[ubuntu/xenial-updates] nplan 0.32~16.04.5 (Accepted)
nplan (0.32~16.04.5) xenial; urgency=medium * bond/bridge: Support suffixes for time-based values so things like "mii-monitor-interval" can support milliseconds. (LP: #1745597) * Do not attempt to rebind driver 'qeth'. (LP: #1756322) * Allow setting ClientIdentifier=mac for networkd-renderered devices (LP: #1738998) * IPv6: accept-ra should default to being unset, so that the kernel default can be used. (LP: #1732002) * doc/netplan.md: Clarify the behavior for time-based values for bonds and bridges. (LP: #1756587) * critical: provide a way to set "CriticalConnection=true" on a networkd connection, especially for remote-fs scenarios. (LP: #1769682) * networkd: don't wipe out /run/netplan on generate: we do want to keep any YAML configurations in that directory, we just need to remove generated wpasupplicant configs. (LP: #1764869) Date: 2018-05-08 17:43:09.589871+00:00 Changed-By: Mathieu Trudel-Lapierre Signed-By: Chris Halse Rogers https://launchpad.net/ubuntu/+source/nplan/0.32~16.04.5 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] git 1:2.7.4-0ubuntu1.4 (Accepted)
git (1:2.7.4-0ubuntu1.4) xenial-security; urgency=medium * SECURITY UPDATE: arbitrary code execution via submodule names in .gitsubmodules. - 0014-fsck-simplify-.git-check.patch - 0015-fsck-actually-fsck-blob-data.patch - 0016-fsck-detect-gitmodules-files.patch - 0017-fsck-check-.gitmodules-content.patch - 0018-fsck-call-fsck_finish-after-fscking-objects.patch - 0019-unpack-objects-call-fsck_finish-after-fscking-object.patch - 0020-index-pack-check-.gitmodules-files-with-strict.patch - CVE-2018-11235 (LP: #1774061) * SECURITY UPDATE: out-of-bounds memory access when sanity-checking pathnames on NTFS - 0002-is_ntfs_dotgit-use-a-size_t-for-traversing-string.patch - CVE-2018-11233 * Do not allow .gitmodules to be a symlink: - 0003-is_hfs_dotgit-match-other-.git-files.patch - 0004-is_ntfs_dotgit-match-other-.git-files.patch - 0005-is_-hfs-ntfs-_dotgitmodules-add-tests.patch - 0006-skip_prefix-add-case-insensitive-variant.patch - 0007-verify_path-drop-clever-fallthrough.patch - 0008-verify_dotfile-mention-case-insensitivity-in-comment.patch - 0009-update-index-stat-updated-files-earlier.patch - 0010-verify_path-disallow-symlinks-in-.gitmodules.patch - 0011-sha1_file-add-read_loose_object-function.patch - 0012-fsck-parse-loose-object-paths-directly.patch - 0013-index-pack-make-fsck-error-message-more-specific.patch - 0021-fsck-complain-when-.gitmodules-is-a-symlink.patch * debian/rules: ensure added tests are executable. Date: 2018-06-05 07:32:16.369593+00:00 Changed-By: Steve Beattie Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/git/1:2.7.4-0ubuntu1.4 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] git 1:2.7.4-0ubuntu1.4 (Accepted)
git (1:2.7.4-0ubuntu1.4) xenial-security; urgency=medium * SECURITY UPDATE: arbitrary code execution via submodule names in .gitsubmodules. - 0014-fsck-simplify-.git-check.patch - 0015-fsck-actually-fsck-blob-data.patch - 0016-fsck-detect-gitmodules-files.patch - 0017-fsck-check-.gitmodules-content.patch - 0018-fsck-call-fsck_finish-after-fscking-objects.patch - 0019-unpack-objects-call-fsck_finish-after-fscking-object.patch - 0020-index-pack-check-.gitmodules-files-with-strict.patch - CVE-2018-11235 (LP: #1774061) * SECURITY UPDATE: out-of-bounds memory access when sanity-checking pathnames on NTFS - 0002-is_ntfs_dotgit-use-a-size_t-for-traversing-string.patch - CVE-2018-11233 * Do not allow .gitmodules to be a symlink: - 0003-is_hfs_dotgit-match-other-.git-files.patch - 0004-is_ntfs_dotgit-match-other-.git-files.patch - 0005-is_-hfs-ntfs-_dotgitmodules-add-tests.patch - 0006-skip_prefix-add-case-insensitive-variant.patch - 0007-verify_path-drop-clever-fallthrough.patch - 0008-verify_dotfile-mention-case-insensitivity-in-comment.patch - 0009-update-index-stat-updated-files-earlier.patch - 0010-verify_path-disallow-symlinks-in-.gitmodules.patch - 0011-sha1_file-add-read_loose_object-function.patch - 0012-fsck-parse-loose-object-paths-directly.patch - 0013-index-pack-make-fsck-error-message-more-specific.patch - 0021-fsck-complain-when-.gitmodules-is-a-symlink.patch * debian/rules: ensure added tests are executable. Date: 2018-06-05 07:32:16.369593+00:00 Changed-By: Steve Beattie https://launchpad.net/ubuntu/+source/git/1:2.7.4-0ubuntu1.4 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] elfutils 0.165-3ubuntu1.1 (Accepted)
elfutils (0.165-3ubuntu1.1) xenial-security; urgency=medium * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading an ELF file for sanity checks. Based on upstream patch. - CVE-2016-10254 * SECURITY UPDATE: Denial of service via memory consumption when handling crafted ELF files - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before trying to malloc and read data. Based on upstream patch. - CVE-2016-10255 * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2017-7607.patch: Fix off by one sanity check in handle_gnu_hash. Based on upstream patch. - CVE-2017-7607 * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2017-7608.patch: Use the empty string for note names with zero size. Based on upstream patch. - CVE-2017-7608 * SECURITY UPDATE: Denial of service via memory consumption when handling crafted ELF files - debian/patches/CVE-2017-7609.patch: Check compression ratio before trying to allocate output buffer. Based on upstream patch. - CVE-2017-7609 * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2017-7610.patch: Don't check section group without flags word. Based on upstream patch. - CVE-2017-7610 * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2017-7611.patch: Check symbol table data is big enough before checking. Based on upstream patch. - CVE-2017-7611 * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking hash sections. Based on upstream patch. - CVE-2017-7612 * SECURITY UPDATE: Denial of service via memory consumption when handling crafted ELF files - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and shdrs available. Based on upstream patch. - CVE-2017-7613 Date: 2017-05-18 21:41:24.746981+00:00 Changed-By: Tyler Hicks Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/elfutils/0.165-3ubuntu1.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] elfutils 0.165-3ubuntu1.1 (Accepted)
elfutils (0.165-3ubuntu1.1) xenial-security; urgency=medium * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2016-10254.patch: Always set ELF maxsize when reading an ELF file for sanity checks. Based on upstream patch. - CVE-2016-10254 * SECURITY UPDATE: Denial of service via memory consumption when handling crafted ELF files - debian/patches/CVE-2016-10255.patch: Sanity check offset and size before trying to malloc and read data. Based on upstream patch. - CVE-2016-10255 * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2017-7607.patch: Fix off by one sanity check in handle_gnu_hash. Based on upstream patch. - CVE-2017-7607 * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2017-7608.patch: Use the empty string for note names with zero size. Based on upstream patch. - CVE-2017-7608 * SECURITY UPDATE: Denial of service via memory consumption when handling crafted ELF files - debian/patches/CVE-2017-7609.patch: Check compression ratio before trying to allocate output buffer. Based on upstream patch. - CVE-2017-7609 * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2017-7610.patch: Don't check section group without flags word. Based on upstream patch. - CVE-2017-7610 * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2017-7611.patch: Check symbol table data is big enough before checking. Based on upstream patch. - CVE-2017-7611 * SECURITY UPDATE: Denial of service via invalid memory read when handling crafted ELF files - debian/patches/CVE-2017-7612.patch: Don't trust sh_entsize when checking hash sections. Based on upstream patch. - CVE-2017-7612 * SECURITY UPDATE: Denial of service via memory consumption when handling crafted ELF files - debian/patches/CVE-2017-7613.patch: Sanity check the number of phdrs and shdrs available. Based on upstream patch. - CVE-2017-7613 Date: 2017-05-18 21:41:24.746981+00:00 Changed-By: Tyler Hicks Signed-By: Marc Deslauriers https://launchpad.net/ubuntu/+source/elfutils/0.165-3ubuntu1.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/partner/xenial] google-cloud-sdk 201.0.0-0ubuntu2~16.04.0 (Accepted)
google-cloud-sdk (201.0.0-0ubuntu2~16.04.0) xenial; urgency=medium * debian/install: - Make sure we install usr/lib/google-cloud-sdk/properties. google-cloud-sdk (201.0.0-0ubuntu1~16.04.0) xenial; urgency=medium * New upstream release google-cloud-sdk (191.0.0-0ubuntu2) bionic; urgency=medium * debian/postinst: - The 191.0.0 tarball now also ships python3 code in the third_party directory - add --exclude=.*python3.* to the postinst pycompile to omit those. Date: 2018-06-04 19:56:09.738330+00:00 Changed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/google-cloud-sdk/201.0.0-0ubuntu2~16.04.0 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes