linux-gcp (4.15.0-1032.34~16.04.1) xenial; urgency=medium [ Ubuntu: 4.15.0-1032.34 ]
* CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130 - Documentation/l1tf: Fix small spelling typo - x86/cpu: Sanitize FAM6_ATOM naming - kvm: x86: Report STIBP on GET_SUPPORTED_CPUID - locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file - tools include: Adopt linux/bits.h - x86/msr-index: Cleanup bit defines - x86/speculation: Consolidate CPU whitelists - x86/speculation/mds: Add basic bug infrastructure for MDS - x86/speculation/mds: Add BUG_MSBDS_ONLY - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests - x86/speculation/mds: Add mds_clear_cpu_buffers() - x86/speculation/mds: Clear CPU buffers on exit to user - x86/kvm/vmx: Add MDS protection when L1D Flush is not active - x86/speculation/mds: Conditionally clear CPU buffers on idle entry - x86/speculation/mds: Add mitigation control for MDS - x86/speculation/mds: Add sysfs reporting for MDS - x86/speculation/mds: Add mitigation mode VMWERV - Documentation: Move L1TF to separate directory - Documentation: Add MDS vulnerability documentation - x86/speculation/mds: Add mds=full,nosmt cmdline option - x86/speculation: Move arch_smt_update() call to after mitigation decisions - x86/speculation/mds: Add SMT warning message - x86/speculation/mds: Fix comment - x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off - x86/speculation/mds: Add 'mitigations=' support for MDS * CVE-2017-5715 // CVE-2017-5753 - s390/speculation: Support 'mitigations=' cmdline option * CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639 - powerpc/speculation: Support 'mitigations=' cmdline option * CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646 - cpu/speculation: Add 'mitigations=' cmdline option - x86/speculation: Support 'mitigations=' cmdline option * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log * linux: 4.15.0-49.53 -proposed tracker (LP: #1826358) * bionic: fork out linux-snapdragon into its own topic kernel (LP: #1820868) - [Packaging] arm64: Drop snapdragon from kernel-versions Date: Wed, 08 May 2019 14:59:06 +0200 Changed-By: Stefan Bader <stefan.ba...@canonical.com> Maintainer: Launchpad Build Daemon <buildd@lgw01-amd64-022.buildd>
Format: 1.8 Date: Wed, 08 May 2019 14:59:06 +0200 Source: linux-gcp Binary: linux-gcp-headers-4.15.0-1032 linux-gcp-tools-4.15.0-1032 linux-image-unsigned-4.15.0-1032-gcp linux-modules-4.15.0-1032-gcp linux-modules-extra-4.15.0-1032-gcp linux-headers-4.15.0-1032-gcp linux-image-unsigned-4.15.0-1032-gcp-dbgsym linux-tools-4.15.0-1032-gcp linux-buildinfo-4.15.0-1032-gcp Architecture: amd64 amd64_translations Version: 4.15.0-1032.34~16.04.1 Distribution: xenial Urgency: medium Maintainer: Launchpad Build Daemon <buildd@lgw01-amd64-022.buildd> Changed-By: Stefan Bader <stefan.ba...@canonical.com> Description: linux-buildinfo-4.15.0-1032-gcp - Linux kernel buildinfo for version 4.15.0 on 64 bit x86 SMP linux-gcp-headers-4.15.0-1032 - Header files related to Linux kernel version 4.15.0 linux-gcp-tools-4.15.0-1032 - Linux kernel version specific tools for version 4.15.0-1032 linux-headers-4.15.0-1032-gcp - Linux kernel headers for version 4.15.0 on 64 bit x86 SMP linux-image-unsigned-4.15.0-1032-gcp - Linux kernel image for version 4.15.0 on 64 bit x86 SMP linux-image-unsigned-4.15.0-1032-gcp-dbgsym - Linux kernel debug image for version 4.15.0 on 64 bit x86 SMP linux-modules-4.15.0-1032-gcp - Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP linux-modules-extra-4.15.0-1032-gcp - Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP linux-tools-4.15.0-1032-gcp - Linux kernel version specific tools for version 4.15.0-1032 Launchpad-Bugs-Fixed: 1786013 1820868 1826358 Changes: linux-gcp (4.15.0-1032.34~16.04.1) xenial; urgency=medium . [ Ubuntu: 4.15.0-1032.34 ] . * CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130 - Documentation/l1tf: Fix small spelling typo - x86/cpu: Sanitize FAM6_ATOM naming - kvm: x86: Report STIBP on GET_SUPPORTED_CPUID - locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file - tools include: Adopt linux/bits.h - x86/msr-index: Cleanup bit defines - x86/speculation: Consolidate CPU whitelists - x86/speculation/mds: Add basic bug infrastructure for MDS - x86/speculation/mds: Add BUG_MSBDS_ONLY - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests - x86/speculation/mds: Add mds_clear_cpu_buffers() - x86/speculation/mds: Clear CPU buffers on exit to user - x86/kvm/vmx: Add MDS protection when L1D Flush is not active - x86/speculation/mds: Conditionally clear CPU buffers on idle entry - x86/speculation/mds: Add mitigation control for MDS - x86/speculation/mds: Add sysfs reporting for MDS - x86/speculation/mds: Add mitigation mode VMWERV - Documentation: Move L1TF to separate directory - Documentation: Add MDS vulnerability documentation - x86/speculation/mds: Add mds=full,nosmt cmdline option - x86/speculation: Move arch_smt_update() call to after mitigation decisions - x86/speculation/mds: Add SMT warning message - x86/speculation/mds: Fix comment - x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off - x86/speculation/mds: Add 'mitigations=' support for MDS * CVE-2017-5715 // CVE-2017-5753 - s390/speculation: Support 'mitigations=' cmdline option * CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639 - powerpc/speculation: Support 'mitigations=' cmdline option * CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646 - cpu/speculation: Add 'mitigations=' cmdline option - x86/speculation: Support 'mitigations=' cmdline option * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log * linux: 4.15.0-49.53 -proposed tracker (LP: #1826358) * bionic: fork out linux-snapdragon into its own topic kernel (LP: #1820868) - [Packaging] arm64: Drop snapdragon from kernel-versions Checksums-Sha1: da0efdc4b359c993d42da7cdd33f16c5c0777f4e 252190 linux-buildinfo-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 1efbd448324068c1180a20cc6fe358c6fc9b8e4d 11065540 linux-gcp-headers-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb e8a43400aca7e92e3ac3db30637de1e80f86b99c 3787164 linux-gcp-tools-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb a9f45a4819677753aae83d21595490f9dca351b1 7884932 linux-gcp_4.15.0-1032.34~16.04.1_amd64.tar.gz 13ec8023277e6505a2cb27e27503c07531c0c654 24494 linux-gcp_4.15.0-1032.34~16.04.1_amd64_translations.tar.gz 8fe4efa3454bb6564d578ba4594e27e7c912c113 1139526 linux-headers-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 7c9d10716b1bc473d2fc3ad494d1accf735bf9d4 620729588 linux-image-unsigned-4.15.0-1032-gcp-dbgsym_4.15.0-1032.34~16.04.1_amd64.ddeb 997c70ee15b7aca9d079392eec3e23fb2b29af8d 7923564 linux-image-unsigned-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb c76afe72ec56f1fe2026770b75b6d9544cc2212b 12771190 linux-modules-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 58ebf2b4935dd95bfd7bcf281af83312e685ce6c 32404322 linux-modules-extra-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb a91112cd7f0694b6b8532fbde66a64d03b8b829c 1882 linux-tools-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb Checksums-Sha256: 50541b575195c17a45695a3203010d28b6300e85a774a346c249b732b973306f 252190 linux-buildinfo-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 6646d1fea8a2cba050d1e575af0e50353a4901348b5f179f41ca6a0b0ffb5e7a 11065540 linux-gcp-headers-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb 58a5d056d59329e8839bb5d30fb47866eccdb7f3a4912d75d6331912aa73dfe9 3787164 linux-gcp-tools-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb 9c4b488813ff5c0b0667092cc227a7c471151541994c8af1d1619f6b277040da 7884932 linux-gcp_4.15.0-1032.34~16.04.1_amd64.tar.gz 7e7df9ef199a5eff0fc4034c6c7ca4d987923f3d70117c735c890f1219870c7b 24494 linux-gcp_4.15.0-1032.34~16.04.1_amd64_translations.tar.gz fd4c18a2e1e2f1a016386736b685e18a0a9b099fc579e3a7545b2813e3b8b580 1139526 linux-headers-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 32f69c3ce8f22f799dee8f537e65e675a455a6eb920530cbb2a91f1ece3a1973 620729588 linux-image-unsigned-4.15.0-1032-gcp-dbgsym_4.15.0-1032.34~16.04.1_amd64.ddeb 1637b6189a36c4080f52b6913667619e94715df971cee325a56f4e013696881b 7923564 linux-image-unsigned-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 607ed1452a1f226f709199129671cd4909c3259f5c6ba7d06c10f551a8de9909 12771190 linux-modules-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 8075e3553a0a424789cd2091af1bdaa4cdd21b254357504a5131259fc5e8a15c 32404322 linux-modules-extra-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb bd2c83f20fa7d8a783c632574e7a7ea33e61385a725eec138c3a53e0b97fb3f0 1882 linux-tools-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb Files: 025348d705e6913e0b69e07e1c1477f8 252190 kernel optional linux-buildinfo-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 0b7e9b0726c3e5b15cc371a18a8ea529 11065540 devel optional linux-gcp-headers-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb d649da7a5f40acca3f991b38351308d1 3787164 devel optional linux-gcp-tools-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb 1450e93d4a561f33deb43cf79203102e 7884932 raw-signing - linux-gcp_4.15.0-1032.34~16.04.1_amd64.tar.gz 7f42ea41190b689d83c9bb44f0c78a2c 24494 raw-translations - linux-gcp_4.15.0-1032.34~16.04.1_amd64_translations.tar.gz f3ac41fba4ddf583779a92c910c66ca6 1139526 devel optional linux-headers-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb b9668905d90e92e9f34e04762b1051e8 620729588 devel optional linux-image-unsigned-4.15.0-1032-gcp-dbgsym_4.15.0-1032.34~16.04.1_amd64.ddeb 597329868626dce1f78e9e4cebec7f04 7923564 kernel optional linux-image-unsigned-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 0479dfec9baadad4acb47709ca4a05c7 12771190 kernel optional linux-modules-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 41da2deba7a92eae56ad2754c707e0aa 32404322 kernel optional linux-modules-extra-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb 47c640b89482f4cdb7c167341a28a549 1882 devel optional linux-tools-4.15.0-1032-gcp_4.15.0-1032.34~16.04.1_amd64.deb
-- Xenial-changes mailing list Xenial-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/xenial-changes