[ubuntu/xenial-updates] znc 1.6.3-1ubuntu0.1 (Accepted)

2018-08-06 Thread Ubuntu Archive Robot
znc (1.6.3-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Privilege escalation for non-admin users (LP: #1781925)
- debian/patches/CVE-2018-14055-1.patch: Remove newlines from incoming
  network configuration change directives. Based on upstream patch.
- debian/patches/CVE-2018-14055-2.patch: Remove extra newlines when
  writing out configuration file. Based on upstream patch.
- CVE-2018-14055
  * SECURITY UPDATE: Path traversal flaw allows access to files outside of
skins (LP: #1781925)
- debian/patches/CVE-2018-14056.patch: Replace path traversal components
  in skin names to ensure path traversal is not possible. Based on
  upstream patch.
- CVE-2018-14056

Date: 2018-08-03 05:08:39.022036+00:00
Changed-By: Alex Murray 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/znc/1.6.3-1ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] znc 1.6.3-1ubuntu0.1 (Accepted)

2018-08-06 Thread Alex Murray
znc (1.6.3-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Privilege escalation for non-admin users (LP: #1781925)
- debian/patches/CVE-2018-14055-1.patch: Remove newlines from incoming
  network configuration change directives. Based on upstream patch.
- debian/patches/CVE-2018-14055-2.patch: Remove extra newlines when
  writing out configuration file. Based on upstream patch.
- CVE-2018-14055
  * SECURITY UPDATE: Path traversal flaw allows access to files outside of
skins (LP: #1781925)
- debian/patches/CVE-2018-14056.patch: Replace path traversal components
  in skin names to ensure path traversal is not possible. Based on
  upstream patch.
- CVE-2018-14056

Date: 2018-08-03 05:08:39.022036+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/znc/1.6.3-1ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] gnupg 1.4.20-1ubuntu3.3 (Accepted)

2018-08-06 Thread Ubuntu Archive Robot
gnupg (1.4.20-1ubuntu3.3) xenial-security; urgency=medium

  * SECURITY UPDATE: full RSA key recovery via side-channel attack
- debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-2.patch: use same computation for square
  and multiply in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-3.patch: fix allocation size for mpi_pow
- debian/patches/CVE-2017-7526-4.patch: add exponent blinding in
  cipher/rsa.c.
- debian/patches/CVE-2017-7526-5.patch: allow different build directory
- CVE-2017-7526

Date: 2018-08-06 01:08:17.468128+00:00
Changed-By: Alex Murray 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/gnupg/1.4.20-1ubuntu3.3
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] gnupg 1.4.20-1ubuntu3.3 (Accepted)

2018-08-06 Thread Alex Murray
gnupg (1.4.20-1ubuntu3.3) xenial-security; urgency=medium

  * SECURITY UPDATE: full RSA key recovery via side-channel attack
- debian/patches/CVE-2017-7526-1.patch: simplify loop in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-2.patch: use same computation for square
  and multiply in mpi/mpi-pow.c.
- debian/patches/CVE-2017-7526-3.patch: fix allocation size for mpi_pow
- debian/patches/CVE-2017-7526-4.patch: add exponent blinding in
  cipher/rsa.c.
- debian/patches/CVE-2017-7526-5.patch: allow different build directory
- CVE-2017-7526

Date: 2018-08-06 01:08:17.468128+00:00
Changed-By: Alex Murray 
https://launchpad.net/ubuntu/+source/gnupg/1.4.20-1ubuntu3.3
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] libtomcrypt 1.17-7ubuntu0.1 (Accepted)

2018-08-06 Thread Ubuntu Archive Robot
libtomcrypt (1.17-7ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Fix possible bleichenbacher signature attack.
- debian/patches/CVE-2016-6129.patch: fix in
  src/pk/rsa/rsa_verify_hash.c
- CVE-2016-6129

  * SECURITY UPDATE: Memory side-channel attack on ECDSA signatures.
- debian/patches/CVE-2018-12437.patch: fix in
  src/pk/ecc/ecc_sign_hash.c
- CVE-2018-12437

Date: 2018-08-06 18:16:20.430797+00:00
Changed-By: Eduardo dos Santos Barretto 
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/libtomcrypt/1.17-7ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] libtomcrypt 1.17-7ubuntu0.1 (Accepted)

2018-08-06 Thread Eduardo dos Santos Barretto
libtomcrypt (1.17-7ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Fix possible bleichenbacher signature attack.
- debian/patches/CVE-2016-6129.patch: fix in
  src/pk/rsa/rsa_verify_hash.c
- CVE-2016-6129

  * SECURITY UPDATE: Memory side-channel attack on ECDSA signatures.
- debian/patches/CVE-2018-12437.patch: fix in
  src/pk/ecc/ecc_sign_hash.c
- CVE-2018-12437

Date: 2018-08-06 18:16:20.430797+00:00
Changed-By: Eduardo dos Santos Barretto 
https://launchpad.net/ubuntu/+source/libtomcrypt/1.17-7ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-hwe_4.15.0-30.32~16.04.1_amd64.tar.gz - (Accepted)

2018-08-06 Thread Stefan Bader
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

Date: Thu, 26 Jul 2018 17:20:29 +0200
Changed-By: Stefan Bader 
Maintainer: Launchpad Build Daemon 

Format: 1.8
Date: Thu, 26 Jul 2018 17:20:29 +0200
Source: linux-hwe
Binary: linux-source-4.15.0 linux-headers-4.15.0-30 linux-hwe-tools-4.15.0-30 
linux-hwe-cloud-tools-4.15.0-30 linux-image-unsigned-4.15.0-30-generic 
linux-modules-4.15.0-30-generic linux-modules-extra-4.15.0-30-generic 
linux-headers-4.15.0-30-generic linux-image-unsigned-4.15.0-30-generic-dbgsym 
linux-tools-4.15.0-30-generic linux-cloud-tools-4.15.0-30-generic 
linux-hwe-udebs-generic linux-image-unsigned-4.15.0-30-generic-lpae 
linux-modules-4.15.0-30-generic-lpae linux-modules-extra-4.15.0-30-generic-lpae 
linux-headers-4.15.0-30-generic-lpae 
linux-image-unsigned-4.15.0-30-generic-lpae-dbgsym 
linux-tools-4.15.0-30-generic-lpae linux-cloud-tools-4.15.0-30-generic-lpae 
linux-hwe-udebs-generic-lpae linux-image-unsigned-4.15.0-30-lowlatency 
linux-modules-4.15.0-30-lowlatency linux-modules-extra-4.15.0-30-lowlatency 
linux-headers-4.15.0-30-lowlatency 
linux-image-unsigned-4.15.0-30-lowlatency-dbgsym 
linux-tools-4.15.0-30-lowlatency linux-cloud-tools-4.15.0-30-lowlatency
 linux-hwe-udebs-lowlatency kernel-image-4.15.0-30-generic-di 
fat-modules-4.15.0-30-generic-di fb-modules-4.15.0-30-generic-di 
firewire-core-modules-4.15.0-30-generic-di floppy-modules-4.15.0-30-generic-di 
fs-core-modules-4.15.0-30-generic-di fs-secondary-modules-4.15.0-30-generic-di 
input-modules-4.15.0-30-generic-di irda-modules-4.15.0-30-generic-di 
md-modules-4.15.0-30-generic-di nic-modules-4.15.0-30-generic-di 
nic-pcmcia-modules-4.15.0-30-generic-di nic-usb-modules-4.15.0-30-generic-di 
nic-shared-modules-4.15.0-30-generic-di parport-modules-4.15.0-30-generic-di 
pata-modules-4.15.0-30-generic-di pcmcia-modules-4.15.0-30-generic-di 
pcmcia-storage-modules-4.15.0-30-generic-di plip-modules-4.15.0-30-generic-di 
ppp-modules-4.15.0-30-generic-di sata-modules-4.15.0-30-generic-di 
scsi-modules-4.15.0-30-generic-di serial-modules-4.15.0-30-generic-di 
storage-core-modules-4.15.0-30-generic-di usb-modules-4.15.0-30-generic-di 
nfs-modules-4.15.0-30-generic-di
 block-modules-4.15.0-30-generic-di message-modules-4.15.0-30-generic-di 
crypto-modules-4.15.0-30-generic-di virtio-modules-4.15.0-30-generic-di 
mouse-modules-4.15.0-30-generic-di vlan-modules-4.15.0-30-generic-di 
ipmi-modules-4.15.0-30-generic-di
 multipath-modules-4.15.0-30-generic-di
Architecture: amd64 all amd64_translations
Version: 4.15.0-30.32~16.04.1
Distribution: xenial
Urgency: medium
Maintainer: Launchpad Build Daemon 
Changed-By: Stefan Bader 
Description:
 block-modules-4.15.0-30-generic-di - Block storage devices (udeb)
 crypto-modules-4.15.0-30-generic-di - crypto modules (udeb)
 fat-modules-4.15.0-30-generic-di - FAT filesystem support (udeb)
 fb-modules-4.15.0-30-generic-di - Framebuffer modules (udeb)
 firewire-core-modules-4.15.0-30-generic-di - Firewire (IEEE-1394) Support 
(udeb)
 floppy-modules-4.15.0-30-generic-di - Floppy driver support (udeb)
 fs-core-modules-4.15.0-30-generic-di - Base filesystem modules (udeb)
 fs-secondary-modules-4.15.0-30-generic-di - Extra filesystem modules (udeb)
 input-modules-4.15.0-30-generic-di - Support for various input methods (udeb)
 ipmi-modules-4.15.0-30-generic-di - ipmi modules (udeb)
 irda-modules-4.15.0-30-generic-di - Support for Infrared protocols (udeb)
 kernel-image-4.15.0-30-generic-di - kernel image and system map (udeb)
 linux-cloud-tools-4.15.0-30-generic - Linux kernel version specific cloud 
tools for version 4.15.0-30
 linux-cloud-tools-4.15.0-30-generic-lpae - Linux kernel version specific cloud 
tools for version 4.15.0-30
 linux-cloud-tools-4.15.0-30-lowlatency - Linux kernel version specific cloud 
tools for version 4.15.0-30
 linux-headers-4.15.0-30 - Header files related to Linux kernel version 4.15.0
 linux-headers-4.15.0-30-generic - Linux kernel headers for version 4.15.0 on 
64 bit x86 SMP
 linux-headers-4.15.0-30-generic-lpae - Linux kernel headers for version 4.15.0 
on 64 bit x86 SMP
 linux-headers-4.15.0-30-lowlatency - Linux kernel headers for version 4.15.0 
on 64 bit x86 SMP
 linux-hwe-cloud-tools-4.15.0-30 - Linux kernel version specific cloud tools 
for version 4.15.0-30
 linux-hwe-tools-4.15.0-30 - Linux kernel version specific tools for version 
4.15.0-30
 linux-hwe-udebs-generic - Metapackage depending on kernel udebs (udeb)
 linux-hwe-udebs-generic-lpae - Metapackage depending on kernel udebs (udeb)
 linux-hwe-udebs-lowlatency - Metapackage depending on kernel udebs (udeb)
 linux-image-unsigned-4.15.0-30-generic - Linux kernel image for version 4.15.0 
on 

[ubuntu/xenial-updates] linux-azure_4.15.0-1019.19~16.04.1_amd64.tar.gz - (Accepted)

2018-08-06 Thread Stefan Bader
linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-30.32 ]

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

Date: Thu, 26 Jul 2018 21:29:04 +0200
Changed-By: Stefan Bader 
Maintainer: Launchpad Build Daemon 

Format: 1.8
Date: Thu, 26 Jul 2018 21:29:04 +0200
Source: linux-azure
Binary: linux-azure-headers-4.15.0-1019 linux-azure-tools-4.15.0-1019 
linux-azure-cloud-tools-4.15.0-1019 linux-image-unsigned-4.15.0-1019-azure 
linux-modules-4.15.0-1019-azure linux-modules-extra-4.15.0-1019-azure 
linux-headers-4.15.0-1019-azure linux-image-unsigned-4.15.0-1019-azure-dbgsym 
linux-tools-4.15.0-1019-azure linux-cloud-tools-4.15.0-1019-azure 
linux-udebs-azure
Architecture: amd64 all amd64_translations
Version: 4.15.0-1019.19~16.04.1
Distribution: xenial
Urgency: medium
Maintainer: Launchpad Build Daemon 
Changed-By: Stefan Bader 
Description:
 linux-azure-cloud-tools-4.15.0-1019 - Linux kernel version specific cloud 
tools for version 4.15.0-1019
 linux-azure-headers-4.15.0-1019 - Header files related to Linux kernel version 
4.15.0
 linux-azure-tools-4.15.0-1019 - Linux kernel version specific tools for 
version 4.15.0-1019
 linux-cloud-tools-4.15.0-1019-azure - Linux kernel version specific cloud 
tools for version 4.15.0-1019
 linux-headers-4.15.0-1019-azure - Linux kernel headers for version 4.15.0 on 
64 bit x86 SMP
 linux-image-unsigned-4.15.0-1019-azure - Linux kernel image for version 4.15.0 
on 64 bit x86 SMP
 linux-image-unsigned-4.15.0-1019-azure-dbgsym - Linux kernel debug image for 
version 4.15.0 on 64 bit x86 SMP
 linux-modules-4.15.0-1019-azure - Linux kernel extra modules for version 
4.15.0 on 64 bit x86 SMP
 linux-modules-extra-4.15.0-1019-azure - Linux kernel extra modules for version 
4.15.0 on 64 bit x86 SMP
 linux-tools-4.15.0-1019-azure - Linux kernel version specific tools for 
version 4.15.0-1019
 linux-udebs-azure - Metapackage depending on kernel udebs (udeb)
Changes:
 linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium
 .
   [ Ubuntu: 4.15.0-30.32 ]
 .
   * CVE-2018-5390
 - tcp: free batches of packets in tcp_prune_ofo_queue()
 - tcp: avoid collapses in tcp_prune_queue() if possible
 - tcp: detect malicious patterns in tcp_collapse_ofo_queue()
 - tcp: call tcp_drop() from tcp_data_queue_ofo()
 - tcp: add tcp_ooo_try_coalesce() helper
Checksums-Sha1:
 b62d751beadc04fb5ddd594d72574023221e8bb3 858 
linux-azure-cloud-tools-4.15.0-1019-dbgsym_4.15.0-1019.19~16.04.1_amd64.ddeb
 096cbf9a88fb14d393d122089bb836a8d3d5a96d 42712 
linux-azure-cloud-tools-4.15.0-1019_4.15.0-1019.19~16.04.1_amd64.deb
 f5f9406b9be37336b8e45d829b64b4bfa5211bb0 11006142 
linux-azure-headers-4.15.0-1019_4.15.0-1019.19~16.04.1_all.deb
 36ca648f7618c4cc84ef13b05de8187f0d87e7df 880 
linux-azure-tools-4.15.0-1019-dbgsym_4.15.0-1019.19~16.04.1_amd64.ddeb
 915456e080c9ddda5532b9b28bb477e9aece43e9 1017322 
linux-azure-tools-4.15.0-1019_4.15.0-1019.19~16.04.1_amd64.deb
 8c54d9e7fefcca35fb07121a8302f5f49c965dc6 7665640 
linux-azure_4.15.0-1019.19~16.04.1_amd64.tar.gz
 ce698e947ef9afa7b6a67cbaf82ca5d19ecd86dd 24475 
linux-azure_4.15.0-1019.19~16.04.1_amd64_translations.tar.gz
 0512fe71e39720391ace18c45196c441aecc3283 1816 
linux-cloud-tools-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
 fcfaa1466d5ec6e39a9f128cbf4490e83edb9b53 901610 
linux-headers-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
 ec0de255e3372190d1b8d281ca4d606a82e83478 319706744 
linux-image-unsigned-4.15.0-1019-azure-dbgsym_4.15.0-1019.19~16.04.1_amd64.ddeb
 3c1e4a4758720d7aeda341d9f8d3023d9d76e4ae 7683814 
linux-image-unsigned-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
 cf09b8dde550e2fc86a91d25d0eee5a090e69849 11056822 
linux-modules-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
 8a16c066b7228178d6cf4b8a02275af0867d2fb6 10321314 
linux-modules-extra-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
 46080c6d3c95beb3b918e8f58bb90c9d0dfbe5ae 1890 
linux-tools-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
Checksums-Sha256:
 78f6c878fa1dc3f30f0924e1946a32c5ebd5fca543af454767bf8e930bfa839e 858 
linux-azure-cloud-tools-4.15.0-1019-dbgsym_4.15.0-1019.19~16.04.1_amd64.ddeb
 f96f3395860c744dd2756203e53659cecae7dced3edf83f0fccd867447a6bfeb 42712 
linux-azure-cloud-tools-4.15.0-1019_4.15.0-1019.19~16.04.1_amd64.deb
 f51722201e72260315f590a488059b2398d0f6509a1a20f393450e1a600c5ee2 11006142 
linux-azure-headers-4.15.0-1019_4.15.0-1019.19~16.04.1_all.deb
 1cb6a94a28e4e737eb85a621a49b2e63cb33b396211058e260e694e95e3322c3 880 
linux-azure-tools-4.15.0-1019-dbgsym_4.15.0-1019.19~16.04.1_amd64.ddeb
 b318c690ba1d5b898c1a93a02829f241fdbdbce4abf5d96ca33d979823817f52 1017322 
linux-azure-tools-4.15.0-1019_4.15.0-1019.19~16.04.1_amd64.deb
 

[ubuntu/xenial-security] linux-hwe 4.15.0-30.32~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

linux (4.15.0-29.31) bionic; urgency=medium

  * linux: 4.15.0-29.31 -proposed tracker (LP: #1782173)

  * [SRU Bionic][Cosmic] kernel panic in ipmi_ssif at msg_done_handler
(LP: #116)
- ipmi_ssif: Fix kernel panic at msg_done_handler

  * Update to ocxl driver for 18.04.1 (LP: #1775786)
- misc: ocxl: use put_device() instead of device_unregister()
- powerpc: Add TIDR CPU feature for POWER9
- powerpc: Use TIDR CPU feature to control TIDR allocation
- powerpc: use task_pid_nr() for TID allocation
- ocxl: Rename pnv_ocxl_spa_remove_pe to clarify it's action
- ocxl: Expose the thread_id needed for wait on POWER9
- ocxl: Add an IOCTL so userspace knows what OCXL features are available
- ocxl: Document new OCXL IOCTLs
- ocxl: Fix missing unlock on error in afu_ioctl_enable_p9_wait()

  * Critical upstream bugfix missing in Ubuntu 18.04 - frequent Xorg crash after
suspend (LP: #1776887)
- ocxl: Document the OCXL_IOCTL_GET_METADATA IOCTL

  * Hard LOCKUP observed on stressing Ubuntu 18 04 (LP: #1777194)
- powerpc: use NMI IPI for smp_send_stop
- powerpc: Fix smp_send_stop NMI IPI handling

  * IPL: ppc64_cpu --frequency hang with INFO: rcu_sched detected stalls on
CPUs/tasks on w34 and wsbmc016 with 920.1714.20170330n (LP: #1773964)
- rtc: opal: Fix OPAL RTC driver OPAL_BUSY loops

  * [Regression] EXT4-fs error (device sda2): ext4_validate_block_bitmap:383:
comm stress-ng: bg 4705: bad block bitmap checksum (LP: #1781709)
- SAUCE: Revert "UBUNTU: SAUCE: ext4: fix ext4_validate_inode_bitmap: comm
  stress-ng: Corrupt inode bitmap"
- SAUCE: ext4: check for allocation block validity with block group locked

Date: 2018-07-26 20:15:13.529491+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-30.32~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-signed-hwe 4.15.0-30.32~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-signed-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium

  * Master version: 4.15.0-30.32~16.04.1

Date: 2018-07-27 11:15:16.716923+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-signed-hwe/4.15.0-30.32~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-hwe 4.15.0-30.32~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

linux (4.15.0-29.31) bionic; urgency=medium

  * linux: 4.15.0-29.31 -proposed tracker (LP: #1782173)

  * [SRU Bionic][Cosmic] kernel panic in ipmi_ssif at msg_done_handler
(LP: #116)
- ipmi_ssif: Fix kernel panic at msg_done_handler

  * Update to ocxl driver for 18.04.1 (LP: #1775786)
- misc: ocxl: use put_device() instead of device_unregister()
- powerpc: Add TIDR CPU feature for POWER9
- powerpc: Use TIDR CPU feature to control TIDR allocation
- powerpc: use task_pid_nr() for TID allocation
- ocxl: Rename pnv_ocxl_spa_remove_pe to clarify it's action
- ocxl: Expose the thread_id needed for wait on POWER9
- ocxl: Add an IOCTL so userspace knows what OCXL features are available
- ocxl: Document new OCXL IOCTLs
- ocxl: Fix missing unlock on error in afu_ioctl_enable_p9_wait()

  * Critical upstream bugfix missing in Ubuntu 18.04 - frequent Xorg crash after
suspend (LP: #1776887)
- ocxl: Document the OCXL_IOCTL_GET_METADATA IOCTL

  * Hard LOCKUP observed on stressing Ubuntu 18 04 (LP: #1777194)
- powerpc: use NMI IPI for smp_send_stop
- powerpc: Fix smp_send_stop NMI IPI handling

  * IPL: ppc64_cpu --frequency hang with INFO: rcu_sched detected stalls on
CPUs/tasks on w34 and wsbmc016 with 920.1714.20170330n (LP: #1773964)
- rtc: opal: Fix OPAL RTC driver OPAL_BUSY loops

  * [Regression] EXT4-fs error (device sda2): ext4_validate_block_bitmap:383:
comm stress-ng: bg 4705: bad block bitmap checksum (LP: #1781709)
- SAUCE: Revert "UBUNTU: SAUCE: ext4: fix ext4_validate_inode_bitmap: comm
  stress-ng: Corrupt inode bitmap"
- SAUCE: ext4: check for allocation block validity with block group locked

Date: 2018-07-26 20:15:13.529491+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-30.32~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-meta-hwe 4.15.0.30.52 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-hwe (4.15.0.30.52) xenial; urgency=medium

  * Bump ABI 4.15.0-30

Date: 2018-07-27 11:15:12.440680+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-hwe/4.15.0.30.52
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-signed-hwe 4.15.0-30.32~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-signed-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium

  * Master version: 4.15.0-30.32~16.04.1

Date: 2018-07-27 11:15:16.716923+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-signed-hwe/4.15.0-30.32~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-meta-hwe 4.15.0.30.52 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-hwe (4.15.0.30.52) xenial; urgency=medium

  * Bump ABI 4.15.0-30

Date: 2018-07-27 11:15:12.440680+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-hwe/4.15.0.30.52
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-meta-hwe-edge 4.15.0.30.51 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-hwe-edge (4.15.0.30.51) xenial; urgency=medium

  * Bump ABI 4.15.0-30

Date: 2018-07-27 11:39:12.362392+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-hwe-edge/4.15.0.30.51
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-meta-gcp 4.15.0.1015.27 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-gcp (4.15.0.1015.27) xenial; urgency=medium

  * Bump ABI 4.15.0-1015

Date: 2018-07-27 08:23:13.088331+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1015.27
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-meta-gcp 4.15.0.1015.27 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-gcp (4.15.0.1015.27) xenial; urgency=medium

  * Bump ABI 4.15.0-1015

Date: 2018-07-27 08:23:13.088331+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1015.27
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] lftp 4.6.3a-1ubuntu0.1 (Accepted)

2018-08-06 Thread Ubuntu Archive Robot
lftp (4.6.3a-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Incorrectly sanitize remote file names
- debian/patches/CVE-2018-10196.patch: fix in src/MirrorJob.cc.
- CVE-2018-10196

Date: 2018-08-03 16:55:24.842833+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/lftp/4.6.3a-1ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-meta-hwe-edge 4.15.0.30.51 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-hwe-edge (4.15.0.30.51) xenial; urgency=medium

  * Bump ABI 4.15.0-30

Date: 2018-07-27 11:39:12.362392+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-hwe-edge/4.15.0.30.51
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-meta-azure 4.15.0.1019.25 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-azure (4.15.0.1019.25) xenial; urgency=medium

  * Bump ABI 4.15.0-1019

Date: 2018-07-27 08:21:12.870682+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-azure/4.15.0.1019.25
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-azure 4.15.0-1019.19~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-30.32 ]

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

linux-azure (4.15.0-1018.18) bionic; urgency=medium

  * linux-azure: 4.15.0-1018.18 -proposed tracker (LP: #1782178)


  [ Ubuntu: 4.15.0-29.31 ]

  * linux: 4.15.0-29.31 -proposed tracker (LP: #1782173)
  * [SRU Bionic][Cosmic] kernel panic in ipmi_ssif at msg_done_handler
(LP: #116)
- ipmi_ssif: Fix kernel panic at msg_done_handler
  * Update to ocxl driver for 18.04.1 (LP: #1775786)
- misc: ocxl: use put_device() instead of device_unregister()
- powerpc: Add TIDR CPU feature for POWER9
- powerpc: Use TIDR CPU feature to control TIDR allocation
- powerpc: use task_pid_nr() for TID allocation
- ocxl: Rename pnv_ocxl_spa_remove_pe to clarify it's action
- ocxl: Expose the thread_id needed for wait on POWER9
- ocxl: Add an IOCTL so userspace knows what OCXL features are available
- ocxl: Document new OCXL IOCTLs
- ocxl: Fix missing unlock on error in afu_ioctl_enable_p9_wait()
  * Critical upstream bugfix missing in Ubuntu 18.04 - frequent Xorg crash after
suspend (LP: #1776887)
- ocxl: Document the OCXL_IOCTL_GET_METADATA IOCTL
  * Hard LOCKUP observed on stressing Ubuntu 18 04 (LP: #1777194)
- powerpc: use NMI IPI for smp_send_stop
- powerpc: Fix smp_send_stop NMI IPI handling
  * IPL: ppc64_cpu --frequency hang with INFO: rcu_sched detected stalls on
CPUs/tasks on w34 and wsbmc016 with 920.1714.20170330n (LP: #1773964)
- rtc: opal: Fix OPAL RTC driver OPAL_BUSY loops
  * [Regression] EXT4-fs error (device sda2): ext4_validate_block_bitmap:383:
comm stress-ng: bg 4705: bad block bitmap checksum (LP: #1781709)
- SAUCE: Revert "UBUNTU: SAUCE: ext4: fix ext4_validate_inode_bitmap: comm
  stress-ng: Corrupt inode bitmap"
- SAUCE: ext4: check for allocation block validity with block group locked

  [ Ubuntu: 4.15.0-28.30 ]

  * linux: 4.15.0-28.30 -proposed tracker (LP: #1781433)
  * Cannot set MTU higher than 1500 in Xen instance (LP: #1781413)
- xen-netfront: Fix mismatched rtnl_unlock
- xen-netfront: Update features after registering netdev

Date: 2018-07-26 20:32:12.629943+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1019.19~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-signed-azure 4.15.0-1019.19~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-signed-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium

  * Master version: 4.15.0-1019.19~16.04.1

Date: 2018-07-27 08:21:15.559269+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-signed-azure/4.15.0-1019.19~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-gcp 4.15.0-1015.15~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-gcp (4.15.0-1015.15~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-30.32 ]

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

linux-gcp (4.15.0-1014.14) bionic; urgency=medium

  * linux-gcp: 4.15.0-1014.14 -proposed tracker (LP: #1782174)


  [ Ubuntu: 4.15.0-29.31 ]

  * linux: 4.15.0-29.31 -proposed tracker (LP: #1782173)
  * [SRU Bionic][Cosmic] kernel panic in ipmi_ssif at msg_done_handler
(LP: #116)
- ipmi_ssif: Fix kernel panic at msg_done_handler
  * Update to ocxl driver for 18.04.1 (LP: #1775786)
- misc: ocxl: use put_device() instead of device_unregister()
- powerpc: Add TIDR CPU feature for POWER9
- powerpc: Use TIDR CPU feature to control TIDR allocation
- powerpc: use task_pid_nr() for TID allocation
- ocxl: Rename pnv_ocxl_spa_remove_pe to clarify it's action
- ocxl: Expose the thread_id needed for wait on POWER9
- ocxl: Add an IOCTL so userspace knows what OCXL features are available
- ocxl: Document new OCXL IOCTLs
- ocxl: Fix missing unlock on error in afu_ioctl_enable_p9_wait()
  * Critical upstream bugfix missing in Ubuntu 18.04 - frequent Xorg crash after
suspend (LP: #1776887)
- ocxl: Document the OCXL_IOCTL_GET_METADATA IOCTL
  * Hard LOCKUP observed on stressing Ubuntu 18 04 (LP: #1777194)
- powerpc: use NMI IPI for smp_send_stop
- powerpc: Fix smp_send_stop NMI IPI handling
  * IPL: ppc64_cpu --frequency hang with INFO: rcu_sched detected stalls on
CPUs/tasks on w34 and wsbmc016 with 920.1714.20170330n (LP: #1773964)
- rtc: opal: Fix OPAL RTC driver OPAL_BUSY loops
  * [Regression] EXT4-fs error (device sda2): ext4_validate_block_bitmap:383:
comm stress-ng: bg 4705: bad block bitmap checksum (LP: #1781709)
- SAUCE: Revert "UBUNTU: SAUCE: ext4: fix ext4_validate_inode_bitmap: comm
  stress-ng: Corrupt inode bitmap"
- SAUCE: ext4: check for allocation block validity with block group locked

  [ Ubuntu: 4.15.0-28.30 ]

  * linux: 4.15.0-28.30 -proposed tracker (LP: #1781433)
  * Cannot set MTU higher than 1500 in Xen instance (LP: #1781413)
- xen-netfront: Fix mismatched rtnl_unlock
- xen-netfront: Update features after registering netdev

Date: 2018-07-26 20:22:13.338278+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1015.15~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-azure 4.15.0-1019.19~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-30.32 ]

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

linux-azure (4.15.0-1018.18) bionic; urgency=medium

  * linux-azure: 4.15.0-1018.18 -proposed tracker (LP: #1782178)


  [ Ubuntu: 4.15.0-29.31 ]

  * linux: 4.15.0-29.31 -proposed tracker (LP: #1782173)
  * [SRU Bionic][Cosmic] kernel panic in ipmi_ssif at msg_done_handler
(LP: #116)
- ipmi_ssif: Fix kernel panic at msg_done_handler
  * Update to ocxl driver for 18.04.1 (LP: #1775786)
- misc: ocxl: use put_device() instead of device_unregister()
- powerpc: Add TIDR CPU feature for POWER9
- powerpc: Use TIDR CPU feature to control TIDR allocation
- powerpc: use task_pid_nr() for TID allocation
- ocxl: Rename pnv_ocxl_spa_remove_pe to clarify it's action
- ocxl: Expose the thread_id needed for wait on POWER9
- ocxl: Add an IOCTL so userspace knows what OCXL features are available
- ocxl: Document new OCXL IOCTLs
- ocxl: Fix missing unlock on error in afu_ioctl_enable_p9_wait()
  * Critical upstream bugfix missing in Ubuntu 18.04 - frequent Xorg crash after
suspend (LP: #1776887)
- ocxl: Document the OCXL_IOCTL_GET_METADATA IOCTL
  * Hard LOCKUP observed on stressing Ubuntu 18 04 (LP: #1777194)
- powerpc: use NMI IPI for smp_send_stop
- powerpc: Fix smp_send_stop NMI IPI handling
  * IPL: ppc64_cpu --frequency hang with INFO: rcu_sched detected stalls on
CPUs/tasks on w34 and wsbmc016 with 920.1714.20170330n (LP: #1773964)
- rtc: opal: Fix OPAL RTC driver OPAL_BUSY loops
  * [Regression] EXT4-fs error (device sda2): ext4_validate_block_bitmap:383:
comm stress-ng: bg 4705: bad block bitmap checksum (LP: #1781709)
- SAUCE: Revert "UBUNTU: SAUCE: ext4: fix ext4_validate_inode_bitmap: comm
  stress-ng: Corrupt inode bitmap"
- SAUCE: ext4: check for allocation block validity with block group locked

  [ Ubuntu: 4.15.0-28.30 ]

  * linux: 4.15.0-28.30 -proposed tracker (LP: #1781433)
  * Cannot set MTU higher than 1500 in Xen instance (LP: #1781413)
- xen-netfront: Fix mismatched rtnl_unlock
- xen-netfront: Update features after registering netdev

Date: 2018-07-26 20:32:12.629943+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1019.19~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-signed-azure 4.15.0-1019.19~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-signed-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium

  * Master version: 4.15.0-1019.19~16.04.1

Date: 2018-07-27 08:21:15.559269+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-signed-azure/4.15.0-1019.19~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-gcp 4.15.0-1015.15~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-gcp (4.15.0-1015.15~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-30.32 ]

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

linux-gcp (4.15.0-1014.14) bionic; urgency=medium

  * linux-gcp: 4.15.0-1014.14 -proposed tracker (LP: #1782174)


  [ Ubuntu: 4.15.0-29.31 ]

  * linux: 4.15.0-29.31 -proposed tracker (LP: #1782173)
  * [SRU Bionic][Cosmic] kernel panic in ipmi_ssif at msg_done_handler
(LP: #116)
- ipmi_ssif: Fix kernel panic at msg_done_handler
  * Update to ocxl driver for 18.04.1 (LP: #1775786)
- misc: ocxl: use put_device() instead of device_unregister()
- powerpc: Add TIDR CPU feature for POWER9
- powerpc: Use TIDR CPU feature to control TIDR allocation
- powerpc: use task_pid_nr() for TID allocation
- ocxl: Rename pnv_ocxl_spa_remove_pe to clarify it's action
- ocxl: Expose the thread_id needed for wait on POWER9
- ocxl: Add an IOCTL so userspace knows what OCXL features are available
- ocxl: Document new OCXL IOCTLs
- ocxl: Fix missing unlock on error in afu_ioctl_enable_p9_wait()
  * Critical upstream bugfix missing in Ubuntu 18.04 - frequent Xorg crash after
suspend (LP: #1776887)
- ocxl: Document the OCXL_IOCTL_GET_METADATA IOCTL
  * Hard LOCKUP observed on stressing Ubuntu 18 04 (LP: #1777194)
- powerpc: use NMI IPI for smp_send_stop
- powerpc: Fix smp_send_stop NMI IPI handling
  * IPL: ppc64_cpu --frequency hang with INFO: rcu_sched detected stalls on
CPUs/tasks on w34 and wsbmc016 with 920.1714.20170330n (LP: #1773964)
- rtc: opal: Fix OPAL RTC driver OPAL_BUSY loops
  * [Regression] EXT4-fs error (device sda2): ext4_validate_block_bitmap:383:
comm stress-ng: bg 4705: bad block bitmap checksum (LP: #1781709)
- SAUCE: Revert "UBUNTU: SAUCE: ext4: fix ext4_validate_inode_bitmap: comm
  stress-ng: Corrupt inode bitmap"
- SAUCE: ext4: check for allocation block validity with block group locked

  [ Ubuntu: 4.15.0-28.30 ]

  * linux: 4.15.0-28.30 -proposed tracker (LP: #1781433)
  * Cannot set MTU higher than 1500 in Xen instance (LP: #1781413)
- xen-netfront: Fix mismatched rtnl_unlock
- xen-netfront: Update features after registering netdev

Date: 2018-07-26 20:22:13.338278+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1015.15~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-meta-azure 4.15.0.1019.25 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-azure (4.15.0.1019.25) xenial; urgency=medium

  * Bump ABI 4.15.0-1019

Date: 2018-07-27 08:21:12.870682+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-azure/4.15.0.1019.25
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] linux-meta-azure-edge 4.15.0.1019.16 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-azure-edge (4.15.0.1019.16) xenial; urgency=medium

  * Bump ABI 4.15.0-1019

Date: 2018-07-27 11:41:13.432373+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-azure-edge/4.15.0.1019.16
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] linux-meta-azure-edge 4.15.0.1019.16 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-azure-edge (4.15.0.1019.16) xenial; urgency=medium

  * Bump ABI 4.15.0-1019

Date: 2018-07-27 11:41:13.432373+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-azure-edge/4.15.0.1019.16
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] lftp 4.6.3a-1ubuntu0.1 (Accepted)

2018-08-06 Thread Leonidas S. Barbosa
lftp (4.6.3a-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Incorrectly sanitize remote file names
- debian/patches/CVE-2018-10196.patch: fix in src/MirrorJob.cc.
- CVE-2018-10196

Date: 2018-08-03 16:55:24.842833+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
https://launchpad.net/ubuntu/+source/lftp/4.6.3a-1ubuntu0.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-hwe_4.15.0-30.32~16.04.1_ppc64el.tar.gz - (Accepted)

2018-08-06 Thread Stefan Bader
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

Date: Thu, 26 Jul 2018 17:20:29 +0200
Changed-By: Stefan Bader 
Maintainer: Launchpad Build Daemon 

Format: 1.8
Date: Thu, 26 Jul 2018 17:20:29 +0200
Source: linux-hwe
Binary: linux-source-4.15.0 linux-headers-4.15.0-30 linux-hwe-tools-4.15.0-30 
linux-hwe-cloud-tools-4.15.0-30 linux-image-unsigned-4.15.0-30-generic 
linux-modules-4.15.0-30-generic linux-modules-extra-4.15.0-30-generic 
linux-headers-4.15.0-30-generic linux-image-unsigned-4.15.0-30-generic-dbgsym 
linux-tools-4.15.0-30-generic linux-cloud-tools-4.15.0-30-generic 
linux-hwe-udebs-generic linux-image-unsigned-4.15.0-30-generic-lpae 
linux-modules-4.15.0-30-generic-lpae linux-modules-extra-4.15.0-30-generic-lpae 
linux-headers-4.15.0-30-generic-lpae 
linux-image-unsigned-4.15.0-30-generic-lpae-dbgsym 
linux-tools-4.15.0-30-generic-lpae linux-cloud-tools-4.15.0-30-generic-lpae 
linux-hwe-udebs-generic-lpae linux-image-unsigned-4.15.0-30-lowlatency 
linux-modules-4.15.0-30-lowlatency linux-modules-extra-4.15.0-30-lowlatency 
linux-headers-4.15.0-30-lowlatency 
linux-image-unsigned-4.15.0-30-lowlatency-dbgsym 
linux-tools-4.15.0-30-lowlatency linux-cloud-tools-4.15.0-30-lowlatency
 linux-hwe-udebs-lowlatency kernel-image-4.15.0-30-generic-di 
floppy-modules-4.15.0-30-generic-di fs-core-modules-4.15.0-30-generic-di 
fs-secondary-modules-4.15.0-30-generic-di input-modules-4.15.0-30-generic-di 
md-modules-4.15.0-30-generic-di nic-modules-4.15.0-30-generic-di 
nic-usb-modules-4.15.0-30-generic-di nic-shared-modules-4.15.0-30-generic-di 
parport-modules-4.15.0-30-generic-di plip-modules-4.15.0-30-generic-di 
ppp-modules-4.15.0-30-generic-di sata-modules-4.15.0-30-generic-di 
scsi-modules-4.15.0-30-generic-di storage-core-modules-4.15.0-30-generic-di 
nfs-modules-4.15.0-30-generic-di block-modules-4.15.0-30-generic-di 
message-modules-4.15.0-30-generic-di crypto-modules-4.15.0-30-generic-di 
virtio-modules-4.15.0-30-generic-di vlan-modules-4.15.0-30-generic-di 
ipmi-modules-4.15.0-30-generic-di
 multipath-modules-4.15.0-30-generic-di
Architecture: ppc64el ppc64el_translations
Version: 4.15.0-30.32~16.04.1
Distribution: xenial
Urgency: medium
Maintainer: Launchpad Build Daemon 
Changed-By: Stefan Bader 
Description:
 block-modules-4.15.0-30-generic-di - Block storage devices (udeb)
 crypto-modules-4.15.0-30-generic-di - crypto modules (udeb)
 floppy-modules-4.15.0-30-generic-di - Floppy driver support (udeb)
 fs-core-modules-4.15.0-30-generic-di - Base filesystem modules (udeb)
 fs-secondary-modules-4.15.0-30-generic-di - Extra filesystem modules (udeb)
 input-modules-4.15.0-30-generic-di - Support for various input methods (udeb)
 ipmi-modules-4.15.0-30-generic-di - ipmi modules (udeb)
 kernel-image-4.15.0-30-generic-di - kernel image and system map (udeb)
 linux-cloud-tools-4.15.0-30-generic - Linux kernel version specific cloud 
tools for version 4.15.0-30
 linux-cloud-tools-4.15.0-30-generic-lpae - Linux kernel version specific cloud 
tools for version 4.15.0-30
 linux-cloud-tools-4.15.0-30-lowlatency - Linux kernel version specific cloud 
tools for version 4.15.0-30
 linux-headers-4.15.0-30 - Header files related to Linux kernel version 4.15.0
 linux-headers-4.15.0-30-generic - Linux kernel headers for version 4.15.0 on 
PowerPC 64el SMP
 linux-headers-4.15.0-30-generic-lpae - Linux kernel headers for version 4.15.0 
on PowerPC 64el SMP
 linux-headers-4.15.0-30-lowlatency - Linux kernel headers for version 4.15.0 
on PowerPC 64el SMP
 linux-hwe-cloud-tools-4.15.0-30 - Linux kernel version specific cloud tools 
for version 4.15.0-30
 linux-hwe-tools-4.15.0-30 - Linux kernel version specific tools for version 
4.15.0-30
 linux-hwe-udebs-generic - Metapackage depending on kernel udebs (udeb)
 linux-hwe-udebs-generic-lpae - Metapackage depending on kernel udebs (udeb)
 linux-hwe-udebs-lowlatency - Metapackage depending on kernel udebs (udeb)
 linux-image-unsigned-4.15.0-30-generic - Linux kernel image for version 4.15.0 
on PowerPC 64el SMP
 linux-image-unsigned-4.15.0-30-generic-dbgsym - Linux kernel debug image for 
version 4.15.0 on PowerPC 64el SMP
 linux-image-unsigned-4.15.0-30-generic-lpae - Linux kernel image for version 
4.15.0 on PowerPC 64el SMP
 linux-image-unsigned-4.15.0-30-generic-lpae-dbgsym - Linux kernel debug image 
for version 4.15.0 on PowerPC 64el SMP
 linux-image-unsigned-4.15.0-30-lowlatency - Linux kernel image for version 
4.15.0 on PowerPC 64el SMP
 linux-image-unsigned-4.15.0-30-lowlatency-dbgsym - Linux kernel debug image 
for version 4.15.0 on PowerPC 64el SMP
 linux-modules-4.15.0-30-generic - Linux kernel extra modules for version 
4.15.0 on PowerPC 64el SMP
 

[ubuntu/xenial-proposed] linux-hwe_4.15.0-30.32~16.04.1_amd64.tar.gz - (Accepted)

2018-08-06 Thread Stefan Bader
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

Date: Thu, 26 Jul 2018 17:20:29 +0200
Changed-By: Stefan Bader 
Maintainer: Launchpad Build Daemon 

Format: 1.8
Date: Thu, 26 Jul 2018 17:20:29 +0200
Source: linux-hwe
Binary: linux-source-4.15.0 linux-headers-4.15.0-30 linux-hwe-tools-4.15.0-30 
linux-hwe-cloud-tools-4.15.0-30 linux-image-unsigned-4.15.0-30-generic 
linux-modules-4.15.0-30-generic linux-modules-extra-4.15.0-30-generic 
linux-headers-4.15.0-30-generic linux-image-unsigned-4.15.0-30-generic-dbgsym 
linux-tools-4.15.0-30-generic linux-cloud-tools-4.15.0-30-generic 
linux-hwe-udebs-generic linux-image-unsigned-4.15.0-30-generic-lpae 
linux-modules-4.15.0-30-generic-lpae linux-modules-extra-4.15.0-30-generic-lpae 
linux-headers-4.15.0-30-generic-lpae 
linux-image-unsigned-4.15.0-30-generic-lpae-dbgsym 
linux-tools-4.15.0-30-generic-lpae linux-cloud-tools-4.15.0-30-generic-lpae 
linux-hwe-udebs-generic-lpae linux-image-unsigned-4.15.0-30-lowlatency 
linux-modules-4.15.0-30-lowlatency linux-modules-extra-4.15.0-30-lowlatency 
linux-headers-4.15.0-30-lowlatency 
linux-image-unsigned-4.15.0-30-lowlatency-dbgsym 
linux-tools-4.15.0-30-lowlatency linux-cloud-tools-4.15.0-30-lowlatency
 linux-hwe-udebs-lowlatency kernel-image-4.15.0-30-generic-di 
fat-modules-4.15.0-30-generic-di fb-modules-4.15.0-30-generic-di 
firewire-core-modules-4.15.0-30-generic-di floppy-modules-4.15.0-30-generic-di 
fs-core-modules-4.15.0-30-generic-di fs-secondary-modules-4.15.0-30-generic-di 
input-modules-4.15.0-30-generic-di irda-modules-4.15.0-30-generic-di 
md-modules-4.15.0-30-generic-di nic-modules-4.15.0-30-generic-di 
nic-pcmcia-modules-4.15.0-30-generic-di nic-usb-modules-4.15.0-30-generic-di 
nic-shared-modules-4.15.0-30-generic-di parport-modules-4.15.0-30-generic-di 
pata-modules-4.15.0-30-generic-di pcmcia-modules-4.15.0-30-generic-di 
pcmcia-storage-modules-4.15.0-30-generic-di plip-modules-4.15.0-30-generic-di 
ppp-modules-4.15.0-30-generic-di sata-modules-4.15.0-30-generic-di 
scsi-modules-4.15.0-30-generic-di serial-modules-4.15.0-30-generic-di 
storage-core-modules-4.15.0-30-generic-di usb-modules-4.15.0-30-generic-di 
nfs-modules-4.15.0-30-generic-di
 block-modules-4.15.0-30-generic-di message-modules-4.15.0-30-generic-di 
crypto-modules-4.15.0-30-generic-di virtio-modules-4.15.0-30-generic-di 
mouse-modules-4.15.0-30-generic-di vlan-modules-4.15.0-30-generic-di 
ipmi-modules-4.15.0-30-generic-di
 multipath-modules-4.15.0-30-generic-di
Architecture: amd64 all amd64_translations
Version: 4.15.0-30.32~16.04.1
Distribution: xenial
Urgency: medium
Maintainer: Launchpad Build Daemon 
Changed-By: Stefan Bader 
Description:
 block-modules-4.15.0-30-generic-di - Block storage devices (udeb)
 crypto-modules-4.15.0-30-generic-di - crypto modules (udeb)
 fat-modules-4.15.0-30-generic-di - FAT filesystem support (udeb)
 fb-modules-4.15.0-30-generic-di - Framebuffer modules (udeb)
 firewire-core-modules-4.15.0-30-generic-di - Firewire (IEEE-1394) Support 
(udeb)
 floppy-modules-4.15.0-30-generic-di - Floppy driver support (udeb)
 fs-core-modules-4.15.0-30-generic-di - Base filesystem modules (udeb)
 fs-secondary-modules-4.15.0-30-generic-di - Extra filesystem modules (udeb)
 input-modules-4.15.0-30-generic-di - Support for various input methods (udeb)
 ipmi-modules-4.15.0-30-generic-di - ipmi modules (udeb)
 irda-modules-4.15.0-30-generic-di - Support for Infrared protocols (udeb)
 kernel-image-4.15.0-30-generic-di - kernel image and system map (udeb)
 linux-cloud-tools-4.15.0-30-generic - Linux kernel version specific cloud 
tools for version 4.15.0-30
 linux-cloud-tools-4.15.0-30-generic-lpae - Linux kernel version specific cloud 
tools for version 4.15.0-30
 linux-cloud-tools-4.15.0-30-lowlatency - Linux kernel version specific cloud 
tools for version 4.15.0-30
 linux-headers-4.15.0-30 - Header files related to Linux kernel version 4.15.0
 linux-headers-4.15.0-30-generic - Linux kernel headers for version 4.15.0 on 
64 bit x86 SMP
 linux-headers-4.15.0-30-generic-lpae - Linux kernel headers for version 4.15.0 
on 64 bit x86 SMP
 linux-headers-4.15.0-30-lowlatency - Linux kernel headers for version 4.15.0 
on 64 bit x86 SMP
 linux-hwe-cloud-tools-4.15.0-30 - Linux kernel version specific cloud tools 
for version 4.15.0-30
 linux-hwe-tools-4.15.0-30 - Linux kernel version specific tools for version 
4.15.0-30
 linux-hwe-udebs-generic - Metapackage depending on kernel udebs (udeb)
 linux-hwe-udebs-generic-lpae - Metapackage depending on kernel udebs (udeb)
 linux-hwe-udebs-lowlatency - Metapackage depending on kernel udebs (udeb)
 linux-image-unsigned-4.15.0-30-generic - Linux kernel image for version 4.15.0 
on 

[ubuntu/xenial-proposed] linux-azure_4.15.0-1019.19~16.04.1_amd64.tar.gz - (Accepted)

2018-08-06 Thread Stefan Bader
linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-30.32 ]

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

Date: Thu, 26 Jul 2018 21:29:04 +0200
Changed-By: Stefan Bader 
Maintainer: Launchpad Build Daemon 

Format: 1.8
Date: Thu, 26 Jul 2018 21:29:04 +0200
Source: linux-azure
Binary: linux-azure-headers-4.15.0-1019 linux-azure-tools-4.15.0-1019 
linux-azure-cloud-tools-4.15.0-1019 linux-image-unsigned-4.15.0-1019-azure 
linux-modules-4.15.0-1019-azure linux-modules-extra-4.15.0-1019-azure 
linux-headers-4.15.0-1019-azure linux-image-unsigned-4.15.0-1019-azure-dbgsym 
linux-tools-4.15.0-1019-azure linux-cloud-tools-4.15.0-1019-azure 
linux-udebs-azure
Architecture: amd64 all amd64_translations
Version: 4.15.0-1019.19~16.04.1
Distribution: xenial
Urgency: medium
Maintainer: Launchpad Build Daemon 
Changed-By: Stefan Bader 
Description:
 linux-azure-cloud-tools-4.15.0-1019 - Linux kernel version specific cloud 
tools for version 4.15.0-1019
 linux-azure-headers-4.15.0-1019 - Header files related to Linux kernel version 
4.15.0
 linux-azure-tools-4.15.0-1019 - Linux kernel version specific tools for 
version 4.15.0-1019
 linux-cloud-tools-4.15.0-1019-azure - Linux kernel version specific cloud 
tools for version 4.15.0-1019
 linux-headers-4.15.0-1019-azure - Linux kernel headers for version 4.15.0 on 
64 bit x86 SMP
 linux-image-unsigned-4.15.0-1019-azure - Linux kernel image for version 4.15.0 
on 64 bit x86 SMP
 linux-image-unsigned-4.15.0-1019-azure-dbgsym - Linux kernel debug image for 
version 4.15.0 on 64 bit x86 SMP
 linux-modules-4.15.0-1019-azure - Linux kernel extra modules for version 
4.15.0 on 64 bit x86 SMP
 linux-modules-extra-4.15.0-1019-azure - Linux kernel extra modules for version 
4.15.0 on 64 bit x86 SMP
 linux-tools-4.15.0-1019-azure - Linux kernel version specific tools for 
version 4.15.0-1019
 linux-udebs-azure - Metapackage depending on kernel udebs (udeb)
Changes:
 linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium
 .
   [ Ubuntu: 4.15.0-30.32 ]
 .
   * CVE-2018-5390
 - tcp: free batches of packets in tcp_prune_ofo_queue()
 - tcp: avoid collapses in tcp_prune_queue() if possible
 - tcp: detect malicious patterns in tcp_collapse_ofo_queue()
 - tcp: call tcp_drop() from tcp_data_queue_ofo()
 - tcp: add tcp_ooo_try_coalesce() helper
Checksums-Sha1:
 b62d751beadc04fb5ddd594d72574023221e8bb3 858 
linux-azure-cloud-tools-4.15.0-1019-dbgsym_4.15.0-1019.19~16.04.1_amd64.ddeb
 096cbf9a88fb14d393d122089bb836a8d3d5a96d 42712 
linux-azure-cloud-tools-4.15.0-1019_4.15.0-1019.19~16.04.1_amd64.deb
 f5f9406b9be37336b8e45d829b64b4bfa5211bb0 11006142 
linux-azure-headers-4.15.0-1019_4.15.0-1019.19~16.04.1_all.deb
 36ca648f7618c4cc84ef13b05de8187f0d87e7df 880 
linux-azure-tools-4.15.0-1019-dbgsym_4.15.0-1019.19~16.04.1_amd64.ddeb
 915456e080c9ddda5532b9b28bb477e9aece43e9 1017322 
linux-azure-tools-4.15.0-1019_4.15.0-1019.19~16.04.1_amd64.deb
 8c54d9e7fefcca35fb07121a8302f5f49c965dc6 7665640 
linux-azure_4.15.0-1019.19~16.04.1_amd64.tar.gz
 ce698e947ef9afa7b6a67cbaf82ca5d19ecd86dd 24475 
linux-azure_4.15.0-1019.19~16.04.1_amd64_translations.tar.gz
 0512fe71e39720391ace18c45196c441aecc3283 1816 
linux-cloud-tools-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
 fcfaa1466d5ec6e39a9f128cbf4490e83edb9b53 901610 
linux-headers-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
 ec0de255e3372190d1b8d281ca4d606a82e83478 319706744 
linux-image-unsigned-4.15.0-1019-azure-dbgsym_4.15.0-1019.19~16.04.1_amd64.ddeb
 3c1e4a4758720d7aeda341d9f8d3023d9d76e4ae 7683814 
linux-image-unsigned-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
 cf09b8dde550e2fc86a91d25d0eee5a090e69849 11056822 
linux-modules-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
 8a16c066b7228178d6cf4b8a02275af0867d2fb6 10321314 
linux-modules-extra-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
 46080c6d3c95beb3b918e8f58bb90c9d0dfbe5ae 1890 
linux-tools-4.15.0-1019-azure_4.15.0-1019.19~16.04.1_amd64.deb
Checksums-Sha256:
 78f6c878fa1dc3f30f0924e1946a32c5ebd5fca543af454767bf8e930bfa839e 858 
linux-azure-cloud-tools-4.15.0-1019-dbgsym_4.15.0-1019.19~16.04.1_amd64.ddeb
 f96f3395860c744dd2756203e53659cecae7dced3edf83f0fccd867447a6bfeb 42712 
linux-azure-cloud-tools-4.15.0-1019_4.15.0-1019.19~16.04.1_amd64.deb
 f51722201e72260315f590a488059b2398d0f6509a1a20f393450e1a600c5ee2 11006142 
linux-azure-headers-4.15.0-1019_4.15.0-1019.19~16.04.1_all.deb
 1cb6a94a28e4e737eb85a621a49b2e63cb33b396211058e260e694e95e3322c3 880 
linux-azure-tools-4.15.0-1019-dbgsym_4.15.0-1019.19~16.04.1_amd64.ddeb
 b318c690ba1d5b898c1a93a02829f241fdbdbce4abf5d96ca33d979823817f52 1017322 
linux-azure-tools-4.15.0-1019_4.15.0-1019.19~16.04.1_amd64.deb
 

[ubuntu/xenial-proposed] linux-hwe 4.15.0-30.32~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

Date: 2018-07-26 20:15:13.529491+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-30.32~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-signed-hwe 4.15.0-30.32~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-signed-hwe (4.15.0-30.32~16.04.1) xenial; urgency=medium

  * Master version: 4.15.0-30.32~16.04.1

Date: 2018-07-27 11:15:16.716923+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-signed-hwe/4.15.0-30.32~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-hwe 4.15.0.30.52 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-hwe (4.15.0.30.52) xenial; urgency=medium

  * Bump ABI 4.15.0-30

Date: 2018-07-27 11:15:12.440680+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-hwe/4.15.0.30.52
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-gcp 4.15.0-1015.15~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-gcp (4.15.0-1015.15~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-30.32 ]

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

Date: 2018-07-26 20:22:13.338278+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1015.15~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-hwe-edge 4.15.0.30.51 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-hwe-edge (4.15.0.30.51) xenial; urgency=medium

  * Bump ABI 4.15.0-30

Date: 2018-07-27 11:39:12.362392+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-hwe-edge/4.15.0.30.51
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-gcp 4.15.0.1015.27 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-gcp (4.15.0.1015.27) xenial; urgency=medium

  * Bump ABI 4.15.0-1015

Date: 2018-07-27 08:23:13.088331+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1015.27
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-signed-azure 4.15.0-1019.19~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-signed-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium

  * Master version: 4.15.0-1019.19~16.04.1

Date: 2018-07-27 08:21:15.559269+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-signed-azure/4.15.0-1019.19~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-azure 4.15.0-1019.19~16.04.1 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-azure (4.15.0-1019.19~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-30.32 ]

  * CVE-2018-5390
- tcp: free batches of packets in tcp_prune_ofo_queue()
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
- tcp: call tcp_drop() from tcp_data_queue_ofo()
- tcp: add tcp_ooo_try_coalesce() helper

Date: 2018-07-26 20:32:12.629943+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1019.19~16.04.1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-azure 4.15.0.1019.25 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-azure (4.15.0.1019.25) xenial; urgency=medium

  * Bump ABI 4.15.0-1019

Date: 2018-07-27 08:21:12.870682+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-azure/4.15.0.1019.25
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-proposed] linux-meta-azure-edge 4.15.0.1019.16 (Accepted)

2018-08-06 Thread Andy Whitcroft
linux-meta-azure-edge (4.15.0.1019.16) xenial; urgency=medium

  * Bump ABI 4.15.0-1019

Date: 2018-07-27 11:41:13.432373+00:00
Changed-By: Stefan Bader 
Signed-By: Andy Whitcroft 
https://launchpad.net/ubuntu/+source/linux-meta-azure-edge/4.15.0.1019.16
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] libxcursor 1:1.1.14-1ubuntu0.16.04.2 (Accepted)

2018-08-06 Thread Ubuntu Archive Robot
libxcursor (1:1.1.14-1ubuntu0.16.04.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Denial of service
- debian/patches/CVE-2015-9262.patch: fix in src/library.c.
- CVE-2015-9262

Date: 2018-08-02 15:01:13.519398+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Ubuntu Archive Robot 

https://launchpad.net/ubuntu/+source/libxcursor/1:1.1.14-1ubuntu0.16.04.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-security] libxcursor 1:1.1.14-1ubuntu0.16.04.2 (Accepted)

2018-08-06 Thread Leonidas S. Barbosa
libxcursor (1:1.1.14-1ubuntu0.16.04.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Denial of service
- debian/patches/CVE-2015-9262.patch: fix in src/library.c.
- CVE-2015-9262

Date: 2018-08-02 15:01:13.519398+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
https://launchpad.net/ubuntu/+source/libxcursor/1:1.1.14-1ubuntu0.16.04.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] openssl-ibmca 1.3.0-0ubuntu2.16.04.2 (Accepted)

2018-08-06 Thread Łukasz Zemczak
openssl-ibmca (1.3.0-0ubuntu2.16.04.2) xenial; urgency=medium

  * Apply upstream patch to resolve crashes when libssl attempts to
initialise engine a few times too many. LP: #1543455

Date: 2018-07-24 15:32:08.880851+00:00
Changed-By: Dimitri John Ledkov 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/openssl-ibmca/1.3.0-0ubuntu2.16.04.2
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes


[ubuntu/xenial-updates] nux 4.0.8+16.04.20180622.2-0ubuntu1 (Accepted)

2018-08-06 Thread Łukasz Zemczak
nux (4.0.8+16.04.20180622.2-0ubuntu1) xenial; urgency=medium

  * debian/control: update Vcs
  * debian/nux-tools.preinst:
- Restore backup config files before installing nux-tools, so that they
  will be updaded with the fixed versions (LP: #1768610)

nux (4.0.8+16.04.20180613.1-0ubuntu1) xenial; urgency=medium

  * debian/50_check_unity_support:
- various changes to fix (LP: #1768610):
  + export LIBGL_ALWAYS_SOFTWARE=1 only on command failure
  + run only when called inside an unity session

Date: 2018-06-22 13:17:14.028668+00:00
Changed-By: Marco Trevisan (Treviño) 
Maintainer: Didier Roche 
Signed-By: Łukasz Zemczak 
https://launchpad.net/ubuntu/+source/nux/4.0.8+16.04.20180622.2-0ubuntu1
Sorry, changesfile not available.-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes