[ubuntu/xenial-proposed] linux-azure_4.13.0-1018.21_amd64.tar.gz - (Accepted)

Stefan Bader stefan.bader at canonical.com
Mon May 21 21:07:45 UTC 2018


linux-azure (4.13.0-1018.21) xenial; urgency=medium

  [ Ubuntu: 4.13.0-43.48 ]

  * CVE-2018-3639 (powerpc)
    - SAUCE: rfi-flush: update H_CPU_* macro names to upstream
    - SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
      upstream
    - SAUCE: update pseries_setup_rfi_flush() capitalization to upstream
    - powerpc/pseries: Support firmware disable of RFI flush
    - powerpc/powernv: Support firmware disable of RFI flush
    - powerpc/64s: Allow control of RFI flush via debugfs
    - powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs code
    - powerpc/rfi-flush: Always enable fallback flush on pseries
    - powerpc/rfi-flush: Differentiate enabled and patched flush types
    - powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
    - powerpc: Add security feature flags for Spectre/Meltdown
    - powerpc/powernv: Set or clear security feature flags
    - powerpc/pseries: Set or clear security feature flags
    - powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
    - powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()
    - powerpc/pseries: Fix clearing of security feature flags
    - powerpc: Move default security feature flags
    - powerpc/pseries: Restore default security feature flags on setup
    - powerpc/64s: Add support for a store forwarding barrier at kernel entry/exit
  * CVE-2018-3639 (x86)
    - SAUCE: Add X86_FEATURE_ARCH_CAPABILITIES
    - SAUCE: x86: Add alternative_msr_write
    - x86/nospec: Simplify alternative_msr_write()
    - x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
    - x86/bugs: Concentrate bug detection into a separate function
    - x86/bugs: Concentrate bug reporting into a separate function
    - x86/msr: Add definitions for new speculation control MSRs
    - x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
    - x86/bugs, KVM: Support the combination of guest and host IBRS
    - x86/bugs: Expose /sys/../spec_store_bypass
    - x86/cpufeatures: Add X86_FEATURE_RDS
    - x86/bugs: Provide boot parameters for the spec_store_bypass_disable
      mitigation
    - x86/bugs/intel: Set proper CPU features and setup RDS
    - x86/bugs: Whitelist allowed SPEC_CTRL MSR values
    - x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
    - x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
    - x86/speculation: Create spec-ctrl.h to avoid include hell
    - prctl: Add speculation control prctls
    - x86/process: Allow runtime control of Speculative Store Bypass
    - x86/speculation: Add prctl for Speculative Store Bypass mitigation
    - nospec: Allow getting/setting on non-current task
    - proc: Provide details on speculation flaw mitigations
    - seccomp: Enable speculation flaw mitigations
    - SAUCE: x86/bugs: Honour SPEC_CTRL default
    - x86/bugs: Make boot modes __ro_after_init
    - prctl: Add force disable speculation
    - seccomp: Use PR_SPEC_FORCE_DISABLE
    - seccomp: Add filter flag to opt-out of SSB mitigation
    - seccomp: Move speculation migitation control to arch code
    - x86/speculation: Make "seccomp" the default mode for Speculative Store
      Bypass
    - x86/bugs: Rename _RDS to _SSBD
    - proc: Use underscores for SSBD in 'status'
    - Documentation/spec_ctrl: Do some minor cleanups
    - x86/bugs: Fix __ssb_select_mitigation() return type
    - x86/bugs: Make cpu_show_common() static
  * LSM Stacking prctl values should be redefined as to not collide with
    upstream prctls (LP: #1769263) // CVE-2018-3639
    - SAUCE: LSM stacking: adjust prctl values

  [ Ubuntu: 4.13.0-42.47 ]

  * linux: 4.13.0-42.47 -proposed tracker (LP: #1769993)
  * arm64: fix CONFIG_DEBUG_WX address reporting (LP: #1765850)
    - arm64: fix CONFIG_DEBUG_WX address reporting
  * HiSilicon HNS NIC names are truncated in /proc/interrupts (LP: #1765977)
    - net: hns: Avoid action name truncation
  * CVE-2017-18208
    - mm/madvise.c: fix madvise() infinite loop under special circumstances
  * CVE-2018-8822
    - staging: ncpfs: memory corruption in ncp_read_kernel()
  * CVE-2017-18203
    - dm: fix race between dm_get_from_kobject() and __dm_destroy()
  * CVE-2017-17449
    - netlink: Add netns check on taps
  * CVE-2017-17975
    - media: usbtv: prevent double free in error case
  * [8086:3e92] display becomes blank after S3 (LP: #1763271)
    - drm/i915/edp: Allow alternate fixed mode for eDP if available.
    - drm/i915/dp: rename intel_dp_is_edp to intel_dp_is_port_edp
    - drm/i915/dp: make is_edp non-static and rename to intel_dp_is_edp
    - drm/i915/edp: Do not do link training fallback or prune modes on EDP
  * sky2 gigabit ethernet driver sometimes stops working after lid-open resume
    from sleep (88E8055) (LP: #1758507)
    - sky2: Increase D3 delay to sky2 stops working after suspend
  * perf vendor events arm64: Enable JSON events for ThunderX2 B0 (LP: #1760712)
    - perf vendor events arm64: Enable JSON events for ThunderX2 B0
  * No network with e1000e driver on 4.13.0-38-generic (LP: #1762693)
    - e1000e: Fix e1000_check_for_copper_link_ich8lan return value.
  * /dev/ipmi enumeration flaky on Cavium Sabre nodes (LP: #1762812)
    - i2c: xlp9xx: return ENXIO on slave address NACK
    - i2c: xlp9xx: Handle transactions with I2C_M_RECV_LEN properly
    - i2c: xlp9xx: Check for Bus state before every transfer
    - i2c: xlp9xx: Handle NACK on DATA properly
  * "ip a" command on a guest VM shows UNKNOWN status (LP: #1761534)
    - virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS
  * fix regression in mm/hotplug, allows NVIDIA driver to work (LP: #1761104)
    - SAUCE: Fix revert "mm, memory_hotplug: do not associate hotadded memory to
      zones until online"
  * ibrs/ibpb fixes result in excessive kernel logging  (LP: #1755627)
    - SAUCE: remove ibrs_dump sysctl interface

Date: Thu, 17 May 2018 15:23:08 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Launchpad Build Daemon <buildd at lcy01-amd64-014.buildd>

-------------- next part --------------
Format: 1.8
Date: Thu, 17 May 2018 15:23:08 +0200
Source: linux-azure
Binary: linux-azure-headers-4.13.0-1018 linux-azure-tools-4.13.0-1018 linux-azure-cloud-tools-4.13.0-1018 linux-image-4.13.0-1018-azure linux-image-extra-4.13.0-1018-azure linux-headers-4.13.0-1018-azure linux-image-4.13.0-1018-azure-dbgsym linux-tools-4.13.0-1018-azure linux-cloud-tools-4.13.0-1018-azure linux-udebs-azure
Architecture: amd64 all amd64_translations
Version: 4.13.0-1018.21
Distribution: xenial
Urgency: medium
Maintainer: Launchpad Build Daemon <buildd at lcy01-amd64-014.buildd>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
 linux-azure-cloud-tools-4.13.0-1018 - Linux kernel version specific cloud tools for version 4.13.0-1018
 linux-azure-headers-4.13.0-1018 - Header files related to Linux kernel version 4.13.0
 linux-azure-tools-4.13.0-1018 - Linux kernel version specific tools for version 4.13.0-1018
 linux-cloud-tools-4.13.0-1018-azure - Linux kernel version specific cloud tools for version 4.13.0-1018
 linux-headers-4.13.0-1018-azure - Linux kernel headers for version 4.13.0 on 64 bit x86 SMP
 linux-image-4.13.0-1018-azure - Linux kernel image for version 4.13.0 on 64 bit x86 SMP
 linux-image-4.13.0-1018-azure-dbgsym - Linux kernel debug image for version 4.13.0 on 64 bit x86 SMP
 linux-image-extra-4.13.0-1018-azure - Linux kernel extra modules for version 4.13.0 on 64 bit x86 SMP
 linux-tools-4.13.0-1018-azure - Linux kernel version specific tools for version 4.13.0-1018
 linux-udebs-azure - Metapackage depending on kernel udebs (udeb)
Launchpad-Bugs-Fixed: 1755627 1758507 1760712 1761104 1761534 1762693 1762812 1763271 1765850 1765977 1769263 1769993
Changes:
 linux-azure (4.13.0-1018.21) xenial; urgency=medium
 .
   [ Ubuntu: 4.13.0-43.48 ]
 .
   * CVE-2018-3639 (powerpc)
     - SAUCE: rfi-flush: update H_CPU_* macro names to upstream
     - SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
       upstream
     - SAUCE: update pseries_setup_rfi_flush() capitalization to upstream
     - powerpc/pseries: Support firmware disable of RFI flush
     - powerpc/powernv: Support firmware disable of RFI flush
     - powerpc/64s: Allow control of RFI flush via debugfs
     - powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs code
     - powerpc/rfi-flush: Always enable fallback flush on pseries
     - powerpc/rfi-flush: Differentiate enabled and patched flush types
     - powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
     - powerpc: Add security feature flags for Spectre/Meltdown
     - powerpc/powernv: Set or clear security feature flags
     - powerpc/pseries: Set or clear security feature flags
     - powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
     - powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()
     - powerpc/pseries: Fix clearing of security feature flags
     - powerpc: Move default security feature flags
     - powerpc/pseries: Restore default security feature flags on setup
     - powerpc/64s: Add support for a store forwarding barrier at kernel entry/exit
   * CVE-2018-3639 (x86)
     - SAUCE: Add X86_FEATURE_ARCH_CAPABILITIES
     - SAUCE: x86: Add alternative_msr_write
     - x86/nospec: Simplify alternative_msr_write()
     - x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
     - x86/bugs: Concentrate bug detection into a separate function
     - x86/bugs: Concentrate bug reporting into a separate function
     - x86/msr: Add definitions for new speculation control MSRs
     - x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
     - x86/bugs, KVM: Support the combination of guest and host IBRS
     - x86/bugs: Expose /sys/../spec_store_bypass
     - x86/cpufeatures: Add X86_FEATURE_RDS
     - x86/bugs: Provide boot parameters for the spec_store_bypass_disable
       mitigation
     - x86/bugs/intel: Set proper CPU features and setup RDS
     - x86/bugs: Whitelist allowed SPEC_CTRL MSR values
     - x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
     - x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
     - x86/speculation: Create spec-ctrl.h to avoid include hell
     - prctl: Add speculation control prctls
     - x86/process: Allow runtime control of Speculative Store Bypass
     - x86/speculation: Add prctl for Speculative Store Bypass mitigation
     - nospec: Allow getting/setting on non-current task
     - proc: Provide details on speculation flaw mitigations
     - seccomp: Enable speculation flaw mitigations
     - SAUCE: x86/bugs: Honour SPEC_CTRL default
     - x86/bugs: Make boot modes __ro_after_init
     - prctl: Add force disable speculation
     - seccomp: Use PR_SPEC_FORCE_DISABLE
     - seccomp: Add filter flag to opt-out of SSB mitigation
     - seccomp: Move speculation migitation control to arch code
     - x86/speculation: Make "seccomp" the default mode for Speculative Store
       Bypass
     - x86/bugs: Rename _RDS to _SSBD
     - proc: Use underscores for SSBD in 'status'
     - Documentation/spec_ctrl: Do some minor cleanups
     - x86/bugs: Fix __ssb_select_mitigation() return type
     - x86/bugs: Make cpu_show_common() static
   * LSM Stacking prctl values should be redefined as to not collide with
     upstream prctls (LP: #1769263) // CVE-2018-3639
     - SAUCE: LSM stacking: adjust prctl values
 .
   [ Ubuntu: 4.13.0-42.47 ]
 .
   * linux: 4.13.0-42.47 -proposed tracker (LP: #1769993)
   * arm64: fix CONFIG_DEBUG_WX address reporting (LP: #1765850)
     - arm64: fix CONFIG_DEBUG_WX address reporting
   * HiSilicon HNS NIC names are truncated in /proc/interrupts (LP: #1765977)
     - net: hns: Avoid action name truncation
   * CVE-2017-18208
     - mm/madvise.c: fix madvise() infinite loop under special circumstances
   * CVE-2018-8822
     - staging: ncpfs: memory corruption in ncp_read_kernel()
   * CVE-2017-18203
     - dm: fix race between dm_get_from_kobject() and __dm_destroy()
   * CVE-2017-17449
     - netlink: Add netns check on taps
   * CVE-2017-17975
     - media: usbtv: prevent double free in error case
   * [8086:3e92] display becomes blank after S3 (LP: #1763271)
     - drm/i915/edp: Allow alternate fixed mode for eDP if available.
     - drm/i915/dp: rename intel_dp_is_edp to intel_dp_is_port_edp
     - drm/i915/dp: make is_edp non-static and rename to intel_dp_is_edp
     - drm/i915/edp: Do not do link training fallback or prune modes on EDP
   * sky2 gigabit ethernet driver sometimes stops working after lid-open resume
     from sleep (88E8055) (LP: #1758507)
     - sky2: Increase D3 delay to sky2 stops working after suspend
   * perf vendor events arm64: Enable JSON events for ThunderX2 B0 (LP: #1760712)
     - perf vendor events arm64: Enable JSON events for ThunderX2 B0
   * No network with e1000e driver on 4.13.0-38-generic (LP: #1762693)
     - e1000e: Fix e1000_check_for_copper_link_ich8lan return value.
   * /dev/ipmi enumeration flaky on Cavium Sabre nodes (LP: #1762812)
     - i2c: xlp9xx: return ENXIO on slave address NACK
     - i2c: xlp9xx: Handle transactions with I2C_M_RECV_LEN properly
     - i2c: xlp9xx: Check for Bus state before every transfer
     - i2c: xlp9xx: Handle NACK on DATA properly
   * "ip a" command on a guest VM shows UNKNOWN status (LP: #1761534)
     - virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS
   * fix regression in mm/hotplug, allows NVIDIA driver to work (LP: #1761104)
     - SAUCE: Fix revert "mm, memory_hotplug: do not associate hotadded memory to
       zones until online"
   * ibrs/ibpb fixes result in excessive kernel logging  (LP: #1755627)
     - SAUCE: remove ibrs_dump sysctl interface
Checksums-Sha1:
 cb61cffd88cbf96ea9d92ae37a61ef2fdb6fc608 846 linux-azure-cloud-tools-4.13.0-1018-dbgsym_4.13.0-1018.21_amd64.ddeb
 c0eadf482f6b22fff151eda3d75f5acfd190c8b4 36976 linux-azure-cloud-tools-4.13.0-1018_4.13.0-1018.21_amd64.deb
 211049e021d2412b427fc8d4c98cf7c592f1f292 10763818 linux-azure-headers-4.13.0-1018_4.13.0-1018.21_all.deb
 2b72a302d6ccd318d1ca458900ff2f45f9eb19c7 864 linux-azure-tools-4.13.0-1018-dbgsym_4.13.0-1018.21_amd64.ddeb
 afc7d692a75b819829bd746f74b4097bc2c009d4 962632 linux-azure-tools-4.13.0-1018_4.13.0-1018.21_amd64.deb
 bb30577603de24a8c6fa23e7b9546c0c69da85b8 6843162 linux-azure_4.13.0-1018.21_amd64.tar.gz
 512220affe2f1693641968a1bfff9ea8e3c32b8e 34220 linux-azure_4.13.0-1018.21_amd64_translations.tar.gz
 a3018197fd4385867fcf57c2c6deac1084a7c76a 1808 linux-cloud-tools-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 a3248e16de05cd15b51bca88051f8ff289adf027 532302 linux-headers-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 1eea844dcddee69e63726cce270391ff8d0eb128 312691040 linux-image-4.13.0-1018-azure-dbgsym_4.13.0-1018.21_amd64.ddeb
 a12201957d289b105222b080a930f3ce0c2be605 18536688 linux-image-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 680f4704a4bc261dcfcf6c27a5b57efd16e03f8c 9816970 linux-image-extra-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 0663170427042bebfe27bf47eb5b5479a30d9396 1888 linux-tools-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
Checksums-Sha256:
 6f3ed1c6ac4a57bb880fad1395d2ae8d82eed2baab9d1a1dbcb9e24d28e803d4 846 linux-azure-cloud-tools-4.13.0-1018-dbgsym_4.13.0-1018.21_amd64.ddeb
 46dd1d6bf40bc4a0ed8731711f16449142dbc517cde19298d387571c1a6f04a6 36976 linux-azure-cloud-tools-4.13.0-1018_4.13.0-1018.21_amd64.deb
 3dca4612006bb32abbf640f879bb9e9a06213c4fd99e6c2890d2cffb4cbe2865 10763818 linux-azure-headers-4.13.0-1018_4.13.0-1018.21_all.deb
 5783db6e081fc4853d4dfe5863b7de240dbd9aa0034baf8b277f07d00ec846e0 864 linux-azure-tools-4.13.0-1018-dbgsym_4.13.0-1018.21_amd64.ddeb
 68ab7f45015c0fc53b6ac019e0f20d2aaa67212f346ebc830153b117fdf045ac 962632 linux-azure-tools-4.13.0-1018_4.13.0-1018.21_amd64.deb
 7695968a26b15196828e2068d8bf9e2956b48280a76e7fa34bc713285cb94438 6843162 linux-azure_4.13.0-1018.21_amd64.tar.gz
 a4861e85551683edaf2c7046d1df5f2f6d9c00eb82b563c22025e679848a48a6 34220 linux-azure_4.13.0-1018.21_amd64_translations.tar.gz
 42f30bc168bfb7a918a1459e33ac0f6006bacfee9a29b6f98b4b217ce24de7cd 1808 linux-cloud-tools-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 5037710f49154c791166cb427a3dad34284a7b67ceb5ae7cf213d31697daf5e7 532302 linux-headers-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 47040bfb8802c80e9d4e4c56e96af1168e5b272fc46cb535d1bfff4d7bc26da7 312691040 linux-image-4.13.0-1018-azure-dbgsym_4.13.0-1018.21_amd64.ddeb
 ceb9b98fbf80b1359132ea7bc70c1529845dc61c9772c902c85280d62f6d5091 18536688 linux-image-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 331678d2b257b96c7584b0f62bb09f60655b05b3c954bcc9797f3be9c79987de 9816970 linux-image-extra-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 b6ce76df373f332b11f631ab68fc41fba08d2e8d20bcd24e1741532fc26eb29f 1888 linux-tools-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
Files:
 7e0d6738a3c8f293932ad1ec8371de1c 846 devel extra linux-azure-cloud-tools-4.13.0-1018-dbgsym_4.13.0-1018.21_amd64.ddeb
 48f33d535d0a3f60cb5ad2895189ce1d 36976 devel optional linux-azure-cloud-tools-4.13.0-1018_4.13.0-1018.21_amd64.deb
 d7e102e72b68865a2ade7b8e50662a1d 10763818 devel optional linux-azure-headers-4.13.0-1018_4.13.0-1018.21_all.deb
 3c2d9ef110ae71ec72754737d7981ff9 864 devel extra linux-azure-tools-4.13.0-1018-dbgsym_4.13.0-1018.21_amd64.ddeb
 5aa3728eedbb432ac132865865e501bf 962632 devel optional linux-azure-tools-4.13.0-1018_4.13.0-1018.21_amd64.deb
 5f0ecec96fd5aa07123f435d245f1fcd 6843162 raw-uefi - linux-azure_4.13.0-1018.21_amd64.tar.gz
 b332321d8c9d6404af01d4e43020710b 34220 raw-translations - linux-azure_4.13.0-1018.21_amd64_translations.tar.gz
 e2ebce0ad6435b2c0f3a5e69f2722182 1808 devel optional linux-cloud-tools-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 23bf950076a4ab4f99a0f919505d6e70 532302 devel optional linux-headers-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 181477e144d7120c34293900271f5362 312691040 devel optional linux-image-4.13.0-1018-azure-dbgsym_4.13.0-1018.21_amd64.ddeb
 8c73bc5f87b92e785c988329d85f64df 18536688 kernel optional linux-image-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 6f730ce80d3ecf5dce69b049d6032b84 9816970 kernel optional linux-image-extra-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb
 37917b9ec243c00981bd0e1aba248307 1888 devel optional linux-tools-4.13.0-1018-azure_4.13.0-1018.21_amd64.deb


More information about the Xenial-changes mailing list