[ubuntu/xenial-updates] flashplugin-nonfree 32.0.0.207ubuntu0.16.04.1 (Accepted)

2019-06-12 Thread Ubuntu Archive Robot
flashplugin-nonfree (32.0.0.207ubuntu0.16.04.1) xenial-security; urgency=medium * New upstream release (32.0.0.207) - debian/flashplugin-installer.{config,postinst}, debian/post-download-hook: Updated version and sha256sum Date: 2019-06-11 13:48:22.923133+00:00 Changed-By: Chris

[ubuntu/xenial-security] flashplugin-nonfree 32.0.0.207ubuntu0.16.04.1 (Accepted)

2019-06-12 Thread Chris Coulson
flashplugin-nonfree (32.0.0.207ubuntu0.16.04.1) xenial-security; urgency=medium * New upstream release (32.0.0.207) - debian/flashplugin-installer.{config,postinst}, debian/post-download-hook: Updated version and sha256sum Date: 2019-06-11 13:48:22.923133+00:00 Changed-By: Chris

[ubuntu/xenial-updates] openjpeg2 2.1.2-1.1+deb9u3build0.16.04.1 (Accepted)

2019-06-12 Thread Ubuntu Archive Robot
openjpeg2 (2.1.2-1.1+deb9u3build0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: sync from Debian stretch-security openjpeg2 (2.1.2-1.1+deb9u3) stretch-security; urgency=medium * Non-maintainer upload by the Security Team. * CVE-2018-14423: Division-by-zero vulnerabilities in

[ubuntu/xenial-updates] minissdpd 1.2.20130907-3+deb8u2build0.16.04.1 (Accepted)

2019-06-12 Thread Ubuntu Archive Robot
minissdpd (1.2.20130907-3+deb8u2build0.16.04.1) xenial-security; urgency=medium * fake sync from Debian minissdpd (1.2.20130907-3+deb8u2) jessie-security; urgency=high * CVE-2019-12106: Prevent a use-after-free vulnerability that would allow a remote attacker to crash the process.

[ubuntu/xenial-updates] roundup 1.4.20-1.1+deb8u2build0.16.04.1 (Accepted)

2019-06-12 Thread Ubuntu Archive Robot
roundup (1.4.20-1.1+deb8u2build0.16.04.1) xenial-security; urgency=medium * fake sync from Debian Date: 2019-06-11 23:17:12.726120+00:00 Changed-By: Steve Beattie Maintainer: Kai Storbeck Signed-By: Ubuntu Archive Robot

[ubuntu/xenial-security] openjpeg2 2.1.2-1.1+deb9u3build0.16.04.1 (Accepted)

2019-06-12 Thread Steve Beattie
openjpeg2 (2.1.2-1.1+deb9u3build0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: sync from Debian stretch-security openjpeg2 (2.1.2-1.1+deb9u3) stretch-security; urgency=medium * Non-maintainer upload by the Security Team. * CVE-2018-14423: Division-by-zero vulnerabilities in

[ubuntu/xenial-security] minissdpd 1.2.20130907-3+deb8u2build0.16.04.1 (Accepted)

2019-06-12 Thread Steve Beattie
minissdpd (1.2.20130907-3+deb8u2build0.16.04.1) xenial-security; urgency=medium * fake sync from Debian minissdpd (1.2.20130907-3+deb8u2) jessie-security; urgency=high * CVE-2019-12106: Prevent a use-after-free vulnerability that would allow a remote attacker to crash the process.

[ubuntu/xenial-security] roundup 1.4.20-1.1+deb8u2build0.16.04.1 (Accepted)

2019-06-12 Thread Steve Beattie
roundup (1.4.20-1.1+deb8u2build0.16.04.1) xenial-security; urgency=medium * fake sync from Debian Date: 2019-06-11 23:17:12.726120+00:00 Changed-By: Steve Beattie Maintainer: Kai Storbeck https://launchpad.net/ubuntu/+source/roundup/1.4.20-1.1+deb8u2build0.16.04.1 Sorry, changesfile not

[ubuntu/xenial-proposed] u-boot 2016.01+dfsg1-2ubuntu5 (Accepted)

2019-06-12 Thread Andy Whitcroft
u-boot (2016.01+dfsg1-2ubuntu5) xenial; urgency=low * Enable FIT signing support (LP: #1831942) - Ensure fit_image_process_sig() ENOSPC return propogates to fit_file_name() space allocation loop. u-boot (2016.01+dfsg1-2ubuntu4) xenial; urgency=low * Enable FIT signing support (LP: