[ubuntu/trusty-proposed] crash 7.0.3-3ubuntu4.4 (Accepted)

2015-12-17 Thread Dave Chiluk
crash (7.0.3-3ubuntu4.4) trusty; urgency=medium

  * Fix for crash: page excluded: kernel virtual address: 881052fa8000
type: "fill_task_struct" (LP: #1523606)

Date: Mon, 07 Dec 2015 11:38:05 -0600
Changed-By: Dave Chiluk 
Maintainer: Ubuntu Developers 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/crash/7.0.3-3ubuntu4.4
Format: 1.8
Date: Mon, 07 Dec 2015 11:38:05 -0600
Source: crash
Binary: crash
Architecture: source
Version: 7.0.3-3ubuntu4.4
Distribution: trusty
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Dave Chiluk 
Description: 
 crash  - kernel debugging utility, allowing gdb like syntax
Launchpad-Bugs-Fixed: 1523606
Changes: 
 crash (7.0.3-3ubuntu4.4) trusty; urgency=medium
 .
   * Fix for crash: page excluded: kernel virtual address: 881052fa8000
 type: "fill_task_struct" (LP: #1523606)
Checksums-Sha1: 
 8a8afef6228901c400b09d3adfe2ac7f2d96a949 1907 crash_7.0.3-3ubuntu4.4.dsc
 def8c701ad519175e615a91805b1163ddccc6760 117157 crash_7.0.3-3ubuntu4.4.diff.gz
Checksums-Sha256: 
 bb7ac7e48efb6068ff83d37aae86b88ca668c9d5bbbce0e02d1c93070e9d7137 1907 
crash_7.0.3-3ubuntu4.4.dsc
 c52aff2b6123f1e1914ef801b48a3cc87b4df71c5786568e586c4e45ba5bd366 117157 
crash_7.0.3-3ubuntu4.4.diff.gz
Files: 
 7e8daf40b3875afeedb33403ec0b9599 1907 utils optional crash_7.0.3-3ubuntu4.4.dsc
 a02629ba74aeecbf350d3603d091d5f2 117157 utils optional 
crash_7.0.3-3ubuntu4.4.diff.gz
Original-Maintainer: Troy Heber 
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] grub2 2.02~beta2-9ubuntu1.7 (Accepted)

2015-12-17 Thread dann frazier
grub2 (2.02~beta2-9ubuntu1.7) trusty; urgency=medium

  * Cherry-picks to better handle TFTP timeouts on some arches: (LP: #1521612)
- (7b386b7) efidisk: move device path helpers in core for efinet
- (c52ae40) efinet: skip virtual IP devices when enumerating cards
- (f348aee) efinet: enable hardware filters when opening interface
  * Update quick boot logic to handle abstractions for which there is no
write support. (LP: #1274320)

Date: Wed, 16 Dec 2015 14:03:48 -0700
Changed-By: dann frazier 
Maintainer: Ubuntu Developers 
https://launchpad.net/ubuntu/+source/grub2/2.02~beta2-9ubuntu1.7
Format: 1.8
Date: Wed, 16 Dec 2015 14:03:48 -0700
Source: grub2
Binary: grub2 grub-linuxbios grub-efi grub-common grub2-common grub-emu 
grub-emu-dbg grub-pc-bin grub-pc-dbg grub-pc grub-rescue-pc grub-coreboot-bin 
grub-coreboot-dbg grub-coreboot grub-efi-ia32-bin grub-efi-ia32-dbg 
grub-efi-ia32 grub-efi-amd64-bin grub-efi-amd64-dbg grub-efi-amd64 
grub-efi-ia64-bin grub-efi-ia64-dbg grub-efi-ia64 grub-efi-arm-bin 
grub-efi-arm-dbg grub-efi-arm grub-efi-arm64-bin grub-efi-arm64-dbg 
grub-efi-arm64 grub-ieee1275-bin grub-ieee1275-dbg grub-ieee1275 
grub-firmware-qemu grub-uboot-bin grub-uboot-dbg grub-uboot grub-xen-bin 
grub-xen-dbg grub-xen grub-yeeloong-bin grub-yeeloong-dbg grub-yeeloong 
grub-theme-starfield grub-mount-udeb
Architecture: source
Version: 2.02~beta2-9ubuntu1.7
Distribution: trusty
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: dann frazier 
Description:
 grub-common - GRand Unified Bootloader (common files)
 grub-coreboot - GRand Unified Bootloader, version 2 (Coreboot version)
 grub-coreboot-bin - GRand Unified Bootloader, version 2 (Coreboot binaries)
 grub-coreboot-dbg - GRand Unified Bootloader, version 2 (Coreboot debug files)
 grub-efi   - GRand Unified Bootloader, version 2 (dummy package)
 grub-efi-amd64 - GRand Unified Bootloader, version 2 (EFI-AMD64 version)
 grub-efi-amd64-bin - GRand Unified Bootloader, version 2 (EFI-AMD64 binaries)
 grub-efi-amd64-dbg - GRand Unified Bootloader, version 2 (EFI-AMD64 debug 
files)
 grub-efi-arm - GRand Unified Bootloader, version 2 (ARM UEFI version)
 grub-efi-arm-bin - GRand Unified Bootloader, version 2 (ARM UEFI binaries)
 grub-efi-arm-dbg - GRand Unified Bootloader, version 2 (ARM UEFI debug files)
 grub-efi-arm64 - GRand Unified Bootloader, version 2 (ARM64 UEFI version)
 grub-efi-arm64-bin - GRand Unified Bootloader, version 2 (ARM64 UEFI binaries)
 grub-efi-arm64-dbg - GRand Unified Bootloader, version 2 (ARM64 UEFI debug 
files)
 grub-efi-ia32 - GRand Unified Bootloader, version 2 (EFI-IA32 version)
 grub-efi-ia32-bin - GRand Unified Bootloader, version 2 (EFI-IA32 binaries)
 grub-efi-ia32-dbg - GRand Unified Bootloader, version 2 (EFI-IA32 debug files)
 grub-efi-ia64 - GRand Unified Bootloader, version 2 (IA64 version)
 grub-efi-ia64-bin - GRand Unified Bootloader, version 2 (IA64 binaries)
 grub-efi-ia64-dbg - GRand Unified Bootloader, version 2 (IA64 debug files)
 grub-emu   - GRand Unified Bootloader, version 2 (emulated version)
 grub-emu-dbg - GRand Unified Bootloader, version 2 (emulated debug files)
 grub-firmware-qemu - GRUB firmware image for QEMU
 grub-ieee1275 - GRand Unified Bootloader, version 2 (Open Firmware version)
 grub-ieee1275-bin - GRand Unified Bootloader, version 2 (Open Firmware 
binaries)
 grub-ieee1275-dbg - GRand Unified Bootloader, version 2 (Open Firmware debug 
files)
 grub-linuxbios - GRand Unified Bootloader, version 2 (dummy package)
 grub-mount-udeb - export GRUB filesystems using FUSE (udeb)
 grub-pc- GRand Unified Bootloader, version 2 (PC/BIOS version)
 grub-pc-bin - GRand Unified Bootloader, version 2 (PC/BIOS binaries)
 grub-pc-dbg - GRand Unified Bootloader, version 2 (PC/BIOS debug files)
 grub-rescue-pc - GRUB bootable rescue images, version 2 (PC/BIOS version)
 grub-theme-starfield - GRand Unified Bootloader, version 2 (starfield theme)
 grub-uboot - GRand Unified Bootloader, version 2 (ARM U-Boot version)
 grub-uboot-bin - GRand Unified Bootloader, version 2 (ARM U-Boot binaries)
 grub-uboot-dbg - GRand Unified Bootloader, version 2 (ARM U-Boot debug files)
 grub-xen   - GRand Unified Bootloader, version 2 (Xen version)
 grub-xen-bin - GRand Unified Bootloader, version 2 (Xen binaries)
 grub-xen-dbg - GRand Unified Bootloader, version 2 (Xen debug files)
 grub-yeeloong - GRand Unified Bootloader, version 2 (Yeeloong version)
 grub-yeeloong-bin - GRand Unified Bootloader, version 2 (Yeeloong binaries)
 grub-yeeloong-dbg - GRand Unified Bootloader, version 2 (Yeeloong debug files)
 grub2  - GRand Unified Bootloader, version 2 (dummy package)
 grub2-common - GRand Unified Bootloader (common files for version 2)
Launchpad-Bugs-Fixed: 1274320 1521612
Changes:
 grub2 (2.02~beta2-9ubuntu1.7) trusty; urgency=medium
 .
   * Cherry-picks to 

[ubuntu/trusty-proposed] grub2-signed 1.34.8 (Accepted)

2015-12-17 Thread dann frazier
grub2-signed (1.34.8) trusty; urgency=medium

  * Rebuild against grub-efi-amd64 2.02~beta2-9ubuntu1.7 (LP: #1521612,
LP: #1274320).

Date: Wed, 16 Dec 2015 14:23:00 -0700
Changed-By: dann frazier 
Maintainer: Colin Watson 
https://launchpad.net/ubuntu/+source/grub2-signed/1.34.8
Format: 1.8
Date: Wed, 16 Dec 2015 14:23:00 -0700
Source: grub2-signed
Binary: grub-efi-amd64-signed
Architecture: source
Version: 1.34.8
Distribution: trusty
Urgency: medium
Maintainer: Colin Watson 
Changed-By: dann frazier 
Description:
 grub-efi-amd64-signed - GRand Unified Bootloader, version 2 (EFI-AMD64 
version, signed)
Launchpad-Bugs-Fixed: 1274320 1521612
Changes:
 grub2-signed (1.34.8) trusty; urgency=medium
 .
   * Rebuild against grub-efi-amd64 2.02~beta2-9ubuntu1.7 (LP: #1521612,
 LP: #1274320).
Checksums-Sha1:
 8f2e517995e61f3129b5abc6df13bdf4d86fcfd6 1519 grub2-signed_1.34.8.dsc
 db4c30f2eebdf93caf4c88601d5e26e3214ae166 3776 grub2-signed_1.34.8.tar.xz
Checksums-Sha256:
 2e5f8cff773181a120d9bd6f86a82fac8c99dc1d9d2ef4be00cd28ddcfa6ce5d 1519 
grub2-signed_1.34.8.dsc
 d13d94c542a43bddcb2ec0a3e25604ac4cd8458384c20acaf1c7a3a89ffbc5f9 3776 
grub2-signed_1.34.8.tar.xz
Files:
 6be13a6efe6621c9a00e6e2a3b7727ca 1519 utils optional grub2-signed_1.34.8.dsc
 1164f18adea1713d978b028d10c94cb3 3776 utils optional grub2-signed_1.34.8.tar.xz
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] xen 4.4.2-0ubuntu0.14.04.4 (Accepted)

2015-12-17 Thread Ubuntu Archive Robot
xen (4.4.2-0ubuntu0.14.04.4) trusty-security; urgency=low

  * Applying Xen Security Advisories:
- CVE-2015-8550 / XSA-155
  * blkif: Avoid double access to src->nr_segments
  * xenfb: avoid reading twice the same fields from the shared page
  * xen: Add RING_COPY_REQUEST()
  * blktap2: Use RING_COPY_REQUEST
  * libvchan: Read prod/cons only once.
- CVE-2015-8338 / XSA-158
  * memory: split and tighten maximum order permitted in memops
- CVE-2015-8339, CVE-2015-8340 / XSA-159
  * memory: fix XENMEM_exchange error handling
- CVE-2015-8341 / XSA-160
  * libxl: Fix bootloader-related virtual memory leak on pv
build failure
- CVE-2015-7504 / XSA-162
  * net: pcnet: add check to validate receive data size
- CVE-2015-8554 / XSA-164
  * MSI-X: avoid array overrun upon MSI-X table writes
- CVE-2015-8555 / XSA-165
  * x86: don't leak ST(n)/XMMn values to domains first using them
- CVE-2015- / XSA-166
  * x86/HVM: avoid reading ioreq state more than once

Date: 2015-12-16 19:16:18.616878+00:00
Changed-By: Stefan Bader 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/xen/4.4.2-0ubuntu0.14.04.4
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] linux-lts-wily_4.2.0-21.25~14.04.1_amd64.tar.gz - (Accepted)

2015-12-17 Thread Luis Henriques
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1522374

  [ Upstream Kernel Changes ]

  * staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
  * [media] media/vivid-osd: fix info leak in ioctl
- LP: #1509564
- CVE-2015-7884
  * KEYS: Fix race between key destruction and finding a keyring by name
- LP: #1508856
- CVE-2015-7872
  * KEYS: Fix crash when attempt to garbage collect an uninstantiated
keyring
- LP: #1508856
- CVE-2015-7872
  * KEYS: Don't permit request_key() to construct a new keyring
- LP: #1508856
- CVE-2015-7872
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
- LP: #1508329
- CVE-2015-7799
  * ppp, slip: Validate VJ compression slot parameters completely
- LP: #1508329
- CVE-2015-7799

Date: Thu, 03 Dec 2015 11:41:35 +
Changed-By: Luis Henriques 
Maintainer: Launchpad Build Daemon 

Format: 1.8
Date: Thu, 03 Dec 2015 11:41:35 +
Source: linux-lts-wily
Binary: linux-headers-4.2.0-21 linux-lts-wily-tools-4.2.0-21 
linux-lts-wily-cloud-tools-4.2.0-21 linux-image-4.2.0-21-generic 
linux-image-extra-4.2.0-21-generic linux-headers-4.2.0-21-generic 
linux-image-4.2.0-21-generic-dbgsym linux-tools-4.2.0-21-generic 
linux-cloud-tools-4.2.0-21-generic linux-lts-wily-udebs-generic 
linux-image-4.2.0-21-generic-lpae linux-image-extra-4.2.0-21-generic-lpae 
linux-headers-4.2.0-21-generic-lpae linux-image-4.2.0-21-generic-lpae-dbgsym 
linux-tools-4.2.0-21-generic-lpae linux-cloud-tools-4.2.0-21-generic-lpae 
linux-lts-wily-udebs-generic-lpae linux-image-4.2.0-21-lowlatency 
linux-image-extra-4.2.0-21-lowlatency linux-headers-4.2.0-21-lowlatency 
linux-image-4.2.0-21-lowlatency-dbgsym linux-tools-4.2.0-21-lowlatency 
linux-cloud-tools-4.2.0-21-lowlatency linux-lts-wily-udebs-lowlatency 
linux-image-4.2.0-21-powerpc-e500mc linux-image-extra-4.2.0-21-powerpc-e500mc 
linux-headers-4.2.0-21-powerpc-e500mc linux-image-4.2.0-21-powerpc-e500mc-dbgsym
 linux-tools-4.2.0-21-powerpc-e500mc linux-cloud-tools-4.2.0-21-powerpc-e500mc 
linux-lts-wily-udebs-powerpc-e500mc linux-image-4.2.0-21-powerpc-smp 
linux-image-extra-4.2.0-21-powerpc-smp linux-headers-4.2.0-21-powerpc-smp 
linux-image-4.2.0-21-powerpc-smp-dbgsym linux-tools-4.2.0-21-powerpc-smp 
linux-cloud-tools-4.2.0-21-powerpc-smp linux-lts-wily-udebs-powerpc-smp 
linux-image-4.2.0-21-powerpc64-emb linux-image-extra-4.2.0-21-powerpc64-emb 
linux-headers-4.2.0-21-powerpc64-emb linux-image-4.2.0-21-powerpc64-emb-dbgsym 
linux-tools-4.2.0-21-powerpc64-emb linux-cloud-tools-4.2.0-21-powerpc64-emb 
linux-lts-wily-udebs-powerpc64-emb linux-image-4.2.0-21-powerpc64-smp 
linux-image-extra-4.2.0-21-powerpc64-smp linux-headers-4.2.0-21-powerpc64-smp 
linux-image-4.2.0-21-powerpc64-smp-dbgsym linux-tools-4.2.0-21-powerpc64-smp 
linux-cloud-tools-4.2.0-21-powerpc64-smp linux-lts-wily-udebs-powerpc64-smp 
kernel-image-4.2.0-21-generic-di nic-modules-4.2.0-21-generic-di
 nic-shared-modules-4.2.0-21-generic-di serial-modules-4.2.0-21-generic-di 
ppp-modules-4.2.0-21-generic-di pata-modules-4.2.0-21-generic-di 
firewire-core-modules-4.2.0-21-generic-di scsi-modules-4.2.0-21-generic-di 
plip-modules-4.2.0-21-generic-di floppy-modules-4.2.0-21-generic-di 
fat-modules-4.2.0-21-generic-di nfs-modules-4.2.0-21-generic-di 
md-modules-4.2.0-21-generic-di multipath-modules-4.2.0-21-generic-di 
usb-modules-4.2.0-21-generic-di pcmcia-storage-modules-4.2.0-21-generic-di 
fb-modules-4.2.0-21-generic-di input-modules-4.2.0-21-generic-di 
mouse-modules-4.2.0-21-generic-di irda-modules-4.2.0-21-generic-di 
parport-modules-4.2.0-21-generic-di nic-pcmcia-modules-4.2.0-21-generic-di 
pcmcia-modules-4.2.0-21-generic-di nic-usb-modules-4.2.0-21-generic-di 
sata-modules-4.2.0-21-generic-di crypto-modules-4.2.0-21-generic-di 
squashfs-modules-4.2.0-21-generic-di speakup-modules-4.2.0-21-generic-di 
virtio-modules-4.2.0-21-generic-di fs-core-modules-4.2.0-21-generic-di
 fs-secondary-modules-4.2.0-21-generic-di 
storage-core-modules-4.2.0-21-generic-di block-modules-4.2.0-21-generic-di 
message-modules-4.2.0-21-generic-di vlan-modules-4.2.0-21-generic-di
 ipmi-modules-4.2.0-21-generic-di
Architecture: amd64 amd64_translations
Version: 4.2.0-21.25~14.04.1
Distribution: trusty
Urgency: low
Maintainer: Launchpad Build Daemon 
Changed-By: Luis Henriques 
Description: 
 block-modules-4.2.0-21-generic-di - Block storage devices (udeb)
 crypto-modules-4.2.0-21-generic-di - crypto modules (udeb)
 fat-modules-4.2.0-21-generic-di - FAT filesystem support (udeb)
 fb-modules-4.2.0-21-generic-di - Framebuffer modules (udeb)
 firewire-core-modules-4.2.0-21-generic-di - Firewire (IEEE-1394) Support (udeb)
 floppy-modules-4.2.0-21-generic-di - Floppy driver support (udeb)
 fs-core-modules-4.2.0-21-generic-di - Base filesystem modules (udeb)
 

[ubuntu/trusty-security] linux-lts-wily 4.2.0-21.25~14.04.1 (Accepted)

2015-12-17 Thread Chris J Arges
linux-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1522374

  [ Upstream Kernel Changes ]

  * staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
  * [media] media/vivid-osd: fix info leak in ioctl
- LP: #1509564
- CVE-2015-7884
  * KEYS: Fix race between key destruction and finding a keyring by name
- LP: #1508856
- CVE-2015-7872
  * KEYS: Fix crash when attempt to garbage collect an uninstantiated
keyring
- LP: #1508856
- CVE-2015-7872
  * KEYS: Don't permit request_key() to construct a new keyring
- LP: #1508856
- CVE-2015-7872
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
- LP: #1508329
- CVE-2015-7799
  * ppp, slip: Validate VJ compression slot parameters completely
- LP: #1508329
- CVE-2015-7799

linux (4.2.0-20.24) wily; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
- LP: #1521753

  [ Andy Whitcroft ]

  * [Tests] gcc-multilib does not exist on ppc64el
- LP: #1515541

  [ Joseph Salisbury ]

  * SAUCE: scsi_sysfs: protect against double execution of
__scsi_remove_device()
- LP: #1509029

  [ Manoj Kumar ]

  * SAUCE: (noup) cxlflash: Fix to escalate LINK_RESET also on port 1
- LP: #1513583

  [ Matthew R. Ochs ]

  * SAUCE: (noup) cxlflash: Fix to avoid virtual LUN failover failure
- LP: #1513583

  [ Oren Givon ]

  * SAUCE: (noup) iwlwifi: Add new PCI IDs for the 8260 series
- LP: #1517375

  [ Seth Forshee ]

  * [Config] CONFIG_DRM_AMDGPU_CIK=n
- LP: #1510405

  [ Upstream Kernel Changes ]

  * net/mlx5e: Disable VLAN filter in promiscuous mode
- LP: #1514861
  * drivers: net: xgene: fix RGMII 10/100Mb mode
- LP: #1433290
  * HID: rmi: Disable scanning if the device is not a wake source
- LP: #1515503
  * HID: rmi: Set F01 interrupt enable register when not set
- LP: #1515503
  * net/mlx5e: Ethtool link speed setting fixes
- LP: #1517919
  * scsi_scan: don't dump trace when scsi_prep_async_scan() is called twice
- LP: #1517942
  * x86/ioapic: Disable interrupts when re-routing legacy IRQs
- LP: #1508593
  * xhci: Workaround to get Intel xHCI reset working more reliably
  * megaraid_sas: Do not use PAGE_SIZE for max_sectors
- LP: #1475166
  * net: usb: cdc_ether: add Dell DW5580 as a mobile broadband adapter
- LP: #1513847
  * KVM: svm: unconditionally intercept #DB
- LP: #1520184
- CVE-2015-8104

linux (4.2.0-19.23) wily; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1515157

  [ Andy Whitcroft ]

  * [Config] re-enable OSS support and blacklist
- LP: #1434842

  [ dann frazier ]

  * Revert "[Config] CONFIG_ARM64_ERRATUM_843419=n"
- LP: #1502946

  [ Paolo Pisati ]

  * [SRU] [Config] armhf: LEDS_TRIGGER_HEARTBEAT=y
- LP: #1510165

  [ Tim Gardner ]

  * [Config] Add iscsi_ibft and iscsi_boot_sysfs to generic inclusion list
- LP: #1511006
  * [Config] CONFIG_AUFS_EXPORT=y
- LP: #1121699

  [ Upstream Kernel Changes ]

  * Revert "KVM: x86: apply guest MTRR virtualization on host reserved
pages"
- LP: #1509886
  * Revert "KVM: SVM: use NPT page attributes"
- LP: #1509886
  * Revert "KVM: SVM: Sync g_pat with guest-written PAT value"
- LP: #1509886
  * Revert "cgroup: simplify threadgroup locking"
- LP: #1509886
  * Revert "sched, cgroup: replace signal_struct->group_rwsem with a global
percpu_rwsem"
- LP: #1509886
  * Revert "ARM64: unwind: Fix PC calculation"
- LP: #1514889
  * Revert "serial: 8250_dma: don't bother DMA with small transfers"
- LP: #1514889
  * Revert "md: allow a partially recovered device to be hot-added to an
array."
- LP: #1514889
  * arm64: Change memcpy in kernel to use the copy template file
- LP: #1508471
  * arm64: copy_to-from-in_user optimization using copy template
- LP: #1508471
  * Input: elan_i2c - enable ELAN0600 acpi panels
- LP: #1439111
  * e1000e: Fix tight loop implementation of systime read algorithm
  * arm: KVM: Fix incorrect device to IPA mapping
- LP: #1509886
  * KVM: vmx: fix VPID is H in non-root operation
- LP: #1509886
  * kvm: don't try to register to KVM_FAST_MMIO_BUS for non mmio eventfd
- LP: #1509886
  * kvm: fix zero length mmio searching
- LP: #1509886
  * kvm: factor out core eventfd assign/deassign logic
- LP: #1509886
  * kvm: fix double free for fast mmio eventfd
- LP: #1509886
  * arm: KVM: Disable virtual timer even if the guest is not using it
- LP: #1509886
  * kvm: svm: reset mmu on VCPU reset
- LP: #1509886
  * KVM: x86: trap AMD MSRs for the TSeg base and mask
- LP: #1509886
  * KVM: PPC: Book3S: Take the kvm->srcu lock in
kvmppc_h_logical_ci_load/store()
- LP: #1509886
  * KVM: PPC: Book3S HV: Pass the correct trap argument to
kvmhv_commence_exit
- LP: #1509886
  * time: Fix timekeeping_freqadjust()'s incorrect use of abs() 

[ubuntu/trusty-updates] linux-signed-lts-wily 4.2.0-21.25~14.04.1 (Accepted)

2015-12-17 Thread Chris J Arges
linux-signed-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=medium

  * Master Version 4.2.0-21.25~14.04.1

Date: 2015-12-03 13:53:55.672532+00:00
Changed-By: Luis Henriques 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-signed-lts-wily/4.2.0-21.25~14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] linux-meta-lts-wily 4.2.0.21.15 (Accepted)

2015-12-17 Thread Chris J Arges
linux-meta-lts-wily (4.2.0.21.15) trusty; urgency=medium

  * linux ABI 4.2.0-21

Date: 2015-12-03 13:54:13.375633+00:00
Changed-By: Luis Henriques 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-meta-lts-wily/4.2.0.21.15
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] linux-signed-lts-wily 4.2.0-21.25~14.04.1 (Accepted)

2015-12-17 Thread Chris J Arges
linux-signed-lts-wily (4.2.0-21.25~14.04.1) trusty; urgency=medium

  * Master Version 4.2.0-21.25~14.04.1

Date: 2015-12-03 13:53:55.672532+00:00
Changed-By: Luis Henriques 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-signed-lts-wily/4.2.0-21.25~14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] sosreport 3.1-1ubuntu2.2 (Accepted)

2015-12-17 Thread Tyler Hicks
sosreport (3.1-1ubuntu2.2) trusty-security; urgency=medium

  * SECURITY UPDATE: Information disclosure via insufficient scrubbing of
passwords in /etc/fstab
   - debian/patches/0010-CVE-2014-0246.patch: Remove passwords when collecting
 the contents of /etc/fstab
   - CVE-2014-0246

  [ Louis Bouchard ]
  * SECURITY UPDATE: Information disclosure and/or directory traversal
via insecure tmp file handling (LP: #1525271)
- debian/patches/0011-CVE-2015-7529.patch: Safely create a private
  tmp directory
- CVE-2015-7529

Date: 2015-12-17 23:37:13.110945+00:00
Changed-By: Tyler Hicks 
Maintainer: Adam Stokes 
https://launchpad.net/ubuntu/+source/sosreport/3.1-1ubuntu2.2
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] sosreport 3.1-1ubuntu2.2 (Accepted)

2015-12-17 Thread Ubuntu Archive Robot
sosreport (3.1-1ubuntu2.2) trusty-security; urgency=medium

  * SECURITY UPDATE: Information disclosure via insufficient scrubbing of
passwords in /etc/fstab
   - debian/patches/0010-CVE-2014-0246.patch: Remove passwords when collecting
 the contents of /etc/fstab
   - CVE-2014-0246

  [ Louis Bouchard ]
  * SECURITY UPDATE: Information disclosure and/or directory traversal
via insecure tmp file handling (LP: #1525271)
- debian/patches/0011-CVE-2015-7529.patch: Safely create a private
  tmp directory
- CVE-2015-7529

Date: 2015-12-17 23:37:13.110945+00:00
Changed-By: Tyler Hicks 
Maintainer: Adam Stokes 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/sosreport/3.1-1ubuntu2.2
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] btrfs-tools 3.12-1ubuntu0.1 (Accepted)

2015-12-17 Thread Dimitri John Ledkov
btrfs-tools (3.12-1ubuntu0.1) trusty; urgency=high

  * Cherry-pick upstream fix for btrfsck tool to work on non-4k sectorsize
filesystems, e.g. on ppc64el. (LP: #1438032)

Date: 2015-12-11 13:31:14.278168+00:00
Changed-By: Dimitri John Ledkov 
https://launchpad.net/ubuntu/+source/btrfs-tools/3.12-1ubuntu0.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes