[ubuntu/xenial-proposed] plymouth 0.9.2-3ubuntu13.2 (Accepted)
plymouth (0.9.2-3ubuntu13.2) xenial; urgency=medium * Remove dependency on initramfs-tools | dracut. LP: #1716825. Date: Tue, 12 Sep 2017 22:25:47 -0700 Changed-By: Steve Langasek Maintainer: Ubuntu Developers https://launchpad.net/ubuntu/+source/plymouth/0.9.2-3ubuntu13.2 Format: 1.8 Date: Tue, 12 Sep 2017 22:25:47 -0700 Source: plymouth Binary: plymouth plymouth-x11 plymouth-dbg libplymouth4 libplymouth-dev plymouth-label plymouth-themes plymouth-theme-ubuntu-logo plymouth-theme-ubuntu-text Architecture: source Version: 0.9.2-3ubuntu13.2 Distribution: xenial Urgency: medium Maintainer: Ubuntu Developers Changed-By: Steve Langasek Description: libplymouth-dev - graphical boot animation and logger - development files libplymouth4 - graphical boot animation and logger - shared libraries plymouth - boot animation, logger and I/O multiplexer plymouth-dbg - boot animation, logger and I/O multiplexer - debug symbols plymouth-label - boot animation, logger and I/O multiplexer - label control plymouth-theme-ubuntu-logo - boot animation, logger and I/O multiplexer - ubuntu theme plymouth-theme-ubuntu-text - boot animation, logger and I/O multiplexer - ubuntu text theme plymouth-themes - boot animation, logger and I/O multiplexer - themes plymouth-x11 - boot animation, logger and I/O multiplexer - X11 renderer Launchpad-Bugs-Fixed: 1716825 Changes: plymouth (0.9.2-3ubuntu13.2) xenial; urgency=medium . * Remove dependency on initramfs-tools | dracut. LP: #1716825. Checksums-Sha1: 605a51780ec2918392495d8377eb944ce9e62a02 2744 plymouth_0.9.2-3ubuntu13.2.dsc fa4fadf86d6391b895424556602823c899048416 76120 plymouth_0.9.2-3ubuntu13.2.debian.tar.xz Checksums-Sha256: 73c591d3a4a7c17ddc5870aee9fc92b6363d50afc445920292284983ae06 2744 plymouth_0.9.2-3ubuntu13.2.dsc 18746cfbbf2cfd5ceaf0e1a2513b9f77b3d7cbced184e452895b280f0ac1a8f5 76120 plymouth_0.9.2-3ubuntu13.2.debian.tar.xz Files: be67184ead14c246655e17445018ae30 2744 misc optional plymouth_0.9.2-3ubuntu13.2.dsc e3fc9951859f08af77adb071add9d8ce 76120 misc optional plymouth_0.9.2-3ubuntu13.2.debian.tar.xz Original-Maintainer: Laurent Bigonville -- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-security] qemu 1:2.5+dfsg-5ubuntu10.15 (Accepted)
qemu (1:2.5+dfsg-5ubuntu10.15) xenial-security; urgency=medium * SECURITY UPDATE: privilege escalation via virtFS - debian/patches/CVE-2017-7493.patch: forbid client access to metadata in hw/9pfs/virtio-9p-local.c. - CVE-2017-7493 * SECURITY UPDATE: DoS via message ring page count - debian/patches/CVE-2017-8112.patch: check page count in hw/scsi/vmw_pvscsi.c. - CVE-2017-8112 * SECURITY UPDATE: DoS via OOB read in MegaSAS - debian/patches/CVE-2017-8380.patch: avoid off-by-one in hw/scsi/megasas.c. - CVE-2017-8380 * SECURITY UPDATE: DoS in USB OHCI emulation - debian/patches/CVE-2017-9330.patch: fix error code in hw/usb/hcd-ohci.c. - CVE-2017-9330 * SECURITY UPDATE: DoS in IDE AHCI emulation - debian/patches/CVE-2017-9373-1.patch: add cleanup function in hw/ide/core.c, hw/ide/internal.h. - debian/patches/CVE-2017-9373-2.patch: call cleanup function in hw/ide/ahci.c. - CVE-2017-9373 * SECURITY UPDATE: DoS in USB EHCI emulation - debian/patches/CVE-2017-9374.patch: fix memory leak in hw/usb/hcd-ehci-pci.c, hw/usb/hcd-ehci.c, hw/usb/hcd-ehci.h. - CVE-2017-9374 * SECURITY UPDATE: DoS in USB xHCI emulation - debian/patches/CVE-2017-9375.patch: guard against recursive calls in hw/usb/hcd-xhci.c. - CVE-2017-9375 * SECURITY UPDATE: DoS in MegaSAS - debian/patches/CVE-2017-9503-1.patch: add test to tests/Makefile, tests/megasas-test.c. - debian/patches/CVE-2017-9503-2.patch: do not read sense length more than once in hw/scsi/megasas.c. - debian/patches/CVE-2017-9503-3.patch: do not read iovec count more than once in hw/scsi/megasas.c. - debian/patches/CVE-2017-9503-4.patch: do not read DCMD opcode more than once in hw/scsi/megasas.c. - debian/patches/CVE-2017-9503-5.patch: do not read command more than once in hw/scsi/megasas.c. - debian/patches/CVE-2017-9503-6.patch: do not read SCSI req parameters more than once in hw/scsi/megasas.c. - debian/patches/CVE-2017-9503-7.patch: always store SCSIRequest* into MegasasCmd in hw/scsi/megasas.c, added test to tests/megasas-test.c. - CVE-2017-9503 * SECURITY UPDATE: DoS via incorrect SIGPIPE handling - debian/patches/CVE-2017-10664.patch: ignore SIGPIPE in qemu-nbd.c. - CVE-2017-10664 * SECURITY UPDATE: stack overflow in usbredir_log_data - debian/patches/CVE-2017-10806.patch: use qemu_hexdump in hw/usb/redirect.c. - CVE-2017-10806 * SECURITY UPDATE: memory disclosure in Xen block-interface responses - debian/patches/CVE-2017-10911.patch: fill the fields directly in hw/block/xen_disk.c. - CVE-2017-10911 * SECURITY UPDATE: DoS via crafted DHCP options string - debian/patches/CVE-2017-11434.patch: check length in slirp/bootp.c. - CVE-2017-11434 * SECURITY UPDATE: DoS via flushing empty CDROM drives - debian/patches/CVE-2017-12809.patch: don't flush empty drives in hw/ide/core.c. - CVE-2017-12809 Date: 2017-08-22 17:03:20.073927+00:00 Changed-By: Marc Deslauriers https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.15 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] qemu 1:2.5+dfsg-5ubuntu10.15 (Accepted)
