keepalived (1:1.2.24-1ubuntu0.16.04.1) xenial; urgency=medium
* New upstream version for Ubuntu 16.04 (LP: #1783583).
* d/p/fix_message_truncation_with_large_pagesizes.patch: Rebased.
* d/p/fix-removing-left-over-addresses-if-keepalived-abort.patch:
Cherry-picked from upstream to ensure
xorg (1:7.7+13ubuntu3.1) xenial; urgency=medium
* x11-common.preinst:
- Rename nux config leftovers which might change the environment
even when not running an unity session (LP: #1768610)
* debian/control:
- x11-common breaks nux-tools (<< 4.0.8+16.04.20180613.1-0ubuntu1) - this
nux (4.0.8+16.04.20180622.2-0ubuntu1) xenial; urgency=medium
* debian/control: update Vcs
* debian/nux-tools.preinst:
- Restore backup config files before installing nux-tools, so that they
will be updaded with the fixed versions (LP: #1768610)
nux (4.0.8+16.04.20180613.1-0ubuntu1)
openssl-ibmca (1.3.0-0ubuntu2.16.04.2) xenial; urgency=medium
* Apply upstream patch to resolve crashes when libssl attempts to
initialise engine a few times too many. LP: #1543455
Date: 2018-07-24 15:32:08.880851+00:00
Changed-By: Dimitri John Ledkov
Signed-By: Łukasz Zemczak
https://lau
libxcursor (1:1.1.14-1ubuntu0.16.04.2) xenial-security; urgency=medium
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2015-9262.patch: fix in src/library.c.
- CVE-2015-9262
Date: 2018-08-02 15:01:13.519398+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
http
libxcursor (1:1.1.14-1ubuntu0.16.04.2) xenial-security; urgency=medium
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2015-9262.patch: fix in src/library.c.
- CVE-2015-9262
Date: 2018-08-02 15:01:13.519398+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Sign
linux-meta-azure-edge (4.15.0.1019.16) xenial; urgency=medium
* Bump ABI 4.15.0-1019
Date: 2018-07-27 11:41:13.432373+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-azure-edge/4.15.0.1019.16
Sorry, changesfile not available.--
Xenial-
linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-30.32 ]
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- t
linux-meta-azure (4.15.0.1019.25) xenial; urgency=medium
* Bump ABI 4.15.0-1019
Date: 2018-07-27 08:21:12.870682+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-azure/4.15.0.1019.25
Sorry, changesfile not available.--
Xenial-changes ma
linux-signed-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-1019.19~16.04.1
Date: 2018-07-27 08:21:15.559269+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-signed-azure/4.15.0-1019.19~16.04.1
Sorry, changesfi
linux-meta-gcp (4.15.0.1015.27) xenial; urgency=medium
* Bump ABI 4.15.0-1015
Date: 2018-07-27 08:23:13.088331+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1015.27
Sorry, changesfile not available.--
Xenial-changes mailin
linux-meta-hwe-edge (4.15.0.30.51) xenial; urgency=medium
* Bump ABI 4.15.0-30
Date: 2018-07-27 11:39:12.362392+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-hwe-edge/4.15.0.30.51
Sorry, changesfile not available.--
Xenial-changes ma
linux-gcp (4.15.0-1015.15~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-30.32 ]
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp
linux-meta-hwe (4.15.0.30.52) xenial; urgency=medium
* Bump ABI 4.15.0-30
Date: 2018-07-27 11:15:12.440680+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-hwe/4.15.0.30.52
Sorry, changesfile not available.--
Xenial-changes mailing list
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_dat
linux-signed-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-30.32~16.04.1
Date: 2018-07-27 11:15:16.716923+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-signed-hwe/4.15.0-30.32~16.04.1
Sorry, changesfile not ava
linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-30.32 ]
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- t
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_dat
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_dat
lftp (4.6.3a-1ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Incorrectly sanitize remote file names
- debian/patches/CVE-2018-10196.patch: fix in src/MirrorJob.cc.
- CVE-2018-10196
Date: 2018-08-03 16:55:24.842833+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. B
linux-meta-azure (4.15.0.1019.25) xenial; urgency=medium
* Bump ABI 4.15.0-1019
Date: 2018-07-27 08:21:12.870682+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-azure/4.15.0.1019.25
Sorry, changesfile not available.--
Xenial-changes ma
linux-meta-azure-edge (4.15.0.1019.16) xenial; urgency=medium
* Bump ABI 4.15.0-1019
Date: 2018-07-27 11:41:13.432373+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-azure-edge/4.15.0.1019.16
Sorry, changesfile not available.--
Xenial-
linux-meta-azure-edge (4.15.0.1019.16) xenial; urgency=medium
* Bump ABI 4.15.0-1019
Date: 2018-07-27 11:41:13.432373+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-azure-edge/4.15.0.1019.16
Sorry, changesfile not available.--
Xenial-
linux-gcp (4.15.0-1015.15~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-30.32 ]
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp
linux-gcp (4.15.0-1015.15~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-30.32 ]
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp
linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-30.32 ]
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- t
linux-signed-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-1019.19~16.04.1
Date: 2018-07-27 08:21:15.559269+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-signed-azure/4.15.0-1019.19~16.04.1
Sorry, changesfi
linux-meta-azure (4.15.0.1019.25) xenial; urgency=medium
* Bump ABI 4.15.0-1019
Date: 2018-07-27 08:21:12.870682+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-azure/4.15.0.1019.25
Sorry, changesfile not available.--
Xenial-changes ma
linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-30.32 ]
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- t
linux-signed-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-1019.19~16.04.1
Date: 2018-07-27 08:21:15.559269+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-signed-azure/4.15.0-1019.19~16.04.1
Sorry, changesfi
linux-meta-hwe-edge (4.15.0.30.51) xenial; urgency=medium
* Bump ABI 4.15.0-30
Date: 2018-07-27 11:39:12.362392+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-hwe-edge/4.15.0.30.51
Sorry, changesfile not available.--
Xenial-changes ma
linux-meta-gcp (4.15.0.1015.27) xenial; urgency=medium
* Bump ABI 4.15.0-1015
Date: 2018-07-27 08:23:13.088331+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1015.27
Sorry, changesfile not available.--
Xenial-changes mailin
lftp (4.6.3a-1ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Incorrectly sanitize remote file names
- debian/patches/CVE-2018-10196.patch: fix in src/MirrorJob.cc.
- CVE-2018-10196
Date: 2018-08-03 16:55:24.842833+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. B
linux-meta-hwe-edge (4.15.0.30.51) xenial; urgency=medium
* Bump ABI 4.15.0-30
Date: 2018-07-27 11:39:12.362392+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-hwe-edge/4.15.0.30.51
Sorry, changesfile not available.--
Xenial-changes ma
linux-meta-gcp (4.15.0.1015.27) xenial; urgency=medium
* Bump ABI 4.15.0-1015
Date: 2018-07-27 08:23:13.088331+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1015.27
Sorry, changesfile not available.--
Xenial-changes mailin
linux-meta-hwe (4.15.0.30.52) xenial; urgency=medium
* Bump ABI 4.15.0-30
Date: 2018-07-27 11:15:12.440680+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-hwe/4.15.0.30.52
Sorry, changesfile not available.--
Xenial-changes mailing list
linux-signed-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-30.32~16.04.1
Date: 2018-07-27 11:15:16.716923+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-signed-hwe/4.15.0-30.32~16.04.1
Sorry, changesfile not ava
linux-meta-hwe (4.15.0.30.52) xenial; urgency=medium
* Bump ABI 4.15.0-30
Date: 2018-07-27 11:15:12.440680+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-hwe/4.15.0.30.52
Sorry, changesfile not available.--
Xenial-changes mailing list
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_dat
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_dat
linux-signed-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-30.32~16.04.1
Date: 2018-07-27 11:15:16.716923+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-signed-hwe/4.15.0-30.32~16.04.1
Sorry, changesfile not ava
linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-30.32 ]
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- t
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_dat
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium
* CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_dat
libtomcrypt (1.17-7ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Fix possible bleichenbacher signature attack.
- debian/patches/CVE-2016-6129.patch: fix in
src/pk/rsa/rsa_verify_hash.c
- CVE-2016-6129
* SECURITY UPDATE: Memory side-channel attack on ECDSA signatu
libtomcrypt (1.17-7ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Fix possible bleichenbacher signature attack.
- debian/patches/CVE-2016-6129.patch: fix in
src/pk/rsa/rsa_verify_hash.c
- CVE-2016-6129
* SECURITY UPDATE: Memory side-channel attack on ECDSA signatu
gnupg (1.4.20-1ubuntu3.3) xenial-security; urgency=medium
* SECURITY UPDATE: full RSA key recovery via side-channel attack
- debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-2.patch: use same computation for square
and multiply in
gnupg (1.4.20-1ubuntu3.3) xenial-security; urgency=medium
* SECURITY UPDATE: full RSA key recovery via side-channel attack
- debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-2.patch: use same computation for square
and multiply in
znc (1.6.3-1ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Privilege escalation for non-admin users (LP: #1781925)
- debian/patches/CVE-2018-14055-1.patch: Remove newlines from incoming
network configuration change directives. Based on upstream patch.
- debian/patche
znc (1.6.3-1ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Privilege escalation for non-admin users (LP: #1781925)
- debian/patches/CVE-2018-14055-1.patch: Remove newlines from incoming
network configuration change directives. Based on upstream patch.
- debian/patche
50 matches
Mail list logo