[ubuntu/trusty-security] qemu 2.0.0+dfsg-2ubuntu1.7 (Accepted)

2014-11-13 Thread Marc Deslauriers
qemu (2.0.0+dfsg-2ubuntu1.7) trusty-security; urgency=medium

  * SECURITY UPDATE: information disclosure via vga driver
- debian/patches/CVE-2014-3615.patch: return the correct memory size,
  sanity check register writes, and don't use fixed buffer sizes in
  hw/display/qxl.c, hw/display/vga.c, hw/display/vga_int.h,
  ui/spice-display.c.
- CVE-2014-3615
  * SECURITY UPDATE: denial of service via slirp NULL pointer deref
- debian/patches/CVE-2014-3640.patch: make sure socket is not just a
  stub in slirp/udp.c.
- CVE-2014-3640
  * SECURITY UPDATE: possible privilege escalation via vmware-vga driver
- debian/patches/CVE-2014-3689.patch: verify rectangles in
  hw/display/vmware_vga.c.
- CVE-2014-3689
  * SECURITY UPDATE: denial of service and possible privilege escalation
via vmstate_xhci_event
- debian/patches/CVE-2014-5263.patch: fix unterminated field list in
  hw/usb/hcd-xhci.c.
- CVE-2014-5263
  * SECURITY UPDATE: possible privilege escalation via pcihp out-of-bounds
- debian/patches/CVE-2014-5388.patch: fix bounds checking in
  hw/acpi/pcihp.c.
- CVE-2014-5388
  * SECURITY UPDATE: denial of service via VNC console
- debian/patches/CVE-2014-7815.patch: validate bits_per_pixel in
  ui/vnc.c.
- CVE-2014-7815

qemu (2.0.0+dfsg-2ubuntu1.6) trusty-proposed; urgency=medium

  * Support incoming migration from 12.04 (LP: #1374612)
- d/p/ubutu/add-machine-type-pc-1.0-qemu-kvm-for-live-migrate-co.patch
- add note in README.Debian
- d/control: have qemu-system-x86 suggest kvm-ipxe-precise

qemu (2.0.0+dfsg-2ubuntu1.5) trusty-proposed; urgency=medium

  * move reload of kvm_intel qemu-system-x86.postinst.  (LP: #1324174)

qemu (2.0.0+dfsg-2ubuntu1.4) trusty-proposed; urgency=medium

  * reload kvm_intel if needed to set the nested=Y flag (LP: #1324174)

Date: 2014-11-11 22:03:11.408497+00:00
Changed-By: Marc Deslauriers marc.deslauri...@canonical.com
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.7
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] qemu 2.0.0+dfsg-2ubuntu1.7 (Accepted)

2014-11-13 Thread Ubuntu Archive Robot
qemu (2.0.0+dfsg-2ubuntu1.7) trusty-security; urgency=medium

  * SECURITY UPDATE: information disclosure via vga driver
- debian/patches/CVE-2014-3615.patch: return the correct memory size,
  sanity check register writes, and don't use fixed buffer sizes in
  hw/display/qxl.c, hw/display/vga.c, hw/display/vga_int.h,
  ui/spice-display.c.
- CVE-2014-3615
  * SECURITY UPDATE: denial of service via slirp NULL pointer deref
- debian/patches/CVE-2014-3640.patch: make sure socket is not just a
  stub in slirp/udp.c.
- CVE-2014-3640
  * SECURITY UPDATE: possible privilege escalation via vmware-vga driver
- debian/patches/CVE-2014-3689.patch: verify rectangles in
  hw/display/vmware_vga.c.
- CVE-2014-3689
  * SECURITY UPDATE: denial of service and possible privilege escalation
via vmstate_xhci_event
- debian/patches/CVE-2014-5263.patch: fix unterminated field list in
  hw/usb/hcd-xhci.c.
- CVE-2014-5263
  * SECURITY UPDATE: possible privilege escalation via pcihp out-of-bounds
- debian/patches/CVE-2014-5388.patch: fix bounds checking in
  hw/acpi/pcihp.c.
- CVE-2014-5388
  * SECURITY UPDATE: denial of service via VNC console
- debian/patches/CVE-2014-7815.patch: validate bits_per_pixel in
  ui/vnc.c.
- CVE-2014-7815

Date: 2014-11-11 22:03:11.408497+00:00
Changed-By: Marc Deslauriers marc.deslauri...@canonical.com
Signed-By: Ubuntu Archive Robot 
cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk
https://launchpad.net/ubuntu/+source/qemu/2.0.0+dfsg-2ubuntu1.7
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] mesa 10.1.3-0ubuntu0.2 (Accepted)

2014-11-13 Thread Brian Murray
mesa (10.1.3-0ubuntu0.2) trusty; urgency=medium

  [ Timo Aaltonen ]
  * Drop fix-kwin.diff hack, as 10.1.3 has 0380ec467d78f40 which
fixes the issue properly.

  [ Maarten Lankhorst ]
  * Add fix-svga-ioctl.patch (LP: #1365490)

Date: 2014-10-01 09:51:08.376020+00:00
Changed-By: Maarten Lankhorst maarten.lankho...@canonical.com
Signed-By: Brian Murray br...@ubuntu.com
https://launchpad.net/ubuntu/+source/mesa/10.1.3-0ubuntu0.2
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] gnome-calculator 1:3.10.3-0ubuntu0.1.1 (Accepted)

2014-11-13 Thread Brian Murray
gnome-calculator (1:3.10.3-0ubuntu0.1.1) trusty; urgency=medium

  * debian/patches/git_base_change.patch:
- don't display expression errors on base change

gnome-calculator (1:3.10.3-0ubuntu0.1) trusty; urgency=medium

  * New upstream version, drop patches included in the new version
(lp: #1209326)

Date: 2014-10-31 10:24:09.986332+00:00
Changed-By: Sebastien Bacher seb...@ubuntu.com
Signed-By: Brian Murray br...@ubuntu.com
https://launchpad.net/ubuntu/+source/gnome-calculator/1:3.10.3-0ubuntu0.1.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] ipxe-precise 1.0.0+git-3.55f6c88-0ubuntu1.14.04.1 (Accepted)

2014-11-13 Thread Brian Murray
ipxe-precise (1.0.0+git-3.55f6c88-0ubuntu1.14.04.1) trusty-proposed; 
urgency=medium

  * First submission of ipxe-precise package (LP: #1374617)
- rename source to ipxe-precise
- rename binary to ipxe-kvm-precise
- drop other binary packages.
- add-isolinux-bin-path - Accomodate isolinux's new install path in
  utopic (not needed in trusty, but added in case toolchain updates
  through SRU or for ppa builds)

Date: 2014-10-07 00:26:42.294905+00:00
Changed-By: Serge Hallyn serge.hal...@ubuntu.com
Signed-By: Brian Murray br...@ubuntu.com
https://launchpad.net/ubuntu/+source/ipxe-precise/1.0.0+git-3.55f6c88-0ubuntu1.14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] mariadb-5.5 5.5.40-0ubuntu0.14.04.1 (Accepted)

2014-11-13 Thread Seth Arnold
mariadb-5.5 (5.5.40-0ubuntu0.14.04.1) trusty-security; urgency=medium

  * SECURITY UPDATE: Update to 5.5.40 to fix security issues (LP: #1391676)
- CVE-2014-6507
- CVE-2014-6491
- CVE-2014-6500
- CVE-2014-6469
- CVE-2014-6555
- CVE-2014-6559
- CVE-2014-6494
- CVE-2014-6496
- CVE-2014-6464
  * Add bsdutils as mariadb-server dependency like upstream does in 5.5.40.

Date: 2014-11-13 01:23:17.468401+00:00
Changed-By: Otto Kekäläinen o...@seravo.fi
Signed-By: Seth Arnold seth.arn...@canonical.com
https://launchpad.net/ubuntu/+source/mariadb-5.5/5.5.40-0ubuntu0.14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] aide 0.16~a2.git20130520-2ubuntu0.1 (Accepted)

2014-11-13 Thread Jamie Strandboge
aide (0.16~a2.git20130520-2ubuntu0.1) trusty-proposed; urgency=medium

  * cron.daily/aide: fixed 'unbound variable' error with bash-4.3. Patch
from Debian. (LP: #1323827)

Date: Wed, 12 Nov 2014 09:11:52 -0600
Changed-By: Jamie Strandboge ja...@ubuntu.com
Maintainer: Ubuntu Developers ubuntu-devel-disc...@lists.ubuntu.com
https://launchpad.net/ubuntu/+source/aide/0.16~a2.git20130520-2ubuntu0.1
Format: 1.8
Date: Wed, 12 Nov 2014 09:11:52 -0600
Source: aide
Binary: aide aide-xen aide-dynamic aide-common
Architecture: source
Version: 0.16~a2.git20130520-2ubuntu0.1
Distribution: trusty-proposed
Urgency: medium
Maintainer: Ubuntu Developers ubuntu-devel-disc...@lists.ubuntu.com
Changed-By: Jamie Strandboge ja...@ubuntu.com
Description: 
 aide   - Advanced Intrusion Detection Environment - static binary
 aide-common - Advanced Intrusion Detection Environment - Common files
 aide-dynamic - Advanced Intrusion Detection Environment - dynamic binary
 aide-xen   - Advanced Intrusion Detection Environment - static binary for XEN
Launchpad-Bugs-Fixed: 1323827
Changes: 
 aide (0.16~a2.git20130520-2ubuntu0.1) trusty-proposed; urgency=medium
 .
   * cron.daily/aide: fixed 'unbound variable' error with bash-4.3. Patch
 from Debian. (LP: #1323827)
Checksums-Sha1: 
 224538c64c5aea5b808dabe0d0b64c594f338637 2459 
aide_0.16~a2.git20130520-2ubuntu0.1.dsc
 e7736bc910c2973b89a00aa34fe1e921a664be39 82174 
aide_0.16~a2.git20130520-2ubuntu0.1.debian.tar.gz
Checksums-Sha256: 
 58f55c3b241d414dac3d12530f12df7d503df4bd0296c11cd646e30d41fbc8a0 2459 
aide_0.16~a2.git20130520-2ubuntu0.1.dsc
 280a74010332342dd280e9b7691aa3b82fb880f649a993beafce5ad8df01eda5 82174 
aide_0.16~a2.git20130520-2ubuntu0.1.debian.tar.gz
Files: 
 10a3431048367e5755260fe2f0b82c9d 2459 admin optional 
aide_0.16~a2.git20130520-2ubuntu0.1.dsc
 285b4c27b0c7219ef93918a799424f03 82174 admin optional 
aide_0.16~a2.git20130520-2ubuntu0.1.debian.tar.gz
Original-Maintainer: Aide Maintainers 
pkg-aide-maintain...@lists.alioth.debian.org
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] mariadb-5.5 5.5.40-0ubuntu0.14.04.1 (Accepted)

2014-11-13 Thread Ubuntu Archive Robot
mariadb-5.5 (5.5.40-0ubuntu0.14.04.1) trusty-security; urgency=medium

  * SECURITY UPDATE: Update to 5.5.40 to fix security issues (LP: #1391676)
- CVE-2014-6507
- CVE-2014-6491
- CVE-2014-6500
- CVE-2014-6469
- CVE-2014-6555
- CVE-2014-6559
- CVE-2014-6494
- CVE-2014-6496
- CVE-2014-6464
  * Add bsdutils as mariadb-server dependency like upstream does in 5.5.40.

Date: 2014-11-13 01:23:17.468401+00:00
Changed-By: Otto Kekäläinen o...@seravo.fi
Signed-By: Ubuntu Archive Robot 
cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk
https://launchpad.net/ubuntu/+source/mariadb-5.5/5.5.40-0ubuntu0.14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/partner/trusty-proposed] ti-llvm-3.3 3.3-0ubuntu8 (Accepted)

2014-11-13 Thread dann frazier
ti-llvm-3.3 (3.3-0ubuntu8) trusty; urgency=medium

  * Upload to partner archive

Date: Wed, 12 Nov 2014 21:13:32 -0700
Changed-By: dann frazier dann.fraz...@canonical.com
Maintainer: TI Keystone PPA ti-keystone-...@list.ti.com
https://launchpad.net/ubuntu/+source/ti-llvm-3.3/3.3-0ubuntu8
Format: 1.8
Date: Wed, 12 Nov 2014 21:13:32 -0700
Source: ti-llvm-3.3
Binary: ti-llvm-3.3
Architecture: source
Version: 3.3-0ubuntu8
Distribution: trusty
Urgency: medium
Maintainer: TI Keystone PPA ti-keystone-...@list.ti.com
Changed-By: dann frazier dann.fraz...@canonical.com
Description: 
 ti-llvm-3.3 - llvm-3.3 with support for TI c66x intrinsics.
Changes: 
 ti-llvm-3.3 (3.3-0ubuntu8) trusty; urgency=medium
 .
   * Upload to partner archive
Checksums-Sha1: 
 d590db00ab0d56f314b9ad32af2abc74343e9bad 1489 ti-llvm-3.3_3.3-0ubuntu8.dsc
 135dd68ecbd813c31c8a4bb7a6dc66059dc9dd42 23492201 
ti-llvm-3.3_3.3-0ubuntu8.tar.gz
Checksums-Sha256: 
 3374e504094fac18ffb30bcbb2e6fd7a7d2caa69e89de9f72d2ed781268e4569 1489 
ti-llvm-3.3_3.3-0ubuntu8.dsc
 f90d1afbd27b58d4fb8c1030b5702b70c4704bcaf6330c11239f5f9bff22074c 23492201 
ti-llvm-3.3_3.3-0ubuntu8.tar.gz
Files: 
 5623860c7ea8a9084f25eb55796d6210 1489 partner/misc extra 
ti-llvm-3.3_3.3-0ubuntu8.dsc
 daf424c903de41200714a26490e52133 23492201 partner/misc extra 
ti-llvm-3.3_3.3-0ubuntu8.tar.gz
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/partner/trusty-proposed] edma3-lld 02.11.11.15-0ubuntu2 (Accepted)

2014-11-13 Thread dann frazier
edma3-lld (02.11.11.15-0ubuntu2) trusty; urgency=high

  [ TI Keystone PPA ]

  * Remove unnecessary build-dependency on pdk-keystone2

  [ dann frazier ]

  * Upload to partner archive

Date: Thu, 13 Nov 2014 14:05:54 -0700
Changed-By: dann frazier dann.fraz...@canonical.com
Maintainer: TI Keystone PPA ti-keystone-...@list.ti.com
https://launchpad.net/ubuntu/+source/edma3-lld/02.11.11.15-0ubuntu2
Format: 1.8
Date: Thu, 13 Nov 2014 14:05:54 -0700
Source: edma3-lld
Binary: libedma3-1 libedma3-dev
Architecture: source
Version: 02.11.11.15-0ubuntu2
Distribution: trusty
Urgency: high
Maintainer: TI Keystone PPA ti-keystone-...@list.ti.com
Changed-By: dann frazier dann.fraz...@canonical.com
Description: 
 libedma3-1 - EDMA3 Low Level Driver for user space
 libedma3-dev - EDMA3 Low Level Driver for user space - development files
Changes: 
 edma3-lld (02.11.11.15-0ubuntu2) trusty; urgency=high
 .
   [ TI Keystone PPA ]
 .
   * Remove unnecessary build-dependency on pdk-keystone2
 .
   [ dann frazier ]
 .
   * Upload to partner archive
Checksums-Sha1: 
 a448be36979cf7b65cf08be20204188ecdc76612 1796 
edma3-lld_02.11.11.15-0ubuntu2.dsc
 772f091b91801ff9e970689a7783a366e804 5316 
edma3-lld_02.11.11.15-0ubuntu2.debian.tar.gz
Checksums-Sha256: 
 da2fa3e84521a693ed4b29d74782be5d2c1d3ce1967216c6ee4bb936f7477383 1796 
edma3-lld_02.11.11.15-0ubuntu2.dsc
 cfa0c517c5215469b74ab2e29e275547adae0b653c0a103d4694c151c0c472da 5316 
edma3-lld_02.11.11.15-0ubuntu2.debian.tar.gz
Files: 
 e13e1c626e55fded95a54e8d0e0f1276 1796 partner/libs extra 
edma3-lld_02.11.11.15-0ubuntu2.dsc
 fdb87cd687914deb92f5fe496dc78b9b 5316 partner/libs extra 
edma3-lld_02.11.11.15-0ubuntu2.debian.tar.gz
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes