[ubuntu/xenial-updates] linux-gcp_4.15.0-1032.34~16.04.1_amd64.tar.gz - (Accepted)

Stefan Bader stefan.bader at canonical.com
Tue May 14 19:12:43 UTC 2019


linux-gcp (4.15.0-1032.34~16.04.1) xenial; urgency=medium

  [ Ubuntu: 4.15.0-1032.34 ]

  * CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    - Documentation/l1tf: Fix small spelling typo
    - x86/cpu: Sanitize FAM6_ATOM naming
    - kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    - locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a
      new <linux/bits.h> file
    - tools include: Adopt linux/bits.h
    - x86/msr-index: Cleanup bit defines
    - x86/speculation: Consolidate CPU whitelists
    - x86/speculation/mds: Add basic bug infrastructure for MDS
    - x86/speculation/mds: Add BUG_MSBDS_ONLY
    - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    - x86/speculation/mds: Add mds_clear_cpu_buffers()
    - x86/speculation/mds: Clear CPU buffers on exit to user
    - x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    - x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    - x86/speculation/mds: Add mitigation control for MDS
    - x86/speculation/mds: Add sysfs reporting for MDS
    - x86/speculation/mds: Add mitigation mode VMWERV
    - Documentation: Move L1TF to separate directory
    - Documentation: Add MDS vulnerability documentation
    - x86/speculation/mds: Add mds=full,nosmt cmdline option
    - x86/speculation: Move arch_smt_update() call to after mitigation decisions
    - x86/speculation/mds: Add SMT warning message
    - x86/speculation/mds: Fix comment
    - x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    - x86/speculation/mds: Add 'mitigations=' support for MDS
  * CVE-2017-5715 // CVE-2017-5753
    - s390/speculation: Support 'mitigations=' cmdline option
  * CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    - powerpc/speculation: Support 'mitigations=' cmdline option
  * CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 //
    CVE-2018-3646
    - cpu/speculation: Add 'mitigations=' cmdline option
    - x86/speculation: Support 'mitigations=' cmdline option
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
  * linux: 4.15.0-49.53 -proposed tracker (LP: #1826358)
  * bionic: fork out linux-snapdragon into its own topic kernel (LP: #1820868)
    - [Packaging] arm64: Drop snapdragon from kernel-versions

Date: Wed, 08 May 2019 14:59:06 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Launchpad Build Daemon <buildd at lgw01-amd64-022.buildd>

-------------- next part --------------
Format: 1.8
Date: Wed, 08 May 2019 14:59:06 +0200
Source: linux-gcp
Binary: linux-gcp-headers-4.15.0-1032 linux-gcp-tools-4.15.0-1032 linux-image-unsigned-4.15.0-1032-gcp linux-modules-4.15.0-1032-gcp linux-modules-extra-4.15.0-1032-gcp linux-headers-4.15.0-1032-gcp linux-image-unsigned-4.15.0-1032-gcp-dbgsym linux-tools-4.15.0-1032-gcp linux-buildinfo-4.15.0-1032-gcp
Architecture: amd64 amd64_translations
Version: 4.15.0-1032.34~16.04.1
Distribution: xenial
Urgency: medium
Maintainer: Launchpad Build Daemon <buildd at lgw01-amd64-022.buildd>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
 linux-buildinfo-4.15.0-1032-gcp - Linux kernel buildinfo for version 4.15.0 on 64 bit x86 SMP
 linux-gcp-headers-4.15.0-1032 - Header files related to Linux kernel version 4.15.0
 linux-gcp-tools-4.15.0-1032 - Linux kernel version specific tools for version 4.15.0-1032
 linux-headers-4.15.0-1032-gcp - Linux kernel headers for version 4.15.0 on 64 bit x86 SMP
 linux-image-unsigned-4.15.0-1032-gcp - Linux kernel image for version 4.15.0 on 64 bit x86 SMP
 linux-image-unsigned-4.15.0-1032-gcp-dbgsym - Linux kernel debug image for version 4.15.0 on 64 bit x86 SMP
 linux-modules-4.15.0-1032-gcp - Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP
 linux-modules-extra-4.15.0-1032-gcp - Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP
 linux-tools-4.15.0-1032-gcp - Linux kernel version specific tools for version 4.15.0-1032
Launchpad-Bugs-Fixed: 1786013 1820868 1826358
Changes:
 linux-gcp (4.15.0-1032.34~16.04.1) xenial; urgency=medium
 .
   [ Ubuntu: 4.15.0-1032.34 ]
 .
   * CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
     - Documentation/l1tf: Fix small spelling typo
     - x86/cpu: Sanitize FAM6_ATOM naming
     - kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
     - locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a
       new <linux/bits.h> file
     - tools include: Adopt linux/bits.h
     - x86/msr-index: Cleanup bit defines
     - x86/speculation: Consolidate CPU whitelists
     - x86/speculation/mds: Add basic bug infrastructure for MDS
     - x86/speculation/mds: Add BUG_MSBDS_ONLY
     - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
     - x86/speculation/mds: Add mds_clear_cpu_buffers()
     - x86/speculation/mds: Clear CPU buffers on exit to user
     - x86/kvm/vmx: Add MDS protection when L1D Flush is not active
     - x86/speculation/mds: Conditionally clear CPU buffers on idle entry
     - x86/speculation/mds: Add mitigation control for MDS
     - x86/speculation/mds: Add sysfs reporting for MDS
     - x86/speculation/mds: Add mitigation mode VMWERV
     - Documentation: Move L1TF to separate directory
     - Documentation: Add MDS vulnerability documentation
     - x86/speculation/mds: Add mds=full,nosmt cmdline option
     - x86/speculation: Move arch_smt_update() call to after mitigation decisions
     - x86/speculation/mds: Add SMT warning message
     - x86/speculation/mds: Fix comment
     - x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
     - x86/speculation/mds: Add 'mitigations=' support for MDS
   * CVE-2017-5715 // CVE-2017-5753
     - s390/speculation: Support 'mitigations=' cmdline option
   * CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
     - powerpc/speculation: Support 'mitigations=' cmdline option
   * CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 //
     CVE-2018-3646
     - cpu/speculation: Add 'mitigations=' cmdline option
     - x86/speculation: Support 'mitigations=' cmdline option
   * Packaging resync (LP: #1786013)
     - [Packaging] resync git-ubuntu-log
   * linux: 4.15.0-49.53 -proposed tracker (LP: #1826358)
   * bionic: fork out linux-snapdragon into its own topic kernel (LP: #1820868)
     - [Packaging] arm64: Drop snapdragon from kernel-versions
Checksums-Sha1:
 da0efdc4b359c993d42da7cdd33f16c5c0777f4e 252190 linux-buildinfo-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 1efbd448324068c1180a20cc6fe358c6fc9b8e4d 11065540 linux-gcp-headers-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb
 e8a43400aca7e92e3ac3db30637de1e80f86b99c 3787164 linux-gcp-tools-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb
 a9f45a4819677753aae83d21595490f9dca351b1 7884932 linux-gcp_4.15.0-1032.34~16.04.1_amd64.tar.gz
 13ec8023277e6505a2cb27e27503c07531c0c654 24494 linux-gcp_4.15.0-1032.34~16.04.1_amd64_translations.tar.gz
 8fe4efa3454bb6564d578ba4594e27e7c912c113 1139526 linux-headers-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 7c9d10716b1bc473d2fc3ad494d1accf735bf9d4 620729588 linux-image-unsigned-4.15.0-1032-gcp-dbgsym_4.15.0-1032.34~16.04.1_amd64.ddeb
 997c70ee15b7aca9d079392eec3e23fb2b29af8d 7923564 linux-image-unsigned-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 c76afe72ec56f1fe2026770b75b6d9544cc2212b 12771190 linux-modules-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 58ebf2b4935dd95bfd7bcf281af83312e685ce6c 32404322 linux-modules-extra-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 a91112cd7f0694b6b8532fbde66a64d03b8b829c 1882 linux-tools-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
Checksums-Sha256:
 50541b575195c17a45695a3203010d28b6300e85a774a346c249b732b973306f 252190 linux-buildinfo-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 6646d1fea8a2cba050d1e575af0e50353a4901348b5f179f41ca6a0b0ffb5e7a 11065540 linux-gcp-headers-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb
 58a5d056d59329e8839bb5d30fb47866eccdb7f3a4912d75d6331912aa73dfe9 3787164 linux-gcp-tools-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb
 9c4b488813ff5c0b0667092cc227a7c471151541994c8af1d1619f6b277040da 7884932 linux-gcp_4.15.0-1032.34~16.04.1_amd64.tar.gz
 7e7df9ef199a5eff0fc4034c6c7ca4d987923f3d70117c735c890f1219870c7b 24494 linux-gcp_4.15.0-1032.34~16.04.1_amd64_translations.tar.gz
 fd4c18a2e1e2f1a016386736b685e18a0a9b099fc579e3a7545b2813e3b8b580 1139526 linux-headers-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 32f69c3ce8f22f799dee8f537e65e675a455a6eb920530cbb2a91f1ece3a1973 620729588 linux-image-unsigned-4.15.0-1032-gcp-dbgsym_4.15.0-1032.34~16.04.1_amd64.ddeb
 1637b6189a36c4080f52b6913667619e94715df971cee325a56f4e013696881b 7923564 linux-image-unsigned-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 607ed1452a1f226f709199129671cd4909c3259f5c6ba7d06c10f551a8de9909 12771190 linux-modules-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 8075e3553a0a424789cd2091af1bdaa4cdd21b254357504a5131259fc5e8a15c 32404322 linux-modules-extra-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 bd2c83f20fa7d8a783c632574e7a7ea33e61385a725eec138c3a53e0b97fb3f0 1882 linux-tools-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
Files:
 025348d705e6913e0b69e07e1c1477f8 252190 kernel optional linux-buildinfo-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 0b7e9b0726c3e5b15cc371a18a8ea529 11065540 devel optional linux-gcp-headers-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb
 d649da7a5f40acca3f991b38351308d1 3787164 devel optional linux-gcp-tools-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb
 1450e93d4a561f33deb43cf79203102e 7884932 raw-signing - linux-gcp_4.15.0-1032.34~16.04.1_amd64.tar.gz
 7f42ea41190b689d83c9bb44f0c78a2c 24494 raw-translations - linux-gcp_4.15.0-1032.34~16.04.1_amd64_translations.tar.gz
 f3ac41fba4ddf583779a92c910c66ca6 1139526 devel optional linux-headers-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 b9668905d90e92e9f34e04762b1051e8 620729588 devel optional linux-image-unsigned-4.15.0-1032-gcp-dbgsym_4.15.0-1032.34~16.04.1_amd64.ddeb
 597329868626dce1f78e9e4cebec7f04 7923564 kernel optional linux-image-unsigned-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 0479dfec9baadad4acb47709ca4a05c7 12771190 kernel optional linux-modules-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 41da2deba7a92eae56ad2754c707e0aa 32404322 kernel optional linux-modules-extra-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
 47c640b89482f4cdb7c167341a28a549 1882 devel optional linux-tools-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb


More information about the Xenial-changes mailing list