[ubuntu/trusty-security] pure-ftpd 1.0.36-1.1ubuntu0.1 (Accepted)

2016-05-31 Thread Marc Deslauriers
pure-ftpd (1.0.36-1.1ubuntu0.1) trusty-security; urgency=low

  * SECURITY-UPDATE: SSLv3 is enabled by default allowing the POODLE 
attack (LP: #1381840)
- debian/pure-ftpd-wrapper: enable loading of TLSCipherSuite parameter 
- debian/etc/TLSCipherSuite: disable SSLv3
- CVE-2014-3566

Date: 2016-05-31 12:45:19.338751+00:00
Changed-By: Joshua Zeitlinger 
Signed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/pure-ftpd/1.0.36-1.1ubuntu0.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] linux-meta 3.13.0.87.93 (Accepted)

2016-05-31 Thread Chris J Arges
linux-meta (3.13.0.87.93) trusty; urgency=medium

  * linux ABI 3.13.0-87

Date: 2016-05-11 19:27:19.642552+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-meta/3.13.0.87.93
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] linux-signed 3.13.0-87.133 (Accepted)

2016-05-31 Thread Chris J Arges
linux-signed (3.13.0-87.133) trusty; urgency=medium

  * Version 3.13.0-87.133

linux-signed (3.13.0-87.132) trusty; urgency=medium

  * Version 3.13.0-87.132

Date: 2016-05-24 18:29:14.954978+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-signed/3.13.0-87.133
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] linux-meta 3.13.0.87.93 (Accepted)

2016-05-31 Thread Chris J Arges
linux-meta (3.13.0.87.93) trusty; urgency=medium

  * linux ABI 3.13.0-87

Date: 2016-05-11 19:27:19.642552+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-meta/3.13.0.87.93
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] linux-signed 3.13.0-87.133 (Accepted)

2016-05-31 Thread Chris J Arges
linux-signed (3.13.0-87.133) trusty; urgency=medium

  * Version 3.13.0-87.133

linux-signed (3.13.0-87.132) trusty; urgency=medium

  * Version 3.13.0-87.132

Date: 2016-05-24 18:29:14.954978+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux-signed/3.13.0-87.133
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] linux 3.13.0-87.133 (Accepted)

2016-05-31 Thread Chris J Arges
linux (3.13.0-87.133) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1585315

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864

linux (3.13.0-87.132) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1582398

  [ Kamal Mostafa ]

  * [Config] Drop ozwpan from the ABI

  [ Luis Henriques ]

  * [Config] CONFIG_USB_WPAN_HCD=n
- LP: #1463740
- CVE-2015-4004

  [ Prarit Bhargava ]

  * SAUCE: (no-up) ACPICA: Dispatcher: Update thread ID for recursive
method calls
- LP: #1577898

  [ Upstream Kernel Changes ]

  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951
  * KVM: x86: bit-ops emulation ignores offset on 64-bit
- LP: #1423672
  * USB: usbip: fix potential out-of-bounds write
- LP: #1572666
- CVE-2016-3955
  * x86/mm/32: Enable full randomization on i386 and X86_32
- LP: #1568523
- CVE-2016-3672
  * Input: gtco - fix crash on detecting device without endpoints
- LP: #1575706
- CVE-2016-2187
  * atl2: Disable unimplemented scatter/gather feature
- LP: #1561403
- CVE-2016-2117
  * ALSA: usb-audio: Skip volume controls triggers hangup on Dell USB Dock
- LP: #1577905
  * fs/pnode.c: treat zero mnt_group_id-s as unequal
- LP: #1572316
  * propogate_mnt: Handle the first propogated copy being a slave
- LP: #1572316
  * drm: Balance error path for GEM handle allocation
- LP: #1579610
  * x86/mm: Add barriers and document switch_mm()-vs-flush synchronization
- LP: #1538429
- CVE-2016-2069
  * x86/mm: Improve switch_mm() barrier comments
- LP: #1538429
- CVE-2016-2069
  * net: fix infoleak in llc
- LP: #1578496
- CVE-2016-4485
  * net: fix infoleak in rtnetlink
- LP: #1578497
- CVE-2016-4486

Date: 2016-05-24 18:28:14.027668+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux/3.13.0-87.133
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] linux 3.13.0-87.133 (Accepted)

2016-05-31 Thread Chris J Arges
linux (3.13.0-87.133) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1585315

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864

linux (3.13.0-87.132) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1582398

  [ Kamal Mostafa ]

  * [Config] Drop ozwpan from the ABI

  [ Luis Henriques ]

  * [Config] CONFIG_USB_WPAN_HCD=n
- LP: #1463740
- CVE-2015-4004

  [ Prarit Bhargava ]

  * SAUCE: (no-up) ACPICA: Dispatcher: Update thread ID for recursive
method calls
- LP: #1577898

  [ Upstream Kernel Changes ]

  * usbnet: cleanup after bind() in probe()
- LP: #1567191
- CVE-2016-3951
  * KVM: x86: bit-ops emulation ignores offset on 64-bit
- LP: #1423672
  * USB: usbip: fix potential out-of-bounds write
- LP: #1572666
- CVE-2016-3955
  * x86/mm/32: Enable full randomization on i386 and X86_32
- LP: #1568523
- CVE-2016-3672
  * Input: gtco - fix crash on detecting device without endpoints
- LP: #1575706
- CVE-2016-2187
  * atl2: Disable unimplemented scatter/gather feature
- LP: #1561403
- CVE-2016-2117
  * ALSA: usb-audio: Skip volume controls triggers hangup on Dell USB Dock
- LP: #1577905
  * fs/pnode.c: treat zero mnt_group_id-s as unequal
- LP: #1572316
  * propogate_mnt: Handle the first propogated copy being a slave
- LP: #1572316
  * drm: Balance error path for GEM handle allocation
- LP: #1579610
  * x86/mm: Add barriers and document switch_mm()-vs-flush synchronization
- LP: #1538429
- CVE-2016-2069
  * x86/mm: Improve switch_mm() barrier comments
- LP: #1538429
- CVE-2016-2069
  * net: fix infoleak in llc
- LP: #1578496
- CVE-2016-4485
  * net: fix infoleak in rtnetlink
- LP: #1578497
- CVE-2016-4486

Date: 2016-05-24 18:28:14.027668+00:00
Changed-By: Kamal Mostafa 
Signed-By: Chris J Arges 
https://launchpad.net/ubuntu/+source/linux/3.13.0-87.133
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] pure-ftpd 1.0.36-1.1ubuntu0.1 (Accepted)

2016-05-31 Thread Ubuntu Archive Robot
pure-ftpd (1.0.36-1.1ubuntu0.1) trusty-security; urgency=low

  * SECURITY-UPDATE: SSLv3 is enabled by default allowing the POODLE 
attack (LP: #1381840)
- debian/pure-ftpd-wrapper: enable loading of TLSCipherSuite parameter 
- debian/etc/TLSCipherSuite: disable SSLv3
- CVE-2014-3566

Date: 2016-05-31 12:45:19.338751+00:00
Changed-By: Joshua Zeitlinger 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/pure-ftpd/1.0.36-1.1ubuntu0.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] dosfstools 3.0.26-1ubuntu0.1 (Accepted)

2016-05-31 Thread Marc Deslauriers
dosfstools (3.0.26-1ubuntu0.1) trusty-security; urgency=medium

  * SECURITY UPDATE: out of bounds read denial of service
- debian/patches/date_oob_read.patch: prevent out of bounds array read
  in src/check.c.
- No CVE number
  * SECURITY UPDATE: memory corruption via off-by-2 in FAT12
- debian/patches/CVE-2015-8872.patch: fix FAT12 logic in src/fat.c.
- CVE-2015-8872
  * SECURITY UPDATE: heap overflow via excessive FAT size specifications
- debian/patches/CVE-2016-4804.patch: change size and perform checks in
  src/boot.c, src/fsck.fat.h.
- CVE-2016-4804

Date: 2016-05-26 11:50:28.250287+00:00
Changed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/dosfstools/3.0.26-1ubuntu0.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] libgd2 2.1.0-3ubuntu0.1 (Accepted)

2016-05-31 Thread Marc Deslauriers
libgd2 (2.1.0-3ubuntu0.1) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service via crafted color table in XPM file
- debian/patches/CVE-2014-2497.patch: avoid null-pointer dereference in
  src/gdxpm.c.
- CVE-2014-2497
  * SECURITY UPDATE: denial of service via crafted GIF image
- debian/patches/CVE-2014-9709-1.patch: fix buffer read overflow in
  src/gd_gif_in.c.
- debian/patches/CVE-2014-9709-2.patch: move overflow test outside the
  loop in src/gd_gif_in.c.
- CVE-2014-9709
  * SECURITY UPDATE: denial of service via crafted imagefilltoborder call
- debian/patches/CVE-2015-8874.patch: add limits to src/gd.c.
- CVE-2015-8874
  * SECURITY UPDATE: denial of service via memleak in gdImageScaleTwoPass
- debian/patches/CVE-2015-8877.patch: use gdImageDestroy in
  src/gd_interpolation.c.
- CVE-2015-8877
  * SECURITY UPDATE: denial of service and possible code execution via
crafted compressed gd2 data
- debian/patches/CVE-2016-3074.patch: perform range checking in
  src/gd_gd2.c.
- CVE-2016-3074

Date: 2016-05-26 13:47:18.769005+00:00
Changed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/libgd2/2.1.0-3ubuntu0.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] linux_3.13.0-87.133_amd64.tar.gz - (Accepted)

2016-05-31 Thread Kamal Mostafa
linux (3.13.0-87.133) trusty; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
- LP: #1585315

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864

Date: Tue, 24 May 2016 11:04:30 -0700
Changed-By: Kamal Mostafa 
Maintainer: Launchpad Build Daemon 

Format: 1.8
Date: Tue, 24 May 2016 11:04:30 -0700
Source: linux
Binary: linux-source-3.13.0 linux-doc linux-headers-3.13.0-87 linux-libc-dev 
linux-tools-common linux-tools-3.13.0-87 linux-cloud-tools-common 
linux-cloud-tools-3.13.0-87 linux-image-3.13.0-87-generic 
linux-image-extra-3.13.0-87-generic linux-headers-3.13.0-87-generic 
linux-image-3.13.0-87-generic-dbgsym linux-tools-3.13.0-87-generic 
linux-cloud-tools-3.13.0-87-generic linux-udebs-generic 
linux-image-3.13.0-87-generic-lpae linux-image-extra-3.13.0-87-generic-lpae 
linux-headers-3.13.0-87-generic-lpae linux-image-3.13.0-87-generic-lpae-dbgsym 
linux-tools-3.13.0-87-generic-lpae linux-cloud-tools-3.13.0-87-generic-lpae 
linux-udebs-generic-lpae linux-image-3.13.0-87-lowlatency 
linux-image-extra-3.13.0-87-lowlatency linux-headers-3.13.0-87-lowlatency 
linux-image-3.13.0-87-lowlatency-dbgsym linux-tools-3.13.0-87-lowlatency 
linux-cloud-tools-3.13.0-87-lowlatency linux-udebs-lowlatency 
linux-image-3.13.0-87-powerpc-e500 linux-image-extra-3.13.0-87-powerpc-e500
 linux-headers-3.13.0-87-powerpc-e500 linux-image-3.13.0-87-powerpc-e500-dbgsym 
linux-tools-3.13.0-87-powerpc-e500 linux-cloud-tools-3.13.0-87-powerpc-e500 
linux-udebs-powerpc-e500 linux-image-3.13.0-87-powerpc-e500mc 
linux-image-extra-3.13.0-87-powerpc-e500mc 
linux-headers-3.13.0-87-powerpc-e500mc 
linux-image-3.13.0-87-powerpc-e500mc-dbgsym 
linux-tools-3.13.0-87-powerpc-e500mc linux-cloud-tools-3.13.0-87-powerpc-e500mc 
linux-udebs-powerpc-e500mc linux-image-3.13.0-87-powerpc-smp 
linux-image-extra-3.13.0-87-powerpc-smp linux-headers-3.13.0-87-powerpc-smp 
linux-image-3.13.0-87-powerpc-smp-dbgsym linux-tools-3.13.0-87-powerpc-smp 
linux-cloud-tools-3.13.0-87-powerpc-smp linux-udebs-powerpc-smp 
linux-image-3.13.0-87-powerpc64-emb linux-image-extra-3.13.0-87-powerpc64-emb 
linux-headers-3.13.0-87-powerpc64-emb 
linux-image-3.13.0-87-powerpc64-emb-dbgsym linux-tools-3.13.0-87-powerpc64-emb 
linux-cloud-tools-3.13.0-87-powerpc64-emb linux-udebs-powerpc64-emb
 linux-image-3.13.0-87-powerpc64-smp linux-image-extra-3.13.0-87-powerpc64-smp 
linux-headers-3.13.0-87-powerpc64-smp 
linux-image-3.13.0-87-powerpc64-smp-dbgsym linux-tools-3.13.0-87-powerpc64-smp 
linux-cloud-tools-3.13.0-87-powerpc64-smp linux-udebs-powerpc64-smp 
kernel-image-3.13.0-87-generic-di nic-modules-3.13.0-87-generic-di 
nic-shared-modules-3.13.0-87-generic-di serial-modules-3.13.0-87-generic-di 
ppp-modules-3.13.0-87-generic-di pata-modules-3.13.0-87-generic-di 
firewire-core-modules-3.13.0-87-generic-di scsi-modules-3.13.0-87-generic-di 
plip-modules-3.13.0-87-generic-di floppy-modules-3.13.0-87-generic-di 
fat-modules-3.13.0-87-generic-di nfs-modules-3.13.0-87-generic-di 
md-modules-3.13.0-87-generic-di multipath-modules-3.13.0-87-generic-di 
usb-modules-3.13.0-87-generic-di pcmcia-storage-modules-3.13.0-87-generic-di 
fb-modules-3.13.0-87-generic-di input-modules-3.13.0-87-generic-di 
mouse-modules-3.13.0-87-generic-di irda-modules-3.13.0-87-generic-di
 parport-modules-3.13.0-87-generic-di nic-pcmcia-modules-3.13.0-87-generic-di 
pcmcia-modules-3.13.0-87-generic-di nic-usb-modules-3.13.0-87-generic-di 
sata-modules-3.13.0-87-generic-di crypto-modules-3.13.0-87-generic-di 
squashfs-modules-3.13.0-87-generic-di speakup-modules-3.13.0-87-generic-di 
virtio-modules-3.13.0-87-generic-di fs-core-modules-3.13.0-87-generic-di 
fs-secondary-modules-3.13.0-87-generic-di 
storage-core-modules-3.13.0-87-generic-di block-modules-3.13.0-87-generic-di 
message-modules-3.13.0-87-generic-di vlan-modules-3.13.0-87-generic-di
 ipmi-modules-3.13.0-87-generic-di
Architecture: amd64 amd64_translations
Version: 3.13.0-87.133
Distribution: trusty
Urgency: low
Maintainer: Launchpad Build Daemon 
Changed-By: Kamal Mostafa 
Description: 
 block-modules-3.13.0-87-generic-di - Block storage devices (udeb)
 crypto-modules-3.13.0-87-generic-di - crypto modules (udeb)
 fat-modules-3.13.0-87-generic-di - FAT filesystem support (udeb)
 fb-modules-3.13.0-87-generic-di - Framebuffer modules (udeb)
 firewire-core-modules-3.13.0-87-generic-di - Firewire (IEEE-1394) Support 
(udeb)
 floppy-modules-3.13.0-87-generic-di - Floppy driver support (udeb)
 fs-core-modules-3.13.0-87-generic-di - Base filesystem modules (udeb)
 fs-secondary-modules-3.13.0-87-generic-di - Extra filesystem modules (udeb)
 input-modules-3.13.0-87-generic-di - Support for various input methods (udeb)
 ipmi-modules-3.13.0-87-generic-di - ipmi modules (udeb)
 irda-modules-3.13.0-87-generic-di - Support for Infrared protocols (udeb)
 kernel-image-3.13.0-87-generic-di - Linux kernel binary image for the Debian 
installer (udeb)
 linux-cloud-tools-3.13.0-87 - 

[ubuntu/trusty-updates] libgd2 2.1.0-3ubuntu0.1 (Accepted)

2016-05-31 Thread Ubuntu Archive Robot
libgd2 (2.1.0-3ubuntu0.1) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service via crafted color table in XPM file
- debian/patches/CVE-2014-2497.patch: avoid null-pointer dereference in
  src/gdxpm.c.
- CVE-2014-2497
  * SECURITY UPDATE: denial of service via crafted GIF image
- debian/patches/CVE-2014-9709-1.patch: fix buffer read overflow in
  src/gd_gif_in.c.
- debian/patches/CVE-2014-9709-2.patch: move overflow test outside the
  loop in src/gd_gif_in.c.
- CVE-2014-9709
  * SECURITY UPDATE: denial of service via crafted imagefilltoborder call
- debian/patches/CVE-2015-8874.patch: add limits to src/gd.c.
- CVE-2015-8874
  * SECURITY UPDATE: denial of service via memleak in gdImageScaleTwoPass
- debian/patches/CVE-2015-8877.patch: use gdImageDestroy in
  src/gd_interpolation.c.
- CVE-2015-8877
  * SECURITY UPDATE: denial of service and possible code execution via
crafted compressed gd2 data
- debian/patches/CVE-2016-3074.patch: perform range checking in
  src/gd_gd2.c.
- CVE-2016-3074

Date: 2016-05-26 13:47:18.769005+00:00
Changed-By: Marc Deslauriers 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/libgd2/2.1.0-3ubuntu0.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] dosfstools 3.0.26-1ubuntu0.1 (Accepted)

2016-05-31 Thread Ubuntu Archive Robot
dosfstools (3.0.26-1ubuntu0.1) trusty-security; urgency=medium

  * SECURITY UPDATE: out of bounds read denial of service
- debian/patches/date_oob_read.patch: prevent out of bounds array read
  in src/check.c.
- No CVE number
  * SECURITY UPDATE: memory corruption via off-by-2 in FAT12
- debian/patches/CVE-2015-8872.patch: fix FAT12 logic in src/fat.c.
- CVE-2015-8872
  * SECURITY UPDATE: heap overflow via excessive FAT size specifications
- debian/patches/CVE-2016-4804.patch: change size and perform checks in
  src/boot.c, src/fsck.fat.h.
- CVE-2016-4804

Date: 2016-05-26 11:50:28.250287+00:00
Changed-By: Marc Deslauriers 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/dosfstools/3.0.26-1ubuntu0.1
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes