[ubuntu/trusty-updates] firefox 46.0.1+build1-0ubuntu0.14.04.3 (Accepted)

2016-05-18 Thread Ubuntu Archive Robot
firefox (46.0.1+build1-0ubuntu0.14.04.3) trusty-security; urgency=medium

  * New upstream stable release (46.0.1build1)
- see USN-2936-2

  * Update debian/config/searchplugins.conf now that ja uses the en-US version
of the Google search plugin

Date: 2016-05-11 22:36:16.994988+00:00
Changed-By: Chris Coulson 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/firefox/46.0.1+build1-0ubuntu0.14.04.3
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] thunderbird 1:38.8.0+build1-0ubuntu0.14.04.1 (Accepted)

2016-05-18 Thread Ubuntu Archive Robot
thunderbird (1:38.8.0+build1-0ubuntu0.14.04.1) trusty-security; urgency=medium

  * New upstream stable release (THUNDERBIRD_38_8_0_BUILD1)
- see USN-2973-1

Date: 2016-05-11 16:17:43.955719+00:00
Changed-By: Chris Coulson 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/thunderbird/1:38.8.0+build1-0ubuntu0.14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] livecd-rootfs 2.208.12 (Accepted)

2016-05-18 Thread Chris J Arges
livecd-rootfs (2.208.12) trusty; urgency=medium

  * Rename old ubuntu-core tarballs to ubuntu-base, for consistency with
the changes already made to yakkety and the ubuntu-cdimage project.
LP: #1579950.

Date: 2016-05-10 00:04:11.300272+00:00
Changed-By: Steve Langasek 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/livecd-rootfs/2.208.12
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] thunderbird 1:38.8.0+build1-0ubuntu0.14.04.1 (Accepted)

2016-05-18 Thread Chris Coulson
thunderbird (1:38.8.0+build1-0ubuntu0.14.04.1) trusty-security; urgency=medium

  * New upstream stable release (THUNDERBIRD_38_8_0_BUILD1)
- see USN-2973-1

Date: 2016-05-11 16:17:43.955719+00:00
Changed-By: Chris Coulson 
https://launchpad.net/ubuntu/+source/thunderbird/1:38.8.0+build1-0ubuntu0.14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] firefox 46.0.1+build1-0ubuntu0.14.04.3 (Accepted)

2016-05-18 Thread Chris Coulson
firefox (46.0.1+build1-0ubuntu0.14.04.3) trusty-security; urgency=medium

  * New upstream stable release (46.0.1build1)
- see USN-2936-2

  * Update debian/config/searchplugins.conf now that ja uses the en-US version
of the Google search plugin

Date: 2016-05-11 22:36:16.994988+00:00
Changed-By: Chris Coulson 
https://launchpad.net/ubuntu/+source/firefox/46.0.1+build1-0ubuntu0.14.04.3
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] linux-lts-utopic_3.16.0-72.93~14.04.1_amd64.tar.gz - (Accepted)

2016-05-18 Thread Kamal Mostafa
linux-lts-utopic (3.16.0-72.93~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1582411

  [ Kamal Mostafa ]

  * [Packaging] update-from-xxx-master: pull from git.launchpad.net
  * [Packaging] update-from-xxx-master: update from master-next
  * [Config] Drop ozwpan from the ABI

  [ Luis Henriques ]

  * [Config] CONFIG_USB_WPAN_HCD=n
- LP: #1463740
- CVE-2015-4004

  [ Prarit Bhargava ]

  * SAUCE: (no-up) ACPICA: Dispatcher: Update thread ID for recursive
method calls
- LP: #1577898

  [ Upstream Kernel Changes ]

  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951
  * KVM: x86: bit-ops emulation ignores offset on 64-bit
- LP: #1423672
  * USB: usbip: fix potential out-of-bounds write
- LP: #1572666
- CVE-2016-3955
  * x86/mm/32: Enable full randomization on i386 and X86_32
- LP: #1568523
- CVE-2016-3672
  * Input: gtco - fix crash on detecting device without endpoints
- LP: #1575706
- CVE-2016-2187
  * atl2: Disable unimplemented scatter/gather feature
- LP: #1561403
- CVE-2016-2117
  * ALSA: usb-audio: Skip volume controls triggers hangup on Dell USB Dock
- LP: #1577905
  * PNP: Add Broadwell to Intel MCH size workaround
- LP: #1577748
  * PNP: Add Haswell-ULT to Intel MCH size workaround
- LP: #1577748
  * fs/pnode.c: treat zero mnt_group_id-s as unequal
- LP: #1572316
  * propogate_mnt: Handle the first propogated copy being a slave
- LP: #1572316
  * USB: mct_u232: add sanity checking in probe
- LP: #1556877
- CVE-2016-3136
  * USB: cypress_m8: add endpoint sanity check
- LP: #1556878
- CVE-2016-3137
  * USB: digi_acceleport: do sanity checking for the number of ports
- LP: #1556888
- CVE-2016-3140
  * Input: ims-pcu - sanity check against missing interfaces
- LP: #1566581
- CVE-2016-3689
  * drm: Balance error path for GEM handle allocation
- LP: #1579610
  * net: fix infoleak in llc
- LP: #1578496
- CVE-2016-4485
  * net: fix infoleak in rtnetlink
- LP: #1578497
- CVE-2016-4486

Date: Mon, 16 May 2016 14:10:36 -0700
Changed-By: Kamal Mostafa 
Maintainer: Launchpad Build Daemon 

Format: 1.8
Date: Mon, 16 May 2016 14:10:36 -0700
Source: linux-lts-utopic
Binary: linux-headers-3.16.0-72 linux-lts-utopic-tools-3.16.0-72 
linux-lts-utopic-cloud-tools-3.16.0-72 linux-image-3.16.0-72-generic 
linux-image-extra-3.16.0-72-generic linux-headers-3.16.0-72-generic 
linux-image-3.16.0-72-generic-dbgsym linux-tools-3.16.0-72-generic 
linux-cloud-tools-3.16.0-72-generic linux-lts-utopic-udebs-generic 
linux-image-3.16.0-72-generic-lpae linux-image-extra-3.16.0-72-generic-lpae 
linux-headers-3.16.0-72-generic-lpae linux-image-3.16.0-72-generic-lpae-dbgsym 
linux-tools-3.16.0-72-generic-lpae linux-cloud-tools-3.16.0-72-generic-lpae 
linux-lts-utopic-udebs-generic-lpae linux-image-3.16.0-72-lowlatency 
linux-image-extra-3.16.0-72-lowlatency linux-headers-3.16.0-72-lowlatency 
linux-image-3.16.0-72-lowlatency-dbgsym linux-tools-3.16.0-72-lowlatency 
linux-cloud-tools-3.16.0-72-lowlatency linux-lts-utopic-udebs-lowlatency 
linux-image-3.16.0-72-powerpc-e500mc linux-image-extra-3.16.0-72-powerpc-e500mc 
linux-headers-3.16.0-72-powerpc-e500mc
 linux-image-3.16.0-72-powerpc-e500mc-dbgsym 
linux-tools-3.16.0-72-powerpc-e500mc linux-cloud-tools-3.16.0-72-powerpc-e500mc 
linux-lts-utopic-udebs-powerpc-e500mc linux-image-3.16.0-72-powerpc-smp 
linux-image-extra-3.16.0-72-powerpc-smp linux-headers-3.16.0-72-powerpc-smp 
linux-image-3.16.0-72-powerpc-smp-dbgsym linux-tools-3.16.0-72-powerpc-smp 
linux-cloud-tools-3.16.0-72-powerpc-smp linux-lts-utopic-udebs-powerpc-smp 
linux-image-3.16.0-72-powerpc64-emb linux-image-extra-3.16.0-72-powerpc64-emb 
linux-headers-3.16.0-72-powerpc64-emb 
linux-image-3.16.0-72-powerpc64-emb-dbgsym linux-tools-3.16.0-72-powerpc64-emb 
linux-cloud-tools-3.16.0-72-powerpc64-emb linux-lts-utopic-udebs-powerpc64-emb 
linux-image-3.16.0-72-powerpc64-smp linux-image-extra-3.16.0-72-powerpc64-smp 
linux-headers-3.16.0-72-powerpc64-smp 
linux-image-3.16.0-72-powerpc64-smp-dbgsym linux-tools-3.16.0-72-powerpc64-smp 
linux-cloud-tools-3.16.0-72-powerpc64-smp linux-lts-utopic-udebs-powerpc64-smp
 kernel-image-3.16.0-72-generic-di nic-modules-3.16.0-72-generic-di 
nic-shared-modules-3.16.0-72-generic-di serial-modules-3.16.0-72-generic-di 
ppp-modules-3.16.0-72-generic-di pata-modules-3.16.0-72-generic-di 
firewire-core-modules-3.16.0-72-generic-di scsi-modules-3.16.0-72-generic-di 
plip-modules-3.16.0-72-generic-di floppy-modules-3.16.0-72-generic-di 
fat-modules-3.16.0-72-generic-di nfs-modules-3.16.0-72-generic-di 
md-modules-3.16.0-72-generic-di multipath-modules-3.16.0-72-generic-di 
usb-modules-3.16.0-72-generic-di pcmcia-storage-modules-3.16.0-72-generic-di 
fb-modules-3.16.0-72-generic-di input-modules-3.16.0-72-generic-di 
mouse-modules-3.16.0-72-generic-di 

[ubuntu/trusty-updates] oxide-qt 1.14.9-0ubuntu0.14.04.1 (Accepted)

2016-05-18 Thread Ubuntu Archive Robot
oxide-qt (1.14.9-0ubuntu0.14.04.1) trusty-security; urgency=medium

  * Update to v1.14.9 (see USN-2960-1)
- Bump Chromium rev to 50.0.2661.102
- Scale the locationbar height when the screen changes
- Fix LP: #1575216 - Ensure we resize / rescale the webview compositor
  viewport when the screen is updated

Date: 2016-05-13 18:57:59.963799+00:00
Changed-By: Chris Coulson 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/oxide-qt/1.14.9-0ubuntu0.14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] chromium-browser 50.0.2661.102-0ubuntu0.14.04.1.1117 (Accepted)

2016-05-18 Thread Ubuntu Archive Robot
chromium-browser (50.0.2661.102-0ubuntu0.14.04.1.1117) trusty-security; 
urgency=medium

  * Upstream release 50.0.2661.102:
- CVE-2016-1667: Same origin bypass in DOM.
- CVE-2016-1668: Same origin bypass in Blink V8 bindings.
- CVE-2016-1669: Buffer overflow in V8.
- CVE-2016-1670: Race condition in loader.
- CVE-2016-1671: Directory traversal using the file scheme on Android.
  * Upstream release 50.0.2661.94:
- CVE-2016-1660: Out-of-bounds write in Blink.
- CVE-2016-1661: Memory corruption in cross-process frames.
- CVE-2016-1662: Use-after-free in extensions.
- CVE-2016-1663: Use-after-free in Blink’s V8 bindings.
- CVE-2016-1664: Address bar spoofing.
- CVE-2016-1665: Information leak in V8.
- CVE-2016-1666: Various fixes from internal audits, fuzzing and other
  initiatives.
  * Upstream release 50.0.2661.75:
- CVE-2016-1652: Universal XSS in extension bindings.
- CVE-2016-1653: Out-of-bounds write in V8.
- CVE-2016-1651: Out-of-bounds read in Pdfium JPEG2000 decoding.
- CVE-2016-1654: Uninitialized memory read in media.
- CVE-2016-1655: Use-after-free related to extensions.
- CVE-2016-1656: Android downloaded file path restriction bypass.
- CVE-2016-1657: Address bar spoofing.
- CVE-2016-1658: Potential leak of sensitive information to malicious
  extensions.
- CVE-2015-1659: Various fixes from internal audits, fuzzing and other
  initiatives.
  * debian/patches/seccomp-allow-set-robust-list: pass through syscall
set_robust_list. glibc nptl thread creation uses it.
  * debian/rules: use new libsecret way of contacting keyring.
  * debian/patches/blink-platform-export-class: avoid Trusty bug where
WebKit Platform class vtable not found at link time.
  * debian/apport/chromium-browser.py: Handle case when crash and no
chromium directory exists. Still report errors in apport.

Date: 2016-05-13 16:44:23.672055+00:00
Changed-By: Chad Miller 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/chromium-browser/50.0.2661.102-0ubuntu0.14.04.1.1117
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] linux_3.13.0-87.132_amd64.tar.gz - (Accepted)

2016-05-18 Thread Kamal Mostafa
linux (3.13.0-87.132) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1582398

  [ Kamal Mostafa ]

  * [Config] Drop ozwpan from the ABI

  [ Luis Henriques ]

  * [Config] CONFIG_USB_WPAN_HCD=n
- LP: #1463740
- CVE-2015-4004

  [ Prarit Bhargava ]

  * SAUCE: (no-up) ACPICA: Dispatcher: Update thread ID for recursive
method calls
- LP: #1577898

  [ Upstream Kernel Changes ]

  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951
  * KVM: x86: bit-ops emulation ignores offset on 64-bit
- LP: #1423672
  * USB: usbip: fix potential out-of-bounds write
- LP: #1572666
- CVE-2016-3955
  * x86/mm/32: Enable full randomization on i386 and X86_32
- LP: #1568523
- CVE-2016-3672
  * Input: gtco - fix crash on detecting device without endpoints
- LP: #1575706
- CVE-2016-2187
  * atl2: Disable unimplemented scatter/gather feature
- LP: #1561403
- CVE-2016-2117
  * ALSA: usb-audio: Skip volume controls triggers hangup on Dell USB Dock
- LP: #1577905
  * fs/pnode.c: treat zero mnt_group_id-s as unequal
- LP: #1572316
  * propogate_mnt: Handle the first propogated copy being a slave
- LP: #1572316
  * drm: Balance error path for GEM handle allocation
- LP: #1579610
  * x86/mm: Add barriers and document switch_mm()-vs-flush synchronization
- LP: #1538429
- CVE-2016-2069
  * x86/mm: Improve switch_mm() barrier comments
- LP: #1538429
- CVE-2016-2069
  * net: fix infoleak in llc
- LP: #1578496
- CVE-2016-4485
  * net: fix infoleak in rtnetlink
- LP: #1578497
- CVE-2016-4486

Date: Mon, 16 May 2016 13:28:38 -0700
Changed-By: Kamal Mostafa 
Maintainer: Launchpad Build Daemon 

Format: 1.8
Date: Mon, 16 May 2016 13:28:38 -0700
Source: linux
Binary: linux-source-3.13.0 linux-doc linux-headers-3.13.0-87 linux-libc-dev 
linux-tools-common linux-tools-3.13.0-87 linux-cloud-tools-common 
linux-cloud-tools-3.13.0-87 linux-image-3.13.0-87-generic 
linux-image-extra-3.13.0-87-generic linux-headers-3.13.0-87-generic 
linux-image-3.13.0-87-generic-dbgsym linux-tools-3.13.0-87-generic 
linux-cloud-tools-3.13.0-87-generic linux-udebs-generic 
linux-image-3.13.0-87-generic-lpae linux-image-extra-3.13.0-87-generic-lpae 
linux-headers-3.13.0-87-generic-lpae linux-image-3.13.0-87-generic-lpae-dbgsym 
linux-tools-3.13.0-87-generic-lpae linux-cloud-tools-3.13.0-87-generic-lpae 
linux-udebs-generic-lpae linux-image-3.13.0-87-lowlatency 
linux-image-extra-3.13.0-87-lowlatency linux-headers-3.13.0-87-lowlatency 
linux-image-3.13.0-87-lowlatency-dbgsym linux-tools-3.13.0-87-lowlatency 
linux-cloud-tools-3.13.0-87-lowlatency linux-udebs-lowlatency 
linux-image-3.13.0-87-powerpc-e500 linux-image-extra-3.13.0-87-powerpc-e500
 linux-headers-3.13.0-87-powerpc-e500 linux-image-3.13.0-87-powerpc-e500-dbgsym 
linux-tools-3.13.0-87-powerpc-e500 linux-cloud-tools-3.13.0-87-powerpc-e500 
linux-udebs-powerpc-e500 linux-image-3.13.0-87-powerpc-e500mc 
linux-image-extra-3.13.0-87-powerpc-e500mc 
linux-headers-3.13.0-87-powerpc-e500mc 
linux-image-3.13.0-87-powerpc-e500mc-dbgsym 
linux-tools-3.13.0-87-powerpc-e500mc linux-cloud-tools-3.13.0-87-powerpc-e500mc 
linux-udebs-powerpc-e500mc linux-image-3.13.0-87-powerpc-smp 
linux-image-extra-3.13.0-87-powerpc-smp linux-headers-3.13.0-87-powerpc-smp 
linux-image-3.13.0-87-powerpc-smp-dbgsym linux-tools-3.13.0-87-powerpc-smp 
linux-cloud-tools-3.13.0-87-powerpc-smp linux-udebs-powerpc-smp 
linux-image-3.13.0-87-powerpc64-emb linux-image-extra-3.13.0-87-powerpc64-emb 
linux-headers-3.13.0-87-powerpc64-emb 
linux-image-3.13.0-87-powerpc64-emb-dbgsym linux-tools-3.13.0-87-powerpc64-emb 
linux-cloud-tools-3.13.0-87-powerpc64-emb linux-udebs-powerpc64-emb
 linux-image-3.13.0-87-powerpc64-smp linux-image-extra-3.13.0-87-powerpc64-smp 
linux-headers-3.13.0-87-powerpc64-smp 
linux-image-3.13.0-87-powerpc64-smp-dbgsym linux-tools-3.13.0-87-powerpc64-smp 
linux-cloud-tools-3.13.0-87-powerpc64-smp linux-udebs-powerpc64-smp 
kernel-image-3.13.0-87-generic-di nic-modules-3.13.0-87-generic-di 
nic-shared-modules-3.13.0-87-generic-di serial-modules-3.13.0-87-generic-di 
ppp-modules-3.13.0-87-generic-di pata-modules-3.13.0-87-generic-di 
firewire-core-modules-3.13.0-87-generic-di scsi-modules-3.13.0-87-generic-di 
plip-modules-3.13.0-87-generic-di floppy-modules-3.13.0-87-generic-di 
fat-modules-3.13.0-87-generic-di nfs-modules-3.13.0-87-generic-di 
md-modules-3.13.0-87-generic-di multipath-modules-3.13.0-87-generic-di 
usb-modules-3.13.0-87-generic-di pcmcia-storage-modules-3.13.0-87-generic-di 
fb-modules-3.13.0-87-generic-di input-modules-3.13.0-87-generic-di 
mouse-modules-3.13.0-87-generic-di irda-modules-3.13.0-87-generic-di
 parport-modules-3.13.0-87-generic-di nic-pcmcia-modules-3.13.0-87-generic-di 
pcmcia-modules-3.13.0-87-generic-di nic-usb-modules-3.13.0-87-generic-di 
sata-modules-3.13.0-87-generic-di 

[ubuntu/trusty-proposed] linux-signed-lts-utopic 3.16.0-72.93~14.04.1 (Accepted)

2016-05-18 Thread Chris J Arges
linux-signed-lts-utopic (3.16.0-72.93~14.04.1) trusty; urgency=medium

  * Master Version 3.16.0-72.93~14.04.1

Date: 2016-05-16 21:24:53.201134+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-signed-lts-utopic/3.16.0-72.93~14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] linux-lts-utopic 3.16.0-72.93~14.04.1 (Accepted)

2016-05-18 Thread Chris J Arges
linux-lts-utopic (3.16.0-72.93~14.04.1) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1582411

  [ Kamal Mostafa ]

  * [Packaging] update-from-xxx-master: pull from git.launchpad.net
  * [Packaging] update-from-xxx-master: update from master-next
  * [Config] Drop ozwpan from the ABI

  [ Luis Henriques ]

  * [Config] CONFIG_USB_WPAN_HCD=n
- LP: #1463740
- CVE-2015-4004

  [ Prarit Bhargava ]

  * SAUCE: (no-up) ACPICA: Dispatcher: Update thread ID for recursive
method calls
- LP: #1577898

  [ Upstream Kernel Changes ]

  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951
  * KVM: x86: bit-ops emulation ignores offset on 64-bit
- LP: #1423672
  * USB: usbip: fix potential out-of-bounds write
- LP: #1572666
- CVE-2016-3955
  * x86/mm/32: Enable full randomization on i386 and X86_32
- LP: #1568523
- CVE-2016-3672
  * Input: gtco - fix crash on detecting device without endpoints
- LP: #1575706
- CVE-2016-2187
  * atl2: Disable unimplemented scatter/gather feature
- LP: #1561403
- CVE-2016-2117
  * ALSA: usb-audio: Skip volume controls triggers hangup on Dell USB Dock
- LP: #1577905
  * PNP: Add Broadwell to Intel MCH size workaround
- LP: #1577748
  * PNP: Add Haswell-ULT to Intel MCH size workaround
- LP: #1577748
  * fs/pnode.c: treat zero mnt_group_id-s as unequal
- LP: #1572316
  * propogate_mnt: Handle the first propogated copy being a slave
- LP: #1572316
  * USB: mct_u232: add sanity checking in probe
- LP: #1556877
- CVE-2016-3136
  * USB: cypress_m8: add endpoint sanity check
- LP: #1556878
- CVE-2016-3137
  * USB: digi_acceleport: do sanity checking for the number of ports
- LP: #1556888
- CVE-2016-3140
  * Input: ims-pcu - sanity check against missing interfaces
- LP: #1566581
- CVE-2016-3689
  * drm: Balance error path for GEM handle allocation
- LP: #1579610
  * net: fix infoleak in llc
- LP: #1578496
- CVE-2016-4485
  * net: fix infoleak in rtnetlink
- LP: #1578497
- CVE-2016-4486

Date: 2016-05-16 21:24:13.221026+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-lts-utopic/3.16.0-72.93~14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] linux-meta-lts-utopic 3.16.0.72.63 (Accepted)

2016-05-18 Thread Chris J Arges
linux-meta-lts-utopic (3.16.0.72.63) trusty; urgency=medium

  * linux ABI 3.16.0-72

Date: 2016-05-11 19:44:14.633844+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-meta-lts-utopic/3.16.0.72.63
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] linux 3.13.0-87.132 (Accepted)

2016-05-18 Thread Chris J Arges
linux (3.13.0-87.132) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1582398

  [ Kamal Mostafa ]

  * [Config] Drop ozwpan from the ABI

  [ Luis Henriques ]

  * [Config] CONFIG_USB_WPAN_HCD=n
- LP: #1463740
- CVE-2015-4004

  [ Prarit Bhargava ]

  * SAUCE: (no-up) ACPICA: Dispatcher: Update thread ID for recursive
method calls
- LP: #1577898

  [ Upstream Kernel Changes ]

  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951
  * KVM: x86: bit-ops emulation ignores offset on 64-bit
- LP: #1423672
  * USB: usbip: fix potential out-of-bounds write
- LP: #1572666
- CVE-2016-3955
  * x86/mm/32: Enable full randomization on i386 and X86_32
- LP: #1568523
- CVE-2016-3672
  * Input: gtco - fix crash on detecting device without endpoints
- LP: #1575706
- CVE-2016-2187
  * atl2: Disable unimplemented scatter/gather feature
- LP: #1561403
- CVE-2016-2117
  * ALSA: usb-audio: Skip volume controls triggers hangup on Dell USB Dock
- LP: #1577905
  * fs/pnode.c: treat zero mnt_group_id-s as unequal
- LP: #1572316
  * propogate_mnt: Handle the first propogated copy being a slave
- LP: #1572316
  * drm: Balance error path for GEM handle allocation
- LP: #1579610
  * x86/mm: Add barriers and document switch_mm()-vs-flush synchronization
- LP: #1538429
- CVE-2016-2069
  * x86/mm: Improve switch_mm() barrier comments
- LP: #1538429
- CVE-2016-2069
  * net: fix infoleak in llc
- LP: #1578496
- CVE-2016-4485
  * net: fix infoleak in rtnetlink
- LP: #1578497
- CVE-2016-4486

Date: 2016-05-16 20:47:15.377148+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux/3.13.0-87.132
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] linux-meta 3.13.0.87.93 (Accepted)

2016-05-18 Thread Chris J Arges
linux-meta (3.13.0.87.93) trusty; urgency=medium

  * linux ABI 3.13.0-87

Date: 2016-05-11 19:27:19.642552+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-meta/3.13.0.87.93
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] linux-signed 3.13.0-87.132 (Accepted)

2016-05-18 Thread Chris J Arges
linux-signed (3.13.0-87.132) trusty; urgency=medium

  * Version 3.13.0-87.132

Date: 2016-05-16 20:47:57.990608+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-signed/3.13.0-87.132
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] chromium-browser 50.0.2661.102-0ubuntu0.14.04.1.1117 (Accepted)

2016-05-18 Thread Chris Coulson
chromium-browser (50.0.2661.102-0ubuntu0.14.04.1.1117) trusty-security; 
urgency=medium

  * Upstream release 50.0.2661.102:
- CVE-2016-1667: Same origin bypass in DOM.
- CVE-2016-1668: Same origin bypass in Blink V8 bindings.
- CVE-2016-1669: Buffer overflow in V8.
- CVE-2016-1670: Race condition in loader.
- CVE-2016-1671: Directory traversal using the file scheme on Android.
  * Upstream release 50.0.2661.94:
- CVE-2016-1660: Out-of-bounds write in Blink.
- CVE-2016-1661: Memory corruption in cross-process frames.
- CVE-2016-1662: Use-after-free in extensions.
- CVE-2016-1663: Use-after-free in Blink’s V8 bindings.
- CVE-2016-1664: Address bar spoofing.
- CVE-2016-1665: Information leak in V8.
- CVE-2016-1666: Various fixes from internal audits, fuzzing and other
  initiatives.
  * Upstream release 50.0.2661.75:
- CVE-2016-1652: Universal XSS in extension bindings.
- CVE-2016-1653: Out-of-bounds write in V8.
- CVE-2016-1651: Out-of-bounds read in Pdfium JPEG2000 decoding.
- CVE-2016-1654: Uninitialized memory read in media.
- CVE-2016-1655: Use-after-free related to extensions.
- CVE-2016-1656: Android downloaded file path restriction bypass.
- CVE-2016-1657: Address bar spoofing.
- CVE-2016-1658: Potential leak of sensitive information to malicious
  extensions.
- CVE-2015-1659: Various fixes from internal audits, fuzzing and other
  initiatives.
  * debian/patches/seccomp-allow-set-robust-list: pass through syscall
set_robust_list. glibc nptl thread creation uses it.
  * debian/rules: use new libsecret way of contacting keyring.
  * debian/patches/blink-platform-export-class: avoid Trusty bug where
WebKit Platform class vtable not found at link time.
  * debian/apport/chromium-browser.py: Handle case when crash and no
chromium directory exists. Still report errors in apport.

Date: 2016-05-13 16:44:23.672055+00:00
Changed-By: Chad Miller 
Signed-By: Chris Coulson 
https://launchpad.net/ubuntu/+source/chromium-browser/50.0.2661.102-0ubuntu0.14.04.1.1117
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] oxide-qt 1.14.9-0ubuntu0.14.04.1 (Accepted)

2016-05-18 Thread Chris Coulson
oxide-qt (1.14.9-0ubuntu0.14.04.1) trusty-security; urgency=medium

  * Update to v1.14.9 (see USN-2960-1)
- Bump Chromium rev to 50.0.2661.102
- Scale the locationbar height when the screen changes
- Fix LP: #1575216 - Ensure we resize / rescale the webview compositor
  viewport when the screen is updated

Date: 2016-05-13 18:57:59.963799+00:00
Changed-By: Chris Coulson 
https://launchpad.net/ubuntu/+source/oxide-qt/1.14.9-0ubuntu0.14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] expat 2.1.0-4ubuntu1.2 (Accepted)

2016-05-18 Thread Ubuntu Archive Robot
expat (2.1.0-4ubuntu1.2) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution via
malformed documents
- debian/patches/CVE-2016-0718.patch: fix out of bounds memory access
  and integer overflow in lib/xmlparse.c, lib/xmltok.c, lib/xmltok.h,
  lib/xmltok_impl.c.
- CVE-2016-0718
  * SECURITY UPDATE: integer overflows in XML_GetBuffer
- debian/patches/CVE-2015-1283-refix.patch: improved existing fix in
  lib/xmlparse.c.
- CVE-2015-1283

Date: 2016-05-16 16:59:17.344393+00:00
Changed-By: Marc Deslauriers 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/expat/2.1.0-4ubuntu1.2
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] expat 2.1.0-4ubuntu1.2 (Accepted)

2016-05-18 Thread Marc Deslauriers
expat (2.1.0-4ubuntu1.2) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution via
malformed documents
- debian/patches/CVE-2016-0718.patch: fix out of bounds memory access
  and integer overflow in lib/xmlparse.c, lib/xmltok.c, lib/xmltok.h,
  lib/xmltok_impl.c.
- CVE-2016-0718
  * SECURITY UPDATE: integer overflows in XML_GetBuffer
- debian/patches/CVE-2015-1283-refix.patch: improved existing fix in
  lib/xmlparse.c.
- CVE-2015-1283

Date: 2016-05-16 16:59:17.344393+00:00
Changed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/expat/2.1.0-4ubuntu1.2
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] maas 1.7.6+bzr3376-0ubuntu3~14.04.1 (Accepted)

2016-05-18 Thread Martin Pitt
maas (1.7.6+bzr3376-0ubuntu3~14.04.1) trusty-proposed; urgency=medium

  * debian/patches/lp1573046.patch: No longer use distro-info --lts to
detect the commissioning release, as it returns 'xenial' for LTS.
MAAS 1.7 only supports trusty. (LP: #1573046)

Date: 2016-05-09 20:41:10.619396+00:00
Changed-By: Andres Rodriguez 
Signed-By: Martin Pitt 
https://launchpad.net/ubuntu/+source/maas/1.7.6+bzr3376-0ubuntu3~14.04.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] compiz 1:0.9.11.3+14.04.20160425-0ubuntu1 (Accepted)

2016-05-18 Thread Ken VanDine
compiz (1:0.9.11.3+14.04.20160425-0ubuntu1) trusty; urgency=medium

  [ Eleni Maria Stea ]
  * backported fix: #1442728 (Chrome and Chromium windows must be
handled by Compiz in fullscreen) to trusty. (LP: #1442728)

Date: 2016-04-25 16:31:13.035940+00:00
Changed-By: Marco Trevisan (Treviño) 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/compiz/1:0.9.11.3+14.04.20160425-0ubuntu1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] apt 1.0.1ubuntu2.14 (Accepted)

2016-05-18 Thread Patrick Cable
apt (1.0.1ubuntu2.14) trusty; urgency=medium

  * When using the https transport mechanism, $no_proxy is ignored if apt is
getting it's proxy information from $https_proxy (as opposed to
Acquire::https::Proxy somewhere in apt config). If the source of proxy
information is Acquire::https::Proxy set in apt.conf (or apt.conf.d),
then $no_proxy is honored. This patch makes the behavior similar for
both methods of setting the proxy. (LP: #1575877)

Date: Tue, 17 May 2016 13:45:06 -0700
Changed-By: Patrick Cable 
Maintainer: Ubuntu Developers 
Signed-By: Brian Murray 
https://launchpad.net/ubuntu/+source/apt/1.0.1ubuntu2.14
Format: 1.8
Date: Tue, 17 May 2016 13:45:06 -0700
Source: apt
Binary: apt libapt-pkg4.12 libapt-inst1.5 apt-doc libapt-pkg-dev libapt-pkg-doc 
apt-utils apt-transport-https
Architecture: source
Version: 1.0.1ubuntu2.14
Distribution: trusty
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Patrick Cable 
Description:
 apt- commandline package manager
 apt-doc- documentation for APT
 apt-transport-https - https download transport for APT
 apt-utils  - package management related utility programs
 libapt-inst1.5 - deb package format runtime library
 libapt-pkg-dev - development files for APT's libapt-pkg and libapt-inst
 libapt-pkg-doc - documentation for APT development
 libapt-pkg4.12 - package management runtime library
Launchpad-Bugs-Fixed: 1575877
Changes:
 apt (1.0.1ubuntu2.14) trusty; urgency=medium
 .
   * When using the https transport mechanism, $no_proxy is ignored if apt is
 getting it's proxy information from $https_proxy (as opposed to
 Acquire::https::Proxy somewhere in apt config). If the source of proxy
 information is Acquire::https::Proxy set in apt.conf (or apt.conf.d),
 then $no_proxy is honored. This patch makes the behavior similar for
 both methods of setting the proxy. (LP: #1575877)
Checksums-Sha1:
 02b26950f022771ff41d55b68493d05185d2f87f 1821 apt_1.0.1ubuntu2.14.dsc
 8a9833b925df591a50debf0b6d15b3178552c436 1792384 apt_1.0.1ubuntu2.14.tar.xz
Checksums-Sha256:
 c188b969225970570dedb568bf3b121866c822307d1d5dabbc50834258cbc1af 1821 
apt_1.0.1ubuntu2.14.dsc
 ad1a662b0aa9a6a8bd2776bcc2b2724a9ce2cb55e38fea2c700e1237be2481c3 1792384 
apt_1.0.1ubuntu2.14.tar.xz
Files:
 05de8bfe27dd54f9246c061d173f752e 1821 admin important apt_1.0.1ubuntu2.14.dsc
 b674c0134c50b9fa3554c66b7db10165 1792384 admin important 
apt_1.0.1ubuntu2.14.tar.xz
Original-Maintainer: APT Development Team 
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] thermald 1.4.3-5~14.04.4 (Accepted)

2016-05-18 Thread Colin King
thermald (1.4.3-5~14.04.4) trusty; urgency=medium

  * csys_fs::write: return -errno on write failure (LP: #1543046)
- this detection helps previous fixes to stop BIOS message spamming

thermald (1.4.3-5~14.04.3) trusty; urgency=medium

  * Initialise bios_locked; may lead to random behaviour (LP: #1547594)
- bios_locked should be initialised to false so that RAPL is
  enabled by default.
  * thd_cdev_rapl: stop writing to sysfs if the write fails (LP: #1543046)

Date: Mon, 25 Apr 2016 09:02:11 +0100
Changed-By: Colin King 
https://launchpad.net/ubuntu/+source/thermald/1.4.3-5~14.04.4
Format: 1.8
Date: Mon, 25 Apr 2016 09:02:11 +0100
Source: thermald
Binary: thermald
Architecture: source
Version: 1.4.3-5~14.04.4
Distribution: trusty
Urgency: medium
Maintainer: Colin King 
Changed-By: Colin King 
Description:
 thermald   - Thermal monitoring and controlling daemon
Launchpad-Bugs-Fixed: 1543046 1547594
Changes:
 thermald (1.4.3-5~14.04.4) trusty; urgency=medium
 .
   * csys_fs::write: return -errno on write failure (LP: #1543046)
 - this detection helps previous fixes to stop BIOS message spamming
 .
 thermald (1.4.3-5~14.04.3) trusty; urgency=medium
 .
   * Initialise bios_locked; may lead to random behaviour (LP: #1547594)
 - bios_locked should be initialised to false so that RAPL is
   enabled by default.
   * thd_cdev_rapl: stop writing to sysfs if the write fails (LP: #1543046)
Checksums-Sha1:
 58c7f461bac8dacc5df26a9420da4eb6042cb501 1865 thermald_1.4.3-5~14.04.4.dsc
 d408d1070fc0c91800c564e028cf850a1fe8cf76 20304 
thermald_1.4.3-5~14.04.4.debian.tar.xz
Checksums-Sha256:
 f45505ab48cffb056364b666b967c097e9b5ca1105bc7390d537266d952400e5 1865 
thermald_1.4.3-5~14.04.4.dsc
 ceeb3a3998a502924fdb4b843321fe76b0aab3e9858d888e703d20b25656de3d 20304 
thermald_1.4.3-5~14.04.4.debian.tar.xz
Files:
 bacb29a12f323c6dd9152a7e0192a650 1865 admin optional 
thermald_1.4.3-5~14.04.4.dsc
 9655a0329345c63b19e49391b78c3487 20304 admin optional 
thermald_1.4.3-5~14.04.4.debian.tar.xz
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] lsb 4.1+Debian11ubuntu6.2 (Accepted)

2016-05-18 Thread Steve Langasek
lsb (4.1+Debian11ubuntu6.2) trusty; urgency=medium

  * 01-upstart-lsb: when diverting an init script to an upstart job, we
can't directly map the 'status' subcommand to /sbin/status because the
return value of the latter is always 0 if we communicated successfully
with upstart.  Instead, parse the output of the command to correctly map
this to the LSB return codes.  LP: #1582813.

Date: Tue, 17 May 2016 17:07:10 -0700
Changed-By: Steve Langasek 
Maintainer: Ubuntu Developers 
https://launchpad.net/ubuntu/+source/lsb/4.1+Debian11ubuntu6.2
Format: 1.8
Date: Tue, 17 May 2016 17:07:10 -0700
Source: lsb
Binary: lsb-core lsb-graphics lsb-cxx lsb-desktop lsb-languages lsb-multimedia 
lsb-printing lsb-security lsb lsb-base lsb-release lsb-invalid-mta
Architecture: source
Version: 4.1+Debian11ubuntu6.2
Distribution: trusty
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Steve Langasek 
Description:
 lsb- Linux Standard Base 4.1 support package
 lsb-base   - Linux Standard Base 4.1 init script functionality
 lsb-core   - Linux Standard Base 4.1 core support package
 lsb-cxx- Linux Standard Base 4.1 C++ support package
 lsb-desktop - Linux Standard Base 4.1 Desktop support package
 lsb-graphics - Linux Standard Base 4.1 graphics support package
 lsb-invalid-mta - Linux Standard Base sendmail dummy
 lsb-languages - Linux Standard Base 4.1 Runtime Languages package
 lsb-multimedia - Linux Standard Base 4.1 Multimedia package
 lsb-printing - Linux Standard Base 4.1 Printing package
 lsb-release - Linux Standard Base version reporting utility
 lsb-security - Linux Standard Base 4.1 Security package
Launchpad-Bugs-Fixed: 1582813
Changes:
 lsb (4.1+Debian11ubuntu6.2) trusty; urgency=medium
 .
   * 01-upstart-lsb: when diverting an init script to an upstart job, we
 can't directly map the 'status' subcommand to /sbin/status because the
 return value of the latter is always 0 if we communicated successfully
 with upstart.  Instead, parse the output of the command to correctly map
 this to the LSB return codes.  LP: #1582813.
Checksums-Sha1:
 53ba6862cc5fe1724f53fc8085062ebc36845daf 2431 lsb_4.1+Debian11ubuntu6.2.dsc
 0f64b5b13ccd15d0a61c439e8b976383c9f8e656 66156 lsb_4.1+Debian11ubuntu6.2.tar.xz
Checksums-Sha256:
 d5d317e5d5af01cb0e833fe517c38594cba0a4f6585f9d92beac54445e8598ad 2431 
lsb_4.1+Debian11ubuntu6.2.dsc
 14eac458299596fd70cde7bb696c1ae9f34df5277491de23d13868489fb4bcb6 66156 
lsb_4.1+Debian11ubuntu6.2.tar.xz
Files:
 535cf784978662c06967a4486f21875a 2431 misc extra lsb_4.1+Debian11ubuntu6.2.dsc
 8598bba6cf3d87635a7754ff04f528c1 66156 misc extra 
lsb_4.1+Debian11ubuntu6.2.tar.xz
Original-Maintainer: Debian LSB Team 
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] apport 2.14.1-0ubuntu3.21 (Accepted)

2016-05-18 Thread Brian Murray
apport (2.14.1-0ubuntu3.21) trusty-proposed; urgency=medium

  * apport-bug: Stop checking the autoreport flag and calling
whoopsie-upload-all; these two are different tasks, and that breaks bug
reporting. (LP: #1339663)

Date: Mon, 16 May 2016 13:24:02 -0700
Changed-By: Brian Murray 
Maintainer: Martin Pitt 
https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.21
Format: 1.8
Date: Mon, 16 May 2016 13:24:02 -0700
Source: apport
Binary: apport python-problem-report python3-problem-report python-apport 
python3-apport apport-retrace apport-valgrind apport-gtk apport-kde dh-apport 
apport-noui
Architecture: source
Version: 2.14.1-0ubuntu3.21
Distribution: trusty-proposed
Urgency: medium
Maintainer: Martin Pitt 
Changed-By: Brian Murray 
Description:
 apport - automatically generate crash reports for debugging
 apport-gtk - GTK+ frontend for the apport crash report system
 apport-kde - KDE frontend for the apport crash report system
 apport-noui - tools for automatically reporting Apport crash reports
 apport-retrace - tools for reprocessing Apport crash reports
 apport-valgrind - valgrind wrapper that first downloads debug symbols
 dh-apport  - debhelper extension for the apport crash report system
 python-apport - Python library for Apport crash report handling
 python-problem-report - Python library to handle problem reports
 python3-apport - Python 3 library for Apport crash report handling
 python3-problem-report - Python 3 library to handle problem reports
Launchpad-Bugs-Fixed: 1339663
Changes:
 apport (2.14.1-0ubuntu3.21) trusty-proposed; urgency=medium
 .
   * apport-bug: Stop checking the autoreport flag and calling
 whoopsie-upload-all; these two are different tasks, and that breaks bug
 reporting. (LP: #1339663)
Checksums-Sha1:
 8415e220f4726292b4d171e0a4b3b0427abcd679 2281 apport_2.14.1-0ubuntu3.21.dsc
 dcc741c92eea4139b9e921b1efde2ed0530a5176 157414 
apport_2.14.1-0ubuntu3.21.diff.gz
Checksums-Sha256:
 7f2e0d94711855c008c140571127906c56f2924e9f91f101aa478b44b304643d 2281 
apport_2.14.1-0ubuntu3.21.dsc
 ce5c1e61e782793e403128c83beda5dcec536ce7327136d5b7a4a9e490fb11f0 157414 
apport_2.14.1-0ubuntu3.21.diff.gz
Files:
 c030c44d05836b4055a7560024e8e786 2281 utils optional 
apport_2.14.1-0ubuntu3.21.dsc
 ec7233b9fba5d07ab3fb94c1119ea727 157414 utils optional 
apport_2.14.1-0ubuntu3.21.diff.gz
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] gnome-do-plugins 0.8.5-2ubuntu0.1 (Accepted)

2016-05-18 Thread Joshua Bayfield
gnome-do-plugins (0.8.5-2ubuntu0.1) trusty; urgency=medium

  * Update Homepage: to not point at spam URL. (LP: #1442873)

Date: Tue, 29 Mar 2016 15:42:13 +
Changed-By: Joshua Bayfield 
Maintainer: Ubuntu Developers 
Signed-By: Michael Terry 
https://launchpad.net/ubuntu/+source/gnome-do-plugins/0.8.5-2ubuntu0.1
Format: 1.8
Date: Tue, 29 Mar 2016 15:42:13 +
Source: gnome-do-plugins
Binary: gnome-do-plugins
Architecture: source
Version: 0.8.5-2ubuntu0.1
Distribution: trusty
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Joshua Bayfield 
Description:
 gnome-do-plugins - Extra functionality for GNOME Do
Launchpad-Bugs-Fixed: 1442873
Changes:
 gnome-do-plugins (0.8.5-2ubuntu0.1) trusty; urgency=medium
 .
   * Update Homepage: to not point at spam URL. (LP: #1442873)
Checksums-Sha1:
 aff6658da59bd68e71ea5cc93145c811d669c4d8 2793 
gnome-do-plugins_0.8.5-2ubuntu0.1.dsc
 0c28b8aecdffcaa613df397d1a8d04a9f21ce360 11032 
gnome-do-plugins_0.8.5-2ubuntu0.1.debian.tar.xz
Checksums-Sha256:
 36e289ae0b3bebc92fdf7ae531d125ea23d74e4c6f346e630274b00dd9e5eb75 2793 
gnome-do-plugins_0.8.5-2ubuntu0.1.dsc
 60415d5ed22d9ed4e676c295440c8b9fbc8afa9483cf604cea9b0695f069897b 11032 
gnome-do-plugins_0.8.5-2ubuntu0.1.debian.tar.xz
Files:
 be0fa751f40b6549621d2743a8f5b57d 2793 gnome optional 
gnome-do-plugins_0.8.5-2ubuntu0.1.dsc
 9a5fe77628453b91fa15a9e4e55b 11032 gnome optional 
gnome-do-plugins_0.8.5-2ubuntu0.1.debian.tar.xz
Original-Maintainer: Debian CLI Applications Team 

-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] apport 2.14.1-0ubuntu3.20 (Accepted)

2016-05-18 Thread Martin Pitt
apport (2.14.1-0ubuntu3.20) trusty-proposed; urgency=medium

  * Disambiguate overly generic Python exceptions in duplicate signature
computation: dbus-glib's DBusException wraps a "real" server-side
exception, so add the class of that to disambiguate different crashes;
for OSError that is not a known subclass like FileNotFoundError, add the
errno. (LP: #989819)

Date: 2016-04-01 15:04:10.602233+00:00
Changed-By: Martin Pitt 
https://launchpad.net/ubuntu/+source/apport/2.14.1-0ubuntu3.20
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes