[ubuntu/trusty-proposed] crash 7.0.3-3ubuntu4.4 (Accepted)
crash (7.0.3-3ubuntu4.4) trusty; urgency=medium * Fix for crash: page excluded: kernel virtual address: 881052fa8000 type: "fill_task_struct" (LP: #1523606) Date: Mon, 07 Dec 2015 11:38:05 -0600 Changed-By: Dave ChilukMaintainer: Ubuntu Developers Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/crash/7.0.3-3ubuntu4.4 Format: 1.8 Date: Mon, 07 Dec 2015 11:38:05 -0600 Source: crash Binary: crash Architecture: source Version: 7.0.3-3ubuntu4.4 Distribution: trusty Urgency: medium Maintainer: Ubuntu Developers Changed-By: Dave Chiluk Description: crash - kernel debugging utility, allowing gdb like syntax Launchpad-Bugs-Fixed: 1523606 Changes: crash (7.0.3-3ubuntu4.4) trusty; urgency=medium . * Fix for crash: page excluded: kernel virtual address: 881052fa8000 type: "fill_task_struct" (LP: #1523606) Checksums-Sha1: 8a8afef6228901c400b09d3adfe2ac7f2d96a949 1907 crash_7.0.3-3ubuntu4.4.dsc def8c701ad519175e615a91805b1163ddccc6760 117157 crash_7.0.3-3ubuntu4.4.diff.gz Checksums-Sha256: bb7ac7e48efb6068ff83d37aae86b88ca668c9d5bbbce0e02d1c93070e9d7137 1907 crash_7.0.3-3ubuntu4.4.dsc c52aff2b6123f1e1914ef801b48a3cc87b4df71c5786568e586c4e45ba5bd366 117157 crash_7.0.3-3ubuntu4.4.diff.gz Files: 7e8daf40b3875afeedb33403ec0b9599 1907 utils optional crash_7.0.3-3ubuntu4.4.dsc a02629ba74aeecbf350d3603d091d5f2 117157 utils optional crash_7.0.3-3ubuntu4.4.diff.gz Original-Maintainer: Troy Heber -- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] grub2 2.02~beta2-9ubuntu1.7 (Accepted)
grub2 (2.02~beta2-9ubuntu1.7) trusty; urgency=medium * Cherry-picks to better handle TFTP timeouts on some arches: (LP: #1521612) - (7b386b7) efidisk: move device path helpers in core for efinet - (c52ae40) efinet: skip virtual IP devices when enumerating cards - (f348aee) efinet: enable hardware filters when opening interface * Update quick boot logic to handle abstractions for which there is no write support. (LP: #1274320) Date: Wed, 16 Dec 2015 14:03:48 -0700 Changed-By: dann frazierMaintainer: Ubuntu Developers https://launchpad.net/ubuntu/+source/grub2/2.02~beta2-9ubuntu1.7 Format: 1.8 Date: Wed, 16 Dec 2015 14:03:48 -0700 Source: grub2 Binary: grub2 grub-linuxbios grub-efi grub-common grub2-common grub-emu grub-emu-dbg grub-pc-bin grub-pc-dbg grub-pc grub-rescue-pc grub-coreboot-bin grub-coreboot-dbg grub-coreboot grub-efi-ia32-bin grub-efi-ia32-dbg grub-efi-ia32 grub-efi-amd64-bin grub-efi-amd64-dbg grub-efi-amd64 grub-efi-ia64-bin grub-efi-ia64-dbg grub-efi-ia64 grub-efi-arm-bin grub-efi-arm-dbg grub-efi-arm grub-efi-arm64-bin grub-efi-arm64-dbg grub-efi-arm64 grub-ieee1275-bin grub-ieee1275-dbg grub-ieee1275 grub-firmware-qemu grub-uboot-bin grub-uboot-dbg grub-uboot grub-xen-bin grub-xen-dbg grub-xen grub-yeeloong-bin grub-yeeloong-dbg grub-yeeloong grub-theme-starfield grub-mount-udeb Architecture: source Version: 2.02~beta2-9ubuntu1.7 Distribution: trusty Urgency: medium Maintainer: Ubuntu Developers Changed-By: dann frazier Description: grub-common - GRand Unified Bootloader (common files) grub-coreboot - GRand Unified Bootloader, version 2 (Coreboot version) grub-coreboot-bin - GRand Unified Bootloader, version 2 (Coreboot binaries) grub-coreboot-dbg - GRand Unified Bootloader, version 2 (Coreboot debug files) grub-efi - GRand Unified Bootloader, version 2 (dummy package) grub-efi-amd64 - GRand Unified Bootloader, version 2 (EFI-AMD64 version) grub-efi-amd64-bin - GRand Unified Bootloader, version 2 (EFI-AMD64 binaries) grub-efi-amd64-dbg - GRand Unified Bootloader, version 2 (EFI-AMD64 debug files) grub-efi-arm - GRand Unified Bootloader, version 2 (ARM UEFI version) grub-efi-arm-bin - GRand Unified Bootloader, version 2 (ARM UEFI binaries) grub-efi-arm-dbg - GRand Unified Bootloader, version 2 (ARM UEFI debug files) grub-efi-arm64 - GRand Unified Bootloader, version 2 (ARM64 UEFI version) grub-efi-arm64-bin - GRand Unified Bootloader, version 2 (ARM64 UEFI binaries) grub-efi-arm64-dbg - GRand Unified Bootloader, version 2 (ARM64 UEFI debug files) grub-efi-ia32 - GRand Unified Bootloader, version 2 (EFI-IA32 version) grub-efi-ia32-bin - GRand Unified Bootloader, version 2 (EFI-IA32 binaries) grub-efi-ia32-dbg - GRand Unified Bootloader, version 2 (EFI-IA32 debug files) grub-efi-ia64 - GRand Unified Bootloader, version 2 (IA64 version) grub-efi-ia64-bin - GRand Unified Bootloader, version 2 (IA64 binaries) grub-efi-ia64-dbg - GRand Unified Bootloader, version 2 (IA64 debug files) grub-emu - GRand Unified Bootloader, version 2 (emulated version) grub-emu-dbg - GRand Unified Bootloader, version 2 (emulated debug files) grub-firmware-qemu - GRUB firmware image for QEMU grub-ieee1275 - GRand Unified Bootloader, version 2 (Open Firmware version) grub-ieee1275-bin - GRand Unified Bootloader, version 2 (Open Firmware binaries) grub-ieee1275-dbg - GRand Unified Bootloader, version 2 (Open Firmware debug files) grub-linuxbios - GRand Unified Bootloader, version 2 (dummy package) grub-mount-udeb - export GRUB filesystems using FUSE (udeb) grub-pc- GRand Unified Bootloader, version 2 (PC/BIOS version) grub-pc-bin - GRand Unified Bootloader, version 2 (PC/BIOS binaries) grub-pc-dbg - GRand Unified Bootloader, version 2 (PC/BIOS debug files) grub-rescue-pc - GRUB bootable rescue images, version 2 (PC/BIOS version) grub-theme-starfield - GRand Unified Bootloader, version 2 (starfield theme) grub-uboot - GRand Unified Bootloader, version 2 (ARM U-Boot version) grub-uboot-bin - GRand Unified Bootloader, version 2 (ARM U-Boot binaries) grub-uboot-dbg - GRand Unified Bootloader, version 2 (ARM U-Boot debug files) grub-xen - GRand Unified Bootloader, version 2 (Xen version) grub-xen-bin - GRand Unified Bootloader, version 2 (Xen binaries) grub-xen-dbg - GRand Unified Bootloader, version 2 (Xen debug files) grub-yeeloong - GRand Unified Bootloader, version 2 (Yeeloong version) grub-yeeloong-bin - GRand Unified Bootloader, version 2 (Yeeloong binaries) grub-yeeloong-dbg - GRand Unified Bootloader, version 2 (Yeeloong debug files) grub2 - GRand Unified Bootloader, version 2 (dummy package) grub2-common - GRand Unified Bootloader (common files for version 2) Launchpad-Bugs-Fixed: 1274320 1521612 Changes: grub2 (2.02~beta2-9ubuntu1.7) trusty; urgency=medium . * Cherry-picks to
[ubuntu/trusty-proposed] grub2-signed 1.34.8 (Accepted)
grub2-signed (1.34.8) trusty; urgency=medium * Rebuild against grub-efi-amd64 2.02~beta2-9ubuntu1.7 (LP: #1521612, LP: #1274320). Date: Wed, 16 Dec 2015 14:23:00 -0700 Changed-By: dann frazierMaintainer: Colin Watson https://launchpad.net/ubuntu/+source/grub2-signed/1.34.8 Format: 1.8 Date: Wed, 16 Dec 2015 14:23:00 -0700 Source: grub2-signed Binary: grub-efi-amd64-signed Architecture: source Version: 1.34.8 Distribution: trusty Urgency: medium Maintainer: Colin Watson Changed-By: dann frazier Description: grub-efi-amd64-signed - GRand Unified Bootloader, version 2 (EFI-AMD64 version, signed) Launchpad-Bugs-Fixed: 1274320 1521612 Changes: grub2-signed (1.34.8) trusty; urgency=medium . * Rebuild against grub-efi-amd64 2.02~beta2-9ubuntu1.7 (LP: #1521612, LP: #1274320). Checksums-Sha1: 8f2e517995e61f3129b5abc6df13bdf4d86fcfd6 1519 grub2-signed_1.34.8.dsc db4c30f2eebdf93caf4c88601d5e26e3214ae166 3776 grub2-signed_1.34.8.tar.xz Checksums-Sha256: 2e5f8cff773181a120d9bd6f86a82fac8c99dc1d9d2ef4be00cd28ddcfa6ce5d 1519 grub2-signed_1.34.8.dsc d13d94c542a43bddcb2ec0a3e25604ac4cd8458384c20acaf1c7a3a89ffbc5f9 3776 grub2-signed_1.34.8.tar.xz Files: 6be13a6efe6621c9a00e6e2a3b7727ca 1519 utils optional grub2-signed_1.34.8.dsc 1164f18adea1713d978b028d10c94cb3 3776 utils optional grub2-signed_1.34.8.tar.xz -- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] xen 4.4.2-0ubuntu0.14.04.4 (Accepted)
xen (4.4.2-0ubuntu0.14.04.4) trusty-security; urgency=low * Applying Xen Security Advisories: - CVE-2015-8550 / XSA-155 * blkif: Avoid double access to src->nr_segments * xenfb: avoid reading twice the same fields from the shared page * xen: Add RING_COPY_REQUEST() * blktap2: Use RING_COPY_REQUEST * libvchan: Read prod/cons only once. - CVE-2015-8338 / XSA-158 * memory: split and tighten maximum order permitted in memops - CVE-2015-8339, CVE-2015-8340 / XSA-159 * memory: fix XENMEM_exchange error handling - CVE-2015-8341 / XSA-160 * libxl: Fix bootloader-related virtual memory leak on pv build failure - CVE-2015-7504 / XSA-162 * net: pcnet: add check to validate receive data size - CVE-2015-8554 / XSA-164 * MSI-X: avoid array overrun upon MSI-X table writes - CVE-2015-8555 / XSA-165 * x86: don't leak ST(n)/XMMn values to domains first using them - CVE-2015- / XSA-166 * x86/HVM: avoid reading ioreq state more than once Date: 2015-12-16 19:16:18.616878+00:00 Changed-By: Stefan BaderSigned-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/xen/4.4.2-0ubuntu0.14.04.4 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] linux-lts-wily_4.2.0-21.25~14.04.1_amd64.tar.gz - (Accepted)
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1522374 [ Upstream Kernel Changes ] * staging/dgnc: fix info leak in ioctl - LP: #1509565 - CVE-2015-7885 * [media] media/vivid-osd: fix info leak in ioctl - LP: #1509564 - CVE-2015-7884 * KEYS: Fix race between key destruction and finding a keyring by name - LP: #1508856 - CVE-2015-7872 * KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring - LP: #1508856 - CVE-2015-7872 * KEYS: Don't permit request_key() to construct a new keyring - LP: #1508856 - CVE-2015-7872 * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() - LP: #1508329 - CVE-2015-7799 * ppp, slip: Validate VJ compression slot parameters completely - LP: #1508329 - CVE-2015-7799 Date: Thu, 03 Dec 2015 11:41:35 + Changed-By: Luis HenriquesMaintainer: Launchpad Build Daemon Format: 1.8 Date: Thu, 03 Dec 2015 11:41:35 + Source: linux-lts-wily Binary: linux-headers-4.2.0-21 linux-lts-wily-tools-4.2.0-21 linux-lts-wily-cloud-tools-4.2.0-21 linux-image-4.2.0-21-generic linux-image-extra-4.2.0-21-generic linux-headers-4.2.0-21-generic linux-image-4.2.0-21-generic-dbgsym linux-tools-4.2.0-21-generic linux-cloud-tools-4.2.0-21-generic linux-lts-wily-udebs-generic linux-image-4.2.0-21-generic-lpae linux-image-extra-4.2.0-21-generic-lpae linux-headers-4.2.0-21-generic-lpae linux-image-4.2.0-21-generic-lpae-dbgsym linux-tools-4.2.0-21-generic-lpae linux-cloud-tools-4.2.0-21-generic-lpae linux-lts-wily-udebs-generic-lpae linux-image-4.2.0-21-lowlatency linux-image-extra-4.2.0-21-lowlatency linux-headers-4.2.0-21-lowlatency linux-image-4.2.0-21-lowlatency-dbgsym linux-tools-4.2.0-21-lowlatency linux-cloud-tools-4.2.0-21-lowlatency linux-lts-wily-udebs-lowlatency linux-image-4.2.0-21-powerpc-e500mc linux-image-extra-4.2.0-21-powerpc-e500mc linux-headers-4.2.0-21-powerpc-e500mc linux-image-4.2.0-21-powerpc-e500mc-dbgsym linux-tools-4.2.0-21-powerpc-e500mc linux-cloud-tools-4.2.0-21-powerpc-e500mc linux-lts-wily-udebs-powerpc-e500mc linux-image-4.2.0-21-powerpc-smp linux-image-extra-4.2.0-21-powerpc-smp linux-headers-4.2.0-21-powerpc-smp linux-image-4.2.0-21-powerpc-smp-dbgsym linux-tools-4.2.0-21-powerpc-smp linux-cloud-tools-4.2.0-21-powerpc-smp linux-lts-wily-udebs-powerpc-smp linux-image-4.2.0-21-powerpc64-emb linux-image-extra-4.2.0-21-powerpc64-emb linux-headers-4.2.0-21-powerpc64-emb linux-image-4.2.0-21-powerpc64-emb-dbgsym linux-tools-4.2.0-21-powerpc64-emb linux-cloud-tools-4.2.0-21-powerpc64-emb linux-lts-wily-udebs-powerpc64-emb linux-image-4.2.0-21-powerpc64-smp linux-image-extra-4.2.0-21-powerpc64-smp linux-headers-4.2.0-21-powerpc64-smp linux-image-4.2.0-21-powerpc64-smp-dbgsym linux-tools-4.2.0-21-powerpc64-smp linux-cloud-tools-4.2.0-21-powerpc64-smp linux-lts-wily-udebs-powerpc64-smp kernel-image-4.2.0-21-generic-di nic-modules-4.2.0-21-generic-di nic-shared-modules-4.2.0-21-generic-di serial-modules-4.2.0-21-generic-di ppp-modules-4.2.0-21-generic-di pata-modules-4.2.0-21-generic-di firewire-core-modules-4.2.0-21-generic-di scsi-modules-4.2.0-21-generic-di plip-modules-4.2.0-21-generic-di floppy-modules-4.2.0-21-generic-di fat-modules-4.2.0-21-generic-di nfs-modules-4.2.0-21-generic-di md-modules-4.2.0-21-generic-di multipath-modules-4.2.0-21-generic-di usb-modules-4.2.0-21-generic-di pcmcia-storage-modules-4.2.0-21-generic-di fb-modules-4.2.0-21-generic-di input-modules-4.2.0-21-generic-di mouse-modules-4.2.0-21-generic-di irda-modules-4.2.0-21-generic-di parport-modules-4.2.0-21-generic-di nic-pcmcia-modules-4.2.0-21-generic-di pcmcia-modules-4.2.0-21-generic-di nic-usb-modules-4.2.0-21-generic-di sata-modules-4.2.0-21-generic-di crypto-modules-4.2.0-21-generic-di squashfs-modules-4.2.0-21-generic-di speakup-modules-4.2.0-21-generic-di virtio-modules-4.2.0-21-generic-di fs-core-modules-4.2.0-21-generic-di fs-secondary-modules-4.2.0-21-generic-di storage-core-modules-4.2.0-21-generic-di block-modules-4.2.0-21-generic-di message-modules-4.2.0-21-generic-di vlan-modules-4.2.0-21-generic-di ipmi-modules-4.2.0-21-generic-di Architecture: amd64 amd64_translations Version: 4.2.0-21.25~14.04.1 Distribution: trusty Urgency: low Maintainer: Launchpad Build Daemon Changed-By: Luis Henriques Description: block-modules-4.2.0-21-generic-di - Block storage devices (udeb) crypto-modules-4.2.0-21-generic-di - crypto modules (udeb) fat-modules-4.2.0-21-generic-di - FAT filesystem support (udeb) fb-modules-4.2.0-21-generic-di - Framebuffer modules (udeb) firewire-core-modules-4.2.0-21-generic-di - Firewire (IEEE-1394) Support (udeb) floppy-modules-4.2.0-21-generic-di - Floppy driver support (udeb) fs-core-modules-4.2.0-21-generic-di - Base filesystem modules (udeb)
[ubuntu/trusty-security] linux-lts-wily 4.2.0-21.25~14.04.1 (Accepted)
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1522374 [ Upstream Kernel Changes ] * staging/dgnc: fix info leak in ioctl - LP: #1509565 - CVE-2015-7885 * [media] media/vivid-osd: fix info leak in ioctl - LP: #1509564 - CVE-2015-7884 * KEYS: Fix race between key destruction and finding a keyring by name - LP: #1508856 - CVE-2015-7872 * KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring - LP: #1508856 - CVE-2015-7872 * KEYS: Don't permit request_key() to construct a new keyring - LP: #1508856 - CVE-2015-7872 * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() - LP: #1508329 - CVE-2015-7799 * ppp, slip: Validate VJ compression slot parameters completely - LP: #1508329 - CVE-2015-7799 linux (4.2.0-20.24) wily; urgency=low [ Brad Figg ] * Release Tracking Bug - LP: #1521753 [ Andy Whitcroft ] * [Tests] gcc-multilib does not exist on ppc64el - LP: #1515541 [ Joseph Salisbury ] * SAUCE: scsi_sysfs: protect against double execution of __scsi_remove_device() - LP: #1509029 [ Manoj Kumar ] * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1 - LP: #1513583 [ Matthew R. Ochs ] * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure - LP: #1513583 [ Oren Givon ] * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series - LP: #1517375 [ Seth Forshee ] * [Config] CONFIG_DRM_AMDGPU_CIK=n - LP: #1510405 [ Upstream Kernel Changes ] * net/mlx5e: Disable VLAN filter in promiscuous mode - LP: #1514861 * drivers: net: xgene: fix RGMII 10/100Mb mode - LP: #1433290 * HID: rmi: Disable scanning if the device is not a wake source - LP: #1515503 * HID: rmi: Set F01 interrupt enable register when not set - LP: #1515503 * net/mlx5e: Ethtool link speed setting fixes - LP: #1517919 * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice - LP: #1517942 * x86/ioapic: Disable interrupts when re-routing legacy IRQs - LP: #1508593 * xhci: Workaround to get Intel xHCI reset working more reliably * megaraid_sas: Do not use PAGE_SIZE for max_sectors - LP: #1475166 * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter - LP: #1513847 * KVM: svm: unconditionally intercept #DB - LP: #1520184 - CVE-2015-8104 linux (4.2.0-19.23) wily; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1515157 [ Andy Whitcroft ] * [Config] re-enable OSS support and blacklist - LP: #1434842 [ dann frazier ] * Revert "[Config] CONFIG_ARM64_ERRATUM_843419=n" - LP: #1502946 [ Paolo Pisati ] * [SRU] [Config] armhf: LEDS_TRIGGER_HEARTBEAT=y - LP: #1510165 [ Tim Gardner ] * [Config] Add iscsi_ibft and iscsi_boot_sysfs to generic inclusion list - LP: #1511006 * [Config] CONFIG_AUFS_EXPORT=y - LP: #1121699 [ Upstream Kernel Changes ] * Revert "KVM: x86: apply guest MTRR virtualization on host reserved pages" - LP: #1509886 * Revert "KVM: SVM: use NPT page attributes" - LP: #1509886 * Revert "KVM: SVM: Sync g_pat with guest-written PAT value" - LP: #1509886 * Revert "cgroup: simplify threadgroup locking" - LP: #1509886 * Revert "sched, cgroup: replace signal_struct->group_rwsem with a global percpu_rwsem" - LP: #1509886 * Revert "ARM64: unwind: Fix PC calculation" - LP: #1514889 * Revert "serial: 8250_dma: don't bother DMA with small transfers" - LP: #1514889 * Revert "md: allow a partially recovered device to be hot-added to an array." - LP: #1514889 * arm64: Change memcpy in kernel to use the copy template file - LP: #1508471 * arm64: copy_to-from-in_user optimization using copy template - LP: #1508471 * Input: elan_i2c - enable ELAN0600 acpi panels - LP: #1439111 * e1000e: Fix tight loop implementation of systime read algorithm * arm: KVM: Fix incorrect device to IPA mapping - LP: #1509886 * KVM: vmx: fix VPID is H in non-root operation - LP: #1509886 * kvm: don't try to register to KVM_FAST_MMIO_BUS for non mmio eventfd - LP: #1509886 * kvm: fix zero length mmio searching - LP: #1509886 * kvm: factor out core eventfd assign/deassign logic - LP: #1509886 * kvm: fix double free for fast mmio eventfd - LP: #1509886 * arm: KVM: Disable virtual timer even if the guest is not using it - LP: #1509886 * kvm: svm: reset mmu on VCPU reset - LP: #1509886 * KVM: x86: trap AMD MSRs for the TSeg base and mask - LP: #1509886 * KVM: PPC: Book3S: Take the kvm->srcu lock in kvmppc_h_logical_ci_load/store() - LP: #1509886 * KVM: PPC: Book3S HV: Pass the correct trap argument to kvmhv_commence_exit - LP: #1509886 * time: Fix timekeeping_freqadjust()'s incorrect use of abs()
[ubuntu/trusty-updates] linux-signed-lts-wily 4.2.0-21.25~14.04.1 (Accepted)
linux-signed-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=medium * Master Version 4.2.0-21.25~14.04.1 Date: 2015-12-03 13:53:55.672532+00:00 Changed-By: Luis HenriquesSigned-By: Chris J Arges https://launchpad.net/ubuntu/+source/linux-signed-lts-wily/4.2.0-21.25~14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-security] linux-meta-lts-wily 4.2.0.21.15 (Accepted)
linux-meta-lts-wily (4.2.0.21.15) trusty; urgency=medium * linux ABI 4.2.0-21 Date: 2015-12-03 13:54:13.375633+00:00 Changed-By: Luis HenriquesSigned-By: Chris J Arges https://launchpad.net/ubuntu/+source/linux-meta-lts-wily/4.2.0.21.15 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-security] linux-signed-lts-wily 4.2.0-21.25~14.04.1 (Accepted)
linux-signed-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=medium * Master Version 4.2.0-21.25~14.04.1 Date: 2015-12-03 13:53:55.672532+00:00 Changed-By: Luis HenriquesSigned-By: Chris J Arges https://launchpad.net/ubuntu/+source/linux-signed-lts-wily/4.2.0-21.25~14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-security] sosreport 3.1-1ubuntu2.2 (Accepted)
sosreport (3.1-1ubuntu2.2) trusty-security; urgency=medium * SECURITY UPDATE: Information disclosure via insufficient scrubbing of passwords in /etc/fstab - debian/patches/0010-CVE-2014-0246.patch: Remove passwords when collecting the contents of /etc/fstab - CVE-2014-0246 [ Louis Bouchard ] * SECURITY UPDATE: Information disclosure and/or directory traversal via insecure tmp file handling (LP: #1525271) - debian/patches/0011-CVE-2015-7529.patch: Safely create a private tmp directory - CVE-2015-7529 Date: 2015-12-17 23:37:13.110945+00:00 Changed-By: Tyler HicksMaintainer: Adam Stokes https://launchpad.net/ubuntu/+source/sosreport/3.1-1ubuntu2.2 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] sosreport 3.1-1ubuntu2.2 (Accepted)
sosreport (3.1-1ubuntu2.2) trusty-security; urgency=medium * SECURITY UPDATE: Information disclosure via insufficient scrubbing of passwords in /etc/fstab - debian/patches/0010-CVE-2014-0246.patch: Remove passwords when collecting the contents of /etc/fstab - CVE-2014-0246 [ Louis Bouchard ] * SECURITY UPDATE: Information disclosure and/or directory traversal via insecure tmp file handling (LP: #1525271) - debian/patches/0011-CVE-2015-7529.patch: Safely create a private tmp directory - CVE-2015-7529 Date: 2015-12-17 23:37:13.110945+00:00 Changed-By: Tyler HicksMaintainer: Adam Stokes Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/sosreport/3.1-1ubuntu2.2 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] btrfs-tools 3.12-1ubuntu0.1 (Accepted)
btrfs-tools (3.12-1ubuntu0.1) trusty; urgency=high * Cherry-pick upstream fix for btrfsck tool to work on non-4k sectorsize filesystems, e.g. on ppc64el. (LP: #1438032) Date: 2015-12-11 13:31:14.278168+00:00 Changed-By: Dimitri John Ledkovhttps://launchpad.net/ubuntu/+source/btrfs-tools/3.12-1ubuntu0.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes