[ubuntu/xenial-proposed] linux-meta-kvm 4.4.0.1031.30 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-kvm (4.4.0.1031.30) xenial; urgency=medium * Bump ABI 4.4.0-1031 Date: 2018-08-13 10:40:14.071677+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-kvm/4.4.0.1031.30 Sorry, changesfile not available.-- Xenial-changes mailing

[ubuntu/xenial-proposed] linux-meta-raspi2 4.4.0.1094.94 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-raspi2 (4.4.0.1094.94) xenial; urgency=medium * Bump ABI 4.4.0-1094 Date: 2018-08-13 10:22:12.802788+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-raspi2/4.4.0.1094.94 Sorry, changesfile not available.-- Xenial-changes

[ubuntu/xenial-proposed] linux-kvm 4.4.0-1031.37 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-kvm (4.4.0-1031.37) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits"

[ubuntu/xenial-proposed] linux-meta-snapdragon 4.4.0.1098.90 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-snapdragon (4.4.0.1098.90) xenial; urgency=medium * Bump ABI 4.4.0-1098 Date: 2018-08-13 10:26:14.576258+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-snapdragon/4.4.0.1098.90 Sorry, changesfile not available.--

[ubuntu/xenial-proposed] linux-snapdragon 4.4.0-1098.103 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-snapdragon (4.4.0-1098.103) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage

[ubuntu/xenial-proposed] linux-meta-hwe 4.15.0.32.54 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-hwe (4.15.0.32.54) xenial; urgency=medium * Bump ABI 4.15.0-32 Date: 2018-08-10 21:48:12.349454+00:00 Changed-By: Thadeu Lima de Souza Cascardo Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-hwe/4.15.0.32.54 Sorry, changesfile not available.--

[ubuntu/xenial-proposed] linux-signed-hwe 4.15.0-32.35~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-signed-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium * Master version: 4.15.0-32.35~16.04.1 Date: 2018-08-10 21:49:12.504329+00:00 Changed-By: Thadeu Lima de Souza Cascardo Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-signed-hwe/4.15.0-32.35~16.04.1 Sorry,

[ubuntu/xenial-proposed] linux-hwe 4.15.0-32.35~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium [ Stefan Bader ] * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct CPU/cache topology - x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be

[ubuntu/xenial-proposed] linux 4.4.0-133.159 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux (4.4.0-133.159) xenial; urgency=medium * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 //

[ubuntu/xenial-proposed] linux-signed 4.4.0-133.159 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-signed (4.4.0-133.159) xenial; urgency=medium * Version 4.4.0-133.159 Date: 2018-08-13 07:33:20.621054+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-signed/4.4.0-133.159 Sorry, changesfile not available.-- Xenial-changes mailing

[ubuntu/xenial-proposed] linux-aws 4.4.0-1065.75 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-aws (4.4.0-1065.75) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits"

[ubuntu/xenial-proposed] linux-meta 4.4.0.133.139 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta (4.4.0.133.139) xenial; urgency=medium * Bump ABI 4.4.0-133 Date: 2018-08-13 07:33:13.371402+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta/4.4.0.133.139 Sorry, changesfile not available.-- Xenial-changes mailing list

[ubuntu/xenial-proposed] linux-meta-aws 4.4.0.1065.67 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-aws (4.4.0.1065.67) xenial; urgency=medium * Bump ABI 4.4.0-1065 Date: 2018-08-13 10:30:13.162269+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-aws/4.4.0.1065.67 Sorry, changesfile not available.-- Xenial-changes mailing

[ubuntu/xenial-proposed] linux-meta-azure-edge 4.15.0.1021.18 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-azure-edge (4.15.0.1021.18) xenial; urgency=medium * Bump ABI 4.15.0-1021 Date: 2018-08-13 11:01:22.773896+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-azure-edge/4.15.0.1021.18 Sorry, changesfile not available.--

[ubuntu/xenial-proposed] linux-hwe_4.15.0-32.35~16.04.1_ppc64el.tar.gz - (Accepted)

2018-08-14 Thread Thadeu Lima de Souza Cascardo
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium [ Stefan Bader ] * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct CPU/cache topology - x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be

[ubuntu/xenial-security] samba 2:4.3.11+dfsg-0ubuntu0.16.04.15 (Accepted)

2018-08-14 Thread Marc Deslauriers
samba (2:4.3.11+dfsg-0ubuntu0.16.04.15) xenial-security; urgency=medium * SECURITY UPDATE: Insufficient input validation on client directory listing in libsmbclient - debian/patches/CVE-2018-10858-*.patch: don't overwrite passed in buffer in source3/libsmb/libsmb_path.c, add

[ubuntu/xenial-proposed] linux-hwe_4.15.0-32.35~16.04.1_amd64.tar.gz - (Accepted)

2018-08-14 Thread Thadeu Lima de Souza Cascardo
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium [ Stefan Bader ] * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct CPU/cache topology - x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be

[ubuntu/xenial-security] libxml2 2.9.3+dfsg1-1ubuntu0.6 (Accepted)

2018-08-14 Thread Leonidas S. Barbosa
libxml2 (2.9.3+dfsg1-1ubuntu0.6) xenial-security; urgency=medium * SECURITY UPDATE: XXE attacks - debian/patches/CVE-2016-9318.patch: fix in parser.c. - CVE-2016-9318 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2017-18258.patch: fix in xzlib.c. - CVE-2017-18258

[ubuntu/xenial-proposed] linux_4.4.0-133.159_amd64.tar.gz - (Accepted)

2018-08-14 Thread Stefan Bader
linux (4.4.0-133.159) xenial; urgency=medium * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 //

[ubuntu/xenial-proposed] linux-azure_4.15.0-1021.21~16.04.1_amd64.tar.gz - (Accepted)

2018-08-14 Thread Stefan Bader
linux-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium [ Ubuntu: 4.15.0-32.34 ] * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct

[ubuntu/xenial-proposed] linux-signed-azure 4.15.0-1021.21~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-signed-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium * Master version: 4.15.0-1021.21~16.04.1 Date: 2018-08-13 10:36:16.160043+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-signed-azure/4.15.0-1021.21~16.04.1 Sorry,

[ubuntu/xenial-proposed] linux-azure 4.15.0-1021.21~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium [ Ubuntu: 4.15.0-32.34 ] * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct

[ubuntu/xenial-proposed] linux-gcp 4.15.0-1017.18~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-gcp (4.15.0-1017.18~16.04.1) xenial; urgency=medium [ Ubuntu: 4.15.0-32.34 ] * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct

[ubuntu/xenial-proposed] linux-meta-azure 4.15.0.1021.27 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-azure (4.15.0.1021.27) xenial; urgency=medium * Bump ABI 4.15.0-1021 Date: 2018-08-13 10:36:13.769990+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-azure/4.15.0.1021.27 Sorry, changesfile not available.-- Xenial-changes

[ubuntu/xenial-proposed] linux-meta-gcp 4.15.0.1017.29 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-gcp (4.15.0.1017.29) xenial; urgency=medium * Bump ABI 4.15.0-1017 Date: 2018-08-13 10:57:19.133201+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1017.29 Sorry, changesfile not available.-- Xenial-changes

[ubuntu/xenial-updates] samba 2:4.3.11+dfsg-0ubuntu0.16.04.15 (Accepted)

2018-08-14 Thread Ubuntu Archive Robot
samba (2:4.3.11+dfsg-0ubuntu0.16.04.15) xenial-security; urgency=medium * SECURITY UPDATE: Insufficient input validation on client directory listing in libsmbclient - debian/patches/CVE-2018-10858-*.patch: don't overwrite passed in buffer in source3/libsmb/libsmb_path.c, add

[ubuntu/xenial-security] linux 4.4.0-133.159 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux (4.4.0-133.159) xenial; urgency=medium * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 //

[ubuntu/xenial-updates] linux 4.4.0-133.159 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux (4.4.0-133.159) xenial; urgency=medium * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 //

[ubuntu/xenial-security] linux-meta 4.4.0.133.139 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta (4.4.0.133.139) xenial; urgency=medium * Bump ABI 4.4.0-133 linux-meta (4.4.0.132.138) xenial; urgency=medium * Bump ABI 4.4.0-132 linux-meta (4.4.0.131.137) xenial; urgency=medium * Bump ABI 4.4.0-131 Date: 2018-08-13 07:33:13.371402+00:00 Changed-By: Stefan Bader

[ubuntu/xenial-updates] linux-aws 4.4.0-1065.75 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-aws (4.4.0-1065.75) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits"

[ubuntu/xenial-updates] libxml2 2.9.3+dfsg1-1ubuntu0.6 (Accepted)

2018-08-14 Thread Ubuntu Archive Robot
libxml2 (2.9.3+dfsg1-1ubuntu0.6) xenial-security; urgency=medium * SECURITY UPDATE: XXE attacks - debian/patches/CVE-2016-9318.patch: fix in parser.c. - CVE-2016-9318 * SECURITY UPDATE: Denial of service - debian/patches/CVE-2017-18258.patch: fix in xzlib.c. - CVE-2017-18258

[ubuntu/xenial-updates] linux-snapdragon 4.4.0-1098.103 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-snapdragon (4.4.0-1098.103) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage

[ubuntu/xenial-security] linux-snapdragon 4.4.0-1098.103 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-snapdragon (4.4.0-1098.103) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage

[ubuntu/xenial-security] linux-meta-snapdragon 4.4.0.1098.90 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-snapdragon (4.4.0.1098.90) xenial; urgency=medium * Bump ABI 4.4.0-1098 linux-meta-snapdragon (4.4.0.1097.89) xenial; urgency=medium * Bump ABI 4.4.0-1097 linux-meta-snapdragon (4.4.0.1096.88) xenial; urgency=medium * Bump ABI 4.4.0-1096 Date: 2018-08-13

[ubuntu/xenial-updates] linux-meta-azure-edge 4.15.0.1021.18 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-azure-edge (4.15.0.1021.18) xenial; urgency=medium * Bump ABI 4.15.0-1021 linux-meta-azure-edge (4.15.0.1020.17) xenial; urgency=medium * Bump ABI 4.15.0-1020 Date: 2018-08-13 11:01:22.773896+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-security] linux-aws 4.4.0-1065.75 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-aws (4.4.0-1065.75) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits"

[ubuntu/xenial-security] linux-meta-azure-edge 4.15.0.1021.18 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-azure-edge (4.15.0.1021.18) xenial; urgency=medium * Bump ABI 4.15.0-1021 linux-meta-azure-edge (4.15.0.1020.17) xenial; urgency=medium * Bump ABI 4.15.0-1020 Date: 2018-08-13 11:01:22.773896+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-security] linux-azure 4.15.0-1021.21~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium [ Ubuntu: 4.15.0-32.34 ] * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct

[ubuntu/xenial-updates] linux-azure 4.15.0-1021.21~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium [ Ubuntu: 4.15.0-32.34 ] * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct

[ubuntu/xenial-updates] linux-signed 4.4.0-133.159 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-signed (4.4.0-133.159) xenial; urgency=medium * Version 4.4.0-133.159 linux-signed (4.4.0-132.158) xenial; urgency=medium * Version 4.4.0-132.158 Date: 2018-08-13 07:33:20.621054+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-security] linux-signed 4.4.0-133.159 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-signed (4.4.0-133.159) xenial; urgency=medium * Version 4.4.0-133.159 linux-signed (4.4.0-132.158) xenial; urgency=medium * Version 4.4.0-132.158 linux-signed (4.4.0-131.157) xenial; urgency=medium * Version 4.4.0-131.157 Date: 2018-08-13 07:33:20.621054+00:00 Changed-By: Stefan

[ubuntu/xenial-updates] linux-meta-snapdragon 4.4.0.1098.90 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-snapdragon (4.4.0.1098.90) xenial; urgency=medium * Bump ABI 4.4.0-1098 linux-meta-snapdragon (4.4.0.1097.89) xenial; urgency=medium * Bump ABI 4.4.0-1097 Date: 2018-08-13 10:26:14.576258+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-updates] linux-meta 4.4.0.133.139 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta (4.4.0.133.139) xenial; urgency=medium * Bump ABI 4.4.0-133 linux-meta (4.4.0.132.138) xenial; urgency=medium * Bump ABI 4.4.0-132 Date: 2018-08-13 07:33:13.371402+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-updates] linux-meta-aws 4.4.0.1065.67 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-aws (4.4.0.1065.67) xenial; urgency=medium * Bump ABI 4.4.0-1065 linux-meta-aws (4.4.0.1064.66) xenial; urgency=medium * Bump ABI 4.4.0-1064 Date: 2018-08-13 10:30:13.162269+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-security] linux-meta-azure 4.15.0.1021.27 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-azure (4.15.0.1021.27) xenial; urgency=medium * Bump ABI 4.15.0-1021 linux-meta-azure (4.15.0.1020.26) xenial; urgency=medium * Bump ABI 4.15.0-1020 Date: 2018-08-13 10:36:13.769990+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-updates] linux-meta-azure 4.15.0.1021.27 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-azure (4.15.0.1021.27) xenial; urgency=medium * Bump ABI 4.15.0-1021 linux-meta-azure (4.15.0.1020.26) xenial; urgency=medium * Bump ABI 4.15.0-1020 Date: 2018-08-13 10:36:13.769990+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-security] linux-meta-kvm 4.4.0.1031.30 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-kvm (4.4.0.1031.30) xenial; urgency=medium * Bump ABI 4.4.0-1031 linux-meta-kvm (4.4.0.1030.29) xenial; urgency=medium * Bump ABI 4.4.0-1030 Date: 2018-08-13 10:40:14.071677+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-updates] linux-kvm 4.4.0-1031.37 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-kvm (4.4.0-1031.37) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits"

[ubuntu/xenial-security] linux-raspi2 4.4.0-1094.102 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-raspi2 (4.4.0-1094.102) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage

[ubuntu/xenial-security] linux-meta-hwe 4.15.0.32.54 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-hwe (4.15.0.32.54) xenial; urgency=medium * Bump ABI 4.15.0-32 linux-meta-hwe (4.15.0.31.53) xenial; urgency=medium * Bump ABI 4.15.0-31 Date: 2018-08-10 21:48:12.349454+00:00 Changed-By: Thadeu Lima de Souza Cascardo Signed-By: Andy Whitcroft

[ubuntu/xenial-updates] linux-meta-raspi2 4.4.0.1094.94 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-raspi2 (4.4.0.1094.94) xenial; urgency=medium * Bump ABI 4.4.0-1094 linux-meta-raspi2 (4.4.0.1093.93) xenial; urgency=medium * Bump ABI 4.4.0-1093 Date: 2018-08-13 10:22:12.802788+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-updates] linux-meta-kvm 4.4.0.1031.30 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-kvm (4.4.0.1031.30) xenial; urgency=medium * Bump ABI 4.4.0-1031 linux-meta-kvm (4.4.0.1030.29) xenial; urgency=medium * Bump ABI 4.4.0-1030 Date: 2018-08-13 10:40:14.071677+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-security] linux-signed-hwe 4.15.0-32.35~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-signed-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium * Master version: 4.15.0-32.35~16.04.1 linux-signed-hwe (4.15.0-31.33~16.04.1) xenial; urgency=medium * Master version: 4.15.0-31.33~16.04.1 Date: 2018-08-10 21:49:12.504329+00:00 Changed-By: Thadeu Lima de Souza Cascardo

[ubuntu/xenial-security] linux-hwe 4.15.0-32.35~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium [ Stefan Bader ] * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct CPU/cache topology - x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be

[ubuntu/xenial-updates] linux-meta-hwe 4.15.0.32.54 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-hwe (4.15.0.32.54) xenial; urgency=medium * Bump ABI 4.15.0-32 linux-meta-hwe (4.15.0.31.53) xenial; urgency=medium * Bump ABI 4.15.0-31 Date: 2018-08-10 21:48:12.349454+00:00 Changed-By: Thadeu Lima de Souza Cascardo Signed-By: Andy Whitcroft

[ubuntu/xenial-updates] linux-signed-hwe 4.15.0-32.35~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-signed-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium * Master version: 4.15.0-32.35~16.04.1 linux-signed-hwe (4.15.0-31.33~16.04.1) xenial; urgency=medium * Master version: 4.15.0-31.33~16.04.1 Date: 2018-08-10 21:49:12.504329+00:00 Changed-By: Thadeu Lima de Souza Cascardo

[ubuntu/xenial-security] linux-kvm 4.4.0-1031.37 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-kvm (4.4.0-1031.37) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits"

[ubuntu/xenial-updates] linux-gcp 4.15.0-1017.18~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-gcp (4.15.0-1017.18~16.04.1) xenial; urgency=medium [ Ubuntu: 4.15.0-32.34 ] * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct

[ubuntu/xenial-security] linux-signed-azure 4.15.0-1021.21~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-signed-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium * Master version: 4.15.0-1021.21~16.04.1 linux-signed-azure (4.15.0-1020.20~16.04.1) xenial; urgency=medium * Master version: 4.15.0-1020.20~16.04.1 Date: 2018-08-13 10:36:16.160043+00:00 Changed-By: Stefan Bader

[ubuntu/xenial-updates] linux-signed-azure 4.15.0-1021.21~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-signed-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium * Master version: 4.15.0-1021.21~16.04.1 linux-signed-azure (4.15.0-1020.20~16.04.1) xenial; urgency=medium * Master version: 4.15.0-1020.20~16.04.1 Date: 2018-08-13 10:36:16.160043+00:00 Changed-By: Stefan Bader

[ubuntu/xenial-security] linux-meta-gcp 4.15.0.1017.29 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-gcp (4.15.0.1017.29) xenial; urgency=medium * Bump ABI 4.15.0-1017 Date: 2018-08-13 10:57:19.133201+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1017.29 Sorry, changesfile not available.-- Xenial-changes

[ubuntu/xenial-updates] linux-meta-gcp 4.15.0.1017.29 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-gcp (4.15.0.1017.29) xenial; urgency=medium * Bump ABI 4.15.0-1017 Date: 2018-08-13 10:57:19.133201+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft https://launchpad.net/ubuntu/+source/linux-meta-gcp/4.15.0.1017.29 Sorry, changesfile not available.-- Xenial-changes

[ubuntu/xenial-security] linux-gcp 4.15.0-1017.18~16.04.1 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-gcp (4.15.0-1017.18~16.04.1) xenial; urgency=medium [ Ubuntu: 4.15.0-32.34 ] * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct

[ubuntu/xenial-security] linux-meta-raspi2 4.4.0.1094.94 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-raspi2 (4.4.0.1094.94) xenial; urgency=medium * Bump ABI 4.4.0-1094 linux-meta-raspi2 (4.4.0.1093.93) xenial; urgency=medium * Bump ABI 4.4.0-1093 Date: 2018-08-13 10:22:12.802788+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-security] linux-meta-hwe-edge 4.15.0.32.53 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-hwe-edge (4.15.0.32.53) xenial; urgency=medium * Bump ABI 4.15.0-32 linux-meta-hwe-edge (4.15.0.31.52) xenial; urgency=medium * Bump ABI 4.15.0-31 Date: 2018-08-13 11:05:17.191074+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-updates] linux-meta-hwe-edge 4.15.0.32.53 (Accepted)

2018-08-14 Thread Andy Whitcroft
linux-meta-hwe-edge (4.15.0.32.53) xenial; urgency=medium * Bump ABI 4.15.0-32 linux-meta-hwe-edge (4.15.0.31.52) xenial; urgency=medium * Bump ABI 4.15.0-31 Date: 2018-08-13 11:05:17.191074+00:00 Changed-By: Stefan Bader Signed-By: Andy Whitcroft

[ubuntu/xenial-updates] linux-raspi2 4.4.0-1094.102 (Accepted)

2018-08-14 Thread Ubuntu Archive Robot
linux-raspi2 (4.4.0-1094.102) xenial; urgency=medium [ Ubuntu: 4.4.0-133.159 ] * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage

[ubuntu/xenial-updates] linux_4.4.0-133.159_amd64.tar.gz - (Accepted)

2018-08-14 Thread Stefan Bader
linux (4.4.0-133.159) xenial; urgency=medium * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 //

[ubuntu/xenial-updates] linux-azure_4.15.0-1021.21~16.04.1_amd64.tar.gz - (Accepted)

2018-08-14 Thread Stefan Bader
linux-azure (4.15.0-1021.21~16.04.1) xenial; urgency=medium [ Ubuntu: 4.15.0-32.34 ] * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct

[ubuntu/xenial-updates] linux-hwe_4.15.0-32.35~16.04.1_ppc64el.tar.gz - (Accepted)

2018-08-14 Thread Thadeu Lima de Souza Cascardo
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium [ Stefan Bader ] * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct CPU/cache topology - x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be

[ubuntu/xenial-updates] linux-hwe_4.15.0-32.35~16.04.1_amd64.tar.gz - (Accepted)

2018-08-14 Thread Thadeu Lima de Souza Cascardo
linux-hwe (4.15.0-32.35~16.04.1) xenial; urgency=medium [ Stefan Bader ] * CVE-2018-3620 // CVE-2018-3646 - x86/Centaur: Initialize supported CPU features properly - x86/Centaur: Report correct CPU/cache topology - x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be

[ubuntu/xenial-updates] keepalived 1:1.2.24-1ubuntu0.16.04.1 (Accepted)

2018-08-14 Thread Chris Halse Rogers
keepalived (1:1.2.24-1ubuntu0.16.04.1) xenial; urgency=medium * New upstream version for Ubuntu 16.04 (LP: #1783583). * d/p/fix_message_truncation_with_large_pagesizes.patch: Rebased. * d/p/fix-removing-left-over-addresses-if-keepalived-abort.patch: Cherry-picked from upstream to ensure