linux-azure (4.15.0-1028.29~16.04.1) xenial; urgency=medium
* linux-azure: 4.15.0-1028.29~16.04.1 -proposed tracker (LP: #1798674)
Date: Thu, 18 Oct 2018 17:44:29 -0300
Changed-By: Marcelo Henrique Cerri
Maintainer: Launchpad Build Daemon
Format: 1.8
Date: Thu, 18 Oct 2018 17:44:29 -0300
Sou
linux-meta-euclid (4.4.0.9029.30) xenial; urgency=medium
* Bump ABI 4.4.0-9029
Date: 2018-10-30 13:25:13.435659+00:00
Changed-By: Stefan Bader
Signed-By: Łukasz Zemczak
https://launchpad.net/ubuntu/+source/linux-meta-euclid/4.4.0.9029.30
Sorry, changesfile not available.--
Xenial-changes mai
linux-euclid (4.4.0-9029.31) xenial; urgency=medium
* linux-euclid: 4.4.0-9029.31 -proposed tracker (LP: #1799407)
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net:
squid3 (3.5.12-1ubuntu7.6) xenial; urgency=medium
* d/squid.rc: fix regexp for catching FATAL errors (LP: #1738412)
* d/t/test-squid.py: in xenial, initscript, apparmor profile, pidfile and
process are named squid, not squid3. Get rid of the multiple distro
logic since these tests wil
curl (7.47.0-1ubuntu2.11) xenial-security; urgency=medium
* SECURITY UPDATE: SASL password overflow via integer overflow
- debian/patches/CVE-2018-16839-pre1.patch: prevent size overflows in
lib/curl_sasl.c.
- debian/patches/CVE-2018-16839-pre2.patch: fix integer overflow check
curl (7.47.0-1ubuntu2.11) xenial-security; urgency=medium
* SECURITY UPDATE: SASL password overflow via integer overflow
- debian/patches/CVE-2018-16839-pre1.patch: prevent size overflows in
lib/curl_sasl.c.
- debian/patches/CVE-2018-16839-pre2.patch: fix integer overflow check
ubiquity (2.21.63.9) xenial; urgency=medium
* Revert the changes from 2.21.63.8 in favour of the following instead:
[ Dariusz Gadomski ]
* Implement missing reboot and shutdown methods in debconf_ui (LP: #1749289)
ubiquity (2.21.63.8) xenial; urgency=medium
[ Dariusz Gadomski ]
* Fixe