[ubuntu/xenial-updates] nplan 0.32~16.04.5 (Accepted)

2018-06-05 Thread Chris Halse Rogers
nplan (0.32~16.04.5) xenial; urgency=medium

  * bond/bridge: Support suffixes for time-based values so things like
"mii-monitor-interval" can support milliseconds. (LP: #1745597)
  * Do not attempt to rebind driver 'qeth'. (LP: #1756322)
  * Allow setting ClientIdentifier=mac for networkd-renderered devices
(LP: #1738998)
  * IPv6: accept-ra should default to being unset, so that the kernel default
can be used. (LP: #1732002)
  * doc/netplan.md: Clarify the behavior for time-based values for bonds
and bridges. (LP: #1756587)
  * critical: provide a way to set "CriticalConnection=true" on a networkd
connection, especially for remote-fs scenarios. (LP: #1769682)
  * networkd: don't wipe out /run/netplan on generate: we do want to keep any
YAML configurations in that directory, we just need to remove generated
wpasupplicant configs. (LP: #1764869)

Date: 2018-05-08 17:43:09.589871+00:00
Changed-By: Mathieu Trudel-Lapierre 
Signed-By: Chris Halse Rogers 
https://launchpad.net/ubuntu/+source/nplan/0.32~16.04.5
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] git 1:2.7.4-0ubuntu1.4 (Accepted)

2018-06-05 Thread Ubuntu Archive Robot
git (1:2.7.4-0ubuntu1.4) xenial-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via
submodule names in .gitsubmodules.
- 0014-fsck-simplify-.git-check.patch
- 0015-fsck-actually-fsck-blob-data.patch
- 0016-fsck-detect-gitmodules-files.patch
- 0017-fsck-check-.gitmodules-content.patch
- 0018-fsck-call-fsck_finish-after-fscking-objects.patch
- 0019-unpack-objects-call-fsck_finish-after-fscking-object.patch
- 0020-index-pack-check-.gitmodules-files-with-strict.patch
- CVE-2018-11235 (LP: #1774061)
  * SECURITY UPDATE: out-of-bounds memory access when sanity-checking
pathnames on NTFS
- 0002-is_ntfs_dotgit-use-a-size_t-for-traversing-string.patch
- CVE-2018-11233
  * Do not allow .gitmodules to be a symlink:
- 0003-is_hfs_dotgit-match-other-.git-files.patch
- 0004-is_ntfs_dotgit-match-other-.git-files.patch
- 0005-is_-hfs-ntfs-_dotgitmodules-add-tests.patch
- 0006-skip_prefix-add-case-insensitive-variant.patch
- 0007-verify_path-drop-clever-fallthrough.patch
- 0008-verify_dotfile-mention-case-insensitivity-in-comment.patch
- 0009-update-index-stat-updated-files-earlier.patch
- 0010-verify_path-disallow-symlinks-in-.gitmodules.patch
- 0011-sha1_file-add-read_loose_object-function.patch
- 0012-fsck-parse-loose-object-paths-directly.patch
- 0013-index-pack-make-fsck-error-message-more-specific.patch
- 0021-fsck-complain-when-.gitmodules-is-a-symlink.patch
  * debian/rules: ensure added tests are executable.

Date: 2018-06-05 07:32:16.369593+00:00
Changed-By: Steve Beattie 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/git/1:2.7.4-0ubuntu1.4
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] git 1:2.7.4-0ubuntu1.4 (Accepted)

2018-06-05 Thread Steve Beattie
git (1:2.7.4-0ubuntu1.4) xenial-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via
submodule names in .gitsubmodules.
- 0014-fsck-simplify-.git-check.patch
- 0015-fsck-actually-fsck-blob-data.patch
- 0016-fsck-detect-gitmodules-files.patch
- 0017-fsck-check-.gitmodules-content.patch
- 0018-fsck-call-fsck_finish-after-fscking-objects.patch
- 0019-unpack-objects-call-fsck_finish-after-fscking-object.patch
- 0020-index-pack-check-.gitmodules-files-with-strict.patch
- CVE-2018-11235 (LP: #1774061)
  * SECURITY UPDATE: out-of-bounds memory access when sanity-checking
pathnames on NTFS
- 0002-is_ntfs_dotgit-use-a-size_t-for-traversing-string.patch
- CVE-2018-11233
  * Do not allow .gitmodules to be a symlink:
- 0003-is_hfs_dotgit-match-other-.git-files.patch
- 0004-is_ntfs_dotgit-match-other-.git-files.patch
- 0005-is_-hfs-ntfs-_dotgitmodules-add-tests.patch
- 0006-skip_prefix-add-case-insensitive-variant.patch
- 0007-verify_path-drop-clever-fallthrough.patch
- 0008-verify_dotfile-mention-case-insensitivity-in-comment.patch
- 0009-update-index-stat-updated-files-earlier.patch
- 0010-verify_path-disallow-symlinks-in-.gitmodules.patch
- 0011-sha1_file-add-read_loose_object-function.patch
- 0012-fsck-parse-loose-object-paths-directly.patch
- 0013-index-pack-make-fsck-error-message-more-specific.patch
- 0021-fsck-complain-when-.gitmodules-is-a-symlink.patch
  * debian/rules: ensure added tests are executable.

Date: 2018-06-05 07:32:16.369593+00:00
Changed-By: Steve Beattie 
https://launchpad.net/ubuntu/+source/git/1:2.7.4-0ubuntu1.4
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] elfutils 0.165-3ubuntu1.1 (Accepted)

2018-06-05 Thread Ubuntu Archive Robot
elfutils (0.165-3ubuntu1.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
  an ELF file for sanity checks. Based on upstream patch.
- CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
crafted ELF files
- debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
  trying to malloc and read data. Based on upstream patch.
- CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2017-7607.patch: Fix off by one sanity check in
  handle_gnu_hash. Based on upstream patch.
- CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2017-7608.patch: Use the empty string for note names
  with zero size. Based on upstream patch.
- CVE-2017-7608
  * SECURITY UPDATE: Denial of service via memory consumption when handling
crafted ELF files
- debian/patches/CVE-2017-7609.patch: Check compression ratio before
  trying to allocate output buffer. Based on upstream patch.
- CVE-2017-7609
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2017-7610.patch: Don't check section group without
  flags word. Based on upstream patch.
- CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2017-7611.patch: Check symbol table data is big
  enough before checking. Based on upstream patch.
- CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
  hash sections. Based on upstream patch.
- CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
crafted ELF files
- debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
  shdrs available. Based on upstream patch.
- CVE-2017-7613

Date: 2017-05-18 21:41:24.746981+00:00
Changed-By: Tyler Hicks 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/elfutils/0.165-3ubuntu1.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] elfutils 0.165-3ubuntu1.1 (Accepted)

2018-06-05 Thread Marc Deslauriers
elfutils (0.165-3ubuntu1.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading
  an ELF file for sanity checks. Based on upstream patch.
- CVE-2016-10254
  * SECURITY UPDATE: Denial of service via memory consumption when handling
crafted ELF files
- debian/patches/CVE-2016-10255.patch: Sanity check offset and size before
  trying to malloc and read data. Based on upstream patch.
- CVE-2016-10255
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2017-7607.patch: Fix off by one sanity check in
  handle_gnu_hash. Based on upstream patch.
- CVE-2017-7607
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2017-7608.patch: Use the empty string for note names
  with zero size. Based on upstream patch.
- CVE-2017-7608
  * SECURITY UPDATE: Denial of service via memory consumption when handling
crafted ELF files
- debian/patches/CVE-2017-7609.patch: Check compression ratio before
  trying to allocate output buffer. Based on upstream patch.
- CVE-2017-7609
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2017-7610.patch: Don't check section group without
  flags word. Based on upstream patch.
- CVE-2017-7610
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2017-7611.patch: Check symbol table data is big
  enough before checking. Based on upstream patch.
- CVE-2017-7611
  * SECURITY UPDATE: Denial of service via invalid memory read when handling
crafted ELF files
- debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking
  hash sections. Based on upstream patch.
- CVE-2017-7612
  * SECURITY UPDATE: Denial of service via memory consumption when handling
crafted ELF files
- debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and
  shdrs available. Based on upstream patch.
- CVE-2017-7613

Date: 2017-05-18 21:41:24.746981+00:00
Changed-By: Tyler Hicks 
Signed-By: Marc Deslauriers 
https://launchpad.net/ubuntu/+source/elfutils/0.165-3ubuntu1.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/partner/xenial] google-cloud-sdk 201.0.0-0ubuntu2~16.04.0 (Accepted)

2018-06-05 Thread Łukasz Zemczak
google-cloud-sdk (201.0.0-0ubuntu2~16.04.0) xenial; urgency=medium

  * debian/install:
- Make sure we install usr/lib/google-cloud-sdk/properties.

google-cloud-sdk (201.0.0-0ubuntu1~16.04.0) xenial; urgency=medium

  * New upstream release

google-cloud-sdk (191.0.0-0ubuntu2) bionic; urgency=medium

  * debian/postinst:
- The 191.0.0 tarball now also ships python3 code in the third_party
  directory - add --exclude=.*python3.* to the postinst pycompile to omit
  those.

Date: 2018-06-04 19:56:09.738330+00:00
Changed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/google-cloud-sdk/201.0.0-0ubuntu2~16.04.0
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes