[ubuntu/trusty-security] pacemaker 1.1.10+git20130802-1ubuntu2.4 (Accepted)

2017-10-24 Thread Marc Deslauriers
pacemaker (1.1.10+git20130802-1ubuntu2.4) trusty-security; urgency=medium

  * SECURITY UPDATE: Improper IPC guarding
- debian/patches/CVE-2016-7035.patch: fix logic in lib/common/ipc.c.
- CVE-2016-7035

Date: 2017-06-02 19:04:25.854298+00:00
Changed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/pacemaker/1.1.10+git20130802-1ubuntu2.4
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] pacemaker 1.1.10+git20130802-1ubuntu2.4 (Accepted)

2017-10-24 Thread Ubuntu Archive Robot
pacemaker (1.1.10+git20130802-1ubuntu2.4) trusty-security; urgency=medium

  * SECURITY UPDATE: Improper IPC guarding
- debian/patches/CVE-2016-7035.patch: fix logic in lib/common/ipc.c.
- CVE-2016-7035

Date: 2017-06-02 19:04:25.854298+00:00
Changed-By: Marc Deslauriers 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/pacemaker/1.1.10+git20130802-1ubuntu2.4
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/partner/trusty-proposed] google-cloud-sdk 176.0.0-0ubuntu1~14.04.0 (Accepted)

2017-10-24 Thread Łukasz 'sil2100' Zemczak
google-cloud-sdk (176.0.0-0ubuntu1~14.04.0) trusty; urgency=medium

  * New upstream release

Date: Tue, 24 Oct 2017 11:06:10 +0200
Changed-By: Łukasz 'sil2100' Zemczak 
Maintainer: Canonical CPC Team 
https://launchpad.net/ubuntu/+source/google-cloud-sdk/176.0.0-0ubuntu1~14.04.0
Format: 1.8
Date: Tue, 24 Oct 2017 11:06:10 +0200
Source: google-cloud-sdk
Binary: google-cloud-sdk
Architecture: source
Version: 176.0.0-0ubuntu1~14.04.0
Distribution: trusty
Urgency: medium
Maintainer: Canonical CPC Team 
Changed-By: Łukasz 'sil2100' Zemczak 
Description:
 google-cloud-sdk - Google Cloud SDK for interacting with Google Cloud services.
Changes:
 google-cloud-sdk (176.0.0-0ubuntu1~14.04.0) trusty; urgency=medium
 .
   * New upstream release
Checksums-Sha1:
 a79d7346519c2142e8ef81da3dc0be272eceeead 1801 
google-cloud-sdk_176.0.0-0ubuntu1~14.04.0.dsc
 108cf59d79bb10f2ef601fa20232298a5e578feb 17720358 
google-cloud-sdk_176.0.0.orig.tar.gz
 ae68a1f419265a4f7db08ef060c94b78ced62266 14904 
google-cloud-sdk_176.0.0-0ubuntu1~14.04.0.debian.tar.xz
Checksums-Sha256:
 32799367969bbdd0c676024e9302410f59f798bf6bbfa3569ffb9fb4074776e1 1801 
google-cloud-sdk_176.0.0-0ubuntu1~14.04.0.dsc
 a97fa9c403488bfc80821e1d57e334369d23029e605905a6fbc1bf7db0e26789 17720358 
google-cloud-sdk_176.0.0.orig.tar.gz
 ec1a676f717fef536d916572b1cc15febf07b7f6c5b8070bfb64c28041bbe8dd 14904 
google-cloud-sdk_176.0.0-0ubuntu1~14.04.0.debian.tar.xz
Files:
 f6f464084c445ef3d9a07f5440a9eb88 1801 partner/admin optional 
google-cloud-sdk_176.0.0-0ubuntu1~14.04.0.dsc
 40a691b585b7b435165c354ddd75a815 17720358 partner/admin optional 
google-cloud-sdk_176.0.0.orig.tar.gz
 7bc14459d6ace561d5f941696354ab34 14904 partner/admin optional 
google-cloud-sdk_176.0.0-0ubuntu1~14.04.0.debian.tar.xz
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] chromium-browser 62.0.3202.62-0ubuntu0.14.04.1204 (Accepted)

2017-10-24 Thread Chris Coulson
chromium-browser (62.0.3202.62-0ubuntu0.14.04.1204) trusty; urgency=medium

  * Upstream release: 62.0.3202.62
- CVE-2017-5124: UXSS with MHTML.
- CVE-2017-5125: Heap overflow in Skia.
- CVE-2017-5126: Use after free in PDFium.
- CVE-2017-5127: Use after free in PDFium.
- CVE-2017-5128: Heap overflow in WebGL.
- CVE-2017-5129: Use after free in WebAudio.
- CVE-2017-5132: Incorrect stack manipulation in WebAssembly.
- CVE-2017-5130: Heap overflow in libxml2.
- CVE-2017-5131: Out of bounds write in Skia.
- CVE-2017-5133: Out of bounds write in Skia.
- CVE-2017-15386: UI spoofing in Blink.
- CVE-2017-15387: Content security bypass.
- CVE-2017-15388: Out of bounds read in Skia.
- CVE-2017-15389: URL spoofing in OmniBox.
- CVE-2017-15390: URL spoofing in OmniBox.
- CVE-2017-15391: Extension limitation bypass in Extensions.
- CVE-2017-15392: Incorrect registry key handling in PlatformIntegration.
- CVE-2017-15393: Referrer leak in Devtools.
- CVE-2017-15394: URL spoofing in extensions UI.
- CVE-2017-15395: Null pointer dereference in ImageCapture.
  * debian/control:
- build with clang 4.0
- bump Standards-Version to 4.1.0
  * debian/rules:
- build with clang 4.0
- also build gn with clang 4.0
- do not disable swiftshader on i386 (LP: #1697496)
- when building on armhf, pass symbol_level=0 to gn in the hope that
  Launchpad builders won't run out of memory when linking
  * debian/patches/additional-search-engines.patch: refreshed
  * debian/patches/allow-component-build: removed, unused
  * debian/patches/arm64-vpx-alignment: removed, no longer needed
  * debian/patches/c++-compatibility.patch: added
  * debian/patches/defang-ct-timebomb: removed, unused
  * debian/patches/disable-sse2: refreshed
  * debian/patches/enable-chromecast-by-default.patch: refreshed
  * debian/patches/fix-argument-evaluation-order.patch: removed, no longer
needed
  * debian/patches/fix-compilation-for-atk.patch: removed, no longer needed
  * debian/patches/fix-compilation-for-atk-version-check.patch: removed, no
longer needed
  * debian/patches/fix-gn-bootstrap.patch: updated
  * debian/patches/fix_building_widevinecdm_with_chromium.patch: refreshed
  * debian/patches/gcc-compilation-fixes.patch: removed, no longer needed
  * debian/patches/make-base-numerics-build-with-gcc.patch: removed, no longer
needed
  * debian/patches/no-new-ninja-flag.patch: added
  * debian/patches/protobuf-fullness: removed, unused
  * debian/patches/really-disable-swiftshader-on-x86.patch: removed, no longer
needed
  * debian/patches/reduce-ld-memory-usage.patch: removed, no longer needed
  * debian/patches/revert-clang-nostdlib++.patch: added
  * debian/patches/revert-llvm-ar.patch: removed, no longer needed
  * debian/patches/search-credit.patch: refreshed
  * debian/patches/set-rpath-on-chromium-executables.patch: refreshed
  * debian/patches/suppress-newer-clang-warning-flags.patch: added
  * debian/patches/title-bar-default-system.patch-v35: refreshed
  * debian/patches/use-clang-versioned.patch: added
  * debian/patches/use-gcc-versioned: removed, no longer needed
  * debian/patches/vulkan-c99.patch: removed, no longer needed
  * debian/patches/widevine-other-locations: refreshed
  * debian/known_gyp_flags: removed, unused
  * debian/known_gn_gen_args-[i386,amd64,armhf]: added

Date: 2017-10-19 09:15:15.694092+00:00
Changed-By: Olivier Tilloy 
Signed-By: Chris Coulson 
https://launchpad.net/ubuntu/+source/chromium-browser/62.0.3202.62-0ubuntu0.14.04.1204
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] chromium-browser 62.0.3202.62-0ubuntu0.14.04.1204 (Accepted)

2017-10-24 Thread Ubuntu Archive Robot
chromium-browser (62.0.3202.62-0ubuntu0.14.04.1204) trusty; urgency=medium

  * Upstream release: 62.0.3202.62
- CVE-2017-5124: UXSS with MHTML.
- CVE-2017-5125: Heap overflow in Skia.
- CVE-2017-5126: Use after free in PDFium.
- CVE-2017-5127: Use after free in PDFium.
- CVE-2017-5128: Heap overflow in WebGL.
- CVE-2017-5129: Use after free in WebAudio.
- CVE-2017-5132: Incorrect stack manipulation in WebAssembly.
- CVE-2017-5130: Heap overflow in libxml2.
- CVE-2017-5131: Out of bounds write in Skia.
- CVE-2017-5133: Out of bounds write in Skia.
- CVE-2017-15386: UI spoofing in Blink.
- CVE-2017-15387: Content security bypass.
- CVE-2017-15388: Out of bounds read in Skia.
- CVE-2017-15389: URL spoofing in OmniBox.
- CVE-2017-15390: URL spoofing in OmniBox.
- CVE-2017-15391: Extension limitation bypass in Extensions.
- CVE-2017-15392: Incorrect registry key handling in PlatformIntegration.
- CVE-2017-15393: Referrer leak in Devtools.
- CVE-2017-15394: URL spoofing in extensions UI.
- CVE-2017-15395: Null pointer dereference in ImageCapture.
  * debian/control:
- build with clang 4.0
- bump Standards-Version to 4.1.0
  * debian/rules:
- build with clang 4.0
- also build gn with clang 4.0
- do not disable swiftshader on i386 (LP: #1697496)
- when building on armhf, pass symbol_level=0 to gn in the hope that
  Launchpad builders won't run out of memory when linking
  * debian/patches/additional-search-engines.patch: refreshed
  * debian/patches/allow-component-build: removed, unused
  * debian/patches/arm64-vpx-alignment: removed, no longer needed
  * debian/patches/c++-compatibility.patch: added
  * debian/patches/defang-ct-timebomb: removed, unused
  * debian/patches/disable-sse2: refreshed
  * debian/patches/enable-chromecast-by-default.patch: refreshed
  * debian/patches/fix-argument-evaluation-order.patch: removed, no longer
needed
  * debian/patches/fix-compilation-for-atk.patch: removed, no longer needed
  * debian/patches/fix-compilation-for-atk-version-check.patch: removed, no
longer needed
  * debian/patches/fix-gn-bootstrap.patch: updated
  * debian/patches/fix_building_widevinecdm_with_chromium.patch: refreshed
  * debian/patches/gcc-compilation-fixes.patch: removed, no longer needed
  * debian/patches/make-base-numerics-build-with-gcc.patch: removed, no longer
needed
  * debian/patches/no-new-ninja-flag.patch: added
  * debian/patches/protobuf-fullness: removed, unused
  * debian/patches/really-disable-swiftshader-on-x86.patch: removed, no longer
needed
  * debian/patches/reduce-ld-memory-usage.patch: removed, no longer needed
  * debian/patches/revert-clang-nostdlib++.patch: added
  * debian/patches/revert-llvm-ar.patch: removed, no longer needed
  * debian/patches/search-credit.patch: refreshed
  * debian/patches/set-rpath-on-chromium-executables.patch: refreshed
  * debian/patches/suppress-newer-clang-warning-flags.patch: added
  * debian/patches/title-bar-default-system.patch-v35: refreshed
  * debian/patches/use-clang-versioned.patch: added
  * debian/patches/use-gcc-versioned: removed, no longer needed
  * debian/patches/vulkan-c99.patch: removed, no longer needed
  * debian/patches/widevine-other-locations: refreshed
  * debian/known_gyp_flags: removed, unused
  * debian/known_gn_gen_args-[i386,amd64,armhf]: added

Date: 2017-10-19 09:15:15.694092+00:00
Changed-By: Olivier Tilloy 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/chromium-browser/62.0.3202.62-0ubuntu0.14.04.1204
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-proposed] distro-info-data 0.18ubuntu0.8 (Accepted)

2017-10-24 Thread Stefano Rivera
distro-info-data (0.18ubuntu0.8) trusty; urgency=medium

  * Copy data from 0.37
- Set EOL date for Debian Wheezy.
- Set (provisional) EOL date for Debian Jessie.
- Set release date for Stretch (and matching creation date for Buster).
- Add Ubuntu 18.04 LTS Bionic Beaver. (LP: #1727046)

Date: Tue, 24 Oct 2017 13:19:26 -0700
Changed-By: Stefano Rivera 
Maintainer: Ubuntu Developers 
https://launchpad.net/ubuntu/+source/distro-info-data/0.18ubuntu0.8
Format: 1.8
Date: Tue, 24 Oct 2017 13:19:26 -0700
Source: distro-info-data
Binary: distro-info-data
Architecture: source
Version: 0.18ubuntu0.8
Distribution: trusty
Urgency: medium
Maintainer: Ubuntu Developers 
Changed-By: Stefano Rivera 
Description:
 distro-info-data - information about the distributions' releases (data files)
Launchpad-Bugs-Fixed: 1727046
Changes:
 distro-info-data (0.18ubuntu0.8) trusty; urgency=medium
 .
   * Copy data from 0.37
 - Set EOL date for Debian Wheezy.
 - Set (provisional) EOL date for Debian Jessie.
 - Set release date for Stretch (and matching creation date for Buster).
 - Add Ubuntu 18.04 LTS Bionic Beaver. (LP: #1727046)
Checksums-Sha1:
 bc4871337ee3e606ace978678c2818ffb08c8f9f 1440 
distro-info-data_0.18ubuntu0.8.dsc
 cdb11716782cf986f26943a5760f30c23ed0ef22 6444 
distro-info-data_0.18ubuntu0.8.tar.xz
 d4db5c607e42180feeb90e81d6db97c29ebb3390 6063 
distro-info-data_0.18ubuntu0.8_source.buildinfo
Checksums-Sha256:
 bff78ae397f30f12f5e84c40bec54b80e8ecfd14870d0b29c160f850cdfac646 1440 
distro-info-data_0.18ubuntu0.8.dsc
 a049bea28a12b304c36ceaa0363cc3c32abd3cac5e69e0aa9431fa5b7335a4d0 6444 
distro-info-data_0.18ubuntu0.8.tar.xz
 beb1302eaa35755bfdfc33389ab8dbf0210677d6ff87dea2b76e4c8598e2a5ce 6063 
distro-info-data_0.18ubuntu0.8_source.buildinfo
Files:
 9a61169e6fade8a8e29d6617bac65c10 1440 devel optional 
distro-info-data_0.18ubuntu0.8.dsc
 3bf9fb5179dd93595ac288074513567f 6444 devel optional 
distro-info-data_0.18ubuntu0.8.tar.xz
 88be68aa7def30dc95116b20733de5f7 6063 devel optional 
distro-info-data_0.18ubuntu0.8_source.buildinfo
Original-Maintainer: Benjamin Drung 
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes