[ubuntu/trusty-updates] firefox 46.0.1+build1-0ubuntu0.14.04.3 (Accepted)
firefox (46.0.1+build1-0ubuntu0.14.04.3) trusty-security; urgency=medium * New upstream stable release (46.0.1build1) - see USN-2936-2 * Update debian/config/searchplugins.conf now that ja uses the en-US version of the Google search plugin Date: 2016-05-11 22:36:16.994988+00:00 Changed-By: Chris CoulsonSigned-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/firefox/46.0.1+build1-0ubuntu0.14.04.3 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] thunderbird 1:38.8.0+build1-0ubuntu0.14.04.1 (Accepted)
thunderbird (1:38.8.0+build1-0ubuntu0.14.04.1) trusty-security; urgency=medium * New upstream stable release (THUNDERBIRD_38_8_0_BUILD1) - see USN-2973-1 Date: 2016-05-11 16:17:43.955719+00:00 Changed-By: Chris CoulsonSigned-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/thunderbird/1:38.8.0+build1-0ubuntu0.14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] livecd-rootfs 2.208.12 (Accepted)
livecd-rootfs (2.208.12) trusty; urgency=medium * Rename old ubuntu-core tarballs to ubuntu-base, for consistency with the changes already made to yakkety and the ubuntu-cdimage project. LP: #1579950. Date: 2016-05-10 00:04:11.300272+00:00 Changed-By: Steve LangasekSigned-By: Chris J Arges https://launchpad.net/ubuntu/+source/livecd-rootfs/2.208.12 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-security] thunderbird 1:38.8.0+build1-0ubuntu0.14.04.1 (Accepted)
thunderbird (1:38.8.0+build1-0ubuntu0.14.04.1) trusty-security; urgency=medium * New upstream stable release (THUNDERBIRD_38_8_0_BUILD1) - see USN-2973-1 Date: 2016-05-11 16:17:43.955719+00:00 Changed-By: Chris Coulsonhttps://launchpad.net/ubuntu/+source/thunderbird/1:38.8.0+build1-0ubuntu0.14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-security] firefox 46.0.1+build1-0ubuntu0.14.04.3 (Accepted)
firefox (46.0.1+build1-0ubuntu0.14.04.3) trusty-security; urgency=medium * New upstream stable release (46.0.1build1) - see USN-2936-2 * Update debian/config/searchplugins.conf now that ja uses the en-US version of the Google search plugin Date: 2016-05-11 22:36:16.994988+00:00 Changed-By: Chris Coulsonhttps://launchpad.net/ubuntu/+source/firefox/46.0.1+build1-0ubuntu0.14.04.3 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] linux-lts-utopic_3.16.0-72.93~14.04.1_amd64.tar.gz - (Accepted)
linux-lts-utopic (3.16.0-72.93~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1582411 [ Kamal Mostafa ] * [Packaging] update-from-xxx-master: pull from git.launchpad.net * [Packaging] update-from-xxx-master: update from master-next * [Config] Drop ozwpan from the ABI [ Luis Henriques ] * [Config] CONFIG_USB_WPAN_HCD=n - LP: #1463740 - CVE-2015-4004 [ Prarit Bhargava ] * SAUCE: (no-up) ACPICA: Dispatcher: Update thread ID for recursive method calls - LP: #1577898 [ Upstream Kernel Changes ] * usbnet: cleanup after bind() in probe() - LP: #1567191 - CVE-2016-3951 * KVM: x86: bit-ops emulation ignores offset on 64-bit - LP: #1423672 * USB: usbip: fix potential out-of-bounds write - LP: #1572666 - CVE-2016-3955 * x86/mm/32: Enable full randomization on i386 and X86_32 - LP: #1568523 - CVE-2016-3672 * Input: gtco - fix crash on detecting device without endpoints - LP: #1575706 - CVE-2016-2187 * atl2: Disable unimplemented scatter/gather feature - LP: #1561403 - CVE-2016-2117 * ALSA: usb-audio: Skip volume controls triggers hangup on Dell USB Dock - LP: #1577905 * PNP: Add Broadwell to Intel MCH size workaround - LP: #1577748 * PNP: Add Haswell-ULT to Intel MCH size workaround - LP: #1577748 * fs/pnode.c: treat zero mnt_group_id-s as unequal - LP: #1572316 * propogate_mnt: Handle the first propogated copy being a slave - LP: #1572316 * USB: mct_u232: add sanity checking in probe - LP: #1556877 - CVE-2016-3136 * USB: cypress_m8: add endpoint sanity check - LP: #1556878 - CVE-2016-3137 * USB: digi_acceleport: do sanity checking for the number of ports - LP: #1556888 - CVE-2016-3140 * Input: ims-pcu - sanity check against missing interfaces - LP: #1566581 - CVE-2016-3689 * drm: Balance error path for GEM handle allocation - LP: #1579610 * net: fix infoleak in llc - LP: #1578496 - CVE-2016-4485 * net: fix infoleak in rtnetlink - LP: #1578497 - CVE-2016-4486 Date: Mon, 16 May 2016 14:10:36 -0700 Changed-By: Kamal MostafaMaintainer: Launchpad Build Daemon Format: 1.8 Date: Mon, 16 May 2016 14:10:36 -0700 Source: linux-lts-utopic Binary: linux-headers-3.16.0-72 linux-lts-utopic-tools-3.16.0-72 linux-lts-utopic-cloud-tools-3.16.0-72 linux-image-3.16.0-72-generic linux-image-extra-3.16.0-72-generic linux-headers-3.16.0-72-generic linux-image-3.16.0-72-generic-dbgsym linux-tools-3.16.0-72-generic linux-cloud-tools-3.16.0-72-generic linux-lts-utopic-udebs-generic linux-image-3.16.0-72-generic-lpae linux-image-extra-3.16.0-72-generic-lpae linux-headers-3.16.0-72-generic-lpae linux-image-3.16.0-72-generic-lpae-dbgsym linux-tools-3.16.0-72-generic-lpae linux-cloud-tools-3.16.0-72-generic-lpae linux-lts-utopic-udebs-generic-lpae linux-image-3.16.0-72-lowlatency linux-image-extra-3.16.0-72-lowlatency linux-headers-3.16.0-72-lowlatency linux-image-3.16.0-72-lowlatency-dbgsym linux-tools-3.16.0-72-lowlatency linux-cloud-tools-3.16.0-72-lowlatency linux-lts-utopic-udebs-lowlatency linux-image-3.16.0-72-powerpc-e500mc linux-image-extra-3.16.0-72-powerpc-e500mc linux-headers-3.16.0-72-powerpc-e500mc linux-image-3.16.0-72-powerpc-e500mc-dbgsym linux-tools-3.16.0-72-powerpc-e500mc linux-cloud-tools-3.16.0-72-powerpc-e500mc linux-lts-utopic-udebs-powerpc-e500mc linux-image-3.16.0-72-powerpc-smp linux-image-extra-3.16.0-72-powerpc-smp linux-headers-3.16.0-72-powerpc-smp linux-image-3.16.0-72-powerpc-smp-dbgsym linux-tools-3.16.0-72-powerpc-smp linux-cloud-tools-3.16.0-72-powerpc-smp linux-lts-utopic-udebs-powerpc-smp linux-image-3.16.0-72-powerpc64-emb linux-image-extra-3.16.0-72-powerpc64-emb linux-headers-3.16.0-72-powerpc64-emb linux-image-3.16.0-72-powerpc64-emb-dbgsym linux-tools-3.16.0-72-powerpc64-emb linux-cloud-tools-3.16.0-72-powerpc64-emb linux-lts-utopic-udebs-powerpc64-emb linux-image-3.16.0-72-powerpc64-smp linux-image-extra-3.16.0-72-powerpc64-smp linux-headers-3.16.0-72-powerpc64-smp linux-image-3.16.0-72-powerpc64-smp-dbgsym linux-tools-3.16.0-72-powerpc64-smp linux-cloud-tools-3.16.0-72-powerpc64-smp linux-lts-utopic-udebs-powerpc64-smp kernel-image-3.16.0-72-generic-di nic-modules-3.16.0-72-generic-di nic-shared-modules-3.16.0-72-generic-di serial-modules-3.16.0-72-generic-di ppp-modules-3.16.0-72-generic-di pata-modules-3.16.0-72-generic-di firewire-core-modules-3.16.0-72-generic-di scsi-modules-3.16.0-72-generic-di plip-modules-3.16.0-72-generic-di floppy-modules-3.16.0-72-generic-di fat-modules-3.16.0-72-generic-di nfs-modules-3.16.0-72-generic-di md-modules-3.16.0-72-generic-di multipath-modules-3.16.0-72-generic-di usb-modules-3.16.0-72-generic-di pcmcia-storage-modules-3.16.0-72-generic-di fb-modules-3.16.0-72-generic-di input-modules-3.16.0-72-generic-di mouse-modules-3.16.0-72-generic-di
[ubuntu/trusty-updates] oxide-qt 1.14.9-0ubuntu0.14.04.1 (Accepted)
oxide-qt (1.14.9-0ubuntu0.14.04.1) trusty-security; urgency=medium * Update to v1.14.9 (see USN-2960-1) - Bump Chromium rev to 50.0.2661.102 - Scale the locationbar height when the screen changes - Fix LP: #1575216 - Ensure we resize / rescale the webview compositor viewport when the screen is updated Date: 2016-05-13 18:57:59.963799+00:00 Changed-By: Chris CoulsonSigned-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/oxide-qt/1.14.9-0ubuntu0.14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] chromium-browser 50.0.2661.102-0ubuntu0.14.04.1.1117 (Accepted)
chromium-browser (50.0.2661.102-0ubuntu0.14.04.1.1117) trusty-security; urgency=medium * Upstream release 50.0.2661.102: - CVE-2016-1667: Same origin bypass in DOM. - CVE-2016-1668: Same origin bypass in Blink V8 bindings. - CVE-2016-1669: Buffer overflow in V8. - CVE-2016-1670: Race condition in loader. - CVE-2016-1671: Directory traversal using the file scheme on Android. * Upstream release 50.0.2661.94: - CVE-2016-1660: Out-of-bounds write in Blink. - CVE-2016-1661: Memory corruption in cross-process frames. - CVE-2016-1662: Use-after-free in extensions. - CVE-2016-1663: Use-after-free in Blink’s V8 bindings. - CVE-2016-1664: Address bar spoofing. - CVE-2016-1665: Information leak in V8. - CVE-2016-1666: Various fixes from internal audits, fuzzing and other initiatives. * Upstream release 50.0.2661.75: - CVE-2016-1652: Universal XSS in extension bindings. - CVE-2016-1653: Out-of-bounds write in V8. - CVE-2016-1651: Out-of-bounds read in Pdfium JPEG2000 decoding. - CVE-2016-1654: Uninitialized memory read in media. - CVE-2016-1655: Use-after-free related to extensions. - CVE-2016-1656: Android downloaded file path restriction bypass. - CVE-2016-1657: Address bar spoofing. - CVE-2016-1658: Potential leak of sensitive information to malicious extensions. - CVE-2015-1659: Various fixes from internal audits, fuzzing and other initiatives. * debian/patches/seccomp-allow-set-robust-list: pass through syscall set_robust_list. glibc nptl thread creation uses it. * debian/rules: use new libsecret way of contacting keyring. * debian/patches/blink-platform-export-class: avoid Trusty bug where WebKit Platform class vtable not found at link time. * debian/apport/chromium-browser.py: Handle case when crash and no chromium directory exists. Still report errors in apport. Date: 2016-05-13 16:44:23.672055+00:00 Changed-By: Chad MillerSigned-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/chromium-browser/50.0.2661.102-0ubuntu0.14.04.1.1117 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] linux_3.13.0-87.132_amd64.tar.gz - (Accepted)
linux (3.13.0-87.132) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1582398 [ Kamal Mostafa ] * [Config] Drop ozwpan from the ABI [ Luis Henriques ] * [Config] CONFIG_USB_WPAN_HCD=n - LP: #1463740 - CVE-2015-4004 [ Prarit Bhargava ] * SAUCE: (no-up) ACPICA: Dispatcher: Update thread ID for recursive method calls - LP: #1577898 [ Upstream Kernel Changes ] * usbnet: cleanup after bind() in probe() - LP: #1567191 - CVE-2016-3951 * KVM: x86: bit-ops emulation ignores offset on 64-bit - LP: #1423672 * USB: usbip: fix potential out-of-bounds write - LP: #1572666 - CVE-2016-3955 * x86/mm/32: Enable full randomization on i386 and X86_32 - LP: #1568523 - CVE-2016-3672 * Input: gtco - fix crash on detecting device without endpoints - LP: #1575706 - CVE-2016-2187 * atl2: Disable unimplemented scatter/gather feature - LP: #1561403 - CVE-2016-2117 * ALSA: usb-audio: Skip volume controls triggers hangup on Dell USB Dock - LP: #1577905 * fs/pnode.c: treat zero mnt_group_id-s as unequal - LP: #1572316 * propogate_mnt: Handle the first propogated copy being a slave - LP: #1572316 * drm: Balance error path for GEM handle allocation - LP: #1579610 * x86/mm: Add barriers and document switch_mm()-vs-flush synchronization - LP: #1538429 - CVE-2016-2069 * x86/mm: Improve switch_mm() barrier comments - LP: #1538429 - CVE-2016-2069 * net: fix infoleak in llc - LP: #1578496 - CVE-2016-4485 * net: fix infoleak in rtnetlink - LP: #1578497 - CVE-2016-4486 Date: Mon, 16 May 2016 13:28:38 -0700 Changed-By: Kamal MostafaMaintainer: Launchpad Build Daemon Format: 1.8 Date: Mon, 16 May 2016 13:28:38 -0700 Source: linux Binary: linux-source-3.13.0 linux-doc linux-headers-3.13.0-87 linux-libc-dev linux-tools-common linux-tools-3.13.0-87 linux-cloud-tools-common linux-cloud-tools-3.13.0-87 linux-image-3.13.0-87-generic linux-image-extra-3.13.0-87-generic linux-headers-3.13.0-87-generic linux-image-3.13.0-87-generic-dbgsym linux-tools-3.13.0-87-generic linux-cloud-tools-3.13.0-87-generic linux-udebs-generic linux-image-3.13.0-87-generic-lpae linux-image-extra-3.13.0-87-generic-lpae linux-headers-3.13.0-87-generic-lpae linux-image-3.13.0-87-generic-lpae-dbgsym linux-tools-3.13.0-87-generic-lpae linux-cloud-tools-3.13.0-87-generic-lpae linux-udebs-generic-lpae linux-image-3.13.0-87-lowlatency linux-image-extra-3.13.0-87-lowlatency linux-headers-3.13.0-87-lowlatency linux-image-3.13.0-87-lowlatency-dbgsym linux-tools-3.13.0-87-lowlatency linux-cloud-tools-3.13.0-87-lowlatency linux-udebs-lowlatency linux-image-3.13.0-87-powerpc-e500 linux-image-extra-3.13.0-87-powerpc-e500 linux-headers-3.13.0-87-powerpc-e500 linux-image-3.13.0-87-powerpc-e500-dbgsym linux-tools-3.13.0-87-powerpc-e500 linux-cloud-tools-3.13.0-87-powerpc-e500 linux-udebs-powerpc-e500 linux-image-3.13.0-87-powerpc-e500mc linux-image-extra-3.13.0-87-powerpc-e500mc linux-headers-3.13.0-87-powerpc-e500mc linux-image-3.13.0-87-powerpc-e500mc-dbgsym linux-tools-3.13.0-87-powerpc-e500mc linux-cloud-tools-3.13.0-87-powerpc-e500mc linux-udebs-powerpc-e500mc linux-image-3.13.0-87-powerpc-smp linux-image-extra-3.13.0-87-powerpc-smp linux-headers-3.13.0-87-powerpc-smp linux-image-3.13.0-87-powerpc-smp-dbgsym linux-tools-3.13.0-87-powerpc-smp linux-cloud-tools-3.13.0-87-powerpc-smp linux-udebs-powerpc-smp linux-image-3.13.0-87-powerpc64-emb linux-image-extra-3.13.0-87-powerpc64-emb linux-headers-3.13.0-87-powerpc64-emb linux-image-3.13.0-87-powerpc64-emb-dbgsym linux-tools-3.13.0-87-powerpc64-emb linux-cloud-tools-3.13.0-87-powerpc64-emb linux-udebs-powerpc64-emb linux-image-3.13.0-87-powerpc64-smp linux-image-extra-3.13.0-87-powerpc64-smp linux-headers-3.13.0-87-powerpc64-smp linux-image-3.13.0-87-powerpc64-smp-dbgsym linux-tools-3.13.0-87-powerpc64-smp linux-cloud-tools-3.13.0-87-powerpc64-smp linux-udebs-powerpc64-smp kernel-image-3.13.0-87-generic-di nic-modules-3.13.0-87-generic-di nic-shared-modules-3.13.0-87-generic-di serial-modules-3.13.0-87-generic-di ppp-modules-3.13.0-87-generic-di pata-modules-3.13.0-87-generic-di firewire-core-modules-3.13.0-87-generic-di scsi-modules-3.13.0-87-generic-di plip-modules-3.13.0-87-generic-di floppy-modules-3.13.0-87-generic-di fat-modules-3.13.0-87-generic-di nfs-modules-3.13.0-87-generic-di md-modules-3.13.0-87-generic-di multipath-modules-3.13.0-87-generic-di usb-modules-3.13.0-87-generic-di pcmcia-storage-modules-3.13.0-87-generic-di fb-modules-3.13.0-87-generic-di input-modules-3.13.0-87-generic-di mouse-modules-3.13.0-87-generic-di irda-modules-3.13.0-87-generic-di parport-modules-3.13.0-87-generic-di nic-pcmcia-modules-3.13.0-87-generic-di pcmcia-modules-3.13.0-87-generic-di nic-usb-modules-3.13.0-87-generic-di sata-modules-3.13.0-87-generic-di
[ubuntu/trusty-proposed] linux-signed-lts-utopic 3.16.0-72.93~14.04.1 (Accepted)
linux-signed-lts-utopic (3.16.0-72.93~14.04.1) trusty; urgency=medium * Master Version 3.16.0-72.93~14.04.1 Date: 2016-05-16 21:24:53.201134+00:00 Changed-By: Kamal MostafaSigned-By: Chris J Arges https://launchpad.net/ubuntu/+source/linux-signed-lts-utopic/3.16.0-72.93~14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] linux-lts-utopic 3.16.0-72.93~14.04.1 (Accepted)
linux-lts-utopic (3.16.0-72.93~14.04.1) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1582411 [ Kamal Mostafa ] * [Packaging] update-from-xxx-master: pull from git.launchpad.net * [Packaging] update-from-xxx-master: update from master-next * [Config] Drop ozwpan from the ABI [ Luis Henriques ] * [Config] CONFIG_USB_WPAN_HCD=n - LP: #1463740 - CVE-2015-4004 [ Prarit Bhargava ] * SAUCE: (no-up) ACPICA: Dispatcher: Update thread ID for recursive method calls - LP: #1577898 [ Upstream Kernel Changes ] * usbnet: cleanup after bind() in probe() - LP: #1567191 - CVE-2016-3951 * KVM: x86: bit-ops emulation ignores offset on 64-bit - LP: #1423672 * USB: usbip: fix potential out-of-bounds write - LP: #1572666 - CVE-2016-3955 * x86/mm/32: Enable full randomization on i386 and X86_32 - LP: #1568523 - CVE-2016-3672 * Input: gtco - fix crash on detecting device without endpoints - LP: #1575706 - CVE-2016-2187 * atl2: Disable unimplemented scatter/gather feature - LP: #1561403 - CVE-2016-2117 * ALSA: usb-audio: Skip volume controls triggers hangup on Dell USB Dock - LP: #1577905 * PNP: Add Broadwell to Intel MCH size workaround - LP: #1577748 * PNP: Add Haswell-ULT to Intel MCH size workaround - LP: #1577748 * fs/pnode.c: treat zero mnt_group_id-s as unequal - LP: #1572316 * propogate_mnt: Handle the first propogated copy being a slave - LP: #1572316 * USB: mct_u232: add sanity checking in probe - LP: #1556877 - CVE-2016-3136 * USB: cypress_m8: add endpoint sanity check - LP: #1556878 - CVE-2016-3137 * USB: digi_acceleport: do sanity checking for the number of ports - LP: #1556888 - CVE-2016-3140 * Input: ims-pcu - sanity check against missing interfaces - LP: #1566581 - CVE-2016-3689 * drm: Balance error path for GEM handle allocation - LP: #1579610 * net: fix infoleak in llc - LP: #1578496 - CVE-2016-4485 * net: fix infoleak in rtnetlink - LP: #1578497 - CVE-2016-4486 Date: 2016-05-16 21:24:13.221026+00:00 Changed-By: Kamal MostafaSigned-By: Chris J Arges https://launchpad.net/ubuntu/+source/linux-lts-utopic/3.16.0-72.93~14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] linux-meta-lts-utopic 3.16.0.72.63 (Accepted)
linux-meta-lts-utopic (3.16.0.72.63) trusty; urgency=medium * linux ABI 3.16.0-72 Date: 2016-05-11 19:44:14.633844+00:00 Changed-By: Kamal MostafaSigned-By: Chris J Arges https://launchpad.net/ubuntu/+source/linux-meta-lts-utopic/3.16.0.72.63 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] linux 3.13.0-87.132 (Accepted)
linux (3.13.0-87.132) trusty; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1582398 [ Kamal Mostafa ] * [Config] Drop ozwpan from the ABI [ Luis Henriques ] * [Config] CONFIG_USB_WPAN_HCD=n - LP: #1463740 - CVE-2015-4004 [ Prarit Bhargava ] * SAUCE: (no-up) ACPICA: Dispatcher: Update thread ID for recursive method calls - LP: #1577898 [ Upstream Kernel Changes ] * usbnet: cleanup after bind() in probe() - LP: #1567191 - CVE-2016-3951 * KVM: x86: bit-ops emulation ignores offset on 64-bit - LP: #1423672 * USB: usbip: fix potential out-of-bounds write - LP: #1572666 - CVE-2016-3955 * x86/mm/32: Enable full randomization on i386 and X86_32 - LP: #1568523 - CVE-2016-3672 * Input: gtco - fix crash on detecting device without endpoints - LP: #1575706 - CVE-2016-2187 * atl2: Disable unimplemented scatter/gather feature - LP: #1561403 - CVE-2016-2117 * ALSA: usb-audio: Skip volume controls triggers hangup on Dell USB Dock - LP: #1577905 * fs/pnode.c: treat zero mnt_group_id-s as unequal - LP: #1572316 * propogate_mnt: Handle the first propogated copy being a slave - LP: #1572316 * drm: Balance error path for GEM handle allocation - LP: #1579610 * x86/mm: Add barriers and document switch_mm()-vs-flush synchronization - LP: #1538429 - CVE-2016-2069 * x86/mm: Improve switch_mm() barrier comments - LP: #1538429 - CVE-2016-2069 * net: fix infoleak in llc - LP: #1578496 - CVE-2016-4485 * net: fix infoleak in rtnetlink - LP: #1578497 - CVE-2016-4486 Date: 2016-05-16 20:47:15.377148+00:00 Changed-By: Kamal MostafaSigned-By: Chris J Arges https://launchpad.net/ubuntu/+source/linux/3.13.0-87.132 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] linux-meta 3.13.0.87.93 (Accepted)
linux-meta (3.13.0.87.93) trusty; urgency=medium * linux ABI 3.13.0-87 Date: 2016-05-11 19:27:19.642552+00:00 Changed-By: Kamal MostafaSigned-By: Chris J Arges https://launchpad.net/ubuntu/+source/linux-meta/3.13.0.87.93 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] linux-signed 3.13.0-87.132 (Accepted)
linux-signed (3.13.0-87.132) trusty; urgency=medium * Version 3.13.0-87.132 Date: 2016-05-16 20:47:57.990608+00:00 Changed-By: Kamal MostafaSigned-By: Chris J Arges https://launchpad.net/ubuntu/+source/linux-signed/3.13.0-87.132 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-security] chromium-browser 50.0.2661.102-0ubuntu0.14.04.1.1117 (Accepted)
chromium-browser (50.0.2661.102-0ubuntu0.14.04.1.1117) trusty-security; urgency=medium * Upstream release 50.0.2661.102: - CVE-2016-1667: Same origin bypass in DOM. - CVE-2016-1668: Same origin bypass in Blink V8 bindings. - CVE-2016-1669: Buffer overflow in V8. - CVE-2016-1670: Race condition in loader. - CVE-2016-1671: Directory traversal using the file scheme on Android. * Upstream release 50.0.2661.94: - CVE-2016-1660: Out-of-bounds write in Blink. - CVE-2016-1661: Memory corruption in cross-process frames. - CVE-2016-1662: Use-after-free in extensions. - CVE-2016-1663: Use-after-free in Blink’s V8 bindings. - CVE-2016-1664: Address bar spoofing. - CVE-2016-1665: Information leak in V8. - CVE-2016-1666: Various fixes from internal audits, fuzzing and other initiatives. * Upstream release 50.0.2661.75: - CVE-2016-1652: Universal XSS in extension bindings. - CVE-2016-1653: Out-of-bounds write in V8. - CVE-2016-1651: Out-of-bounds read in Pdfium JPEG2000 decoding. - CVE-2016-1654: Uninitialized memory read in media. - CVE-2016-1655: Use-after-free related to extensions. - CVE-2016-1656: Android downloaded file path restriction bypass. - CVE-2016-1657: Address bar spoofing. - CVE-2016-1658: Potential leak of sensitive information to malicious extensions. - CVE-2015-1659: Various fixes from internal audits, fuzzing and other initiatives. * debian/patches/seccomp-allow-set-robust-list: pass through syscall set_robust_list. glibc nptl thread creation uses it. * debian/rules: use new libsecret way of contacting keyring. * debian/patches/blink-platform-export-class: avoid Trusty bug where WebKit Platform class vtable not found at link time. * debian/apport/chromium-browser.py: Handle case when crash and no chromium directory exists. Still report errors in apport. Date: 2016-05-13 16:44:23.672055+00:00 Changed-By: Chad MillerSigned-By: Chris Coulson https://launchpad.net/ubuntu/+source/chromium-browser/50.0.2661.102-0ubuntu0.14.04.1.1117 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-security] oxide-qt 1.14.9-0ubuntu0.14.04.1 (Accepted)
oxide-qt (1.14.9-0ubuntu0.14.04.1) trusty-security; urgency=medium * Update to v1.14.9 (see USN-2960-1) - Bump Chromium rev to 50.0.2661.102 - Scale the locationbar height when the screen changes - Fix LP: #1575216 - Ensure we resize / rescale the webview compositor viewport when the screen is updated Date: 2016-05-13 18:57:59.963799+00:00 Changed-By: Chris Coulsonhttps://launchpad.net/ubuntu/+source/oxide-qt/1.14.9-0ubuntu0.14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] expat 2.1.0-4ubuntu1.2 (Accepted)
expat (2.1.0-4ubuntu1.2) trusty-security; urgency=medium * SECURITY UPDATE: denial of service and possible code execution via malformed documents - debian/patches/CVE-2016-0718.patch: fix out of bounds memory access and integer overflow in lib/xmlparse.c, lib/xmltok.c, lib/xmltok.h, lib/xmltok_impl.c. - CVE-2016-0718 * SECURITY UPDATE: integer overflows in XML_GetBuffer - debian/patches/CVE-2015-1283-refix.patch: improved existing fix in lib/xmlparse.c. - CVE-2015-1283 Date: 2016-05-16 16:59:17.344393+00:00 Changed-By: Marc DeslauriersSigned-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/expat/2.1.0-4ubuntu1.2 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-security] expat 2.1.0-4ubuntu1.2 (Accepted)
expat (2.1.0-4ubuntu1.2) trusty-security; urgency=medium * SECURITY UPDATE: denial of service and possible code execution via malformed documents - debian/patches/CVE-2016-0718.patch: fix out of bounds memory access and integer overflow in lib/xmlparse.c, lib/xmltok.c, lib/xmltok.h, lib/xmltok_impl.c. - CVE-2016-0718 * SECURITY UPDATE: integer overflows in XML_GetBuffer - debian/patches/CVE-2015-1283-refix.patch: improved existing fix in lib/xmlparse.c. - CVE-2015-1283 Date: 2016-05-16 16:59:17.344393+00:00 Changed-By: Marc Deslauriershttps://launchpad.net/ubuntu/+source/expat/2.1.0-4ubuntu1.2 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] maas 1.7.6+bzr3376-0ubuntu3~14.04.1 (Accepted)
maas (1.7.6+bzr3376-0ubuntu3~14.04.1) trusty-proposed; urgency=medium * debian/patches/lp1573046.patch: No longer use distro-info --lts to detect the commissioning release, as it returns 'xenial' for LTS. MAAS 1.7 only supports trusty. (LP: #1573046) Date: 2016-05-09 20:41:10.619396+00:00 Changed-By: Andres RodriguezSigned-By: Martin Pitt https://launchpad.net/ubuntu/+source/maas/1.7.6+bzr3376-0ubuntu3~14.04.1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] compiz 1:0.9.11.3+14.04.20160425-0ubuntu1 (Accepted)
compiz (1:0.9.11.3+14.04.20160425-0ubuntu1) trusty; urgency=medium [ Eleni Maria Stea ] * backported fix: #1442728 (Chrome and Chromium windows must be handled by Compiz in fullscreen) to trusty. (LP: #1442728) Date: 2016-04-25 16:31:13.035940+00:00 Changed-By: Marco Trevisan (Treviño)Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/compiz/1:0.9.11.3+14.04.20160425-0ubuntu1 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] apt 1.0.1ubuntu2.14 (Accepted)
apt (1.0.1ubuntu2.14) trusty; urgency=medium * When using the https transport mechanism, $no_proxy is ignored if apt is getting it's proxy information from $https_proxy (as opposed to Acquire::https::Proxy somewhere in apt config). If the source of proxy information is Acquire::https::Proxy set in apt.conf (or apt.conf.d), then $no_proxy is honored. This patch makes the behavior similar for both methods of setting the proxy. (LP: #1575877) Date: Tue, 17 May 2016 13:45:06 -0700 Changed-By: Patrick CableMaintainer: Ubuntu Developers Signed-By: Brian Murray https://launchpad.net/ubuntu/+source/apt/1.0.1ubuntu2.14 Format: 1.8 Date: Tue, 17 May 2016 13:45:06 -0700 Source: apt Binary: apt libapt-pkg4.12 libapt-inst1.5 apt-doc libapt-pkg-dev libapt-pkg-doc apt-utils apt-transport-https Architecture: source Version: 1.0.1ubuntu2.14 Distribution: trusty Urgency: medium Maintainer: Ubuntu Developers Changed-By: Patrick Cable Description: apt- commandline package manager apt-doc- documentation for APT apt-transport-https - https download transport for APT apt-utils - package management related utility programs libapt-inst1.5 - deb package format runtime library libapt-pkg-dev - development files for APT's libapt-pkg and libapt-inst libapt-pkg-doc - documentation for APT development libapt-pkg4.12 - package management runtime library Launchpad-Bugs-Fixed: 1575877 Changes: apt (1.0.1ubuntu2.14) trusty; urgency=medium . * When using the https transport mechanism, $no_proxy is ignored if apt is getting it's proxy information from $https_proxy (as opposed to Acquire::https::Proxy somewhere in apt config). If the source of proxy information is Acquire::https::Proxy set in apt.conf (or apt.conf.d), then $no_proxy is honored. This patch makes the behavior similar for both methods of setting the proxy. (LP: #1575877) Checksums-Sha1: 02b26950f022771ff41d55b68493d05185d2f87f 1821 apt_1.0.1ubuntu2.14.dsc 8a9833b925df591a50debf0b6d15b3178552c436 1792384 apt_1.0.1ubuntu2.14.tar.xz Checksums-Sha256: c188b969225970570dedb568bf3b121866c822307d1d5dabbc50834258cbc1af 1821 apt_1.0.1ubuntu2.14.dsc ad1a662b0aa9a6a8bd2776bcc2b2724a9ce2cb55e38fea2c700e1237be2481c3 1792384 apt_1.0.1ubuntu2.14.tar.xz Files: 05de8bfe27dd54f9246c061d173f752e 1821 admin important apt_1.0.1ubuntu2.14.dsc b674c0134c50b9fa3554c66b7db10165 1792384 admin important apt_1.0.1ubuntu2.14.tar.xz Original-Maintainer: APT Development Team -- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] thermald 1.4.3-5~14.04.4 (Accepted)
thermald (1.4.3-5~14.04.4) trusty; urgency=medium * csys_fs::write: return -errno on write failure (LP: #1543046) - this detection helps previous fixes to stop BIOS message spamming thermald (1.4.3-5~14.04.3) trusty; urgency=medium * Initialise bios_locked; may lead to random behaviour (LP: #1547594) - bios_locked should be initialised to false so that RAPL is enabled by default. * thd_cdev_rapl: stop writing to sysfs if the write fails (LP: #1543046) Date: Mon, 25 Apr 2016 09:02:11 +0100 Changed-By: Colin Kinghttps://launchpad.net/ubuntu/+source/thermald/1.4.3-5~14.04.4 Format: 1.8 Date: Mon, 25 Apr 2016 09:02:11 +0100 Source: thermald Binary: thermald Architecture: source Version: 1.4.3-5~14.04.4 Distribution: trusty Urgency: medium Maintainer: Colin King Changed-By: Colin King Description: thermald - Thermal monitoring and controlling daemon Launchpad-Bugs-Fixed: 1543046 1547594 Changes: thermald (1.4.3-5~14.04.4) trusty; urgency=medium . * csys_fs::write: return -errno on write failure (LP: #1543046) - this detection helps previous fixes to stop BIOS message spamming . thermald (1.4.3-5~14.04.3) trusty; urgency=medium . * Initialise bios_locked; may lead to random behaviour (LP: #1547594) - bios_locked should be initialised to false so that RAPL is enabled by default. * thd_cdev_rapl: stop writing to sysfs if the write fails (LP: #1543046) Checksums-Sha1: 58c7f461bac8dacc5df26a9420da4eb6042cb501 1865 thermald_1.4.3-5~14.04.4.dsc d408d1070fc0c91800c564e028cf850a1fe8cf76 20304 thermald_1.4.3-5~14.04.4.debian.tar.xz Checksums-Sha256: f45505ab48cffb056364b666b967c097e9b5ca1105bc7390d537266d952400e5 1865 thermald_1.4.3-5~14.04.4.dsc ceeb3a3998a502924fdb4b843321fe76b0aab3e9858d888e703d20b25656de3d 20304 thermald_1.4.3-5~14.04.4.debian.tar.xz Files: bacb29a12f323c6dd9152a7e0192a650 1865 admin optional thermald_1.4.3-5~14.04.4.dsc 9655a0329345c63b19e49391b78c3487 20304 admin optional thermald_1.4.3-5~14.04.4.debian.tar.xz -- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] lsb 4.1+Debian11ubuntu6.2 (Accepted)
lsb (4.1+Debian11ubuntu6.2) trusty; urgency=medium * 01-upstart-lsb: when diverting an init script to an upstart job, we can't directly map the 'status' subcommand to /sbin/status because the return value of the latter is always 0 if we communicated successfully with upstart. Instead, parse the output of the command to correctly map this to the LSB return codes. LP: #1582813. Date: Tue, 17 May 2016 17:07:10 -0700 Changed-By: Steve LangasekMaintainer: Ubuntu Developers https://launchpad.net/ubuntu/+source/lsb/4.1+Debian11ubuntu6.2 Format: 1.8 Date: Tue, 17 May 2016 17:07:10 -0700 Source: lsb Binary: lsb-core lsb-graphics lsb-cxx lsb-desktop lsb-languages lsb-multimedia lsb-printing lsb-security lsb lsb-base lsb-release lsb-invalid-mta Architecture: source Version: 4.1+Debian11ubuntu6.2 Distribution: trusty Urgency: medium Maintainer: Ubuntu Developers Changed-By: Steve Langasek Description: lsb- Linux Standard Base 4.1 support package lsb-base - Linux Standard Base 4.1 init script functionality lsb-core - Linux Standard Base 4.1 core support package lsb-cxx- Linux Standard Base 4.1 C++ support package lsb-desktop - Linux Standard Base 4.1 Desktop support package lsb-graphics - Linux Standard Base 4.1 graphics support package lsb-invalid-mta - Linux Standard Base sendmail dummy lsb-languages - Linux Standard Base 4.1 Runtime Languages package lsb-multimedia - Linux Standard Base 4.1 Multimedia package lsb-printing - Linux Standard Base 4.1 Printing package lsb-release - Linux Standard Base version reporting utility lsb-security - Linux Standard Base 4.1 Security package Launchpad-Bugs-Fixed: 1582813 Changes: lsb (4.1+Debian11ubuntu6.2) trusty; urgency=medium . * 01-upstart-lsb: when diverting an init script to an upstart job, we can't directly map the 'status' subcommand to /sbin/status because the return value of the latter is always 0 if we communicated successfully with upstart. Instead, parse the output of the command to correctly map this to the LSB return codes. LP: #1582813. Checksums-Sha1: 53ba6862cc5fe1724f53fc8085062ebc36845daf 2431 lsb_4.1+Debian11ubuntu6.2.dsc 0f64b5b13ccd15d0a61c439e8b976383c9f8e656 66156 lsb_4.1+Debian11ubuntu6.2.tar.xz Checksums-Sha256: d5d317e5d5af01cb0e833fe517c38594cba0a4f6585f9d92beac54445e8598ad 2431 lsb_4.1+Debian11ubuntu6.2.dsc 14eac458299596fd70cde7bb696c1ae9f34df5277491de23d13868489fb4bcb6 66156 lsb_4.1+Debian11ubuntu6.2.tar.xz Files: 535cf784978662c06967a4486f21875a 2431 misc extra lsb_4.1+Debian11ubuntu6.2.dsc 8598bba6cf3d87635a7754ff04f528c1 66156 misc extra lsb_4.1+Debian11ubuntu6.2.tar.xz Original-Maintainer: Debian LSB Team -- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] apport 2.14.1-0ubuntu3.21 (Accepted)
apport (2.14.1-0ubuntu3.21) trusty-proposed; urgency=medium * apport-bug: Stop checking the autoreport flag and calling whoopsie-upload-all; these two are different tasks, and that breaks bug reporting. (LP: #1339663) Date: Mon, 16 May 2016 13:24:02 -0700 Changed-By: Brian MurrayMaintainer: Martin Pitt https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.21 Format: 1.8 Date: Mon, 16 May 2016 13:24:02 -0700 Source: apport Binary: apport python-problem-report python3-problem-report python-apport python3-apport apport-retrace apport-valgrind apport-gtk apport-kde dh-apport apport-noui Architecture: source Version: 2.14.1-0ubuntu3.21 Distribution: trusty-proposed Urgency: medium Maintainer: Martin Pitt Changed-By: Brian Murray Description: apport - automatically generate crash reports for debugging apport-gtk - GTK+ frontend for the apport crash report system apport-kde - KDE frontend for the apport crash report system apport-noui - tools for automatically reporting Apport crash reports apport-retrace - tools for reprocessing Apport crash reports apport-valgrind - valgrind wrapper that first downloads debug symbols dh-apport - debhelper extension for the apport crash report system python-apport - Python library for Apport crash report handling python-problem-report - Python library to handle problem reports python3-apport - Python 3 library for Apport crash report handling python3-problem-report - Python 3 library to handle problem reports Launchpad-Bugs-Fixed: 1339663 Changes: apport (2.14.1-0ubuntu3.21) trusty-proposed; urgency=medium . * apport-bug: Stop checking the autoreport flag and calling whoopsie-upload-all; these two are different tasks, and that breaks bug reporting. (LP: #1339663) Checksums-Sha1: 8415e220f4726292b4d171e0a4b3b0427abcd679 2281 apport_2.14.1-0ubuntu3.21.dsc dcc741c92eea4139b9e921b1efde2ed0530a5176 157414 apport_2.14.1-0ubuntu3.21.diff.gz Checksums-Sha256: 7f2e0d94711855c008c140571127906c56f2924e9f91f101aa478b44b304643d 2281 apport_2.14.1-0ubuntu3.21.dsc ce5c1e61e782793e403128c83beda5dcec536ce7327136d5b7a4a9e490fb11f0 157414 apport_2.14.1-0ubuntu3.21.diff.gz Files: c030c44d05836b4055a7560024e8e786 2281 utils optional apport_2.14.1-0ubuntu3.21.dsc ec7233b9fba5d07ab3fb94c1119ea727 157414 utils optional apport_2.14.1-0ubuntu3.21.diff.gz -- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-proposed] gnome-do-plugins 0.8.5-2ubuntu0.1 (Accepted)
gnome-do-plugins (0.8.5-2ubuntu0.1) trusty; urgency=medium * Update Homepage: to not point at spam URL. (LP: #1442873) Date: Tue, 29 Mar 2016 15:42:13 + Changed-By: Joshua BayfieldMaintainer: Ubuntu Developers Signed-By: Michael Terry https://launchpad.net/ubuntu/+source/gnome-do-plugins/0.8.5-2ubuntu0.1 Format: 1.8 Date: Tue, 29 Mar 2016 15:42:13 + Source: gnome-do-plugins Binary: gnome-do-plugins Architecture: source Version: 0.8.5-2ubuntu0.1 Distribution: trusty Urgency: medium Maintainer: Ubuntu Developers Changed-By: Joshua Bayfield Description: gnome-do-plugins - Extra functionality for GNOME Do Launchpad-Bugs-Fixed: 1442873 Changes: gnome-do-plugins (0.8.5-2ubuntu0.1) trusty; urgency=medium . * Update Homepage: to not point at spam URL. (LP: #1442873) Checksums-Sha1: aff6658da59bd68e71ea5cc93145c811d669c4d8 2793 gnome-do-plugins_0.8.5-2ubuntu0.1.dsc 0c28b8aecdffcaa613df397d1a8d04a9f21ce360 11032 gnome-do-plugins_0.8.5-2ubuntu0.1.debian.tar.xz Checksums-Sha256: 36e289ae0b3bebc92fdf7ae531d125ea23d74e4c6f346e630274b00dd9e5eb75 2793 gnome-do-plugins_0.8.5-2ubuntu0.1.dsc 60415d5ed22d9ed4e676c295440c8b9fbc8afa9483cf604cea9b0695f069897b 11032 gnome-do-plugins_0.8.5-2ubuntu0.1.debian.tar.xz Files: be0fa751f40b6549621d2743a8f5b57d 2793 gnome optional gnome-do-plugins_0.8.5-2ubuntu0.1.dsc 9a5fe77628453b91fa15a9e4e55b 11032 gnome optional gnome-do-plugins_0.8.5-2ubuntu0.1.debian.tar.xz Original-Maintainer: Debian CLI Applications Team -- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes
[ubuntu/trusty-updates] apport 2.14.1-0ubuntu3.20 (Accepted)
apport (2.14.1-0ubuntu3.20) trusty-proposed; urgency=medium * Disambiguate overly generic Python exceptions in duplicate signature computation: dbus-glib's DBusException wraps a "real" server-side exception, so add the class of that to disambiguate different crashes; for OSError that is not a known subclass like FileNotFoundError, add the errno. (LP: #989819) Date: 2016-04-01 15:04:10.602233+00:00 Changed-By: Martin Pitthttps://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.20 Sorry, changesfile not available.-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes