoS or segment overwrite via shmseg resource id - debian/patches/CVE-2017-13721.patch: validate shmseg resource id in Xext/shm.c. - CVE-2017-13721 * SECURITY UPDATE: buffer

[ubuntu/trusty-security] xorg-server-lts-xenial 2:1.18.3-1ubuntu2.3~trusty3 (Accepted)

2017-10-12 Thread Marc Deslauriers
xorg-server-lts-xenial (2:1.18.3-1ubuntu2.3~trusty3) trusty-security; urgency=medium * SECURITY UPDATE: DoS or segment overwrite via shmseg resource id - debian/patches/CVE-2017-13721.patch: validate shmseg resource id in Xext/shm.c. - CVE-2017-13721 * SECURITY UPDATE: buffer

[ubuntu/trusty-security] xorg-server 2:1.15.1-0ubuntu2.10 (Accepted)

2017-10-12 Thread Marc Deslauriers
xorg-server (2:1.15.1-0ubuntu2.10) trusty-security; urgency=medium * SECURITY UPDATE: DoS or segment overwrite via shmseg resource id - debian/patches/CVE-2017-13721.patch: validate shmseg resource id in Xext/shm.c. - CVE-2017-13721 * SECURITY UPDATE: buffer overflow via XKB

[ubuntu/trusty-proposed] initramfs-tools 0.103ubuntu4.9 (Accepted)

2017-10-12 Thread Dan Streetman
initramfs-tools (0.103ubuntu4.9) trusty; urgency=low [ Andy Whitcroft ] * hook-functions: include backported bnxt driver. (LP: #1712491) Date: Wed, 30 Aug 2017 11:10:40 +0100 Changed-By: Dan Streetman Maintainer: Ubuntu Kernel Team

[ubuntu/trusty-proposed] snapd 2.28.4~14.04 (Accepted)

2017-10-12 Thread Michael Vogt
snapd (2.28.4~14.04) trusty; urgency=medium * New upstream release, LP: #1714984 - interfaces/opengl: don't udev tag nvidia devices and use snap- confine instead - debian: fix replaces/breaks for snap-xdg-open (thanks to apw!) snapd (2.28.3~14.04) trusty; urgency=medium * New