curl (7.47.0-1ubuntu2.6) xenial-security; urgency=medium
* SECURITY UPDATE: Out of bounds read in code handling HTTP/2
- debian/patches/CVE-2018-105.patch: fix incorrect
trailer buffer size in lib/http2.c.
- CVE-2018-105
* SECURITY UPDATE: leak authentication data
- d
curl (7.47.0-1ubuntu2.6) xenial-security; urgency=medium
* SECURITY UPDATE: Out of bounds read in code handling HTTP/2
- debian/patches/CVE-2018-105.patch: fix incorrect
trailer buffer size in lib/http2.c.
- CVE-2018-105
* SECURITY UPDATE: leak authentication data
- d
chromium-browser (64.0.3282.119-0ubuntu0.16.04.1) xenial; urgency=medium
* Upstream release: 64.0.3282.119
- CVE-2018-6031: Use after free in PDFium.
- CVE-2018-6032: Same origin bypass in Shared Worker.
- CVE-2018-6033: Race when opening downloaded files.
- CVE-2018-6034: Intege
chromium-browser (64.0.3282.119-0ubuntu0.16.04.1) xenial; urgency=medium
* Upstream release: 64.0.3282.119
- CVE-2018-6031: Use after free in PDFium.
- CVE-2018-6032: Same origin bypass in Shared Worker.
- CVE-2018-6033: Race when opening downloaded files.
- CVE-2018-6034: Intege
linux-aws (4.4.0-1050.59) xenial; urgency=low
* linux-aws: 4.4.0-1050.59 -proposed tracker (LP: #1746322)
* linux-aws serial console not recognized (LP: #1746318)
- SAUCE: [aws] serial: 8250_pci: Add Amazon PCI serial device ID
- [aws] config: SERIAL_8250_NR_UARTS=4
Date: 2018-01-30
linux-meta-aws (4.4.0.1050.52) xenial; urgency=medium
* Bump ABI 4.4.0-1050
Date: 2018-01-30 19:55:03.699657+00:00
Changed-By: Kamal Mostafa
Signed-By: Łukasz Zemczak
https://launchpad.net/ubuntu/+source/linux-meta-aws/4.4.0.1050.52
Sorry, changesfile not available.--
Xenial-changes mailing
firefox (58.0.1+build1-0ubuntu0.16.04.1) xenial-security; urgency=medium
* New upstream stable release (58.0.1build1)
- see USN-3552-1
Date: 2018-01-31 00:46:12.941613+00:00
Changed-By: Chris Coulson
Signed-By: Ubuntu Archive Robot
https://launchpad.net/ubuntu/+source/firefox/58.0.1+buil
ruby2.3 (2.3.1-2~16.04.6) xenial-security; urgency=medium
* SECURITY UPDATE: fails to validade specification names
- debian/patches/CVE-2017-0901-0902.patch: fix this.
- CVE-2017-0901
* SECURITY UPDATE: vulnerable to a DNS hijacking
- debian/patches/CVE-2017-0901-0902.patch fix th
firefox (58.0.1+build1-0ubuntu0.16.04.1) xenial-security; urgency=medium
* New upstream stable release (58.0.1build1)
- see USN-3552-1
Date: 2018-01-31 00:46:12.941613+00:00
Changed-By: Chris Coulson
https://launchpad.net/ubuntu/+source/firefox/58.0.1+build1-0ubuntu0.16.04.1
Sorry, changes
uvp-monitor (2.2.0.316-0ubuntu1~16.04.1) xenial; urgency=medium
* Backport to xenial (LP: #1735532).
* New upstream release.
* Add debian/watch.
* debian/control: switch priority from extra to optional.
* debian/patches/init.d_script_fixes.patch:
- Fix some lintian errors with the in
menu-cache (1.0.1-1ubuntu0.2) xenial; urgency=high
* Fix menu-cached so 100% CPU isn't used after suspend (LP: #1635438).
- 90-1-fix-100-cpu-load.patch
- 90-2-fix-100-cpu-load.patch
Date: Sun, 28 Jan 2018 23:15:59 -0600
Changed-By: Simon Quigley
Maintainer: Ubuntu Developers
https://l
lxpanel (0.8.2-1ubuntu2.1) xenial; urgency=medium
* Fix PanelIconGrid allocation in right-to-left languages (LP: #1537334).
- fix-RTL-overlap.patch
Date: Sun, 28 Jan 2018 23:36:04 -0600
Changed-By: Simon Quigley
Maintainer: Ubuntu Developers
https://launchpad.net/ubuntu/+source/lxpanel/0.
cloud-utils (0.27-0ubuntu25) xenial; urgency=medium
* mount-image-callback: update partitions and settle on nbd mounts.
(LP: #1741300)
Date: Fri, 26 Jan 2018 13:27:32 -0500
Changed-By: Scott Moser
https://launchpad.net/ubuntu/+source/cloud-utils/0.27-0ubuntu25
Format: 1.8
Date: Fri, 26 Jan
ruby2.3 (2.3.1-2~16.04.6) xenial-security; urgency=medium
* SECURITY UPDATE: fails to validade specification names
- debian/patches/CVE-2017-0901-0902.patch: fix this.
- CVE-2017-0901
* SECURITY UPDATE: vulnerable to a DNS hijacking
- debian/patches/CVE-2017-0901-0902.patch fix th
linux-oem (4.13.0-1020.21) xenial; urgency=low
* linux-oem: 4.13.0-1020.21 -proposed tracker (LP: #1746017)
[ Stefan Bader ]
* Firmware upgrade interface for CAC Reader BCM58102 (LP: #1744041)
- SAUCE: Support fw upgrade for CAC Reader BCM58102
* the wifi driver is always hard blocke
linux-signed-oem (4.13.0-1020.21) xenial; urgency=medium
* Master version: 4.13.0-1020.21
Date: 2018-01-29 15:29:12.405655+00:00
Changed-By: Timo Aaltonen
Signed-By: Łukasz Zemczak
https://launchpad.net/ubuntu/+source/linux-signed-oem/4.13.0-1020.21
Sorry, changesfile not available.--
Xenial
linux-meta-oem (4.13.0.1020.24) xenial; urgency=medium
* Bump ABI 4.13.0-1020
Date: 2018-01-29 15:16:11.421429+00:00
Changed-By: Timo Aaltonen
Signed-By: Łukasz Zemczak
https://launchpad.net/ubuntu/+source/linux-meta-oem/4.13.0.1020.24
Sorry, changesfile not available.--
Xenial-changes maili
linux-oem (4.13.0-1020.21) xenial; urgency=low
* linux-oem: 4.13.0-1020.21 -proposed tracker (LP: #1746017)
[ Stefan Bader ]
* Firmware upgrade interface for CAC Reader BCM58102 (LP: #1744041)
- SAUCE: Support fw upgrade for CAC Reader BCM58102
* the wifi driver is always hard blocke
linux-meta-azure-edge (4.14.0.1004.4) xenial; urgency=medium
* Bump ABI 4.14.0-1004
Date: 2018-01-29 19:23:07.755167+00:00
Changed-By: Marcelo Cerri
Signed-By: Łukasz Zemczak
https://launchpad.net/ubuntu/+source/linux-meta-azure-edge/4.14.0.1004.4
Sorry, changesfile not available.--
Xenial-c
linux-azure-edge (4.14.0-1004.4) xenial; urgency=low
* linux-azure-edge: 4.14.0-1004.4 -proposed tracker (LP: #1746066)
* [Hyper-V] x86/hyperv: Stop suppressing X86_FEATURE_PCID (LP: #1745247)
- x86/hyperv: Stop suppressing X86_FEATURE_PCID
* [Hyper-V] scsi: storvsc: Spread interrupts
gcc-5 (5.4.0-6ubuntu1~16.04.8) xenial-security; urgency=medium
* Add retpoline support for x86 via adding -mindirect-branch=,
-mindirect-branch-register, and -mfunction-return= support
- 0001-i386-Move-struct-ix86_frame-to-machine_function.diff,
0002-i386-Use-reference-of-struct-ix
21 matches
Mail list logo