samba (2:4.3.11+dfsg-0ubuntu0.16.04.15) xenial-security; urgency=medium
* SECURITY UPDATE: Insufficient input validation on client directory
listing in libsmbclient
- debian/patches/CVE-2018-10858-*.patch: don't overwrite passed in
buffer in source3/libsmb/libsmb_path.c, add checks
linux (4.4.0-133.159) xenial; urgency=medium
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-36
linux-signed (4.4.0-133.159) xenial; urgency=medium
* Version 4.4.0-133.159
Date: 2018-08-13 07:33:20.621054+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-signed/4.4.0-133.159
Sorry, changesfile not available.--
Xenial-changes mailing lis
linux-aws (4.4.0-1065.75) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
linux-meta (4.4.0.133.139) xenial; urgency=medium
* Bump ABI 4.4.0-133
Date: 2018-08-13 07:33:13.371402+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta/4.4.0.133.139
Sorry, changesfile not available.--
Xenial-changes mailing list
Xenia
linux-meta-aws (4.4.0.1065.67) xenial; urgency=medium
* Bump ABI 4.4.0-1065
Date: 2018-08-13 10:30:13.162269+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-aws/4.4.0.1065.67
Sorry, changesfile not available.--
Xenial-changes mailing l
linux-meta-azure-edge (4.15.0.1021.18) xenial; urgency=medium
* Bump ABI 4.15.0-1021
Date: 2018-08-13 11:01:22.773896+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-azure-edge/4.15.0.1021.18
Sorry, changesfile not available.--
Xenial-
linux-signed-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-1021.21~16.04.1
Date: 2018-08-13 10:36:16.160043+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-signed-azure/4.15.0-1021.21~16.04.1
Sorry, changesfi
linux-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-32.34 ]
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU
linux-meta-azure (4.15.0.1021.27) xenial; urgency=medium
* Bump ABI 4.15.0-1021
Date: 2018-08-13 10:36:13.769990+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-azure/4.15.0.1021.27
Sorry, changesfile not available.--
Xenial-changes ma
linux-meta-gcp (4.15.0.1017.29) xenial; urgency=medium
* Bump ABI 4.15.0-1017
Date: 2018-08-13 10:57:19.133201+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1017.29
Sorry, changesfile not available.--
Xenial-changes mailin
linux-gcp (4.15.0-1017.18~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-32.34 ]
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU/c
linux-meta-hwe-edge (4.15.0.32.53) xenial; urgency=medium
* Bump ABI 4.15.0-32
Date: 2018-08-13 11:05:17.191074+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-hwe-edge/4.15.0.32.53
Sorry, changesfile not available.--
Xenial-changes ma
linux (4.4.0-133.159) xenial; urgency=medium
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-36
linux-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-32.34 ]
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU
linux-meta-kvm (4.4.0.1031.30) xenial; urgency=medium
* Bump ABI 4.4.0-1031
Date: 2018-08-13 10:40:14.071677+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-kvm/4.4.0.1031.30
Sorry, changesfile not available.--
Xenial-changes mailing l
linux-meta-raspi2 (4.4.0.1094.94) xenial; urgency=medium
* Bump ABI 4.4.0-1094
Date: 2018-08-13 10:22:12.802788+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-raspi2/4.4.0.1094.94
Sorry, changesfile not available.--
Xenial-changes mai
linux-raspi2 (4.4.0-1094.102) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limit
linux-kvm (4.4.0-1031.37) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
linux-meta-hwe (4.15.0.32.54) xenial; urgency=medium
* Bump ABI 4.15.0-32
Date: 2018-08-10 21:48:12.349454+00:00
Changed-By: Thadeu Lima de Souza Cascardo
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-hwe/4.15.0.32.54
Sorry, changesfile not available.--
Xenial-cha
linux-signed-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-32.35~16.04.1
Date: 2018-08-10 21:49:12.504329+00:00
Changed-By: Thadeu Lima de Souza Cascardo
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-signed-hwe/4.15.0-32.35~16.04.1
Sorry, ch
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium
[ Stefan Bader ]
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU/cache topology
- x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be present
linux-meta-snapdragon (4.4.0.1098.90) xenial; urgency=medium
* Bump ABI 4.4.0-1098
Date: 2018-08-13 10:26:14.576258+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-snapdragon/4.4.0.1098.90
Sorry, changesfile not available.--
Xenial-cha
linux-snapdragon (4.4.0-1098.103) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage l
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium
[ Stefan Bader ]
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU/cache topology
- x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be present
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium
[ Stefan Bader ]
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU/cache topology
- x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be present
samba (2:4.3.11+dfsg-0ubuntu0.16.04.15) xenial-security; urgency=medium
* SECURITY UPDATE: Insufficient input validation on client directory
listing in libsmbclient
- debian/patches/CVE-2018-10858-*.patch: don't overwrite passed in
buffer in source3/libsmb/libsmb_path.c, add checks
libxml2 (2.9.3+dfsg1-1ubuntu0.6) xenial-security; urgency=medium
* SECURITY UPDATE: XXE attacks
- debian/patches/CVE-2016-9318.patch: fix in parser.c.
- CVE-2016-9318
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2017-18258.patch: fix in xzlib.c.
- CVE-2017-18258
libxml2 (2.9.3+dfsg1-1ubuntu0.6) xenial-security; urgency=medium
* SECURITY UPDATE: XXE attacks
- debian/patches/CVE-2016-9318.patch: fix in parser.c.
- CVE-2016-9318
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2017-18258.patch: fix in xzlib.c.
- CVE-2017-18258
linux (4.4.0-133.159) xenial; urgency=medium
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-36
linux (4.4.0-133.159) xenial; urgency=medium
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-36
linux-meta (4.4.0.133.139) xenial; urgency=medium
* Bump ABI 4.4.0-133
linux-meta (4.4.0.132.138) xenial; urgency=medium
* Bump ABI 4.4.0-132
linux-meta (4.4.0.131.137) xenial; urgency=medium
* Bump ABI 4.4.0-131
Date: 2018-08-13 07:33:13.371402+00:00
Changed-By: Stefan Bader
Signed-By
linux-aws (4.4.0-1065.75) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
linux-meta-aws (4.4.0.1065.67) xenial; urgency=medium
* Bump ABI 4.4.0-1065
linux-meta-aws (4.4.0.1064.66) xenial; urgency=medium
* Bump ABI 4.4.0-1064
linux-meta-aws (4.4.0.1063.65) xenial; urgency=medium
* Bump ABI 4.4.0-1063
Date: 2018-08-13 10:30:13.162269+00:00
Changed-By: Stefan B
linux-signed (4.4.0-133.159) xenial; urgency=medium
* Version 4.4.0-133.159
linux-signed (4.4.0-132.158) xenial; urgency=medium
* Version 4.4.0-132.158
Date: 2018-08-13 07:33:20.621054+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-sign
linux-signed (4.4.0-133.159) xenial; urgency=medium
* Version 4.4.0-133.159
linux-signed (4.4.0-132.158) xenial; urgency=medium
* Version 4.4.0-132.158
linux-signed (4.4.0-131.157) xenial; urgency=medium
* Version 4.4.0-131.157
Date: 2018-08-13 07:33:20.621054+00:00
Changed-By: Stefan B
linux-meta-azure-edge (4.15.0.1021.18) xenial; urgency=medium
* Bump ABI 4.15.0-1021
linux-meta-azure-edge (4.15.0.1020.17) xenial; urgency=medium
* Bump ABI 4.15.0-1020
Date: 2018-08-13 11:01:22.773896+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/
linux-aws (4.4.0-1065.75) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
linux-meta-azure-edge (4.15.0.1021.18) xenial; urgency=medium
* Bump ABI 4.15.0-1021
linux-meta-azure-edge (4.15.0.1020.17) xenial; urgency=medium
* Bump ABI 4.15.0-1020
Date: 2018-08-13 11:01:22.773896+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/
linux-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-32.34 ]
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU
linux-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-32.34 ]
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU
linux-gcp (4.15.0-1017.18~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-32.34 ]
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU/c
linux-signed-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-1021.21~16.04.1
linux-signed-azure (4.15.0-1020.20~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-1020.20~16.04.1
Date: 2018-08-13 10:36:16.160043+00:00
Changed-By: Stefan Bader
Signed-By:
linux-signed-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-1021.21~16.04.1
linux-signed-azure (4.15.0-1020.20~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-1020.20~16.04.1
Date: 2018-08-13 10:36:16.160043+00:00
Changed-By: Stefan Bader
Signed-By:
linux-meta-gcp (4.15.0.1017.29) xenial; urgency=medium
* Bump ABI 4.15.0-1017
Date: 2018-08-13 10:57:19.133201+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1017.29
Sorry, changesfile not available.--
Xenial-changes mailin
linux-meta-gcp (4.15.0.1017.29) xenial; urgency=medium
* Bump ABI 4.15.0-1017
Date: 2018-08-13 10:57:19.133201+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1017.29
Sorry, changesfile not available.--
Xenial-changes mailin
linux-gcp (4.15.0-1017.18~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-32.34 ]
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU/c
linux-meta-azure (4.15.0.1021.27) xenial; urgency=medium
* Bump ABI 4.15.0-1021
linux-meta-azure (4.15.0.1020.26) xenial; urgency=medium
* Bump ABI 4.15.0-1020
Date: 2018-08-13 10:36:13.769990+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/li
linux-meta-azure (4.15.0.1021.27) xenial; urgency=medium
* Bump ABI 4.15.0-1021
linux-meta-azure (4.15.0.1020.26) xenial; urgency=medium
* Bump ABI 4.15.0-1020
Date: 2018-08-13 10:36:13.769990+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/li
linux-meta-hwe-edge (4.15.0.32.53) xenial; urgency=medium
* Bump ABI 4.15.0-32
linux-meta-hwe-edge (4.15.0.31.52) xenial; urgency=medium
* Bump ABI 4.15.0-31
Date: 2018-08-13 11:05:17.191074+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linu
linux-meta-hwe-edge (4.15.0.32.53) xenial; urgency=medium
* Bump ABI 4.15.0-32
linux-meta-hwe-edge (4.15.0.31.52) xenial; urgency=medium
* Bump ABI 4.15.0-31
Date: 2018-08-13 11:05:17.191074+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linu
linux-meta-kvm (4.4.0.1031.30) xenial; urgency=medium
* Bump ABI 4.4.0-1031
linux-meta-kvm (4.4.0.1030.29) xenial; urgency=medium
* Bump ABI 4.4.0-1030
Date: 2018-08-13 10:40:14.071677+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta
linux-signed-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-32.35~16.04.1
linux-signed-hwe (4.15.0-31.33~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-31.33~16.04.1
Date: 2018-08-10 21:49:12.504329+00:00
Changed-By: Thadeu Lima de Souza Cascardo
Signe
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium
[ Stefan Bader ]
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU/cache topology
- x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be present
linux-meta-hwe (4.15.0.32.54) xenial; urgency=medium
* Bump ABI 4.15.0-32
linux-meta-hwe (4.15.0.31.53) xenial; urgency=medium
* Bump ABI 4.15.0-31
Date: 2018-08-10 21:48:12.349454+00:00
Changed-By: Thadeu Lima de Souza Cascardo
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+sour
linux-signed-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-32.35~16.04.1
linux-signed-hwe (4.15.0-31.33~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-31.33~16.04.1
Date: 2018-08-10 21:49:12.504329+00:00
Changed-By: Thadeu Lima de Souza Cascardo
Signe
linux-kvm (4.4.0-1031.37) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
linux-meta-kvm (4.4.0.1031.30) xenial; urgency=medium
* Bump ABI 4.4.0-1031
linux-meta-kvm (4.4.0.1030.29) xenial; urgency=medium
* Bump ABI 4.4.0-1030
Date: 2018-08-13 10:40:14.071677+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta
linux-kvm (4.4.0-1031.37) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
linux-raspi2 (4.4.0-1094.102) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limit
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium
[ Stefan Bader ]
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU/cache topology
- x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be present
linux-raspi2 (4.4.0-1094.102) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limit
linux-meta-hwe (4.15.0.32.54) xenial; urgency=medium
* Bump ABI 4.15.0-32
linux-meta-hwe (4.15.0.31.53) xenial; urgency=medium
* Bump ABI 4.15.0-31
Date: 2018-08-10 21:48:12.349454+00:00
Changed-By: Thadeu Lima de Souza Cascardo
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+sour
linux-meta-raspi2 (4.4.0.1094.94) xenial; urgency=medium
* Bump ABI 4.4.0-1094
linux-meta-raspi2 (4.4.0.1093.93) xenial; urgency=medium
* Bump ABI 4.4.0-1093
Date: 2018-08-13 10:22:12.802788+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linu
linux-meta-raspi2 (4.4.0.1094.94) xenial; urgency=medium
* Bump ABI 4.4.0-1094
linux-meta-raspi2 (4.4.0.1093.93) xenial; urgency=medium
* Bump ABI 4.4.0-1093
Date: 2018-08-13 10:22:12.802788+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linu
linux-snapdragon (4.4.0-1098.103) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage l
linux-snapdragon (4.4.0-1098.103) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage l
linux-meta-snapdragon (4.4.0.1098.90) xenial; urgency=medium
* Bump ABI 4.4.0-1098
linux-meta-snapdragon (4.4.0.1097.89) xenial; urgency=medium
* Bump ABI 4.4.0-1097
linux-meta-snapdragon (4.4.0.1096.88) xenial; urgency=medium
* Bump ABI 4.4.0-1096
Date: 2018-08-13 10:26:14.576258+00:00
linux-meta-snapdragon (4.4.0.1098.90) xenial; urgency=medium
* Bump ABI 4.4.0-1098
linux-meta-snapdragon (4.4.0.1097.89) xenial; urgency=medium
* Bump ABI 4.4.0-1097
Date: 2018-08-13 10:26:14.576258+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+sou
linux-meta (4.4.0.133.139) xenial; urgency=medium
* Bump ABI 4.4.0-133
linux-meta (4.4.0.132.138) xenial; urgency=medium
* Bump ABI 4.4.0-132
Date: 2018-08-13 07:33:13.371402+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta/4.4.0.133
linux-meta-aws (4.4.0.1065.67) xenial; urgency=medium
* Bump ABI 4.4.0-1065
linux-meta-aws (4.4.0.1064.66) xenial; urgency=medium
* Bump ABI 4.4.0-1064
Date: 2018-08-13 10:30:13.162269+00:00
Changed-By: Stefan Bader
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta
linux-raspi2 (4.4.0-1094.102) xenial; urgency=medium
[ Ubuntu: 4.4.0-133.159 ]
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limit
linux (4.4.0-133.159) xenial; urgency=medium
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-36
linux-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-32.34 ]
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium
[ Stefan Bader ]
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU/cache topology
- x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be present
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium
[ Stefan Bader ]
* CVE-2018-3620 // CVE-2018-3646
- x86/Centaur: Initialize supported CPU features properly
- x86/Centaur: Report correct CPU/cache topology
- x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be present
keepalived (1:1.2.24-1ubuntu0.16.04.1) xenial; urgency=medium
* New upstream version for Ubuntu 16.04 (LP: #1783583).
* d/p/fix_message_truncation_with_large_pagesizes.patch: Rebased.
* d/p/fix-removing-left-over-addresses-if-keepalived-abort.patch:
Cherry-picked from upstream to ensure
77 matches
Mail list logo