This bug was fixed in the package linux-keystone - 3.13.0-67.95
--------------- linux-keystone (3.13.0-67.95) trusty; urgency=low
* Release Tracking Bug - LP: #1618090 * Miscellaneous Ubuntu changes - Rebase to Ubuntu-3.13.0-96.143
[ Ubuntu: 3.13.0-96.143 ]
* Release Tracking Bug - LP: #1618083 * CVE-2015-8767 - sctp: Prevent soft lockup when sctp_accept() is called during a timeout event * MacBookPro11,4 fails to poweroff or suspend (LP: #1587714) - SAUCE: PCI: Workaround to enable poweroff on Mac Pro 11 * 3.13: libvirtd: page allocation failure: order:4, mode:0x1040d0 (LP: #1616193) - vhost-net: extend device allocation to vmalloc - vhost-net: don't open-code kvfree * [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854) - Revert "UBUNTU: [Config] CONFIG_EFI=n for arm64" - Revert "UBUNTU: SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility" - Revert "UBUNTU: SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl" - Revert "UBUNTU: SAUCE: UEFI: Display MOKSBState when disabled" - Revert "UBUNTU: SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode" - Revert "UBUNTU: SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot" - Revert "UBUNTU: SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI" - Revert "UBUNTU: SAUCE: UEFI: Add option to automatically enforce module signatures when in Secure Boot mode" - Revert "UBUNTU: [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y" - Revert "UBUNTU: SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted" - Revert "UBUNTU: SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module loading restrictions" - Revert "UBUNTU: SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted" - Revert "UBUNTU: SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is restricted" - Revert "UBUNTU: SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading is restricted" - Revert "UBUNTU: SAUCE: UEFI: ACPI: Limit access to custom_method" - Revert "UBUNTU: SAUCE: UEFI: x86: Lock down IO port access when module security is enabled" - Revert "UBUNTU: SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled" - Revert "UBUNTU: SAUCE: UEFI: Add secure_modules() call" - Revert "x86/efi: Build our own EFI services pointer table" - Revert "efi: Add separate 32-bit/64-bit definitions" * [Hyper-V] storvsc messages for CD-ROM medium not present tray closed (LP: #1590655) - scsi: storvsc: Filter out storvsc messages CD-ROM medium not present * CVE-2016-3841 - ipv6: add complete rcu protection around np->opt
-- Ike Panhc <email address hidden> Tue, 30 Aug 2016 16:06:48 +0800
This bug was fixed in the package linux-keystone - 3.13.0-67.95
---------------
linux-keystone (3.13.0-67.95) trusty; urgency=low
* Release Tracking Bug 3.13.0- 96.143
- LP: #1618090
* Miscellaneous Ubuntu changes
- Rebase to Ubuntu-
[ Ubuntu: 3.13.0-96.143 ]
* Release Tracking Bug BOOT_SIG_ ENFORCE depend on EFI_SECURE_ BOOT_SIG_ ENFORCE= y"
- LP: #1618083
* CVE-2015-8767
- sctp: Prevent soft lockup when sctp_accept() is called during a timeout
event
* MacBookPro11,4 fails to poweroff or suspend (LP: #1587714)
- SAUCE: PCI: Workaround to enable poweroff on Mac Pro 11
* 3.13: libvirtd: page allocation failure: order:4, mode:0x1040d0
(LP: #1616193)
- vhost-net: extend device allocation to vmalloc
- vhost-net: don't open-code kvfree
* [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854)
- Revert "UBUNTU: [Config] CONFIG_EFI=n for arm64"
- Revert "UBUNTU: SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility"
- Revert "UBUNTU: SAUCE: UEFI: Add secure boot and MOK SB State disabled
sysctl"
- Revert "UBUNTU: SAUCE: UEFI: Display MOKSBState when disabled"
- Revert "UBUNTU: SAUCE: UEFI: efi: Disable secure boot if shim is in insecure
mode"
- Revert "UBUNTU: SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure
Boot"
- Revert "UBUNTU: SAUCE: UEFI: efi: Make EFI_SECURE_
EFI"
- Revert "UBUNTU: SAUCE: UEFI: Add option to automatically enforce module
signatures when in Secure Boot mode"
- Revert "UBUNTU: [Config] CONFIG_
- Revert "UBUNTU: SAUCE: UEFI: x86: Restrict MSR access when module loading is
restricted"
- Revert "UBUNTU: SAUCE: UEFI: kexec: Disable at runtime if the kernel
enforces module loading restrictions"
- Revert "UBUNTU: SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when
module loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module
loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: asus-wmi: Restrict debugfs interface when
module loading is restricted"
- Revert "UBUNTU: SAUCE: UEFI: ACPI: Limit access to custom_method"
- Revert "UBUNTU: SAUCE: UEFI: x86: Lock down IO port access when module
security is enabled"
- Revert "UBUNTU: SAUCE: UEFI: PCI: Lock down BAR access when module security
is enabled"
- Revert "UBUNTU: SAUCE: UEFI: Add secure_modules() call"
- Revert "x86/efi: Build our own EFI services pointer table"
- Revert "efi: Add separate 32-bit/64-bit definitions"
* [Hyper-V] storvsc messages for CD-ROM medium not present tray closed
(LP: #1590655)
- scsi: storvsc: Filter out storvsc messages CD-ROM medium not present
* CVE-2016-3841
- ipv6: add complete rcu protection around np->opt
-- Ike Panhc <email address hidden> Tue, 30 Aug 2016 16:06:48 +0800