rsync (3.1.1-3ubuntu1.3) xenial-security; urgency=medium
* SECURITY UPDATE: improper pointer arithmetic might allow
context-dependent attackers to have unspecified impact
- debian/patches/CVE-2016-9840.patch: remove offset pointer optimization
in inftrees.c.
- CVE-2016-9840
rsync (3.1.1-3ubuntu1.3) xenial-security; urgency=medium
* SECURITY UPDATE: improper pointer arithmetic might allow
context-dependent attackers to have unspecified impact
- debian/patches/CVE-2016-9840.patch: remove offset pointer optimization
in inftrees.c.
- CVE-2016-9840
spamassassin (3.4.2-0ubuntu0.16.04.4) xenial; urgency=medium
* d/p/lp-1862154-*: avoid 'domain is utf8 flagged' flooding the logs
(LP: #1862154)
Date: Mon, 10 Feb 2020 16:17:02 +0100
Changed-By: Christian Ehrhardt
Maintainer: Ubuntu Developers
linux-oracle (4.15.0-1034.37~16.04.1) xenial; urgency=medium
* xenial/linux-oracle: 4.15.0-1034.37~16.04.1 -proposed tracker (LP: #1863337)
[ Ubuntu: 4.15.0-1034.37 ]
* bionic/linux-oracle: 4.15.0-1034.37 -proposed tracker (LP: #1863339)
* Root can lift kernel lockdown via USB/IP (LP:
linux-oracle (4.15.0-1034.37~16.04.1) xenial; urgency=medium
* xenial/linux-oracle: 4.15.0-1034.37~16.04.1 -proposed tracker (LP: #1863337)
[ Ubuntu: 4.15.0-1034.37 ]
* bionic/linux-oracle: 4.15.0-1034.37 -proposed tracker (LP: #1863339)
* Root can lift kernel lockdown via USB/IP (LP:
linux-meta-oracle (4.15.0.1034.27) xenial; urgency=medium
* Bump ABI 4.15.0-1034
Date: 2020-02-20 03:01:36.932896+00:00
Changed-By: Jesse Sung
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-oracle/4.15.0.1034.27
Sorry, changesfile not available.--
Xenial-changes
linux-signed-oracle (4.15.0-1034.37~16.04.1) xenial; urgency=medium
* Master version: 4.15.0-1034.37~16.04.1
Date: 2020-02-20 03:02:54.703382+00:00
Changed-By: Jesse Sung
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-signed-oracle/4.15.0-1034.37~16.04.1
Sorry,
libpam-radius-auth (1.3.17-0ubuntu4.1) xenial-security; urgency=medium
* SECURITY UPDATE: DoS via stack overflow in password field
- debian/patches/CVE-2015-9542-1.patch: use length, which has been
limited in size in src/pam_radius_auth.c.
- debian/patches/CVE-2015-9542-2.patch:
libpam-radius-auth (1.3.17-0ubuntu4.1) xenial-security; urgency=medium
* SECURITY UPDATE: DoS via stack overflow in password field
- debian/patches/CVE-2015-9542-1.patch: use length, which has been
limited in size in src/pam_radius_auth.c.
- debian/patches/CVE-2015-9542-2.patch:
linux-meta-aws-hwe (4.15.0.1061.61) xenial; urgency=medium
* Bump ABI 4.15.0-1061
Date: 2020-02-20 05:50:56.431032+00:00
Changed-By: Sultan Alsawaf
Signed-By: Andy Whitcroft
https://launchpad.net/ubuntu/+source/linux-meta-aws-hwe/4.15.0.1061.61
Sorry, changesfile not available.--
linux-aws-hwe (4.15.0-1061.65~16.04.2) xenial; urgency=medium
* xenial/linux-aws-hwe: 4.15.0-1061.65~16.04.2 -proposed tracker
(LP: #1863320)
* Packaging resync (LP: #1786013)
- [Packaging] resync dkms-build and family
[ Ubuntu: 4.15.0-1061.65 ]
* bionic/linux-aws:
11 matches
Mail list logo