[ubuntu/trusty-security] qemu 2.0.0+dfsg-2ubuntu1.7 (Accepted)
qemu (2.0.0+dfsg-2ubuntu1.7) trusty-security; urgency=medium * SECURITY UPDATE: information disclosure via vga driver - debian/patches/CVE-2014-3615.patch: return the correct memory size, sanity check register writes, and don't use fixed buffer sizes in hw/display/qxl.c, hw/display/vga.c, hw/display/vga_int.h, ui/spice-display.c. - CVE-2014-3615 * SECURITY UPDATE: denial of service via slirp NULL pointer deref - debian/patches/CVE-2014-3640.patch: make sure socket is not just a stub in slirp/udp.c. - CVE-2014-3640 * SECURITY UPDATE: possible privilege escalation via vmware-vga driver - debian/patches/CVE-2014-3689.patch: verify rectangles in hw/display/vmware_vga.c. - CVE-2014-3689 * SECURITY UPDATE: denial of service and possible privilege escalation via vmstate_xhci_event - debian/patches/CVE-2014-5263.patch: fix unterminated field list in hw/usb/hcd-xhci.c. - CVE-2014-5263 * SECURITY UPDATE: possible privilege escalation via pcihp out-of-bounds - debian/patches/CVE-2014-5388.patch: fix bounds checking in hw/acpi/pcihp.c. - CVE-2014-5388 * SECURITY UPDATE: denial of service via VNC console - debian/patches/CVE-2014-7815.patch: validate bits_per_pixel in ui/vnc.c. - CVE-2014-7815 qemu (2.0.0+dfsg-2ubuntu1.6) trusty-proposed; urgency=medium * Support incoming migration from 12.04 (LP: #1374612) - d/p/ubutu/add-machine-type-pc-1.0-qemu-kvm-for-live-migrate-co.patch - add note in README.Debian - d/control: have qemu-system-x86 suggest kvm-ipxe-precise qemu (2.0.0+dfsg-2ubuntu1.5) trusty-proposed; urgency=medium * move reload of kvm_intel qemu-system-x86.postinst. (LP: #1324174) qemu (2.0.0+dfsg-2ubuntu1.4) trusty-proposed; urgency=medium * reload kvm_intel if needed to set the nested=Y flag (LP: #1324174) Date: 2014-11-11 22:03:11.408497+00:00 Changed-By: Marc Deslauriers marc.deslauri...@canonical.com https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.7 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] qemu 2.0.0+dfsg-2ubuntu1.7 (Accepted)
qemu (2.0.0+dfsg-2ubuntu1.7) trusty-security; urgency=medium * SECURITY UPDATE: information disclosure via vga driver - debian/patches/CVE-2014-3615.patch: return the correct memory size, sanity check register writes, and don't use fixed buffer sizes in hw/display/qxl.c, hw/display/vga.c, hw/display/vga_int.h, ui/spice-display.c. - CVE-2014-3615 * SECURITY UPDATE: denial of service via slirp NULL pointer deref - debian/patches/CVE-2014-3640.patch: make sure socket is not just a stub in slirp/udp.c. - CVE-2014-3640 * SECURITY UPDATE: possible privilege escalation via vmware-vga driver - debian/patches/CVE-2014-3689.patch: verify rectangles in hw/display/vmware_vga.c. - CVE-2014-3689 * SECURITY UPDATE: denial of service and possible privilege escalation via vmstate_xhci_event - debian/patches/CVE-2014-5263.patch: fix unterminated field list in hw/usb/hcd-xhci.c. - CVE-2014-5263 * SECURITY UPDATE: possible privilege escalation via pcihp out-of-bounds - debian/patches/CVE-2014-5388.patch: fix bounds checking in hw/acpi/pcihp.c. - CVE-2014-5388 * SECURITY UPDATE: denial of service via VNC console - debian/patches/CVE-2014-7815.patch: validate bits_per_pixel in ui/vnc.c. - CVE-2014-7815 Date: 2014-11-11 22:03:11.408497+00:00 Changed-By: Marc Deslauriers marc.deslauri...@canonical.com Signed-By: Ubuntu Archive Robot cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.7 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] mesa 10.1.3-0ubuntu0.2 (Accepted)
mesa (10.1.3-0ubuntu0.2) trusty; urgency=medium [ Timo Aaltonen ] * Drop fix-kwin.diff hack, as 10.1.3 has 0380ec467d78f40 which fixes the issue properly. [ Maarten Lankhorst ] * Add fix-svga-ioctl.patch (LP: #1365490) Date: 2014-10-01 09:51:08.376020+00:00 Changed-By: Maarten Lankhorst maarten.lankho...@canonical.com Signed-By: Brian Murray br...@ubuntu.com https://launchpad.net/ubuntu/+source/mesa/10.1.3-0ubuntu0.2 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] gnome-calculator 1:3.10.3-0ubuntu0.1.1 (Accepted)
gnome-calculator (1:3.10.3-0ubuntu0.1.1) trusty; urgency=medium * debian/patches/git_base_change.patch: - don't display expression errors on base change gnome-calculator (1:3.10.3-0ubuntu0.1) trusty; urgency=medium * New upstream version, drop patches included in the new version (lp: #1209326) Date: 2014-10-31 10:24:09.986332+00:00 Changed-By: Sebastien Bacher seb...@ubuntu.com Signed-By: Brian Murray br...@ubuntu.com https://launchpad.net/ubuntu/+source/gnome-calculator/1:3.10.3-0ubuntu0.1.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] ipxe-precise 1.0.0+git-3.55f6c88-0ubuntu1.14.04.1 (Accepted)
ipxe-precise (1.0.0+git-3.55f6c88-0ubuntu1.14.04.1) trusty-proposed; urgency=medium * First submission of ipxe-precise package (LP: #1374617) - rename source to ipxe-precise - rename binary to ipxe-kvm-precise - drop other binary packages. - add-isolinux-bin-path - Accomodate isolinux's new install path in utopic (not needed in trusty, but added in case toolchain updates through SRU or for ppa builds) Date: 2014-10-07 00:26:42.294905+00:00 Changed-By: Serge Hallyn serge.hal...@ubuntu.com Signed-By: Brian Murray br...@ubuntu.com https://launchpad.net/ubuntu/+source/ipxe-precise/1.0.0+git-3.55f6c88-0ubuntu1.14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-security] mariadb-5.5 5.5.40-0ubuntu0.14.04.1 (Accepted)
mariadb-5.5 (5.5.40-0ubuntu0.14.04.1) trusty-security; urgency=medium * SECURITY UPDATE: Update to 5.5.40 to fix security issues (LP: #1391676) - CVE-2014-6507 - CVE-2014-6491 - CVE-2014-6500 - CVE-2014-6469 - CVE-2014-6555 - CVE-2014-6559 - CVE-2014-6494 - CVE-2014-6496 - CVE-2014-6464 * Add bsdutils as mariadb-server dependency like upstream does in 5.5.40. Date: 2014-11-13 01:23:17.468401+00:00 Changed-By: Otto Kekäläinen o...@seravo.fi Signed-By: Seth Arnold seth.arn...@canonical.com https://launchpad.net/ubuntu/+source/mariadb-5.5/5.5.40-0ubuntu0.14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] aide 0.16~a2.git20130520-2ubuntu0.1 (Accepted)
aide (0.16~a2.git20130520-2ubuntu0.1) trusty-proposed; urgency=medium * cron.daily/aide: fixed 'unbound variable' error with bash-4.3. Patch from Debian. (LP: #1323827) Date: Wed, 12 Nov 2014 09:11:52 -0600 Changed-By: Jamie Strandboge ja...@ubuntu.com Maintainer: Ubuntu Developers ubuntu-devel-disc...@lists.ubuntu.com https://launchpad.net/ubuntu/+source/aide/0.16~a2.git20130520-2ubuntu0.1 Format: 1.8 Date: Wed, 12 Nov 2014 09:11:52 -0600 Source: aide Binary: aide aide-xen aide-dynamic aide-common Architecture: source Version: 0.16~a2.git20130520-2ubuntu0.1 Distribution: trusty-proposed Urgency: medium Maintainer: Ubuntu Developers ubuntu-devel-disc...@lists.ubuntu.com Changed-By: Jamie Strandboge ja...@ubuntu.com Description: aide - Advanced Intrusion Detection Environment - static binary aide-common - Advanced Intrusion Detection Environment - Common files aide-dynamic - Advanced Intrusion Detection Environment - dynamic binary aide-xen - Advanced Intrusion Detection Environment - static binary for XEN Launchpad-Bugs-Fixed: 1323827 Changes: aide (0.16~a2.git20130520-2ubuntu0.1) trusty-proposed; urgency=medium . * cron.daily/aide: fixed 'unbound variable' error with bash-4.3. Patch from Debian. (LP: #1323827) Checksums-Sha1: 224538c64c5aea5b808dabe0d0b64c594f338637 2459 aide_0.16~a2.git20130520-2ubuntu0.1.dsc e7736bc910c2973b89a00aa34fe1e921a664be39 82174 aide_0.16~a2.git20130520-2ubuntu0.1.debian.tar.gz Checksums-Sha256: 58f55c3b241d414dac3d12530f12df7d503df4bd0296c11cd646e30d41fbc8a0 2459 aide_0.16~a2.git20130520-2ubuntu0.1.dsc 280a74010332342dd280e9b7691aa3b82fb880f649a993beafce5ad8df01eda5 82174 aide_0.16~a2.git20130520-2ubuntu0.1.debian.tar.gz Files: 10a3431048367e5755260fe2f0b82c9d 2459 admin optional aide_0.16~a2.git20130520-2ubuntu0.1.dsc 285b4c27b0c7219ef93918a799424f03 82174 admin optional aide_0.16~a2.git20130520-2ubuntu0.1.debian.tar.gz Original-Maintainer: Aide Maintainers pkg-aide-maintain...@lists.alioth.debian.org -- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] mariadb-5.5 5.5.40-0ubuntu0.14.04.1 (Accepted)
mariadb-5.5 (5.5.40-0ubuntu0.14.04.1) trusty-security; urgency=medium * SECURITY UPDATE: Update to 5.5.40 to fix security issues (LP: #1391676) - CVE-2014-6507 - CVE-2014-6491 - CVE-2014-6500 - CVE-2014-6469 - CVE-2014-6555 - CVE-2014-6559 - CVE-2014-6494 - CVE-2014-6496 - CVE-2014-6464 * Add bsdutils as mariadb-server dependency like upstream does in 5.5.40. Date: 2014-11-13 01:23:17.468401+00:00 Changed-By: Otto Kekäläinen o...@seravo.fi Signed-By: Ubuntu Archive Robot cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk https://launchpad.net/ubuntu/+source/mariadb-5.5/5.5.40-0ubuntu0.14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/partner/trusty-proposed] ti-llvm-3.3 3.3-0ubuntu8 (Accepted)
ti-llvm-3.3 (3.3-0ubuntu8) trusty; urgency=medium * Upload to partner archive Date: Wed, 12 Nov 2014 21:13:32 -0700 Changed-By: dann frazier dann.fraz...@canonical.com Maintainer: TI Keystone PPA ti-keystone-...@list.ti.com https://launchpad.net/ubuntu/+source/ti-llvm-3.3/3.3-0ubuntu8 Format: 1.8 Date: Wed, 12 Nov 2014 21:13:32 -0700 Source: ti-llvm-3.3 Binary: ti-llvm-3.3 Architecture: source Version: 3.3-0ubuntu8 Distribution: trusty Urgency: medium Maintainer: TI Keystone PPA ti-keystone-...@list.ti.com Changed-By: dann frazier dann.fraz...@canonical.com Description: ti-llvm-3.3 - llvm-3.3 with support for TI c66x intrinsics. Changes: ti-llvm-3.3 (3.3-0ubuntu8) trusty; urgency=medium . * Upload to partner archive Checksums-Sha1: d590db00ab0d56f314b9ad32af2abc74343e9bad 1489 ti-llvm-3.3_3.3-0ubuntu8.dsc 135dd68ecbd813c31c8a4bb7a6dc66059dc9dd42 23492201 ti-llvm-3.3_3.3-0ubuntu8.tar.gz Checksums-Sha256: 3374e504094fac18ffb30bcbb2e6fd7a7d2caa69e89de9f72d2ed781268e4569 1489 ti-llvm-3.3_3.3-0ubuntu8.dsc f90d1afbd27b58d4fb8c1030b5702b70c4704bcaf6330c11239f5f9bff22074c 23492201 ti-llvm-3.3_3.3-0ubuntu8.tar.gz Files: 5623860c7ea8a9084f25eb55796d6210 1489 partner/misc extra ti-llvm-3.3_3.3-0ubuntu8.dsc daf424c903de41200714a26490e52133 23492201 partner/misc extra ti-llvm-3.3_3.3-0ubuntu8.tar.gz -- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/partner/trusty-proposed] edma3-lld 02.11.11.15-0ubuntu2 (Accepted)
edma3-lld (02.11.11.15-0ubuntu2) trusty; urgency=high [ TI Keystone PPA ] * Remove unnecessary build-dependency on pdk-keystone2 [ dann frazier ] * Upload to partner archive Date: Thu, 13 Nov 2014 14:05:54 -0700 Changed-By: dann frazier dann.fraz...@canonical.com Maintainer: TI Keystone PPA ti-keystone-...@list.ti.com https://launchpad.net/ubuntu/+source/edma3-lld/02.11.11.15-0ubuntu2 Format: 1.8 Date: Thu, 13 Nov 2014 14:05:54 -0700 Source: edma3-lld Binary: libedma3-1 libedma3-dev Architecture: source Version: 02.11.11.15-0ubuntu2 Distribution: trusty Urgency: high Maintainer: TI Keystone PPA ti-keystone-...@list.ti.com Changed-By: dann frazier dann.fraz...@canonical.com Description: libedma3-1 - EDMA3 Low Level Driver for user space libedma3-dev - EDMA3 Low Level Driver for user space - development files Changes: edma3-lld (02.11.11.15-0ubuntu2) trusty; urgency=high . [ TI Keystone PPA ] . * Remove unnecessary build-dependency on pdk-keystone2 . [ dann frazier ] . * Upload to partner archive Checksums-Sha1: a448be36979cf7b65cf08be20204188ecdc76612 1796 edma3-lld_02.11.11.15-0ubuntu2.dsc 772f091b91801ff9e970689a7783a366e804 5316 edma3-lld_02.11.11.15-0ubuntu2.debian.tar.gz Checksums-Sha256: da2fa3e84521a693ed4b29d74782be5d2c1d3ce1967216c6ee4bb936f7477383 1796 edma3-lld_02.11.11.15-0ubuntu2.dsc cfa0c517c5215469b74ab2e29e275547adae0b653c0a103d4694c151c0c472da 5316 edma3-lld_02.11.11.15-0ubuntu2.debian.tar.gz Files: e13e1c626e55fded95a54e8d0e0f1276 1796 partner/libs extra edma3-lld_02.11.11.15-0ubuntu2.dsc fdb87cd687914deb92f5fe496dc78b9b 5316 partner/libs extra edma3-lld_02.11.11.15-0ubuntu2.debian.tar.gz -- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes