[ubuntu/xenial-updates] openjdk-8 8u222-b10-1ubuntu1~16.04.1 (Accepted)
openjdk-8 (8u222-b10-1ubuntu1~16.04.1) xenial-security; urgency=medium * Backport from Eoan. openjdk-8 (8u222-b10-1ubuntu2) eoan; urgency=medium * Improve and fix build tests and autopkgtests: - Update debian/tests/hotspot,jdk,langtools to ignore jtreg-autopkgtest.sh return code. - Create debian/tests/jtdiff-autopkgtest.in as it depends on debian/rules variables. - debian/tests/jtreg-autopkgtest.sh: + Enable retry of failed tests to trim out flaky tests. + Fix unbound variable. + Force JT_JAVA otherwise jtreg will look for /usr/lib/jvm/default-java which might not be installed or be the right JVM to use. + Keep .jtr files from failed tests only. - debian/tests/jtdiff-autopkgtest.sh: + Fail only if an actual regression is detected. + Force JT_JAVA otherwise jtreg will look for /usr/lib/jvm/default-java which might not be installed or be the right JVM to use. + Add the super-diff comparison from jtdiff. - debian/rules: + Preserve all JTreport directories in the test output directory. + Use JDK_DIR instead of JDK_TO_TEST for autopkgtest generation. + Package all .jtr files from JTwork as jtreg-autopkgtest.sh makes sure it contains only failing tests. openjdk-8 (8u222-b10-1) unstable; urgency=high * Update to 8u222-b10 (except for AArch32, updated to b08). - Security fixes: - S8191073: JpegImageReader throws IndexOutOfBoundsException when trying to read image data from tables-only image. - S8208698, CVE-2019-2745: Improved ECC Implementation. - S8212328, CVE-2019-2762: Exceptional throw cases. - S8213431, CVE-2019-2766: Improve file protocol handling. - S8213432, CVE-2019-2769: Better copies of CopiesList. - S8216381, CVE-2019-2786: More limited privilege usage. - S8217563: Improve realm maintenance. - S8218863: Better endpoint checks. - S8218873: Improve JSSE endpoint checking. - S8218876, CVE-2019-7317: Improve PNG support options. - S8219018: Adjust positions of glyphs. - S8219020: Table alternate substitutions. - S8219775: Certificate validation improvements. - S8220192: Better outlook for SecureRandom. - S8220517: Enhanced GIF support. - S8221518, CVE-2019-2816: Normalize normalization. - S8223511, CVE-2019-2842: Extended AES support. [ Matthias Klose ] * Bump standards version. [ Tiago Stürmer Daitx ] * Backport fix for S8223511 for AArch32. openjdk-8 (8u222-b07-3) unstable; urgency=medium * Upload to unstable. openjdk-8 (8u222-b07-2) experimental; urgency=medium * Remove AArch32 patches, applied upstream. * Fix build dependencies for Ubuntu precise builds. openjdk-8 (8u222-b07-1) experimental; urgency=medium * Update to 8u222-b07. openjdk-8 (8u222-b05-1) experimental; urgency=medium [ Matthias Klose ] * Update to 8u222-b05 (except for AArch32). * Apply suggested hotspot fixes for AArch32. * Re-enable running the testsuite. [ Tiago Stürmer Daitx ] * Find any hs_err_pid files generated during the build and send to stdout. openjdk-8 (8u222-b04-3) experimental; urgency=medium * Update ARM32 to jdk8u222-b04-aarch32-190603. * Regenerate the ppc64el patch. * Remove unused patches ppc64le-8036767 and zero-opt. openjdk-8 (8u222-b04-1) experimental; urgency=medium * Update to 8u222-b04. * Update ARM32 to jdk8u212-b04-aarch32-190430. * Fix 32bit zero builds. openjdk-8 (8u212-b03-3) UNRELEASED; urgency=medium * Use -a instead of -s for debhelper tools. openjdk-8 (8u212-b03-2) unstable; urgency=medium * Don't apply the 8221355 fix for ARM builds. * Don't configure --with-vendor-name on stable releases. * Fix the jpeg runtime dependency for the build in unstable. openjdk-8 (8u212-b03-1) unstable; urgency=medium [ Matthias Klose ] * Configure --with-vendor-name. * 8221355: Fix performance regression after JDK-8155635 backport into 8u. [ Tiago Stürmer Daitx ] * Update to 8u212-b03. LP: #1826001. * Security fixes: - S8211936, CVE-2019-2602: Better String parsing. - S8218453, CVE-2019-2684: More dynamic RMI interactions. - S8219066, CVE-2019-2698: Fuzzing TrueType fonts: setCurrGlyphID(). * Revert to GTK2 as default since GTK3 still has padding and component issues: - debian/rules: always Build-Depends on libgtk2.0-dev and Depends on libgtk2.0-0 instead of relying on gtk3 for some releases. * debian/control: add missing dependency on testng (required by the testsuites). [ Andrej Shadura ] * debian/rules: check for nodoc instead of nodocs in DEB_BUILD_OPTIONS. Closes: 922757. [ Matthias Klose ] * debian/rules, debian/tests/jtdiff-autopkgtest.sh, debian/tests/jtreg-autopkgtest.in, debian/tests/jtreg-autopkgtest.sh: only set the JDK under test and allow jtreg to use its default JDK for running the tests. [ Thorste
[ubuntu/xenial-security] openjdk-8 8u222-b10-1ubuntu1~16.04.1 (Accepted)
openjdk-8 (8u222-b10-1ubuntu1~16.04.1) xenial-security; urgency=medium * Backport from Eoan. openjdk-8 (8u222-b10-1ubuntu2) eoan; urgency=medium * Improve and fix build tests and autopkgtests: - Update debian/tests/hotspot,jdk,langtools to ignore jtreg-autopkgtest.sh return code. - Create debian/tests/jtdiff-autopkgtest.in as it depends on debian/rules variables. - debian/tests/jtreg-autopkgtest.sh: + Enable retry of failed tests to trim out flaky tests. + Fix unbound variable. + Force JT_JAVA otherwise jtreg will look for /usr/lib/jvm/default-java which might not be installed or be the right JVM to use. + Keep .jtr files from failed tests only. - debian/tests/jtdiff-autopkgtest.sh: + Fail only if an actual regression is detected. + Force JT_JAVA otherwise jtreg will look for /usr/lib/jvm/default-java which might not be installed or be the right JVM to use. + Add the super-diff comparison from jtdiff. - debian/rules: + Preserve all JTreport directories in the test output directory. + Use JDK_DIR instead of JDK_TO_TEST for autopkgtest generation. + Package all .jtr files from JTwork as jtreg-autopkgtest.sh makes sure it contains only failing tests. openjdk-8 (8u222-b10-1) unstable; urgency=high * Update to 8u222-b10 (except for AArch32, updated to b08). - Security fixes: - S8191073: JpegImageReader throws IndexOutOfBoundsException when trying to read image data from tables-only image. - S8208698, CVE-2019-2745: Improved ECC Implementation. - S8212328, CVE-2019-2762: Exceptional throw cases. - S8213431, CVE-2019-2766: Improve file protocol handling. - S8213432, CVE-2019-2769: Better copies of CopiesList. - S8216381, CVE-2019-2786: More limited privilege usage. - S8217563: Improve realm maintenance. - S8218863: Better endpoint checks. - S8218873: Improve JSSE endpoint checking. - S8218876, CVE-2019-7317: Improve PNG support options. - S8219018: Adjust positions of glyphs. - S8219020: Table alternate substitutions. - S8219775: Certificate validation improvements. - S8220192: Better outlook for SecureRandom. - S8220517: Enhanced GIF support. - S8221518, CVE-2019-2816: Normalize normalization. - S8223511, CVE-2019-2842: Extended AES support. [ Matthias Klose ] * Bump standards version. [ Tiago Stürmer Daitx ] * Backport fix for S8223511 for AArch32. openjdk-8 (8u222-b07-3) unstable; urgency=medium * Upload to unstable. openjdk-8 (8u222-b07-2) experimental; urgency=medium * Remove AArch32 patches, applied upstream. * Fix build dependencies for Ubuntu precise builds. openjdk-8 (8u222-b07-1) experimental; urgency=medium * Update to 8u222-b07. openjdk-8 (8u222-b05-1) experimental; urgency=medium [ Matthias Klose ] * Update to 8u222-b05 (except for AArch32). * Apply suggested hotspot fixes for AArch32. * Re-enable running the testsuite. [ Tiago Stürmer Daitx ] * Find any hs_err_pid files generated during the build and send to stdout. openjdk-8 (8u222-b04-3) experimental; urgency=medium * Update ARM32 to jdk8u222-b04-aarch32-190603. * Regenerate the ppc64el patch. * Remove unused patches ppc64le-8036767 and zero-opt. openjdk-8 (8u222-b04-1) experimental; urgency=medium * Update to 8u222-b04. * Update ARM32 to jdk8u212-b04-aarch32-190430. * Fix 32bit zero builds. openjdk-8 (8u212-b03-3) UNRELEASED; urgency=medium * Use -a instead of -s for debhelper tools. openjdk-8 (8u212-b03-2) unstable; urgency=medium * Don't apply the 8221355 fix for ARM builds. * Don't configure --with-vendor-name on stable releases. * Fix the jpeg runtime dependency for the build in unstable. openjdk-8 (8u212-b03-1) unstable; urgency=medium [ Matthias Klose ] * Configure --with-vendor-name. * 8221355: Fix performance regression after JDK-8155635 backport into 8u. [ Tiago Stürmer Daitx ] * Update to 8u212-b03. LP: #1826001. * Security fixes: - S8211936, CVE-2019-2602: Better String parsing. - S8218453, CVE-2019-2684: More dynamic RMI interactions. - S8219066, CVE-2019-2698: Fuzzing TrueType fonts: setCurrGlyphID(). * Revert to GTK2 as default since GTK3 still has padding and component issues: - debian/rules: always Build-Depends on libgtk2.0-dev and Depends on libgtk2.0-0 instead of relying on gtk3 for some releases. * debian/control: add missing dependency on testng (required by the testsuites). [ Andrej Shadura ] * debian/rules: check for nodoc instead of nodocs in DEB_BUILD_OPTIONS. Closes: 922757. [ Matthias Klose ] * debian/rules, debian/tests/jtdiff-autopkgtest.sh, debian/tests/jtreg-autopkgtest.in, debian/tests/jtreg-autopkgtest.sh: only set the JDK under test and allow jtreg to use its default JDK for running the tests. [ Thorste
[ubuntu/xenial-proposed] spice-html5 0.1.4-1ubuntu1.16.04.1 (Accepted)
spice-html5 (0.1.4-1ubuntu1.16.04.1) xenial; urgency=medium * d/p/fix-windows-spice-upside-down.patch d/p/fix-windows-spice-upside-down-bitmaps.patch Fix window spice upside down display (LP: #1836361) Date: Mon, 22 Jul 2019 08:55:37 +0200 Changed-By: Dariusz Gadomski Maintainer: PKG OpenStack Signed-By: Dan Streetman https://launchpad.net/ubuntu/+source/spice-html5/0.1.4-1ubuntu1.16.04.1 Format: 1.8 Date: Mon, 22 Jul 2019 08:55:37 +0200 Source: spice-html5 Binary: spice-html5 Architecture: source Version: 0.1.4-1ubuntu1.16.04.1 Distribution: xenial Urgency: medium Maintainer: PKG OpenStack Changed-By: Dariusz Gadomski Description: spice-html5 - Spice Web client which runs entirely within a modern browser Launchpad-Bugs-Fixed: 1836361 Changes: spice-html5 (0.1.4-1ubuntu1.16.04.1) xenial; urgency=medium . * d/p/fix-windows-spice-upside-down.patch d/p/fix-windows-spice-upside-down-bitmaps.patch Fix window spice upside down display (LP: #1836361) Checksums-Sha1: 51b1decb5f305de8c40c1dd9311c69925a53f134 2123 spice-html5_0.1.4-1ubuntu1.16.04.1.dsc 1beebeb8ec6526b9d4a3dfd7feaa761046270e02 5324 spice-html5_0.1.4-1ubuntu1.16.04.1.debian.tar.xz Checksums-Sha256: 269ee45822be8b0fcb4faddbaf5af0279cf892e57972019364e50b5244d7565e 2123 spice-html5_0.1.4-1ubuntu1.16.04.1.dsc b3596dedc2101c467f36f5ab18ce28c27fb8631c231868d0fa36fcad84a47eae 5324 spice-html5_0.1.4-1ubuntu1.16.04.1.debian.tar.xz Files: 4546b9a12a7725cde29cd1c1f0878b67 2123 web extra spice-html5_0.1.4-1ubuntu1.16.04.1.dsc 8c2ae3da093dea64d7ddb615911f54d9 5324 web extra spice-html5_0.1.4-1ubuntu1.16.04.1.debian.tar.xz -- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] software-properties 0.96.20.9 (Accepted)
software-properties (0.96.20.9) xenial; urgency=medium * cloudarchive: Update outdated WEB_LINK that is presented when cloud archive is enabled (LP: #1836258). Date: Fri, 12 Jul 2019 10:15:23 -0400 Changed-By: Corey Bryant Maintainer: Michael Vogt https://launchpad.net/ubuntu/+source/software-properties/0.96.20.9 Format: 1.8 Date: Fri, 12 Jul 2019 10:15:23 -0400 Source: software-properties Architecture: source Version: 0.96.20.9 Distribution: xenial Urgency: medium Maintainer: Michael Vogt Changed-By: Corey Bryant Launchpad-Bugs-Fixed: 1836258 Changes: software-properties (0.96.20.9) xenial; urgency=medium . * cloudarchive: Update outdated WEB_LINK that is presented when cloud archive is enabled (LP: #1836258). Checksums-Sha1: df2675742e963b1ab47a61a529352958a62df9c0 2345 software-properties_0.96.20.9.dsc 693f7a5e83bc22fe273852c65c7d3a81c0de4449 402148 software-properties_0.96.20.9.tar.xz f1134a7daeec11cd3923411ac46a014b2310383e 7952 software-properties_0.96.20.9_source.buildinfo Checksums-Sha256: 31f688674defc5dbe26d4915c151b08fb08571a0151d88badba0fb9f65ca59f7 2345 software-properties_0.96.20.9.dsc e33c2c714d69558a3dbb3d1019cee90ccf198cf12ad5ff44711fc31dec33137c 402148 software-properties_0.96.20.9.tar.xz 37827f49b810ee95aa52da057f92da4809e4ed4ed8d44de2434805ab320de107 7952 software-properties_0.96.20.9_source.buildinfo Files: 577829587c5d6dc6fc95f959f21d3aba 2345 admin optional software-properties_0.96.20.9.dsc a910a78c27aa9cdedf96643881e249fe 402148 admin optional software-properties_0.96.20.9.tar.xz f63ece032a3139c03d4da6d9af81d6d2 7952 admin optional software-properties_0.96.20.9_source.buildinfo -- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta-snapdragon 4.4.0.1122.114 (Accepted)
linux-meta-snapdragon (4.4.0.1122.114) xenial; urgency=medium * Bump ABI 4.4.0-1122 Date: 2019-07-30 14:48:55.171691+00:00 Changed-By: Jesse Sung Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-snapdragon/4.4.0.1122.114 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-snapdragon 4.4.0-1122.128 (Accepted)
linux-snapdragon (4.4.0-1122.128) xenial; urgency=medium * xenial/linux-snapdragon: 4.4.0-1122.128 -proposed tracker (LP: #1837598) * CVE-2018-5383 - [Config] enable CRYPTO_ECDH [ Ubuntu: 4.4.0-158.186 ] * xenial/linux: 4.4.0-158.186 -proposed tracker (LP: #1837609) * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log - [Packaging] update helper scripts * ixgbe{vf} - Physical Function gets IRQ when VF checks link state (LP: #1836760) - ixgbevf: Use cached link state instead of re-reading the value for ethtool * CVE-2018-5383 - crypto: kpp - Key-agreement Protocol Primitives API (KPP) - crypto: dh - Add DH software implementation - crypto: ecdh - Add ECDH software support - crypto: ecdh - make ecdh_shared_secret unique - crypto: doc - add KPP documentation - crypto: kpp, (ec)dh - fix typos - crypto: ecc - remove unused function arguments - crypto: ecc - remove unnecessary casts - crypto: ecc - rename ecdh_make_pub_key() - crypto: ecdh - add privkey generation support - crypto: ecc - Fix NULL pointer deref. on no default_rng - [Config] CRYPTO_ECDH=m - Bluetooth: convert smp and selftest to crypto kpp API - crypto: ecdh - add public key verification test * Xenial update: 4.4.185 upstream stable release (LP: #1836668) - fs/binfmt_flat.c: make load_flat_shared_library() work - scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() - tracing: Silence GCC 9 array bounds warning - gcc-9: silence 'address-of-packed-member' warning - usb: chipidea: udc: workaround for endpoint conflict issue - Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD - apparmor: enforce nullbyte at end of tag string - parport: Fix mem leak in parport_register_dev_model - parisc: Fix compiler warnings in float emulation code - IB/hfi1: Insure freeze_work work_struct is canceled on shutdown - MIPS: uprobes: remove set but not used variable 'epc' - net: hns: Fix loopback test failed at copper ports - sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD - scripts/checkstack.pl: Fix arm64 wrong or unknown architecture - scsi: ufs: Check that space was properly alloced in copy_query_response - s390/qeth: fix VLAN attribute in bridge_hostnotify udev event - hwmon: (pmbus/core) Treat parameters as paged if on multiple pages - Btrfs: fix race between readahead and device replace/removal - btrfs: start readahead also in seed devices - can: flexcan: fix timeout when set small bitrate - can: purge socket error queue on sock destruct - ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX - Bluetooth: Align minimum encryption key size for LE and BR/EDR connections - Bluetooth: Fix regression with minimum encryption key size alignment - SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write - cfg80211: fix memory leak of wiphy device name - mac80211: drop robust management frames from unknown TA - perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit set nul - perf help: Remove needless use of strncpy() - 9p/rdma: do not disconnect on down_interruptible EAGAIN - 9p: acl: fix uninitialized iattr access - 9p/rdma: remove useless check in cm_event_handler - 9p: p9dirent_read: check network-provided name length - net/9p: include trans_common.h to fix missing prototype warning. - ovl: modify ovl_permission() to do checks on two inodes - x86/speculation: Allow guests to use SSBD even if host does not - cpu/speculation: Warn on unsupported mitigations= parameter - sctp: change to hold sk after auth shkey is created successfully - tipc: change to use register_pernet_device - tipc: check msg->req data len in tipc_nl_compat_bearer_disable - team: Always enable vlan tx offload - ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop - bonding: Always enable vlan tx offload - net: check before dereferencing netdev_ops during busy poll - Bluetooth: Fix faulty expression for minimum encryption key size check - um: Compile with modern headers - ASoC : cs4265 : readable register too low - spi: bitbang: Fix NULL pointer dereference in spi_unregister_master - ASoC: max98090: remove 24-bit format support if RJ is 0 - usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] - usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC - scsi: hpsa: correct ioaccel2 chaining - ARC: Assume multiplier is always present - ARC: fix build warning in elf.h - MIPS: math-emu: do not use bools for arithmetic - mfd: omap-usb-tll: Fix register offsets - swiotlb: Make linux/swiotlb.h standalone includible - bug.h: work around GCC PR82365 in BUG() - MIPS: Workaround GCC __builtin_unreachable reordering bug - ptrace: Fi
[ubuntu/xenial-proposed] linux-meta-raspi2 4.4.0.1118.118 (Accepted)
linux-meta-raspi2 (4.4.0.1118.118) xenial; urgency=medium * Bump ABI 4.4.0-1118 Date: 2019-07-30 16:37:54.899292+00:00 Changed-By: Connor Kuehl Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-raspi2/4.4.0.1118.118 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-raspi2 4.4.0-1118.127 (Accepted)
linux-raspi2 (4.4.0-1118.127) xenial; urgency=medium * xenial/linux-raspi2: 4.4.0-1118.127 -proposed tracker (LP: #1837594) * CVE-2018-5383 - raspi2: [Config]: CRYPTO_ECDH=m [ Ubuntu: 4.4.0-158.186 ] * xenial/linux: 4.4.0-158.186 -proposed tracker (LP: #1837609) * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log - [Packaging] update helper scripts * ixgbe{vf} - Physical Function gets IRQ when VF checks link state (LP: #1836760) - ixgbevf: Use cached link state instead of re-reading the value for ethtool * CVE-2018-5383 - crypto: kpp - Key-agreement Protocol Primitives API (KPP) - crypto: dh - Add DH software implementation - crypto: ecdh - Add ECDH software support - crypto: ecdh - make ecdh_shared_secret unique - crypto: doc - add KPP documentation - crypto: kpp, (ec)dh - fix typos - crypto: ecc - remove unused function arguments - crypto: ecc - remove unnecessary casts - crypto: ecc - rename ecdh_make_pub_key() - crypto: ecdh - add privkey generation support - crypto: ecc - Fix NULL pointer deref. on no default_rng - [Config] CRYPTO_ECDH=m - Bluetooth: convert smp and selftest to crypto kpp API - crypto: ecdh - add public key verification test * Xenial update: 4.4.185 upstream stable release (LP: #1836668) - fs/binfmt_flat.c: make load_flat_shared_library() work - scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() - tracing: Silence GCC 9 array bounds warning - gcc-9: silence 'address-of-packed-member' warning - usb: chipidea: udc: workaround for endpoint conflict issue - Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD - apparmor: enforce nullbyte at end of tag string - parport: Fix mem leak in parport_register_dev_model - parisc: Fix compiler warnings in float emulation code - IB/hfi1: Insure freeze_work work_struct is canceled on shutdown - MIPS: uprobes: remove set but not used variable 'epc' - net: hns: Fix loopback test failed at copper ports - sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD - scripts/checkstack.pl: Fix arm64 wrong or unknown architecture - scsi: ufs: Check that space was properly alloced in copy_query_response - s390/qeth: fix VLAN attribute in bridge_hostnotify udev event - hwmon: (pmbus/core) Treat parameters as paged if on multiple pages - Btrfs: fix race between readahead and device replace/removal - btrfs: start readahead also in seed devices - can: flexcan: fix timeout when set small bitrate - can: purge socket error queue on sock destruct - ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX - Bluetooth: Align minimum encryption key size for LE and BR/EDR connections - Bluetooth: Fix regression with minimum encryption key size alignment - SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write - cfg80211: fix memory leak of wiphy device name - mac80211: drop robust management frames from unknown TA - perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit set nul - perf help: Remove needless use of strncpy() - 9p/rdma: do not disconnect on down_interruptible EAGAIN - 9p: acl: fix uninitialized iattr access - 9p/rdma: remove useless check in cm_event_handler - 9p: p9dirent_read: check network-provided name length - net/9p: include trans_common.h to fix missing prototype warning. - ovl: modify ovl_permission() to do checks on two inodes - x86/speculation: Allow guests to use SSBD even if host does not - cpu/speculation: Warn on unsupported mitigations= parameter - sctp: change to hold sk after auth shkey is created successfully - tipc: change to use register_pernet_device - tipc: check msg->req data len in tipc_nl_compat_bearer_disable - team: Always enable vlan tx offload - ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop - bonding: Always enable vlan tx offload - net: check before dereferencing netdev_ops during busy poll - Bluetooth: Fix faulty expression for minimum encryption key size check - um: Compile with modern headers - ASoC : cs4265 : readable register too low - spi: bitbang: Fix NULL pointer dereference in spi_unregister_master - ASoC: max98090: remove 24-bit format support if RJ is 0 - usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] - usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC - scsi: hpsa: correct ioaccel2 chaining - ARC: Assume multiplier is always present - ARC: fix build warning in elf.h - MIPS: math-emu: do not use bools for arithmetic - mfd: omap-usb-tll: Fix register offsets - swiotlb: Make linux/swiotlb.h standalone includible - bug.h: work around GCC PR82365 in BUG() - MIPS: Workaround GCC __builtin_unreachable reordering bug - ptrace: Fix ->
[ubuntu/xenial-updates] sox 14.4.1-5+deb8u4ubuntu0.1 (Accepted)
sox (14.4.1-5+deb8u4ubuntu0.1) xenial-security; urgency=medium * SECURITY UPDATE: Merge from Debian - Fixes: - CVE-2019-8354 - CVE-2019-8356 - CVE-2019-8357 - Fixes overwritten by Debian: - CVE-2017-11332 - CVE-2017-11358 - CVE-2017-11359 - CVE-2017-15370 - CVE-2017-15371 - CVE-2017-15372 - CVE-2017-15642 - CVE-2017-18189 - Ignored Debian's "override_dh_strip" in debian/rules as this change was made by mistake sox (14.4.1-5+deb8u4) jessie-security; urgency=medium * Non-maintainer upload by the LTS Team. * CVE-2019-8354, CVE-2019-8355: buffer overflow in valloc functions. * CVE-2019-8356: stack-based buffer overflow in bitrv2(). * CVE-2019-8357: NULL pointer dereference in lsx_make_lpf(). sox (14.4.1-5+deb8u3) jessie-security; urgency=high * Non-maintainer upload by the LTS Team. * CVE-2017-15371: reachable assertion in sox_append_comment() (formats.c) (Closes: #878809). * CVE-2017-11359: divide-by-zero error wavwritehdr function (wav.c) (Closes: #870328). * CVE-2017-11332: divide-by-zero error in startread function (wav.c). * CVE-2017-11358: invalid memory read in read_samples function (hcom.c). sox (14.4.1-5+deb8u2) jessie-security; urgency=high * Non-maintainer upload by the LTS Team. * CVE-2017-15370: heap-based buffer overflow in the ImaExpandS function of ima_rw.c (Closes: #878810). * CVE-2017-15372: stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c (Closes: #878808). * CVE-2017-18189: null pointer dereference caused by corrupt header specifying zero channels, sending read_channels() into an infinite loop (Closes: #881121). * CVE-2017-15642: use-after-free in output_message, triggered by crafted aiff file (Closes: #882144). sox (14.4.1-5+deb8u1) jessie-security; urgency=medium * Non-maintainer upload. * Add patches for CVE-2014-8145 to series file and really apply fixes. Thanks to Mike Salvatore for spotting the issue. (Closes: #773720) Date: 2019-07-30 17:01:14.288185+00:00 Changed-By: Eduardo dos Santos Barretto Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/sox/14.4.1-5+deb8u4ubuntu0.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] nss 2:3.28.4-0ubuntu0.16.04.7 (Accepted)
nss (2:3.28.4-0ubuntu0.16.04.7) xenial; urgency=medium * disable reading fips_enabled flag and enabling FIPS mode automatically on a FIPS machine. libnss is not a FIPS certified library. (LP: #1837734) Date: Tue, 23 Jul 2019 11:38:29 -0400 Changed-By: Vineetha Kamath Maintainer: Ubuntu Developers Signed-By: Marc Deslauriers https://launchpad.net/ubuntu/+source/nss/2:3.28.4-0ubuntu0.16.04.7 Format: 1.8 Date: Tue, 23 Jul 2019 11:38:29 -0400 Source: nss Binary: libnss3 libnss3-1d libnss3-nssdb libnss3-tools libnss3-dev libnss3-dbg Architecture: source Version: 2:3.28.4-0ubuntu0.16.04.7 Distribution: xenial Urgency: medium Maintainer: Ubuntu Developers Changed-By: Vineetha Kamath Description: libnss3- Network Security Service libraries libnss3-1d - Network Security Service libraries - transitional package libnss3-dbg - Debugging symbols for the Network Security Service libraries libnss3-dev - Development files for the Network Security Service libraries libnss3-nssdb - Network Security Security libraries - shared databases libnss3-tools - Network Security Service tools Launchpad-Bugs-Fixed: 1837734 Changes: nss (2:3.28.4-0ubuntu0.16.04.7) xenial; urgency=medium . * disable reading fips_enabled flag and enabling FIPS mode automatically on a FIPS machine. libnss is not a FIPS certified library. (LP: #1837734) Checksums-Sha1: d9c0c184bfe98e155049f0edbd1bf0abbdd9842d 2444 nss_3.28.4-0ubuntu0.16.04.7.dsc 9df495f1b4b7cc24e7737c551a6c8a870aa1c7f1 43268 nss_3.28.4-0ubuntu0.16.04.7.debian.tar.xz Checksums-Sha256: 3827b1b649290ee90c54c0bad83eb56fcce46fb96437de50f1c64ca4567b4ffb 2444 nss_3.28.4-0ubuntu0.16.04.7.dsc 736a8c8ad2afeff0039910445b90278c8a273daede6b069680c36a46306ca926 43268 nss_3.28.4-0ubuntu0.16.04.7.debian.tar.xz Files: b5572b65386ee9d88065890898d4523d 2444 libs optional nss_3.28.4-0ubuntu0.16.04.7.dsc e46882507a621aa563fe0146b4de16a1 43268 libs optional nss_3.28.4-0ubuntu0.16.04.7.debian.tar.xz Original-Maintainer: Maintainers of Mozilla-related packages -- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] sox 14.4.1-5+deb8u4ubuntu0.1 (Accepted)
sox (14.4.1-5+deb8u4ubuntu0.1) xenial-security; urgency=medium * SECURITY UPDATE: Merge from Debian - Fixes: - CVE-2019-8354 - CVE-2019-8356 - CVE-2019-8357 - Fixes overwritten by Debian: - CVE-2017-11332 - CVE-2017-11358 - CVE-2017-11359 - CVE-2017-15370 - CVE-2017-15371 - CVE-2017-15372 - CVE-2017-15642 - CVE-2017-18189 - Ignored Debian's "override_dh_strip" in debian/rules as this change was made by mistake sox (14.4.1-5+deb8u4) jessie-security; urgency=medium * Non-maintainer upload by the LTS Team. * CVE-2019-8354, CVE-2019-8355: buffer overflow in valloc functions. * CVE-2019-8356: stack-based buffer overflow in bitrv2(). * CVE-2019-8357: NULL pointer dereference in lsx_make_lpf(). sox (14.4.1-5+deb8u3) jessie-security; urgency=high * Non-maintainer upload by the LTS Team. * CVE-2017-15371: reachable assertion in sox_append_comment() (formats.c) (Closes: #878809). * CVE-2017-11359: divide-by-zero error wavwritehdr function (wav.c) (Closes: #870328). * CVE-2017-11332: divide-by-zero error in startread function (wav.c). * CVE-2017-11358: invalid memory read in read_samples function (hcom.c). sox (14.4.1-5+deb8u2) jessie-security; urgency=high * Non-maintainer upload by the LTS Team. * CVE-2017-15370: heap-based buffer overflow in the ImaExpandS function of ima_rw.c (Closes: #878810). * CVE-2017-15372: stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c (Closes: #878808). * CVE-2017-18189: null pointer dereference caused by corrupt header specifying zero channels, sending read_channels() into an infinite loop (Closes: #881121). * CVE-2017-15642: use-after-free in output_message, triggered by crafted aiff file (Closes: #882144). sox (14.4.1-5+deb8u1) jessie-security; urgency=medium * Non-maintainer upload. * Add patches for CVE-2014-8145 to series file and really apply fixes. Thanks to Mike Salvatore for spotting the issue. (Closes: #773720) Date: 2019-07-30 17:01:14.288185+00:00 Changed-By: Eduardo dos Santos Barretto https://launchpad.net/ubuntu/+source/sox/14.4.1-5+deb8u4ubuntu0.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] openldap 2.4.42+dfsg-2ubuntu3.6 (Accepted)
openldap (2.4.42+dfsg-2ubuntu3.6) xenial-security; urgency=medium * SECURITY UPDATE: rootDN proxyauthz not restricted to its own databases - debian/patches/CVE-2019-13057-1.patch: add restriction to servers/slapd/saslauthz.c. - debian/patches/CVE-2019-13057-2.patch: add tests to tests/data/idassert.out, tests/data/slapd-idassert.conf, tests/data/test-idassert1.ldif, tests/scripts/test028-idassert. - debian/patches/CVE-2019-13057-3.patch: fix typo in tests/scripts/test028-idassert. - debian/patches/CVE-2019-13057-4.patch: fix typo in tests/scripts/test028-idassert. - CVE-2019-13057 * SECURITY UPDATE: SASL SSF not initialized per connection - debian/patches/CVE-2019-13565.patch: zero out sasl_ssf in connection_init in servers/slapd/connection.c. - CVE-2019-13565 Date: 2019-07-29 18:22:13.397162+00:00 Changed-By: Marc Deslauriers Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/openldap/2.4.42+dfsg-2ubuntu3.6 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] openldap 2.4.42+dfsg-2ubuntu3.6 (Accepted)
openldap (2.4.42+dfsg-2ubuntu3.6) xenial-security; urgency=medium * SECURITY UPDATE: rootDN proxyauthz not restricted to its own databases - debian/patches/CVE-2019-13057-1.patch: add restriction to servers/slapd/saslauthz.c. - debian/patches/CVE-2019-13057-2.patch: add tests to tests/data/idassert.out, tests/data/slapd-idassert.conf, tests/data/test-idassert1.ldif, tests/scripts/test028-idassert. - debian/patches/CVE-2019-13057-3.patch: fix typo in tests/scripts/test028-idassert. - debian/patches/CVE-2019-13057-4.patch: fix typo in tests/scripts/test028-idassert. - CVE-2019-13057 * SECURITY UPDATE: SASL SSF not initialized per connection - debian/patches/CVE-2019-13565.patch: zero out sasl_ssf in connection_init in servers/slapd/connection.c. - CVE-2019-13565 openldap (2.4.42+dfsg-2ubuntu3.5) xenial; urgency=medium * Fix sysv-generator unit file by customizing parameters (LP: #1821343) - d/slapd-remain-after-exit.conf: Override RemainAfterExit to allow correct systemctl status for slapd daemon. - d/slapd.install: place override file in correct location. openldap (2.4.42+dfsg-2ubuntu3.4) xenial; urgency=medium * d/apparmor-profile: update apparmor profile to allow reading of files needed when slapd is behaving as a kerberos/gssapi client and acquiring its own ticket. (LP: #1783183) openldap (2.4.42+dfsg-2ubuntu3.3) xenial; urgency=medium [ Ryan Tandy ] * d/p/ITS-8648-check-result-of-ldap_int_initialize-in-ldap.patch, d/p/ITS-8648-init-SASL-library-in-global-init.patch: Import upstream patches to fix memory corruption caused by calling sasl_client_init() multiple times and possibly concurrently. (ITS#8648) (LP: #1688575) Date: 2019-07-29 18:22:13.397162+00:00 Changed-By: Marc Deslauriers https://launchpad.net/ubuntu/+source/openldap/2.4.42+dfsg-2ubuntu3.6 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] qemu 1:2.5+dfsg-5ubuntu10.41 (Accepted)
qemu (1:2.5+dfsg-5ubuntu10.41) xenial; urgency=medium * d/p/ubuntu/lp-1830243-s390-bios-Skip-bootmap-signature-entries.patch: tolerate guests with secure boot loaders (LP: #1830243) Date: 2019-07-16 09:55:10.848100+00:00 Changed-By: Christian Ehrhardt Signed-By: Brian Murray https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.41 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-signed-oracle 4.15.0-1019.21~16.04.1 (Accepted)
linux-signed-oracle (4.15.0-1019.21~16.04.1) xenial; urgency=medium * Master version: 4.15.0-1019.21~16.04.1 Date: 2019-07-30 08:42:56.018710+00:00 Changed-By: Kleber Sacilotto de Souza Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-signed-oracle/4.15.0-1019.21~16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta-oracle 4.15.0.1019.13 (Accepted)
linux-meta-oracle (4.15.0.1019.13) xenial; urgency=medium * Bump ABI 4.15.0-1019 Date: 2019-07-30 08:42:54.348220+00:00 Changed-By: Kleber Sacilotto de Souza Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta-oracle/4.15.0.1019.13 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta-kvm 4.4.0.1053.53 (Accepted)
linux-meta-kvm (4.4.0.1053.53) xenial; urgency=medium * Bump ABI 4.4.0-1053 Date: 2019-07-30 10:25:11.615978+00:00 Changed-By: Connor Kuehl Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta-kvm/4.4.0.1053.53 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-kvm 4.4.0-1053.60 (Accepted)
linux-kvm (4.4.0-1053.60) xenial; urgency=medium * xenial/linux-kvm: 4.4.0-1053.60 -proposed tracker (LP: #1837591) * CVE-2018-5383 - kvm: [Config]: CRYPTO_ECDH=m * linux-kvm: please support kexec (LP: #1799791) - [Config]: enable KEXEC and KEXEC_FILE [ Ubuntu: 4.4.0-158.186 ] * xenial/linux: 4.4.0-158.186 -proposed tracker (LP: #1837609) * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log - [Packaging] update helper scripts * ixgbe{vf} - Physical Function gets IRQ when VF checks link state (LP: #1836760) - ixgbevf: Use cached link state instead of re-reading the value for ethtool * CVE-2018-5383 - crypto: kpp - Key-agreement Protocol Primitives API (KPP) - crypto: dh - Add DH software implementation - crypto: ecdh - Add ECDH software support - crypto: ecdh - make ecdh_shared_secret unique - crypto: doc - add KPP documentation - crypto: kpp, (ec)dh - fix typos - crypto: ecc - remove unused function arguments - crypto: ecc - remove unnecessary casts - crypto: ecc - rename ecdh_make_pub_key() - crypto: ecdh - add privkey generation support - crypto: ecc - Fix NULL pointer deref. on no default_rng - [Config] CRYPTO_ECDH=m - Bluetooth: convert smp and selftest to crypto kpp API - crypto: ecdh - add public key verification test * Xenial update: 4.4.185 upstream stable release (LP: #1836668) - fs/binfmt_flat.c: make load_flat_shared_library() work - scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() - tracing: Silence GCC 9 array bounds warning - gcc-9: silence 'address-of-packed-member' warning - usb: chipidea: udc: workaround for endpoint conflict issue - Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD - apparmor: enforce nullbyte at end of tag string - parport: Fix mem leak in parport_register_dev_model - parisc: Fix compiler warnings in float emulation code - IB/hfi1: Insure freeze_work work_struct is canceled on shutdown - MIPS: uprobes: remove set but not used variable 'epc' - net: hns: Fix loopback test failed at copper ports - sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD - scripts/checkstack.pl: Fix arm64 wrong or unknown architecture - scsi: ufs: Check that space was properly alloced in copy_query_response - s390/qeth: fix VLAN attribute in bridge_hostnotify udev event - hwmon: (pmbus/core) Treat parameters as paged if on multiple pages - Btrfs: fix race between readahead and device replace/removal - btrfs: start readahead also in seed devices - can: flexcan: fix timeout when set small bitrate - can: purge socket error queue on sock destruct - ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX - Bluetooth: Align minimum encryption key size for LE and BR/EDR connections - Bluetooth: Fix regression with minimum encryption key size alignment - SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write - cfg80211: fix memory leak of wiphy device name - mac80211: drop robust management frames from unknown TA - perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit set nul - perf help: Remove needless use of strncpy() - 9p/rdma: do not disconnect on down_interruptible EAGAIN - 9p: acl: fix uninitialized iattr access - 9p/rdma: remove useless check in cm_event_handler - 9p: p9dirent_read: check network-provided name length - net/9p: include trans_common.h to fix missing prototype warning. - ovl: modify ovl_permission() to do checks on two inodes - x86/speculation: Allow guests to use SSBD even if host does not - cpu/speculation: Warn on unsupported mitigations= parameter - sctp: change to hold sk after auth shkey is created successfully - tipc: change to use register_pernet_device - tipc: check msg->req data len in tipc_nl_compat_bearer_disable - team: Always enable vlan tx offload - ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop - bonding: Always enable vlan tx offload - net: check before dereferencing netdev_ops during busy poll - Bluetooth: Fix faulty expression for minimum encryption key size check - um: Compile with modern headers - ASoC : cs4265 : readable register too low - spi: bitbang: Fix NULL pointer dereference in spi_unregister_master - ASoC: max98090: remove 24-bit format support if RJ is 0 - usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] - usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC - scsi: hpsa: correct ioaccel2 chaining - ARC: Assume multiplier is always present - ARC: fix build warning in elf.h - MIPS: math-emu: do not use bools for arithmetic - mfd: omap-usb-tll: Fix register offsets - swiotlb: Make linux/swiotlb.h standalone includible - bug.h: work around GCC PR82365 in BUG()
[ubuntu/xenial-proposed] linux-meta-hwe-edge 4.15.0.56.75 (Accepted)
linux-meta-hwe-edge (4.15.0.56.75) xenial; urgency=medium * Bump ABI 4.15.0-56 Date: 2019-07-30 10:42:24.947680+00:00 Changed-By: Jesse Sung Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta-hwe-edge/4.15.0.56.75 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] linux-meta-snapdragon 4.4.0.1121.113 (Accepted)
linux-meta-snapdragon (4.4.0.1121.113) xenial; urgency=medium * Bump ABI 4.4.0-1121 linux-meta-snapdragon (4.4.0.1120.112) xenial; urgency=medium * Bump ABI 4.4.0-1120 linux-meta-snapdragon (4.4.0.1119.111) xenial; urgency=medium * Bump ABI 4.4.0-1119 Date: 2019-07-23 11:00:30.007471+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-snapdragon/4.4.0.1121.113 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] linux-snapdragon 4.4.0-1121.127 (Accepted)
linux-snapdragon (4.4.0-1121.127) xenial; urgency=medium * xenial/linux-snapdragon: 4.4.0-1121.127 -proposed tracker (LP: #1837474) * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log [ Ubuntu: 4.4.0-157.185 ] * linux: 4.4.0-157.185 -proposed tracker (LP: #1837476) * systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage) (LP: #1837235) - Revert "block/bio: Do not zero user pages" - Revert "block: Clear kernel memory before copying to user" - Revert "bio_copy_from_iter(): get rid of copying iov_iter" linux-snapdragon (4.4.0-1120.126) xenial; urgency=medium * linux-snapdragon: 4.4.0-1120.126 -proposed tracker (LP: #1836878) [ Ubuntu: 4.4.0-156.183 ] * linux: 4.4.0-156.183 -proposed tracker (LP: #1836880) * BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba (LP: #1836801) - brcmfmac: add eth_type_trans back for PCIe full dongle linux-snapdragon (4.4.0-1119.125) xenial; urgency=medium * linux-snapdragon: 4.4.0-1119.125 -proposed tracker (LP: #1834913) [ Ubuntu: 4.4.0-155.182 ] * linux: 4.4.0-155.182 -proposed tracker (LP: #1834918) * Geneve tunnels don't work when ipv6 is disabled (LP: #1794232) - geneve: correctly handle ipv6.disable module parameter * Kernel modules generated incorrectly when system is localized to a non- English language (LP: #1828084) - scripts: override locale from environment when running recordmcount.pl * Handle overflow in proc_get_long of sysctl (LP: #1833935) - sysctl: handle overflow in proc_get_long * Xenial update: 4.4.181 upstream stable release (LP: #1832661) - x86/speculation/mds: Revert CPU buffer clear on double fault exit - x86/speculation/mds: Improve CPU buffer clear documentation - ARM: exynos: Fix a leaked reference by adding missing of_node_put - crypto: vmx - fix copy-paste error in CTR mode - crypto: crct10dif-generic - fix use via crypto_shash_digest() - crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() - ALSA: usb-audio: Fix a memory leak bug - ALSA: hda/hdmi - Consider eld_valid when reporting jack event - ALSA: hda/realtek - EAPD turn on later - ASoC: max98090: Fix restore of DAPM Muxes - ASoC: RT5677-SPI: Disable 16Bit SPI Transfers - mm/mincore.c: make mincore() more conservative - ocfs2: fix ocfs2 read inode data panic in ocfs2_iget - mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L - tty/vt: fix write/write race in ioctl(KDSKBSENT) handler - ext4: actually request zeroing of inode table after grow - ext4: fix ext4_show_options for file systems w/o journal - Btrfs: do not start a transaction at iterate_extent_inodes() - bcache: fix a race between cache register and cacheset unregister - bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() - ipmi:ssif: compare block number correctly for multi-part return messages - crypto: gcm - Fix error return code in crypto_gcm_create_common() - crypto: gcm - fix incompatibility between "gcm" and "gcm_base" - crypto: chacha20poly1305 - set cra_name correctly - crypto: salsa20 - don't access already-freed walk.iv - crypto: arm/aes-neonbs - don't access already-freed walk.iv - writeback: synchronize sync(2) against cgroup writeback membership switches - fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount - ALSA: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug - KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes - net: avoid weird emergency message - net/mlx4_core: Change the error print to info print - ppp: deflate: Fix possible crash in deflate_init - tipc: switch order of device registration to fix a crash - tipc: fix modprobe tipc failed after switch order of device registration - stm class: Fix channel free in stm output free path - md: add mddev->pers to avoid potential NULL pointer dereference - intel_th: msu: Fix single mode with IOMMU - of: fix clang -Wunsequenced for be32_to_cpu() - cifs: fix strcat buffer overflow and reduce raciness in smb21_set_oplock_level() - media: ov6650: Fix sensor possibly not detected on probe - NFS4: Fix v4.0 client state corruption when mount - clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider - fuse: fix writepages on 32bit - fuse: honor RLIMIT_FSIZE in fuse_file_fallocate - iommu/tegra-smmu: Fix invalid ASID bits on Tegra30/114 - ceph: flush dirty inodes before proceeding with remount - tracing: Fix partial reading of trace event's id file - memory: tegra: Fix integer overflow on tick value calculation - perf intel-pt: Fix instructions sampling rate - perf intel-pt: Fix improved sample timestamp - perf intel-pt: Fix sample timestamp wrt non-taken branches - fbdev: sm712f
[ubuntu/xenial-security] linux-azure 4.15.0-1052.57 (Accepted)
linux-azure (4.15.0-1052.57) xenial; urgency=medium * xenial/linux-azure: 4.15.0-1052.57 -proposed tracker (LP: #1837632) * kernel panic using CIFS share in smb2_push_mandatory_locks() (LP: #1795659) - CIFS: keep FileInfo handle live during oplock break Date: 2019-07-23 19:03:13.017153+00:00 Changed-By: Marcelo Cerri Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1052.57 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] linux-signed-azure 4.15.0-1052.57 (Accepted)
linux-signed-azure (4.15.0-1052.57) xenial; urgency=medium * Master version: 4.15.0-1052.57 Date: 2019-07-23 19:04:07.604165+00:00 Changed-By: Marcelo Cerri Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-signed-azure/4.15.0-1052.57 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] linux-meta-azure 4.15.0.1052.55 (Accepted)
linux-meta-azure (4.15.0.1052.55) xenial; urgency=medium * Bump ABI 4.15.0-1052 Date: 2019-07-23 19:04:05.773861+00:00 Changed-By: Marcelo Cerri Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-azure/4.15.0.1052.55 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta-hwe 4.15.0.56.77 (Accepted)
linux-meta-hwe (4.15.0.56.77) xenial; urgency=medium * Bump ABI 4.15.0-56 Date: 2019-07-29 14:17:52.645676+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta-hwe/4.15.0.56.77 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-signed-hwe 4.15.0-56.62~16.04.1 (Accepted)
linux-signed-hwe (4.15.0-56.62~16.04.1) xenial; urgency=medium * Master version: 4.15.0-56.62~16.04.1 Date: 2019-07-29 14:17:50.709085+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-signed-hwe/4.15.0-56.62~16.04.1 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux_4.4.0-158.186_amd64.tar.gz - (Accepted)
linux (4.4.0-158.186) xenial; urgency=medium * xenial/linux: 4.4.0-158.186 -proposed tracker (LP: #1837609) * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log - [Packaging] update helper scripts * ixgbe{vf} - Physical Function gets IRQ when VF checks link state (LP: #1836760) - ixgbevf: Use cached link state instead of re-reading the value for ethtool * CVE-2018-5383 - crypto: kpp - Key-agreement Protocol Primitives API (KPP) - crypto: dh - Add DH software implementation - crypto: ecdh - Add ECDH software support - crypto: ecdh - make ecdh_shared_secret unique - crypto: doc - add KPP documentation - crypto: kpp, (ec)dh - fix typos - crypto: ecc - remove unused function arguments - crypto: ecc - remove unnecessary casts - crypto: ecc - rename ecdh_make_pub_key() - crypto: ecdh - add privkey generation support - crypto: ecc - Fix NULL pointer deref. on no default_rng - [Config] CRYPTO_ECDH=m - Bluetooth: convert smp and selftest to crypto kpp API - crypto: ecdh - add public key verification test * Xenial update: 4.4.185 upstream stable release (LP: #1836668) - fs/binfmt_flat.c: make load_flat_shared_library() work - scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() - tracing: Silence GCC 9 array bounds warning - gcc-9: silence 'address-of-packed-member' warning - usb: chipidea: udc: workaround for endpoint conflict issue - Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD - apparmor: enforce nullbyte at end of tag string - parport: Fix mem leak in parport_register_dev_model - parisc: Fix compiler warnings in float emulation code - IB/hfi1: Insure freeze_work work_struct is canceled on shutdown - MIPS: uprobes: remove set but not used variable 'epc' - net: hns: Fix loopback test failed at copper ports - sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD - scripts/checkstack.pl: Fix arm64 wrong or unknown architecture - scsi: ufs: Check that space was properly alloced in copy_query_response - s390/qeth: fix VLAN attribute in bridge_hostnotify udev event - hwmon: (pmbus/core) Treat parameters as paged if on multiple pages - Btrfs: fix race between readahead and device replace/removal - btrfs: start readahead also in seed devices - can: flexcan: fix timeout when set small bitrate - can: purge socket error queue on sock destruct - ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX - Bluetooth: Align minimum encryption key size for LE and BR/EDR connections - Bluetooth: Fix regression with minimum encryption key size alignment - SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write - cfg80211: fix memory leak of wiphy device name - mac80211: drop robust management frames from unknown TA - perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit set nul - perf help: Remove needless use of strncpy() - 9p/rdma: do not disconnect on down_interruptible EAGAIN - 9p: acl: fix uninitialized iattr access - 9p/rdma: remove useless check in cm_event_handler - 9p: p9dirent_read: check network-provided name length - net/9p: include trans_common.h to fix missing prototype warning. - ovl: modify ovl_permission() to do checks on two inodes - x86/speculation: Allow guests to use SSBD even if host does not - cpu/speculation: Warn on unsupported mitigations= parameter - sctp: change to hold sk after auth shkey is created successfully - tipc: change to use register_pernet_device - tipc: check msg->req data len in tipc_nl_compat_bearer_disable - team: Always enable vlan tx offload - ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop - bonding: Always enable vlan tx offload - net: check before dereferencing netdev_ops during busy poll - Bluetooth: Fix faulty expression for minimum encryption key size check - um: Compile with modern headers - ASoC : cs4265 : readable register too low - spi: bitbang: Fix NULL pointer dereference in spi_unregister_master - ASoC: max98090: remove 24-bit format support if RJ is 0 - usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] - usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC - scsi: hpsa: correct ioaccel2 chaining - ARC: Assume multiplier is always present - ARC: fix build warning in elf.h - MIPS: math-emu: do not use bools for arithmetic - mfd: omap-usb-tll: Fix register offsets - swiotlb: Make linux/swiotlb.h standalone includible - bug.h: work around GCC PR82365 in BUG() - MIPS: Workaround GCC __builtin_unreachable reordering bug - ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME - crypto: user - prevent operating on larval algorithms - ALSA: seq: fix incorrect order of dest_client/dest_ports
[ubuntu/xenial-proposed] linux-signed 4.4.0-158.186 (Accepted)
linux-signed (4.4.0-158.186) xenial; urgency=medium * Master version: 4.4.0-158.186 Date: 2019-07-29 19:01:03.929785+00:00 Changed-By: Sultan Alsawaf Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-signed/4.4.0-158.186 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta 4.4.0.158.166 (Accepted)
linux-meta (4.4.0.158.166) xenial; urgency=medium * Bump ABI 4.4.0-158 Date: 2019-07-29 19:01:00.790833+00:00 Changed-By: Sultan Alsawaf Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta/4.4.0.158.166 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux 4.4.0-158.186 (Accepted)
linux (4.4.0-158.186) xenial; urgency=medium * xenial/linux: 4.4.0-158.186 -proposed tracker (LP: #1837609) * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log - [Packaging] update helper scripts * ixgbe{vf} - Physical Function gets IRQ when VF checks link state (LP: #1836760) - ixgbevf: Use cached link state instead of re-reading the value for ethtool * CVE-2018-5383 - crypto: kpp - Key-agreement Protocol Primitives API (KPP) - crypto: dh - Add DH software implementation - crypto: ecdh - Add ECDH software support - crypto: ecdh - make ecdh_shared_secret unique - crypto: doc - add KPP documentation - crypto: kpp, (ec)dh - fix typos - crypto: ecc - remove unused function arguments - crypto: ecc - remove unnecessary casts - crypto: ecc - rename ecdh_make_pub_key() - crypto: ecdh - add privkey generation support - crypto: ecc - Fix NULL pointer deref. on no default_rng - [Config] CRYPTO_ECDH=m - Bluetooth: convert smp and selftest to crypto kpp API - crypto: ecdh - add public key verification test * Xenial update: 4.4.185 upstream stable release (LP: #1836668) - fs/binfmt_flat.c: make load_flat_shared_library() work - scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() - tracing: Silence GCC 9 array bounds warning - gcc-9: silence 'address-of-packed-member' warning - usb: chipidea: udc: workaround for endpoint conflict issue - Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD - apparmor: enforce nullbyte at end of tag string - parport: Fix mem leak in parport_register_dev_model - parisc: Fix compiler warnings in float emulation code - IB/hfi1: Insure freeze_work work_struct is canceled on shutdown - MIPS: uprobes: remove set but not used variable 'epc' - net: hns: Fix loopback test failed at copper ports - sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD - scripts/checkstack.pl: Fix arm64 wrong or unknown architecture - scsi: ufs: Check that space was properly alloced in copy_query_response - s390/qeth: fix VLAN attribute in bridge_hostnotify udev event - hwmon: (pmbus/core) Treat parameters as paged if on multiple pages - Btrfs: fix race between readahead and device replace/removal - btrfs: start readahead also in seed devices - can: flexcan: fix timeout when set small bitrate - can: purge socket error queue on sock destruct - ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX - Bluetooth: Align minimum encryption key size for LE and BR/EDR connections - Bluetooth: Fix regression with minimum encryption key size alignment - SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write - cfg80211: fix memory leak of wiphy device name - mac80211: drop robust management frames from unknown TA - perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit set nul - perf help: Remove needless use of strncpy() - 9p/rdma: do not disconnect on down_interruptible EAGAIN - 9p: acl: fix uninitialized iattr access - 9p/rdma: remove useless check in cm_event_handler - 9p: p9dirent_read: check network-provided name length - net/9p: include trans_common.h to fix missing prototype warning. - ovl: modify ovl_permission() to do checks on two inodes - x86/speculation: Allow guests to use SSBD even if host does not - cpu/speculation: Warn on unsupported mitigations= parameter - sctp: change to hold sk after auth shkey is created successfully - tipc: change to use register_pernet_device - tipc: check msg->req data len in tipc_nl_compat_bearer_disable - team: Always enable vlan tx offload - ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop - bonding: Always enable vlan tx offload - net: check before dereferencing netdev_ops during busy poll - Bluetooth: Fix faulty expression for minimum encryption key size check - um: Compile with modern headers - ASoC : cs4265 : readable register too low - spi: bitbang: Fix NULL pointer dereference in spi_unregister_master - ASoC: max98090: remove 24-bit format support if RJ is 0 - usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i] - usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC - scsi: hpsa: correct ioaccel2 chaining - ARC: Assume multiplier is always present - ARC: fix build warning in elf.h - MIPS: math-emu: do not use bools for arithmetic - mfd: omap-usb-tll: Fix register offsets - swiotlb: Make linux/swiotlb.h standalone includible - bug.h: work around GCC PR82365 in BUG() - MIPS: Workaround GCC __builtin_unreachable reordering bug - ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME - crypto: user - prevent operating on larval algorithms - ALSA: seq: fix incorrect order of dest_client/dest_ports