qemu (1:2.5+dfsg-5ubuntu10.15) xenial-security; urgency=medium * SECURITY UPDATE: privilege escalation via virtFS - debian/patches/CVE-2017-7493.patch: forbid client access to metadata in hw/9pfs/virtio-9p-local.c. - CVE-2017-7493 * SECURITY UPDATE: DoS via message ring page count - debian/patches/CVE-2017-8112.patch: check page count in hw/scsi/vmw_pvscsi.c. - CVE-2017-8112 * SECURITY UPDATE: DoS via OOB read in MegaSAS - debian/patches/CVE-2017-8380.patch: avoid off-by-one in hw/scsi/megasas.c. - CVE-2017-8380 * SECURITY UPDATE: DoS in USB OHCI emulation - debian/patches/CVE-2017-9330.patch: fix error code in hw/usb/hcd-ohci.c. - CVE-2017-9330 * SECURITY UPDATE: DoS in IDE AHCI emulation - debian/patches/CVE-2017-9373-1.patch: add cleanup function in hw/ide/core.c, hw/ide/internal.h. - debian/patches/CVE-2017-9373-2.patch: call cleanup function in hw/ide/ahci.c. - CVE-2017-9373 * SECURITY UPDATE: DoS in USB EHCI emulation - debian/patches/CVE-2017-9374.patch: fix memory leak in hw/usb/hcd-ehci-pci.c, hw/usb/hcd-ehci.c, hw/usb/hcd-ehci.h. - CVE-2017-9374 * SECURITY UPDATE: DoS in USB xHCI emulation - debian/patches/CVE-2017-9375.patch: guard against recursive calls in hw/usb/hcd-xhci.c. - CVE-2017-9375 * SECURITY UPDATE: DoS in MegaSAS - debian/patches/CVE-2017-9503-1.patch: add test to tests/Makefile, tests/megasas-test.c. - debian/patches/CVE-2017-9503-2.patch: do not read sense length more than once in hw/scsi/megasas.c. - debian/patches/CVE-2017-9503-3.patch: do not read iovec count more than once in hw/scsi/megasas.c. - debian/patches/CVE-2017-9503-4.patch: do not read DCMD opcode more than once in hw/scsi/megasas.c. - debian/patches/CVE-2017-9503-5.patch: do not read command more than once in hw/scsi/megasas.c. - debian/patches/CVE-2017-9503-6.patch: do not read SCSI req parameters more than once in hw/scsi/megasas.c. - debian/patches/CVE-2017-9503-7.patch: always store SCSIRequest* into MegasasCmd in hw/scsi/megasas.c, added test to tests/megasas-test.c. - CVE-2017-9503 * SECURITY UPDATE: DoS via incorrect SIGPIPE handling - debian/patches/CVE-2017-10664.patch: ignore SIGPIPE in qemu-nbd.c. - CVE-2017-10664 * SECURITY UPDATE: stack overflow in usbredir_log_data - debian/patches/CVE-2017-10806.patch: use qemu_hexdump in hw/usb/redirect.c. - CVE-2017-10806 * SECURITY UPDATE: memory disclosure in Xen block-interface responses - debian/patches/CVE-2017-10911.patch: fill the fields directly in hw/block/xen_disk.c. - CVE-2017-10911 * SECURITY UPDATE: DoS via crafted DHCP options string - debian/patches/CVE-2017-11434.patch: check length in slirp/bootp.c. - CVE-2017-11434 * SECURITY UPDATE: DoS via flushing empty CDROM drives - debian/patches/CVE-2017-12809.patch: don't flush empty drives in hw/ide/core.c. - CVE-2017-12809 Date: 2017-08-22 17:03:20.073927+00:00 Changed-By: Marc Deslauriers Signed-By: Ubuntu Archive Robot https://launchpad.net/ubuntu/+source/qemu/1:2.5+dfsg-5ubuntu10.15 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/partner/xenial] google-cloud-sdk 169.0.0-0ubuntu1~16.04.0 (Accepted)
google-cloud-sdk (169.0.0-0ubuntu1~16.04.0) xenial; urgency=medium * Backport to xenial. * New upstream release * debian/rules: - Actually update the get-pristine-tarball rule. Previously the modification got lost and wasn't included. google-cloud-sdk (166.0.0-0ubuntu1) artful; urgency=medium * New upstream release * debian/rules: - Modify the get-pristine-tarball rule to use the for_packagers tarballs instead of the user-targetted ones. * Drop debian/patches/disable-component-manager.patch: - The for_packagers tarball ships with the updater disabled by default. google-cloud-sdk (163.0.0-0ubuntu1) artful; urgency=medium * New upstream release Date: 2017-09-11 15:39:56.350111+00:00 Changed-By: Łukasz Zemczak Signed-By: Steve Langasek https://launchpad.net/ubuntu/+source/google-cloud-sdk/169.0.0-0ubuntu1~16.04.0 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-updates] livecd-rootfs 2.408.16 (Accepted)
livecd-rootfs (2.408.16) xenial; urgency=medium * live-build/ubuntu-cpc/functions: call apt-get update in the chroot after mounting a blank /var/lib/apt, so that further operations work as expected; otherwise, 'apt-get purge ^grub-.*' fails on s390x because no such packages are known to apt. * live-build/ubuntu-cpc/hooks/030-root-tarball.binary: correct a missing unmount of /var/{lib,cache}/apt on cleanup, detected via autopkgtests. livecd-rootfs (2.408.15) xenial; urgency=medium [ Mathieu Trudel-Lapierre ] * Drop preloading of grub modules that are built into the grub signed image. This is functionally a no-op, changed only to clean up the code. [ Steve Langasek ] * live-build/ubuntu-cpc/functions: mount tmpfs on /var/cache/apt and /var/lib/apt, so we don't have to leave empty space in our derivative images for packages that have been downloaded/installed/removed. This normally isn't relevant for the installed system, since the root filesystem will auto-expand in place on the target disk, but lets us ship smaller images. * live-build/ubuntu-cpc/hooks/033-disk-image-uefi.binary: call apt-get update *before* installing packages, not after. [ Colin Watson ] * Mount and unmount /dev recursively, to cope with setups where there are interesting bind-mounts under /dev (e.g. loop devices bind-mounted by LXD). LP: #1716465. [ Balint Reczey ] * Fix suppression of kpartx error. LP: #1684090. Date: 2017-09-12 21:24:11.290245+00:00 Changed-By: Steve Langasek https://launchpad.net/ubuntu/+source/livecd-rootfs/2.408.16 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux 4.4.0-96.119 (Accepted)
linux (4.4.0-96.119) xenial; urgency=low * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613) * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399) - s390/mm: no local TLB flush for clearing-by-ASCE IDTE - SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space - SAUCE: s390/mm: fix race on mm->context.flush_mm * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length Date: 2017-09-12 14:55:15.812109+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux/4.4.0-96.119 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux_4.4.0-96.119_amd64.tar.gz - (Accepted)
linux (4.4.0-96.119) xenial; urgency=low * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613) * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399) - s390/mm: no local TLB flush for clearing-by-ASCE IDTE - SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space - SAUCE: s390/mm: fix race on mm->context.flush_mm * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length Date: Tue, 12 Sep 2017 15:40:01 +0200 Changed-By: Stefan Bader Maintainer: Launchpad Build Daemon Format: 1.8 Date: Tue, 12 Sep 2017 15:40:01 +0200 Source: linux Binary: linux-source-4.4.0 linux-doc linux-headers-4.4.0-96 linux-libc-dev linux-tools-common linux-tools-4.4.0-96 linux-cloud-tools-common linux-cloud-tools-4.4.0-96 linux-image-4.4.0-96-generic linux-image-extra-4.4.0-96-generic linux-headers-4.4.0-96-generic linux-image-4.4.0-96-generic-dbgsym linux-tools-4.4.0-96-generic linux-cloud-tools-4.4.0-96-generic linux-udebs-generic linux-image-4.4.0-96-generic-lpae linux-image-extra-4.4.0-96-generic-lpae linux-headers-4.4.0-96-generic-lpae linux-image-4.4.0-96-generic-lpae-dbgsym linux-tools-4.4.0-96-generic-lpae linux-cloud-tools-4.4.0-96-generic-lpae linux-udebs-generic-lpae linux-image-4.4.0-96-lowlatency linux-image-extra-4.4.0-96-lowlatency linux-headers-4.4.0-96-lowlatency linux-image-4.4.0-96-lowlatency-dbgsym linux-tools-4.4.0-96-lowlatency linux-cloud-tools-4.4.0-96-lowlatency linux-udebs-lowlatency linux-image-4.4.0-96-powerpc-e500mc linux-image-extra-4.4.0-96-powerpc-e500mc linux-headers-4.4.0-96-powerpc-e500mc linux-image-4.4.0-96-powerpc-e500mc-dbgsym linux-tools-4.4.0-96-powerpc-e500mc linux-cloud-tools-4.4.0-96-powerpc-e500mc linux-udebs-powerpc-e500mc linux-image-4.4.0-96-powerpc-smp linux-image-extra-4.4.0-96-powerpc-smp linux-headers-4.4.0-96-powerpc-smp linux-image-4.4.0-96-powerpc-smp-dbgsym linux-tools-4.4.0-96-powerpc-smp linux-cloud-tools-4.4.0-96-powerpc-smp linux-udebs-powerpc-smp linux-image-4.4.0-96-powerpc64-emb linux-image-extra-4.4.0-96-powerpc64-emb linux-headers-4.4.0-96-powerpc64-emb linux-image-4.4.0-96-powerpc64-emb-dbgsym linux-tools-4.4.0-96-powerpc64-emb linux-cloud-tools-4.4.0-96-powerpc64-emb linux-udebs-powerpc64-emb linux-image-4.4.0-96-powerpc64-smp linux-image-extra-4.4.0-96-powerpc64-smp linux-headers-4.4.0-96-powerpc64-smp linux-image-4.4.0-96-powerpc64-smp-dbgsym linux-tools-4.4.0-96-powerpc64-smp linux-cloud-tools-4.4.0-96-powerpc64-smp linux-udebs-powerpc64-smp kernel-image-4.4.0-96-generic-di nic-modules-4.4.0-96-generic-di nic-shared-modules-4.4.0-96-generic-di serial-modules-4.4.0-96-generic-di ppp-modules-4.4.0-96-generic-di pata-modules-4.4.0-96-generic-di firewire-core-modules-4.4.0-96-generic-di scsi-modules-4.4.0-96-generic-di plip-modules-4.4.0-96-generic-di floppy-modules-4.4.0-96-generic-di fat-modules-4.4.0-96-generic-di nfs-modules-4.4.0-96-generic-di md-modules-4.4.0-96-generic-di multipath-modules-4.4.0-96-generic-di usb-modules-4.4.0-96-generic-di pcmcia-storage-modules-4.4.0-96-generic-di fb-modules-4.4.0-96-generic-di input-modules-4.4.0-96-generic-di mouse-modules-4.4.0-96-generic-di irda-modules-4.4.0-96-generic-di parport-modules-4.4.0-96-generic-di nic-pcmcia-modules-4.4.0-96-generic-di pcmcia-modules-4.4.0-96-generic-di nic-usb-modules-4.4.0-96-generic-di sata-modules-4.4.0-96-generic-di crypto-modules-4.4.0-96-generic-di speakup-modules-4.4.0-96-generic-di virtio-modules-4.4.0-96-generic-di fs-core-modules-4.4.0-96-generic-di fs-secondary-modules-4.4.0-96-generic-di storage-core-modules-4.4.0-96-generic-di block-modules-4.4.0-96-generic-di message-modules-4.4.0-96-generic-di vlan-modules-4.4.0-96-generic-di ipmi-modules-4.4.0-96-generic-di Architecture: amd64 all amd64_translations Version: 4.4.0-96.119 Distribution: xenial Urgency: low Maintainer: Launchpad Build Daemon Changed-By: Stefan Bader Description: block-modules-4.4.0-96-generic-di - Block storage devices (udeb) crypto-modules-4.4.0-96-generic-di - crypto modules (udeb) fat-modules-4.4.0-96-generic-di - FAT filesystem support (udeb) fb-modules-4.4.0-96-generic-di - Framebuffer modules (udeb) firewire-core-modules-4.4.0-96-generic-di - Firewire (IEEE-1394) Support (udeb) floppy-modules-4.4.0-96-generic-di - Floppy driver support (udeb) fs-core-modules-4.4.0-96-generic-di - Base filesystem modules (udeb) fs-secondary-modules-4.4.0-96-generic-di - Extra filesystem modules (udeb) input-modules-4.4.0-96-generic-di - Support for various input methods (udeb) ipmi-modules-4.4.0-96-generic-di - ipmi modules (udeb) irda-modules-4.4.0-96-generic-di - Support for Infrared protocols (udeb) kernel-image-4.4.0-96-generic-di - Linux kernel binary image for the Debian installer (udeb) linux-cloud-tools-4.4.0-96 - Linux kernel version specific cloud tools for version 4.4.0-96 linux-cloud-tools-4.4.0-96-generic - Linux kernel version specific cloud tools for vers
[ubuntu/xenial-proposed] linux-meta 4.4.0.96.101 (Accepted)
linux-meta (4.4.0.96.101) xenial; urgency=medium * Bump ABI 4.4.0-96 Date: 2017-09-12 14:56:12.778175+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta/4.4.0.96.101 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-signed 4.4.0-96.119 (Accepted)
linux-signed (4.4.0-96.119) xenial; urgency=medium * Version 4.4.0-96.119 Date: 2017-09-12 14:56:15.356763+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-signed/4.4.0-96.119 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-aws 4.4.0-1035.44 (Accepted)
linux-aws (4.4.0-1035.44) xenial; urgency=low * linux-aws: 4.4.0-1035.44 -proposed tracker (LP: #1716620) [ Ubuntu: 4.4.0-96.119 ] * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613) * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399) - s390/mm: no local TLB flush for clearing-by-ASCE IDTE - SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space - SAUCE: s390/mm: fix race on mm->context.flush_mm * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length Date: 2017-09-12 17:24:13.944098+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1035.44 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta-aws 4.4.0.1035.37 (Accepted)
linux-meta-aws (4.4.0.1035.37) xenial; urgency=medium * Bump ABI 4.4.0-1035 Date: 2017-09-12 17:25:06.157923+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta-aws/4.4.0.1035.37 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-gcp 4.10.0-1006.6 (Accepted)
linux-gcp (4.10.0-1006.6) xenial; urgency=low * linux-gcp: 4.10.0-1006.6 -proposed tracker (LP: #1716609) [ Ubuntu: 4.10.0-35.39 ] * linux: 4.10.0-35.39 -proposed tracker (LP: #1716606) * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399) - SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space - SAUCE: s390/mm: fix race on mm->context.flush_mm * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length Date: 2017-09-13 09:46:13.390199+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-gcp/4.10.0-1006.6 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta-gcp 4.10.0.1006.8 (Accepted)
linux-meta-gcp (4.10.0.1006.8) xenial; urgency=medium * Bump ABI 4.10.0-1006 Date: 2017-09-13 09:46:45.324117+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.10.0.1006.8 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-gke 4.4.0-1031.31 (Accepted)
linux-gke (4.4.0-1031.31) xenial; urgency=low * linux-gke: 4.4.0-1031.31 -proposed tracker (LP: #1716621) [ Ubuntu: 4.4.0-96.119 ] * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613) * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399) - s390/mm: no local TLB flush for clearing-by-ASCE IDTE - SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space - SAUCE: s390/mm: fix race on mm->context.flush_mm * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length Date: 2017-09-12 18:00:18.657190+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-gke/4.4.0-1031.31 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta-gke 4.4.0.1031.32 (Accepted)
linux-meta-gke (4.4.0.1031.32) xenial; urgency=medium * Bump ABI 4.4.0-1031 Date: 2017-09-12 18:01:19.652109+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta-gke/4.4.0.1031.32 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-kvm 4.4.0-1007.12 (Accepted)
linux-kvm (4.4.0-1007.12) xenial; urgency=low * linux-kvm: 4.4.0-1007.12 -proposed tracker (LP: #1716622) [ Ubuntu: 4.4.0-96.119 ] * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613) * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399) - s390/mm: no local TLB flush for clearing-by-ASCE IDTE - SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space - SAUCE: s390/mm: fix race on mm->context.flush_mm * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length Date: 2017-09-12 18:26:13.931159+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1007.12 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta-kvm 4.4.0.1007.7 (Accepted)
linux-meta-kvm (4.4.0.1007.7) xenial; urgency=medium * Bump ABI 4.4.0-1007 Date: 2017-09-12 18:26:56.081215+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta-kvm/4.4.0.1007.7 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-raspi2 4.4.0-1074.82 (Accepted)
linux-raspi2 (4.4.0-1074.82) xenial; urgency=low * linux-raspi2: 4.4.0-1074.82 -proposed tracker (LP: #1716618) [ Ubuntu: 4.4.0-96.119 ] * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613) * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399) - s390/mm: no local TLB flush for clearing-by-ASCE IDTE - SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space - SAUCE: s390/mm: fix race on mm->context.flush_mm * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length Date: 2017-09-12 15:56:15.343503+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1074.82 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta-raspi2 4.4.0.1074.74 (Accepted)
linux-meta-raspi2 (4.4.0.1074.74) xenial; urgency=medium * Bump ABI 4.4.0-1074 Date: 2017-09-12 15:57:21.611647+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta-raspi2/4.4.0.1074.74 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] livecd-rootfs 2.408.17 (Accepted)
livecd-rootfs (2.408.17) xenial; urgency=medium [ Robert C Jennings ] * live-build/ubuntu-cpc/functions: Add a function, teardown_mountpoint, to reverse the work done in setup_mountpoint. Lack of this function has forced users of setup_mountpoint to implement this separately and the implementations have diverged. (LP: #1716992) * live-build/ubuntu-cpc/functions: Remove umount_settle function. The was only used where teardown_mountpoint was lacking. Date: Wed, 13 Sep 2017 12:21:30 -0700 Changed-By: Steve Langasek Maintainer: Ubuntu Developers https://launchpad.net/ubuntu/+source/livecd-rootfs/2.408.17 Format: 1.8 Date: Wed, 13 Sep 2017 12:21:30 -0700 Source: livecd-rootfs Binary: livecd-rootfs Architecture: source Version: 2.408.17 Distribution: xenial Urgency: medium Maintainer: Ubuntu Developers Changed-By: Steve Langasek Description: livecd-rootfs - construction script for the livecd rootfs Launchpad-Bugs-Fixed: 1716992 Changes: livecd-rootfs (2.408.17) xenial; urgency=medium . [ Robert C Jennings ] * live-build/ubuntu-cpc/functions: Add a function, teardown_mountpoint, to reverse the work done in setup_mountpoint. Lack of this function has forced users of setup_mountpoint to implement this separately and the implementations have diverged. (LP: #1716992) * live-build/ubuntu-cpc/functions: Remove umount_settle function. The was only used where teardown_mountpoint was lacking. Checksums-Sha1: 39c3d7ee422729b2594e06059246259b61cc 1578 livecd-rootfs_2.408.17.dsc 653684652ec79baceec118a229464b22c32a1616 86076 livecd-rootfs_2.408.17.tar.xz Checksums-Sha256: 32798235ff19f1f90af427913415111809ce419be6235274d40f357b44c4661b 1578 livecd-rootfs_2.408.17.dsc 19a039ffeb4c312f2be874586d1162fd0186dc76c982eba30b2e0cca353005cb 86076 livecd-rootfs_2.408.17.tar.xz Files: 2508b57c4ff02127ffee83e63abfe989 1578 devel optional livecd-rootfs_2.408.17.dsc 9467e4f4bf1347ca5860213694be1dcf 86076 devel optional livecd-rootfs_2.408.17.tar.xz -- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-snapdragon 4.4.0-1076.81 (Accepted)
linux-snapdragon (4.4.0-1076.81) xenial; urgency=low * linux-snapdragon: 4.4.0-1076.81 -proposed tracker (LP: #1716619) [ Ubuntu: 4.4.0-96.119 ] * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613) * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399) - s390/mm: no local TLB flush for clearing-by-ASCE IDTE - SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space - SAUCE: s390/mm: fix race on mm->context.flush_mm * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length Date: 2017-09-12 16:42:12.795464+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1076.81 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] linux-meta-snapdragon 4.4.0.1076.68 (Accepted)
linux-meta-snapdragon (4.4.0.1076.68) xenial; urgency=medium * Bump ABI 4.4.0-1076 Date: 2017-09-12 16:43:04.146374+00:00 Changed-By: Stefan Bader Signed-By: Łukasz Zemczak https://launchpad.net/ubuntu/+source/linux-meta-snapdragon/4.4.0.1076.68 Sorry, changesfile not available.-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes
[ubuntu/xenial-proposed] gcc-5 5.4.0-6ubuntu1~16.04.5 (Accepted)
gcc-5 (5.4.0-6ubuntu1~16.04.5) xenial-proposed; urgency=medium * SRU * Fix PR target/77267 (x86), taken from the trunk. LP: #1623418. * Fix hangs w/ asan binaries on arm64 (Dann Frazier). LP: #1709727. * Linaro branch only: Fix PR target/79041, aarch64 backend emitting R_AARCH64_ADR_PREL_PG_HI21 relocation despite -mpc-relative-literal-loads option being used (Dan Frazier). LP: #1695093. Date: Wed, 23 Aug 2017 11:35:00 +0200 Changed-By: Matthias Klose Maintainer: Ubuntu Core developers https://launchpad.net/ubuntu/+source/gcc-5/5.4.0-6ubuntu1~16.04.5 Format: 1.8 Date: Wed, 23 Aug 2017 11:35:00 +0200 Source: gcc-5 Binary: gcc-5-base libgcc-5-dev libgcc4 libgcc4-dbg lib64gcc-5-dev lib32gcc-5-dev libhfgcc-5-dev libsfgcc-5-dev libn32gcc-5-dev libx32gcc-5-dev gcc-5 gcc-5-multilib gcc-5-test-results gcc-5-plugin-dev gcc-5-hppa64-linux-gnu cpp-5 cpp-5-doc gcc-5-locales g++-5 g++-5-multilib libgomp1 libgomp1-dbg lib32gomp1 lib32gomp1-dbg lib64gomp1 lib64gomp1-dbg libn32gomp1 libn32gomp1-dbg libx32gomp1 libx32gomp1-dbg libhfgomp1 libhfgomp1-dbg libsfgomp1 libsfgomp1-dbg libitm1 libitm1-dbg lib32itm1 lib32itm1-dbg lib64itm1 lib64itm1-dbg libx32itm1 libx32itm1-dbg libhfitm1 libhfitm1-dbg libsfitm1 libsfitm1-dbg libatomic1 libatomic1-dbg lib32atomic1 lib32atomic1-dbg lib64atomic1 lib64atomic1-dbg libn32atomic1 libn32atomic1-dbg libx32atomic1 libx32atomic1-dbg libhfatomic1 libhfatomic1-dbg libsfatomic1 libsfatomic1-dbg libasan2 libasan2-dbg lib32asan2 lib32asan2-dbg lib64asan2 lib64asan2-dbg libx32asan2 libx32asan2-dbg libhfasan2 libhfasan2-dbg libsfasan2 libsfasan2-dbg liblsan0 liblsan0-dbg lib32lsan0 lib32lsan0-dbg libx32lsan0 libx32lsan0-dbg libtsan0 libtsan0-dbg libubsan0 libubsan0-dbg lib32ubsan0 lib32ubsan0-dbg lib64ubsan0 lib64ubsan0-dbg libx32ubsan0 libx32ubsan0-dbg libhfubsan0 libhfubsan0-dbg libsfubsan0 libsfubsan0-dbg libcilkrts5 libcilkrts5-dbg lib32cilkrts5 lib32cilkrts5-dbg lib64cilkrts5 lib64cilkrts5-dbg libx32cilkrts5 libx32cilkrts5-dbg libmpx0 libmpx0-dbg lib32mpx0 lib32mpx0-dbg lib64mpx0 lib64mpx0-dbg libquadmath0 libquadmath0-dbg lib32quadmath0 lib32quadmath0-dbg lib64quadmath0 lib64quadmath0-dbg libx32quadmath0 libx32quadmath0-dbg libhfquadmath0 libhfquadmath0-dbg libsfquadmath0 libsfquadmath0-dbg libcc1-0 libgccjit0 libgccjit-5-dbg libgccjit-5-doc libgccjit-5-dev gobjc++-5 gobjc++-5-multilib gobjc-5 gobjc-5-multilib libobjc-5-dev lib64objc-5-dev lib32objc-5-dev libn32objc-5-dev libx32objc-5-dev libhfobjc-5-dev libsfobjc-5-dev libobjc4 libobjc4-dbg lib64objc4 lib64objc4-dbg lib32objc4 lib32objc4-dbg libn32objc4 libn32objc4-dbg libx32objc4 libx32objc4-dbg libhfobjc4 libhfobjc4-dbg libsfobjc4 libsfobjc4-dbg gfortran-5 gfortran-5-multilib gfortran-5-doc libgfortran-5-dev lib64gfortran-5-dev lib32gfortran-5-dev libn32gfortran-5-dev libx32gfortran-5-dev libhfgfortran-5-dev libsfgfortran-5-dev libgfortran3 libgfortran3-dbg lib64gfortran3 lib64gfortran3-dbg lib32gfortran3 lib32gfortran3-dbg libn32gfortran3 libn32gfortran3-dbg libx32gfortran3 libx32gfortran3-dbg libhfgfortran3 libhfgfortran3-dbg libsfgfortran3 libsfgfortran3-dbg gccgo-5 gccgo-5-multilib gccgo-5-doc libgo7 libgo7-dbg lib64go7 lib64go7-dbg lib32go7 lib32go7-dbg libn32go7 libn32go7-dbg libx32go7 libx32go7-dbg gcj-5 gcj-5-jdk gcj-5-jre-headless gcj-5-jre libgcj16 gcj-5-jre-lib libgcj16-awt libgcj16-dev libgcj16-dbg gcj-5-source libgcj-doc libstdc++6 lib32stdc++6 lib64stdc++6 libn32stdc++6 libx32stdc++6 libhfstdc++6 libsfstdc++6 libstdc++-5-dev libstdc++-5-pic libstdc++6-5-dbg lib32stdc++-5-dev lib32stdc++6-5-dbg lib64stdc++-5-dev lib64stdc++6-5-dbg libn32stdc++-5-dev libn32stdc++6-5-dbg libx32stdc++-5-dev libx32stdc++6-5-dbg libhfstdc++-5-dev libhfstdc++6-5-dbg libsfstdc++-5-dev libsfstdc++6-5-dbg libstdc++-5-doc gnat-5 gnat-5-sjlj libgnat-5 libgnat-5-dbg libgnatvsn5-dev libgnatvsn5 libgnatvsn5-dbg libgnatprj5-dev libgnatprj5 libgnatprj5-dbg gnat-5-doc gdc-5 gdc-5-multilib libphobos-5-dev lib64phobos-5-dev lib32phobos-5-dev libx32phobos-5-dev libhfphobos-5-dev libsfphobos-5-dev fixincludes gcc-5-doc gcc-5-source Architecture: source Version: 5.4.0-6ubuntu1~16.04.5 Distribution: xenial-proposed Urgency: medium Maintainer: Ubuntu Core developers Changed-By: Matthias Klose Description: cpp-5 - GNU C preprocessor cpp-5-doc - Documentation for the GNU C preprocessor (cpp) fixincludes - Fix non-ANSI header files g++-5 - GNU C++ compiler g++-5-multilib - GNU C++ compiler (multilib support) gcc-5 - GNU C compiler gcc-5-base - GCC, the GNU Compiler Collection (base package) gcc-5-doc - Documentation for the GNU compilers (gcc, gobjc, g++) gcc-5-hppa64-linux-gnu - GNU C compiler (cross compiler for hppa64) gcc-5-locales - GCC, the GNU compiler collection (native language support files) gcc-5-multilib - GNU C compiler (multilib support) gcc-5-plugin-dev - Files for GNU GCC plugin development. gcc-5-source - Source of the GNU Compiler Collection gcc-5-test
[ubuntu/xenial-security] tcpdump 4.9.2-0ubuntu0.16.04.1 (Accepted)
tcpdump (4.9.2-0ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: multiple security issues in tcpdump - CVE-2017-13011: buffer overflow in util-print.c: bittok2str_internal(). - CVE-2017-12989: RESP parser infinite loop in print-resp.c: resp_get_length(). - CVE-2017-12990: ISAKMP parser infinite loops in print-isakmp.c, several functions. - CVE-2017-12995 DNS parser infinite loop in print-domain.c: ns_print(). - CVE-2017-12997: LLDP parser infinite loop in print-lldp.c: lldp_private_8021_print(). - CVE-2017-12893: buffer over-read in smbutil.c:name_len(). - CVE-2017-12894: buffer over-read in addrtoname.c: lookup_bytestring(). - CVE-2017-12895: buffer over-read in print-icmp.c:icmp_print(). - CVE-2017-12896: buffer over-read in print-isakmp.c: isakmp_rfc3948_print(). - CVE-2017-12897: buffer over-read in print-isoclns.c: isoclns_print(). - CVE-2017-12898: buffer over-read in print-nfs.c:interp_reply(). - CVE-2017-12899: buffer over-read in print-decnet.c: decnet_print(). - CVE-2017-12900: buffer over-read in util-print.c:tok2strbuf(). - CVE-2017-12901: buffer over-read in print-eigrp.c:eigrp_print(). - CVE-2017-12902: buffer over-read in print-zephyr.c, several functions. - CVE-2017-12985: buffer over-read in print-ip6.c:ip6_print(). - CVE-2017-12986: buffer over-read in print-rt6.c:rt6_print(). - CVE-2017-12987: buffer over-read in print-802_11.c: parse_elements(). - CVE-2017-12988: buffer over-read in print-telnet.c: telnet_parse(). - CVE-2017-12991: buffer over-read in print-bgp.c:bgp_attr_print(). - CVE-2017-12992: buffer over-read in print-ripng.c:ripng_print(). - CVE-2017-12993: buffer over-read in print-juniper.c, several functions. - CVE-2017-12994: buffer over-read in print-bgp.c:bgp_attr_print(). - CVE-2017-12996: buffer over-read in print-pim.c:pimv2_print(). - CVE-2017-12998: buffer over-read in print-isoclns.c: isis_print_extd_ip_reach(). - CVE-2017-12999: buffer over-read in print-isoclns.c:isis_print(). - CVE-2017-13000: buffer over-read in print-802_15_4.c: ieee802_15_4_if_print(). - CVE-2017-13001: buffer over-read in print-nfs.c:nfs_printfh(). - CVE-2017-13002: buffer over-read in print-aodv.c: aodv_extension(). - CVE-2017-13003: buffer over-read in print-lmp.c:lmp_print(). - CVE-2017-13004: buffer over-read in print-juniper.c: juniper_parse_header(). - CVE-2017-13005: buffer over-read in print-nfs.c:xid_map_enter(). - CVE-2017-13006: buffer over-read in print-l2tp.c, several functions. - CVE-2017-13007: buffer over-read in print-pktap.c: pktap_if_print(). - CVE-2017-13008: buffer over-read in print-802_11.c: parse_elements(). - CVE-2017-13009: buffer over-read in print-mobility.c: mobility_print(). - CVE-2017-13010: buffer over-read in print-beep.c:l_strnstart(). - CVE-2017-13012: buffer over-read in print-icmp.c:icmp_print(). - CVE-2017-13013: buffer over-read in print-arp.c, several functions. - CVE-2017-13014: buffer over-read in print-wb.c:wb_prep(), several functions. - CVE-2017-13015: buffer over-read in print-eap.c:eap_print(). - CVE-2017-13016: buffer over-read in print-isoclns.c:esis_print(). - CVE-2017-13017: buffer over-read in print-dhcp6.c: dhcp6opt_print(). - CVE-2017-13018: buffer over-read in print-pgm.c:pgm_print(). - CVE-2017-13019: buffer over-read in print-pgm.c:pgm_print(). - CVE-2017-13020: buffer over-read in print-vtp.c:vtp_print(). - CVE-2017-13021: buffer over-read in print-icmp6.c:icmp6_print(). - CVE-2017-13022: buffer over-read in print-ip.c:ip_printroute(). - CVE-2017-13023, CVE-2017-13024, CVE-2017-13025: multiple buffer over-reads in print-mobility.c:mobility_opt_print(). - CVE-2017-13026: buffer over-read in print-isoclns.c, several functions. - CVE-2017-13027: buffer over-read in print-lldp.c: lldp_mgmt_addr_tlv_print(). - CVE-2017-13028: buffer over-read in print-bootp.c:bootp_print(). - CVE-2017-13029: buffer over-read in print-ppp.c: print_ccp_config_options(). - CVE-2017-13030: buffer over-read in print-pim.c, several functions. - CVE-2017-13031: buffer over-read in print-frag6.c:frag6_print(). - CVE-2017-13032: buffer over-read in print-radius.c:print_attr_string(). - CVE-2017-13033: buffer over-read in print-vtp.c:vtp_print(). - CVE-2017-13034: buffer over-read in print-pgm.c:pgm_print(). - CVE-2017-13035: buffer over-read in print-isoclns.c:isis_print_id(). - CVE-2017-13036: buffer over-read in print-ospf6.c:ospf6_decode_v3(). - CVE-2017-13037: buffer over-read in print-ip.c:ip_printts(). - CVE-2017-13038: buffer over-read in print-ppp.c:handle_mlppp(). - CVE-2017-13039: buffer over-read in print-isakmp.c, several
[ubuntu/xenial-updates] tcpdump 4.9.2-0ubuntu0.16.04.1 (Accepted)
tcpdump (4.9.2-0ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: multiple security issues in tcpdump - CVE-2017-13011: buffer overflow in util-print.c: bittok2str_internal(). - CVE-2017-12989: RESP parser infinite loop in print-resp.c: resp_get_length(). - CVE-2017-12990: ISAKMP parser infinite loops in print-isakmp.c, several functions. - CVE-2017-12995 DNS parser infinite loop in print-domain.c: ns_print(). - CVE-2017-12997: LLDP parser infinite loop in print-lldp.c: lldp_private_8021_print(). - CVE-2017-12893: buffer over-read in smbutil.c:name_len(). - CVE-2017-12894: buffer over-read in addrtoname.c: lookup_bytestring(). - CVE-2017-12895: buffer over-read in print-icmp.c:icmp_print(). - CVE-2017-12896: buffer over-read in print-isakmp.c: isakmp_rfc3948_print(). - CVE-2017-12897: buffer over-read in print-isoclns.c: isoclns_print(). - CVE-2017-12898: buffer over-read in print-nfs.c:interp_reply(). - CVE-2017-12899: buffer over-read in print-decnet.c: decnet_print(). - CVE-2017-12900: buffer over-read in util-print.c:tok2strbuf(). - CVE-2017-12901: buffer over-read in print-eigrp.c:eigrp_print(). - CVE-2017-12902: buffer over-read in print-zephyr.c, several functions. - CVE-2017-12985: buffer over-read in print-ip6.c:ip6_print(). - CVE-2017-12986: buffer over-read in print-rt6.c:rt6_print(). - CVE-2017-12987: buffer over-read in print-802_11.c: parse_elements(). - CVE-2017-12988: buffer over-read in print-telnet.c: telnet_parse(). - CVE-2017-12991: buffer over-read in print-bgp.c:bgp_attr_print(). - CVE-2017-12992: buffer over-read in print-ripng.c:ripng_print(). - CVE-2017-12993: buffer over-read in print-juniper.c, several functions. - CVE-2017-12994: buffer over-read in print-bgp.c:bgp_attr_print(). - CVE-2017-12996: buffer over-read in print-pim.c:pimv2_print(). - CVE-2017-12998: buffer over-read in print-isoclns.c: isis_print_extd_ip_reach(). - CVE-2017-12999: buffer over-read in print-isoclns.c:isis_print(). - CVE-2017-13000: buffer over-read in print-802_15_4.c: ieee802_15_4_if_print(). - CVE-2017-13001: buffer over-read in print-nfs.c:nfs_printfh(). - CVE-2017-13002: buffer over-read in print-aodv.c: aodv_extension(). - CVE-2017-13003: buffer over-read in print-lmp.c:lmp_print(). - CVE-2017-13004: buffer over-read in print-juniper.c: juniper_parse_header(). - CVE-2017-13005: buffer over-read in print-nfs.c:xid_map_enter(). - CVE-2017-13006: buffer over-read in print-l2tp.c, several functions. - CVE-2017-13007: buffer over-read in print-pktap.c: pktap_if_print(). - CVE-2017-13008: buffer over-read in print-802_11.c: parse_elements(). - CVE-2017-13009: buffer over-read in print-mobility.c: mobility_print(). - CVE-2017-13010: buffer over-read in print-beep.c:l_strnstart(). - CVE-2017-13012: buffer over-read in print-icmp.c:icmp_print(). - CVE-2017-13013: buffer over-read in print-arp.c, several functions. - CVE-2017-13014: buffer over-read in print-wb.c:wb_prep(), several functions. - CVE-2017-13015: buffer over-read in print-eap.c:eap_print(). - CVE-2017-13016: buffer over-read in print-isoclns.c:esis_print(). - CVE-2017-13017: buffer over-read in print-dhcp6.c: dhcp6opt_print(). - CVE-2017-13018: buffer over-read in print-pgm.c:pgm_print(). - CVE-2017-13019: buffer over-read in print-pgm.c:pgm_print(). - CVE-2017-13020: buffer over-read in print-vtp.c:vtp_print(). - CVE-2017-13021: buffer over-read in print-icmp6.c:icmp6_print(). - CVE-2017-13022: buffer over-read in print-ip.c:ip_printroute(). - CVE-2017-13023, CVE-2017-13024, CVE-2017-13025: multiple buffer over-reads in print-mobility.c:mobility_opt_print(). - CVE-2017-13026: buffer over-read in print-isoclns.c, several functions. - CVE-2017-13027: buffer over-read in print-lldp.c: lldp_mgmt_addr_tlv_print(). - CVE-2017-13028: buffer over-read in print-bootp.c:bootp_print(). - CVE-2017-13029: buffer over-read in print-ppp.c: print_ccp_config_options(). - CVE-2017-13030: buffer over-read in print-pim.c, several functions. - CVE-2017-13031: buffer over-read in print-frag6.c:frag6_print(). - CVE-2017-13032: buffer over-read in print-radius.c:print_attr_string(). - CVE-2017-13033: buffer over-read in print-vtp.c:vtp_print(). - CVE-2017-13034: buffer over-read in print-pgm.c:pgm_print(). - CVE-2017-13035: buffer over-read in print-isoclns.c:isis_print_id(). - CVE-2017-13036: buffer over-read in print-ospf6.c:ospf6_decode_v3(). - CVE-2017-13037: buffer over-read in print-ip.c:ip_printts(). - CVE-2017-13038: buffer over-read in print-ppp.c:handle_mlppp(). - CVE-2017-13039: buffer over-read in print-isakmp.c, several
[ubuntu/xenial-proposed] livecd-rootfs 2.408.18 (Accepted)
livecd-rootfs (2.408.18) xenial; urgency=medium [ Robert C Jennings ] * Install udev before calls to udevadm Date: Wed, 13 Sep 2017 22:10:11 -0700 Changed-By: Steve Langasek Maintainer: Ubuntu Developers https://launchpad.net/ubuntu/+source/livecd-rootfs/2.408.18 Format: 1.8 Date: Wed, 13 Sep 2017 22:10:11 -0700 Source: livecd-rootfs Binary: livecd-rootfs Architecture: source Version: 2.408.18 Distribution: xenial Urgency: medium Maintainer: Ubuntu Developers Changed-By: Steve Langasek Description: livecd-rootfs - construction script for the livecd rootfs Changes: livecd-rootfs (2.408.18) xenial; urgency=medium . [ Robert C Jennings ] * Install udev before calls to udevadm Checksums-Sha1: e42730cf53e024f2be84ab8ce06d643661a5a5f6 1578 livecd-rootfs_2.408.18.dsc 6d48e018629373e43af22a952b9440423b106f8a 86112 livecd-rootfs_2.408.18.tar.xz Checksums-Sha256: 867265c2276ae6275c6aa7f3eb5cfcff46b3932e5385dca5c6d2d48f7fb43118 1578 livecd-rootfs_2.408.18.dsc e2b91c50c45d7c6aa102de2ac86166dc8eb113a4a6bb4ad9fd1ee544a05679ac 86112 livecd-rootfs_2.408.18.tar.xz Files: 93cdcca072a92c659b9defd3741d8560 1578 devel optional livecd-rootfs_2.408.18.dsc 5509ddd967daab2c117ba66c5723bfcb 86112 devel optional livecd-rootfs_2.408.18.tar.xz -- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes