libpam4j (1.4-2+deb8u1build0.16.04.1) xenial-security; urgency=medium
* fake sync from Debian
Date: 2017-11-13 15:27:32.293588+00:00
Changed-By: Marc Deslauriers
Maintainer: Debian Java Maintainers
Signed-By:
bchunk (1.2.0-12+deb8u1build0.16.04.1) xenial-security; urgency=medium
* fake sync from Debian
Date: 2017-11-13 14:16:15.272257+00:00
Changed-By: Marc Deslauriers
Maintainer: Praveen Arimbrathodiyil
Signed-By: Ubuntu Archive Robot
libpam4j (1.4-2+deb8u1build0.16.04.1) xenial-security; urgency=medium
* fake sync from Debian
Date: 2017-11-13 15:27:32.293588+00:00
Changed-By: Marc Deslauriers
Maintainer: Debian Java Maintainers
linux-signed (4.4.0-101.124) xenial; urgency=medium
* Version 4.4.0-101.124
Date: 2017-11-10 11:32:19.891975+00:00
Changed-By: Thadeu Lima de Souza Cascardo
Signed-By: Steve Langasek
linux (4.4.0-101.124) xenial; urgency=low
* linux: 4.4.0-101.124 -proposed tracker (LP: #1731264)
* s390/mm: fix write access check in gup_huge_pmd() (LP: #1730596)
- s390/mm: fix write access check in gup_huge_pmd()
Date: 2017-11-10 18:26:25.581753+00:00
Changed-By: Thadeu Lima de
linux-meta (4.4.0.101.106) xenial; urgency=medium
* Bump ABI 4.4.0-101
Date: 2017-11-10 11:19:15.032954+00:00
Changed-By: Thadeu Lima de Souza Cascardo
Signed-By: Steve Langasek
perl (5.22.1-9ubuntu0.2) xenial-security; urgency=medium
* SECURITY UPDATE: Buffer overflow via crafted regular expressiion
- debian/patches/fixes/CVE-2017-12883.patch: fix crafted expression
with invalid '\N{U+...}' escape in regcomp.c
- CVE-2017-12883
* SECURITY UPDATE: