* [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854)
- Revert "UBUNTU: [Config] CONFIG_EFI=n for arm64"
- Revert "UBUNTU: SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility"
- Revert "UBUNTU: SAUCE: UEFI: Add secure boot and MOK SB State disabled
sysctl"
- Revert "UBUNTU: SAUCE: UEFI: Display MOKSBState when disabled"
- Revert "UBUNTU: SAUCE: UEFI: efi: Disable secure boot if shim is in insecure
mode"
- Revert "UBUNTU: SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure
Boot"
- Revert "UBUNTU: SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on
EFI"
- Revert "UBUNTU: SAUCE: UEFI: Add option to automatically enforce module
signatures when in Secure Boot mode"
- Revert "UBUNTU: [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y"
- Revert "UBUNTU: SAUCE: UEFI: x86: Restrict MSR access when module loading is
restricted"
- Revert "UBUNTU: SAUCE: UEFI: kexec: Disable at runtime if the kernel
enforces module loading restrictions"
- Revert "UBUNTU: SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when
module loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module
loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: asus-wmi: Restrict debugfs interface when
module loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: ACPI: Limit access to custom_method"
- Revert "UBUNTU: SAUCE: UEFI: x86: Lock down IO port access when module
security is enabled"
- Revert "UBUNTU: SAUCE: UEFI: PCI: Lock down BAR access when module security
is enabled"
- Revert "UBUNTU: SAUCE: UEFI: Add secure_modules() call"
- Revert "x86/efi: Build our own EFI services pointer table"
- Revert "efi: Add separate 32-bit/64-bit definitions"
* [Hyper-V] storvsc messages for CD-ROM medium not present tray closed
(LP: #1590655)
- scsi: storvsc: Filter out storvsc messages CD-ROM medium not present
* CVE-2016-3841
- ipv6: add complete rcu protection around np->opt
-- Kamal Mostafa <email address hidden> Tue, 16 Aug 2016 10:20:51 -0700
This bug was fixed in the package linux - 3.13.0-96.143
---------------
linux (3.13.0-96.143) trusty; urgency=low
[ Tim Gardner ]
* Release Tracking Bug
- LP: #1618083
* CVE-2015-8767
- sctp: Prevent soft lockup when sctp_accept() is called during a timeout
event
* MacBookPro11,4 fails to poweroff or suspend (LP: #1587714)
- SAUCE: PCI: Workaround to enable poweroff on Mac Pro 11
* 3.13: libvirtd: page allocation failure: order:4, mode:0x1040d0
(LP: #1616193)
- vhost-net: extend device allocation to vmalloc
- vhost-net: don't open-code kvfree
* [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854) BOOT_SIG_ ENFORCE depend on EFI_SECURE_ BOOT_SIG_ ENFORCE= y"
- Revert "UBUNTU: [Config] CONFIG_EFI=n for arm64"
- Revert "UBUNTU: SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility"
- Revert "UBUNTU: SAUCE: UEFI: Add secure boot and MOK SB State disabled
sysctl"
- Revert "UBUNTU: SAUCE: UEFI: Display MOKSBState when disabled"
- Revert "UBUNTU: SAUCE: UEFI: efi: Disable secure boot if shim is in insecure
mode"
- Revert "UBUNTU: SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure
Boot"
- Revert "UBUNTU: SAUCE: UEFI: efi: Make EFI_SECURE_
EFI"
- Revert "UBUNTU: SAUCE: UEFI: Add option to automatically enforce module
signatures when in Secure Boot mode"
- Revert "UBUNTU: [Config] CONFIG_
- Revert "UBUNTU: SAUCE: UEFI: x86: Restrict MSR access when module loading is
restricted"
- Revert "UBUNTU: SAUCE: UEFI: kexec: Disable at runtime if the kernel
enforces module loading restrictions"
- Revert "UBUNTU: SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when
module loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module
loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: asus-wmi: Restrict debugfs interface when
module loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: ACPI: Limit access to custom_method"
- Revert "UBUNTU: SAUCE: UEFI: x86: Lock down IO port access when module
security is enabled"
- Revert "UBUNTU: SAUCE: UEFI: PCI: Lock down BAR access when module security
is enabled"
- Revert "UBUNTU: SAUCE: UEFI: Add secure_modules() call"
- Revert "x86/efi: Build our own EFI services pointer table"
- Revert "efi: Add separate 32-bit/64-bit definitions"
* [Hyper-V] storvsc messages for CD-ROM medium not present tray closed
(LP: #1590655)
- scsi: storvsc: Filter out storvsc messages CD-ROM medium not present
* CVE-2016-3841
- ipv6: add complete rcu protection around np->opt
-- Kamal Mostafa <email address hidden> Tue, 16 Aug 2016 10:20:51 -0700