[ubuntu/xenial-updates] vim 2:7.4.1689-3ubuntu1.3 (Accepted)

2019-06-11 Thread Ubuntu Archive Robot
vim (2:7.4.1689-3ubuntu1.3) xenial-security; urgency=medium * SECURITY UPDATE: Arbitrary code execution - debian/patches/CVE-2019-12735.patch: disallow sourcing a file in the sandbox in src/getchar.c - CVE-2019-12735 * SECURITY UPDATE: Buffer overflow -

[ubuntu/xenial-security] vim 2:7.4.1689-3ubuntu1.3 (Accepted)

2019-06-11 Thread Leonidas S. Barbosa
vim (2:7.4.1689-3ubuntu1.3) xenial-security; urgency=medium * SECURITY UPDATE: Arbitrary code execution - debian/patches/CVE-2019-12735.patch: disallow sourcing a file in the sandbox in src/getchar.c - CVE-2019-12735 * SECURITY UPDATE: Buffer overflow -

[ubuntu/xenial-updates] dbus 1.10.6-1ubuntu3.4 (Accepted)

2019-06-11 Thread Ubuntu Archive Robot
dbus (1.10.6-1ubuntu3.4) xenial-security; urgency=medium * SECURITY UPDATE: DBUS_COOKIE_SHA1 implementation flaw - d/p/0001-auth-Reject-DBUS_COOKIE_SHA1-for-users-other-than-th.patch: reject DBUS_COOKIE_SHA1 for users other than the server owner in dbus/dbus-auth.c. -

[ubuntu/xenial-security] dbus 1.10.6-1ubuntu3.4 (Accepted)

2019-06-11 Thread Marc Deslauriers
dbus (1.10.6-1ubuntu3.4) xenial-security; urgency=medium * SECURITY UPDATE: DBUS_COOKIE_SHA1 implementation flaw - d/p/0001-auth-Reject-DBUS_COOKIE_SHA1-for-users-other-than-th.patch: reject DBUS_COOKIE_SHA1 for users other than the server owner in dbus/dbus-auth.c. -

[ubuntu/xenial-security] linux-meta-azure-edge 4.15.0.1046.29 (Accepted)

2019-06-11 Thread Andy Whitcroft
linux-meta-azure-edge (4.15.0.1046.29) xenial; urgency=medium * Bump ABI 4.15.0-1046 Date: 2019-05-23 08:20:13.688177+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-azure-edge/4.15.0.1046.29 Sorry, changesfile not available.--

[ubuntu/xenial-updates] sudo 1.8.16-0ubuntu1.7 (Accepted)

2019-06-11 Thread Ubuntu Archive Robot
sudo (1.8.16-0ubuntu1.7) xenial-security; urgency=medium * debian/patches/terminate-with-commands-signal.patch: re-enable patch that got dropped by mistake in previous upload. (LP: #1832257) Date: 2019-06-10 22:50:13.014260+00:00 Changed-By: Marc Deslauriers Signed-By: Ubuntu Archive

[ubuntu/xenial-security] sudo 1.8.16-0ubuntu1.7 (Accepted)

2019-06-11 Thread Marc Deslauriers
sudo (1.8.16-0ubuntu1.7) xenial-security; urgency=medium * debian/patches/terminate-with-commands-signal.patch: re-enable patch that got dropped by mistake in previous upload. (LP: #1832257) Date: 2019-06-10 22:50:13.014260+00:00 Changed-By: Marc Deslauriers

[ubuntu/xenial-proposed] u-boot 2016.01+dfsg1-2ubuntu4 (Accepted)

2019-06-11 Thread Andy Whitcroft
u-boot (2016.01+dfsg1-2ubuntu4) xenial; urgency=low * Enable FIT signing support (LP: #1831942) - Fix configuration supply to tools to ensure CONFIG_FIT_SIGNATURE is available to mkimage such that is compiled with FIT build and sign support. - Add libssl-dev to

[ubuntu/xenial-proposed] snapd 2.39.2 (Accepted)

2019-06-11 Thread Michael Vogt
snapd (2.39.2) xenial; urgency=medium * New upstream release, LP: #1827495 - debian: rework how we run autopkgtests - interfaces/docker-support: add overlayfs accesses for ubuntu core - data/selinux: permit init_t to remount snappy_snap_t - strutil/shlex: fix ineffassign -