UbuntuUpdates.org

Package "linux"


Moved to trusty:main:security


Name: linux

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: trusty (14.04)
Level: proposed
Repository: main

Links

Save this URL for the latest version of "linux": https://www.ubuntuupdates.org/linux



Other versions of "linux" in Trusty

Repository Area Version
base main 3.13.0-24.46
security main 3.13.0-170.220
updates main 3.13.0-170.220
PPA: Canonical Kernel Team 3.13.0-91.138

Changelog

Version: *DELETED* 2019-05-16 13:07:15 UTC
Moved to trusty:main:security
No changelog for deleted or moved packages.

Version: 3.13.0-170.220 2019-05-14 19:07:21 UTC

  linux (3.13.0-170.220) trusty; urgency=medium

  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log

  * CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    - KVM: x86: pass host_initiated to functions that read MSRs
    - KVM: x86: remove data variable from kvm_get_msr_common
    - x86/cpufeature: Move some of the scattered feature bits to x86_capability
    - x86/cpufeature: Cleanup get_cpu_cap()
    - x86/cpufeature: Use enum cpuid_leafs instead of magic numbers
    - KVM: x86: remove magic number with enum cpuid_leafs
    - SAUCE: KVM/VMX: Move spec_ctrl from kvm_vcpu_arch to vcpu_vmx
    - KVM: VMX: fixes for vmentry_l1d_flush module parameter
    - perf/x86/intel: Use Intel family macros for core perf events
    - SAUCE: perf/x86/uncore: Use Intel Model name macros
    - x86/speculation: Simplify the CPU bug detection logic
    - x86/cpu: Sanitize FAM6_ATOM naming
    - kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    - bitops: avoid integer overflow in GENMASK(_ULL)
    - locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a
      new <linux/bits.h> file
    - tools include: Adopt linux/bits.h
    - x86/msr-index: Cleanup bit defines
    - x86/speculation: Consolidate CPU whitelists
    - x86/speculation/mds: Add basic bug infrastructure for MDS
    - x86/speculation/mds: Add BUG_MSBDS_ONLY
    - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    - x86/speculation/mds: Add mds_clear_cpu_buffers()
    - locking/static_keys: Provide DECLARE and well as DEFINE macros
    - include/linux/jump_label.h: expose the reference count
    - jump_label: Allow asm/jump_label.h to be included in assembly
    - jump_label: Allow jump labels to be used in assembly
    - x86/headers: Don't include asm/processor.h in asm/atomic.h
    - SAUCE: locking/static_key: Mimick the new static key API
    - x86/speculation/mds: Clear CPU buffers on exit to user
    - x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    - x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    - SAUCE: sched: Expose cpu_smt_mask()
    - SAUCE: jump_label: Introduce static_branch_{inc,dec}
    - SAUCE: sched/smt: Introduce sched_smt_{active,present}
    - SAUCE: Rename the Ubuntu-only spec_ctrl_mutex mutex
    - SAUCE: x86/speculation: Introduce arch_smt_update()
    - x86/speculation: Rework SMT state change
    - x86/speculation: Reorder the spec_v2 code
    - x86/speculation: Unify conditional spectre v2 print functions
    - x86/speculation/mds: Add mitigation control for MDS
    - x86/speculation/mds: Add sysfs reporting for MDS
    - x86/speculation/mds: Add mitigation mode VMWERV
    - Documentation: Move L1TF to separate directory
    - Documentation: Add MDS vulnerability documentation
    - x86/speculation/mds: Add mds=full,nosmt cmdline option
    - x86/speculation: Move arch_smt_update() call to after mitigation decisions
    - x86/speculation/mds: Add SMT warning message
    - x86/speculation/mds: Fix comment
    - x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    - x86/speculation/mds: Add 'mitigations=' support for MDS

  * CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    - powerpc/speculation: Support 'mitigations=' cmdline option

  * CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 //
    CVE-2018-3646
    - cpu/speculation: Add 'mitigations=' cmdline option
    - x86/speculation: Support 'mitigations=' cmdline option

  * CVE-2017-5715
    - SAUCE: Fix 'check_fpu defined but not used' compiler warning on x86_64
    - SAUCE: x86/speculation: Cleanup IBRS and IBPB runtime control handling (v2)
    - SAUCE: KVM/x86: Expose IBRS to guests
    - SAUCE: x86/speculation: Use x86_spec_ctrl_base in entry/exit code

  * CVE-2017-5715 // CVE-2018-3639
    - SAUCE: KVM/x86: Use host_initiated when accessing MSRs

 -- Stefan Bader <email address hidden> Thu, 09 May 2019 12:14:14 +0200

1786013 Packaging resync
CVE-2018-12126 MSBDS Microarchitectural Store Buffer Data Sampling
CVE-2018-12127 MLPDS Microarchitectural Load Port Data Sampling
CVE-2018-12130 MFBDS Microarchitectural Fill Buffer Data Sampling
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at
CVE-2017-5753 Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker wi
CVE-2017-5754 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at
CVE-2018-3639 Speculative Store Bypass
CVE-2018-3620 L1 Terminal Fault-OS/SMM Foreshadow-NG
CVE-2018-3646 L1 Terminal Fault-VMM

Version: *DELETED* 2019-04-25 12:07:06 UTC
Moved to trusty:main:security
No changelog for deleted or moved packages.

Version: 3.13.0-169.219 2019-04-05 10:06:43 UTC

  linux (3.13.0-169.219) trusty; urgency=medium

  * linux: 3.13.0-169.219 -proposed tracker (LP: #1822883)

  * Packaging resync (LP: #1786013)
    - [Packaging] update helper scripts
    - [Packaging] resync retpoline extraction

 -- Andrea Righi <email address hidden> Wed, 03 Apr 2019 08:57:02 +0200

1786013 Packaging resync

Version: *DELETED* 2019-04-04 06:06:35 UTC
Moved to trusty:main:security
No changelog for deleted or moved packages.



About   -   Send Feedback to @ubuntu_updates