[ubuntu/trusty-proposed] grub2-signed 1.34.20 (Accepted)

2019-04-01 Thread Mathieu Trudel-Lapierre
grub2-signed (1.34.20) trusty; urgency=medium

  * Run grub-check-signatures before running grub-install, to block upgrade if
no signed kernels are installed. (LP: #1789918)

grub2-signed (1.34.19) trusty; urgency=medium

  * Rebuild against grub-efi-amd64 2.02~beta2-9ubuntu1.17
(LP: #1401532) (LP: #1789918)

Date: Mon, 01 Apr 2019 12:03:07 -0400
Changed-By: Mathieu Trudel-Lapierre 
Maintainer: Colin Watson 
https://launchpad.net/ubuntu/+source/grub2-signed/1.34.20
Format: 1.8
Date: Mon, 01 Apr 2019 12:03:07 -0400
Source: grub2-signed
Architecture: source
Version: 1.34.20
Distribution: trusty
Urgency: medium
Maintainer: Colin Watson 
Changed-By: Mathieu Trudel-Lapierre 
Launchpad-Bugs-Fixed: 1401532 1789918
Changes:
 grub2-signed (1.34.20) trusty; urgency=medium
 .
   * Run grub-check-signatures before running grub-install, to block upgrade if
 no signed kernels are installed. (LP: #1789918)
 .
 grub2-signed (1.34.19) trusty; urgency=medium
 .
   * Rebuild against grub-efi-amd64 2.02~beta2-9ubuntu1.17
 (LP: #1401532) (LP: #1789918)
Checksums-Sha1:
 7287a29cf38165408f3c2aed122454303bcc74e6 1557 grub2-signed_1.34.20.dsc
 149d9b277b252ebbfa7fcee0de508d71f7418699 4076 grub2-signed_1.34.20.tar.xz
 672b438a94474eec18a54739d13722ccb6353244 6787 
grub2-signed_1.34.20_source.buildinfo
Checksums-Sha256:
 57faafb2597cd7dc5cab1071b43f816e5a8b6371b72630994980ff6704d8d81d 1557 
grub2-signed_1.34.20.dsc
 17417ec2b05c82cda0fea102f76964b009aee51a62f7a13ee58beba899afd88d 4076 
grub2-signed_1.34.20.tar.xz
 9c4722dae3f755f89eb4e39ed125401c81935b54f5204f6bff078df323022b41 6787 
grub2-signed_1.34.20_source.buildinfo
Files:
 bc6920e6f5eaf90bcbc15df90e6dd3aa 1557 utils optional grub2-signed_1.34.20.dsc
 223b39059871295c48a9863f45ac7a22 4076 utils optional 
grub2-signed_1.34.20.tar.xz
 63377b09a0b0b46bd28eb6324be32297 6787 utils optional 
grub2-signed_1.34.20_source.buildinfo
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] apt 1.0.1ubuntu2.23 (Accepted)

2019-04-01 Thread Łukasz Zemczak
apt (1.0.1ubuntu2.23) trusty; urgency=medium

  * Fix regression in pinning of local-only package versions (LP: #1821308)

Date: 2019-03-25 10:34:09.835200+00:00
Changed-By: Julian Andres Klode 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/apt/1.0.1ubuntu2.23
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-updates] dovecot 1:2.2.9-1ubuntu2.6 (Accepted)

2019-04-01 Thread Ubuntu Archive Robot
dovecot (1:2.2.9-1ubuntu2.6) trusty-security; urgency=medium

  * SECURITY UPDATE: stack overflow when reading FTS or POP3-UIDL header
- debian/patches/CVE-2019-7524-2.patch: fix buffer overflow when
  reading oversized fts header in src/plugins/fts/fts-api.c.
- CVE-2019-7524

Date: 2019-03-29 13:00:26.533282+00:00
Changed-By: Marc Deslauriers 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/dovecot/1:2.2.9-1ubuntu2.6
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes


[ubuntu/trusty-security] dovecot 1:2.2.9-1ubuntu2.6 (Accepted)

2019-04-01 Thread Marc Deslauriers
dovecot (1:2.2.9-1ubuntu2.6) trusty-security; urgency=medium

  * SECURITY UPDATE: stack overflow when reading FTS or POP3-UIDL header
- debian/patches/CVE-2019-7524-2.patch: fix buffer overflow when
  reading oversized fts header in src/plugins/fts/fts-api.c.
- CVE-2019-7524

Date: 2019-03-29 13:00:26.533282+00:00
Changed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/dovecot/1:2.2.9-1ubuntu2.6
Sorry, changesfile not available.-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes