UbuntuUpdates.org

Package "linux-gcp"

This package belongs to a PPA: Canonical Kernel Team




Name: linux-gcp

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 4.10.0
  • Header files related to Linux kernel version 4.10.0
  • Header files related to Linux kernel version 4.10.0
  • Header files related to Linux kernel version 4.10.0

Latest version: *DELETED*
Release: xenial (16.04)
Level: base
Repository: main

Links



Other versions of "linux-gcp" in Xenial

No other version of this package is available in the Xenial release.

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 4.13.0-1007.10 2018-01-12 19:08:32 UTC

 linux-gcp (4.13.0-1007.10) xenial; urgency=low
 .
   * linux-gcp: 4.13.0-1007.10 -proposed tracker (LP: #1742726)
 .
 .
   [ Ubuntu: 4.13.0-29.32 ]
 .
   * linux: 4.13.0-29.32 -proposed tracker (LP: #1742722)
   * CVE-2017-5754
     - Revert "x86/cpu: Implement CPU vulnerabilites sysfs functions"
     - Revert "sysfs/cpu: Fix typos in vulnerability documentation"
     - Revert "sysfs/cpu: Add vulnerability folder"
     - Revert "UBUNTU: [Config] updateconfigs to enable
       GENERIC_CPU_VULNERABILITIES"
 .
   [ Ubuntu: 4.13.0-28.31 ]
 .
   * CVE-2017-5753
     - SAUCE: x86/kvm: Fix stuff_RSB() for 32-bit
   * CVE-2017-5715
     - SAUCE: x86/kvm: Fix stuff_RSB() for 32-bit
 .
   [ Ubuntu: 4.13.0-27.30 ]
 .
   * CVE-2017-5753
     - locking/barriers: introduce new memory barrier gmb()
     - bpf: prevent speculative execution in eBPF interpreter
     - x86, bpf, jit: prevent speculative execution when JIT is enabled
     - uvcvideo: prevent speculative execution
     - carl9170: prevent speculative execution
     - p54: prevent speculative execution
     - qla2xxx: prevent speculative execution
     - cw1200: prevent speculative execution
     - Thermal/int340x: prevent speculative execution
     - userns: prevent speculative execution
     - ipv6: prevent speculative execution
     - fs: prevent speculative execution
     - net: mpls: prevent speculative execution
     - udf: prevent speculative execution
     - x86/feature: Enable the x86 feature to control Speculation
     - x86/feature: Report presence of IBPB and IBRS control
     - x86/enter: MACROS to set/clear IBRS and set IBPB
     - x86/enter: Use IBRS on syscall and interrupts
     - x86/idle: Disable IBRS entering idle and enable it on wakeup
     - x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup
     - x86/mm: Set IBPB upon context switch
     - x86/mm: Only set IBPB when the new thread cannot ptrace current thread
     - x86/entry: Stuff RSB for entry to kernel for non-SMEP platform
     - x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm
     - x86/kvm: Set IBPB when switching VM
     - x86/kvm: Toggle IBRS on VM entry and exit
     - x86/kvm: Pad RSB on VM transition
     - x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature
     - x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb control
     - x86/syscall: Clear unused extra registers on syscall entrance
     - x86/syscall: Clear unused extra registers on 32-bit compatible syscall
       entrance
     - x86/entry: Use retpoline for syscall's indirect calls
     - x86/cpu/AMD: Add speculative control support for AMD
     - x86/microcode: Extend post microcode reload to support IBPB feature
     - KVM: SVM: Do not intercept new speculative control MSRs
     - x86/svm: Set IBRS value on VM entry and exit
     - x86/svm: Set IBPB when running a different VCPU
     - KVM: x86: Add speculative control CPUID support for guests
     - x86/svm: Add code to clobber the RSB on VM exit
     - x86/svm: Add code to clear registers on VM exit
     - x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature
     - powerpc: add gmb barrier
     - s390/spinlock: add gmb memory barrier
     - x86/microcode/AMD: Add support for fam17h microcode loading
   * CVE-2017-5715
     - locking/barriers: introduce new memory barrier gmb()
     - bpf: prevent speculative execution in eBPF interpreter
     - x86, bpf, jit: prevent speculative execution when JIT is enabled
     - uvcvideo: prevent speculative execution
     - carl9170: prevent speculative execution
     - p54: prevent speculative execution
     - qla2xxx: prevent speculative execution
     - cw1200: prevent speculative execution
     - Thermal/int340x: prevent speculative execution
     - userns: prevent speculative execution
     - ipv6: prevent speculative execution
     - fs: prevent speculative execution
     - net: mpls: prevent speculative execution
     - udf: prevent speculative execution
     - x86/feature: Enable the x86 feature to control Speculation
     - x86/feature: Report presence of IBPB and IBRS control
     - x86/enter: MACROS to set/clear IBRS and set IBPB
     - x86/enter: Use IBRS on syscall and interrupts
     - x86/idle: Disable IBRS entering idle and enable it on wakeup
     - x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup
     - x86/mm: Set IBPB upon context switch
     - x86/mm: Only set IBPB when the new thread cannot ptrace current thread
     - x86/entry: Stuff RSB for entry to kernel for non-SMEP platform
     - x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm
     - x86/kvm: Set IBPB when switching VM
     - x86/kvm: Toggle IBRS on VM entry and exit
     - x86/kvm: Pad RSB on VM transition
     - x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature
     - x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb control
     - x86/syscall: Clear unused extra registers on syscall entrance
     - x86/syscall: Clear unused extra registers on 32-bit compatible syscall
       entrance
     - x86/entry: Use retpoline for syscall's indirect calls
     - x86/cpu/AMD: Add speculative control support for AMD
     - x86/microcode: Extend post microcode reload to support IBPB feature
     - KVM: SVM: Do not intercept new speculative control MSRs
     - x86/svm: Set IBRS value on VM entry and exit
     - x86/svm: Set IBPB when running a different VCPU
     - KVM: x86: Add speculative control CPUID support for guests
     - x86/svm: Add code to clobber the RSB on VM exit
     - x86/svm: Add code to clear registers on VM exit
     - x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature
     - powerpc: add gmb barrier
     - s390/spinlock: add gmb memory barrier
     - x86/microcode/AMD: Add support for fam17h microcode loading
   * CVE-2017-5754
     - x86/pti: Enable PTI by default
     - x86/pti: Make sure the user/kernel PTEs match
     - x86/dumpstack: Fix partial register dumps
     - x86

1742772 powerpc: flush L1D on return to use
1742771 s390: add ppa to kernel entry/exit
CVE-2017-5754 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at
CVE-2017-5753 Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker wi
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at



About   -   Send Feedback to @ubuntu_updates