Format: 1.8 Date: Fri, 06 Oct 2023 21:33:26 +0200 Source: linux-aws Binary: linux-aws-headers-6.5.0-1008 linux-aws-tools-6.5.0-1008 linux-buildinfo-6.5.0-1008-aws linux-headers-6.5.0-1008-aws linux-image-unsigned-6.5.0-1008-aws linux-modules-6.5.0-1008-aws linux-modules-extra-6.5.0-1008-aws linux-tools-6.5.0-1008-aws Built-For-Profiles: noudeb Architecture: all amd64 amd64_translations Version: 6.5.0-1008.8 Distribution: mantic Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Andrea Righi Description: linux-aws-headers-6.5.0-1008 - Header files related to Linux kernel version 6.5.0 linux-aws-tools-6.5.0-1008 - Linux kernel version specific tools for version 6.5.0-1008 linux-buildinfo-6.5.0-1008-aws - Linux kernel buildinfo for version 6.5.0 on 64 bit x86 SMP linux-headers-6.5.0-1008-aws - Linux kernel headers for version 6.5.0 on 64 bit x86 SMP linux-image-unsigned-6.5.0-1008-aws - Linux kernel image for version 6.5.0 on 64 bit x86 SMP linux-modules-6.5.0-1008-aws - Linux kernel extra modules for version 6.5.0 on 64 bit x86 SMP linux-modules-extra-6.5.0-1008-aws - Linux kernel extra modules for version 6.5.0 on 64 bit x86 SMP linux-tools-6.5.0-1008-aws - Linux kernel version specific tools for version 6.5.0-1008 Launchpad-Bugs-Fixed: 1989983 2016908 2017903 2028253 2038567 2038577 2038687 2038689 Changes: linux-aws (6.5.0-1008.8) mantic; urgency=medium . * mantic/linux-aws: 6.5.0-1008.8 -proposed tracker (LP: #2038689) . [ Ubuntu: 6.5.0-9.9 ] . * mantic/linux: 6.5.0-9.9 -proposed tracker (LP: #2038687) * update apparmor and LSM stacking patch set (LP: #2028253) - re-apply apparmor 4.0.0 * Disable restricting unprivileged change_profile by default, due to LXD latest/stable not yet compatible with this new apparmor feature (LP: #2038567) - SAUCE: apparmor: Make apparmor_restrict_unprivileged_unconfined opt-in . [ Ubuntu: 6.5.0-8.8 ] . * mantic/linux: 6.5.0-8.8 -proposed tracker (LP: #2038577) * update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [02/60]: rename SK_CTX() to aa_sock and make it an inline fn - SAUCE: apparmor3.2.0 [05/60]: Add sysctls for additional controls of unpriv userns restrictions - SAUCE: apparmor3.2.0 [08/60]: Stacking v38: LSM: Identify modules by more than name - SAUCE: apparmor3.2.0 [09/60]: Stacking v38: LSM: Add an LSM identifier for external use - SAUCE: apparmor3.2.0 [10/60]: Stacking v38: LSM: Identify the process attributes for each module - SAUCE: apparmor3.2.0 [11/60]: Stacking v38: LSM: Maintain a table of LSM attribute data - SAUCE: apparmor3.2.0 [12/60]: Stacking v38: proc: Use lsmids instead of lsm names for attrs - SAUCE: apparmor3.2.0 [13/60]: Stacking v38: integrity: disassociate ima_filter_rule from security_audit_rule - SAUCE: apparmor3.2.0 [14/60]: Stacking v38: LSM: Infrastructure management of the sock security - SAUCE: apparmor3.2.0 [15/60]: Stacking v38: LSM: Add the lsmblob data structure. - SAUCE: apparmor3.2.0 [16/60]: Stacking v38: LSM: provide lsm name and id slot mappings - SAUCE: apparmor3.2.0 [17/60]: Stacking v38: IMA: avoid label collisions with stacked LSMs - SAUCE: apparmor3.2.0 [18/60]: Stacking v38: LSM: Use lsmblob in security_audit_rule_match - SAUCE: apparmor3.2.0 [19/60]: Stacking v38: LSM: Use lsmblob in security_kernel_act_as - SAUCE: apparmor3.2.0 [20/60]: Stacking v38: LSM: Use lsmblob in security_secctx_to_secid - SAUCE: apparmor3.2.0 [21/60]: Stacking v38: LSM: Use lsmblob in security_secid_to_secctx - SAUCE: apparmor3.2.0 [22/60]: Stacking v38: LSM: Use lsmblob in security_ipc_getsecid - SAUCE: apparmor3.2.0 [23/60]: Stacking v38: LSM: Use lsmblob in security_current_getsecid - SAUCE: apparmor3.2.0 [24/60]: Stacking v38: LSM: Use lsmblob in security_inode_getsecid - SAUCE: apparmor3.2.0 [25/60]: Stacking v38: LSM: Use lsmblob in security_cred_getsecid - SAUCE: apparmor3.2.0 [26/60]: Stacking v38: LSM: Specify which LSM to display - SAUCE: apparmor3.2.0 [28/60]: Stacking v38: LSM: Ensure the correct LSM context releaser - SAUCE: apparmor3.2.0 [29/60]: Stacking v38: LSM: Use lsmcontext in security_secid_to_secctx - SAUCE: apparmor3.2.0 [30/60]: Stacking v38: LSM: Use lsmcontext in security_inode_getsecctx - SAUCE: apparmor3.2.0 [31/60]: Stacking v38: Use lsmcontext in security_dentry_init_security - SAUCE: apparmor3.2.0 [32/60]: Stacking v38: LSM: security_secid_to_secctx in netlink netfilter - SAUCE: apparmor3.2.0 [33/60]: Stacking v38: NET: Store LSM netlabel data in a lsmblob - SAUCE: apparmor3.2.0 [34/60]: Stacking v38: binder: Pass LSM identifier for confirmation - SAUCE: apparmor3.2.0 [35/60]: Stacking v38: LSM: security_secid_to_secctx module selection - SAUCE: apparmor3.2.0 [36/60]: Stacking v38: Audit: Keep multiple LSM data in audit_names - SAUCE: apparmor3.2.0 [37/60]: Stacking v38: Audit: Create audit_stamp structure - SAUCE: apparmor3.2.0 [38/60]: Stacking v38: LSM: Add a function to report multiple LSMs - SAUCE: apparmor3.2.0 [39/60]: Stacking v38: Audit: Allow multiple records in an audit_buffer - SAUCE: apparmor3.2.0 [40/60]: Stacking v38: Audit: Add record for multiple task security contexts - SAUCE: apparmor3.2.0 [41/60]: Stacking v38: audit: multiple subject lsm values for netlabel - SAUCE: apparmor3.2.0 [42/60]: Stacking v38: Audit: Add record for multiple object contexts - SAUCE: apparmor3.2.0 [43/60]: Stacking v38: netlabel: Use a struct lsmblob in audit data - SAUCE: apparmor3.2.0 [44/60]: Stacking v38: LSM: Removed scaffolding function lsmcontext_init - SAUCE: apparmor3.2.0 [45/60]: Stacking v38: AppArmor: Remove the exclusive flag - SAUCE: apparmor3.2.0 [46/60]: combine common_audit_data and apparmor_audit_data - SAUCE: apparmor3.2.0 [47/60]: setup slab cache for audit data - SAUCE: apparmor3.2.0 [48/60]: rename audit_data->label to audit_data->subj_label - SAUCE: apparmor3.2.0 [49/60]: pass cred through to audit info. - SAUCE: apparmor3.2.0 [50/60]: Improve debug print infrastructure - SAUCE: apparmor3.2.0 [51/60]: add the ability for profiles to have a learning cache - SAUCE: apparmor3.2.0 [52/60]: enable userspace upcall for mediation - SAUCE: apparmor3.2.0 [53/60]: cache buffers on percpu list if there is lock contention - SAUCE: apparmor3.2.0 [55/60]: advertise availability of exended perms - SAUCE: apparmor3.2.0 [60/60]: [Config] enable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS * LSM stacking and AppArmor for 6.2: additional fixes (LP: #2017903) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [57/60]: fix profile verification and enable it * udev fails to make prctl() syscall with apparmor=0 (as used by maas by default) (LP: #2016908) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [27/60]: Stacking v38: Fix prctl() syscall with apparmor=0 * kinetic: apply new apparmor and LSM stacking patch set (LP: #1989983) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [01/60]: add/use fns to print hash string hex value - SAUCE: apparmor3.2.0 [03/60]: patch to provide compatibility with v2.x net rules - SAUCE: apparmor3.2.0 [04/60]: add user namespace creation mediation - SAUCE: apparmor3.2.0 [06/60]: af_unix mediation - SAUCE: apparmor3.2.0 [07/60]: Add fine grained mediation of posix mqueues Checksums-Sha1: 726e0efaa4f3915f69eda3ee853286053b308c9b 13200874 linux-aws-headers-6.5.0-1008_6.5.0-1008.8_all.deb ff5ddb17c8ed17c811097c9263ee84d79010a66e 7598358 linux-aws-tools-6.5.0-1008_6.5.0-1008.8_amd64.deb b286fa4a9694e374a178bbf07fea41a6d8260ce1 19048 linux-aws_6.5.0-1008.8_amd64.buildinfo e35b960c2eafcbb28d3d39cde1173aeab74b37ce 47267 linux-aws_6.5.0-1008.8_amd64_translations.tar.gz 4f02e46d6667025e5e3fd58e7cf40dde1191e323 459498 linux-buildinfo-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb fe9ada7cab11a47d36707db46b16f40df5078f99 3334406 linux-headers-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 5c85ad5c201a73f4f52775838be8624924cca46e 1436620072 linux-image-unsigned-6.5.0-1008-aws-dbgsym_6.5.0-1008.8_amd64.ddeb 7df101b15b703621026140ad6130f918569f2181 14233792 linux-image-unsigned-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 8b7d516a8f3e4928a6baef22ce93c74e8db23799 36341952 linux-modules-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 82b280e7201f6700daa66672ab399750d1da9837 93245632 linux-modules-extra-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 751e18f85a576b008534dfd8b5bd1df1a062b055 1782 linux-tools-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb Checksums-Sha256: ad207230ec2812f732d5576df0bde470895e0fef03e2dce4981c623c37e77412 13200874 linux-aws-headers-6.5.0-1008_6.5.0-1008.8_all.deb 1a1d09dc7b72fbbf4703fea542ff25f11534a965b463cd99baf9fd2ad272e576 7598358 linux-aws-tools-6.5.0-1008_6.5.0-1008.8_amd64.deb c13261c7066a3c60ab80fa805b07313b9446ef843e48ac6b62c95e99303aead9 19048 linux-aws_6.5.0-1008.8_amd64.buildinfo 0d85bfe24a3819ef45ed8a43e2a8ad9b917751aec338c982fefc1e99eaebdd94 47267 linux-aws_6.5.0-1008.8_amd64_translations.tar.gz 89efd33332f59466bf78ef7c04bfc09a814d2f8e881df7d8f7968a76b314af79 459498 linux-buildinfo-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 5223a97ef1ebfa36aea8182720ac23af0d6fe14fb3162394d73c2a665457bf28 3334406 linux-headers-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 1288882c953a1e4bb4020ca780d6238f80b7a8a5bbd5b982b9b6f64c067af22f 1436620072 linux-image-unsigned-6.5.0-1008-aws-dbgsym_6.5.0-1008.8_amd64.ddeb ca550bef71344e1da8c42abb11f01c5432f928ab0565bdf9b5c750573ecc462a 14233792 linux-image-unsigned-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 86d46afa0bb4b19f19f3252bc0f1eed5bb03a8abeaf5ca827a9206d1366f1ad6 36341952 linux-modules-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb fcb3f15ae0f3f0bc81756d0499e0e4ece76239756ec7326773883633c1319c2a 93245632 linux-modules-extra-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 618932d81bf3f93198f22c4b90cbd767ae203f6fcc64ffb4a7c421eca592b5a8 1782 linux-tools-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb Files: afb4e989e575005a63f79f5100afc022 13200874 devel optional linux-aws-headers-6.5.0-1008_6.5.0-1008.8_all.deb fce26fe9a29a52381ac74f26334de6d0 7598358 devel optional linux-aws-tools-6.5.0-1008_6.5.0-1008.8_amd64.deb 6ba6a68fbd529e9bf31296fcc2bf89a8 19048 devel optional linux-aws_6.5.0-1008.8_amd64.buildinfo a532128091dd4e396be23a72d8851e9b 47267 raw-translations - linux-aws_6.5.0-1008.8_amd64_translations.tar.gz f67aaab6b218c7ca6ba4e1dae4f2c1cf 459498 kernel optional linux-buildinfo-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb f3d68e8256cccab64e6e8c90ea338bb6 3334406 devel optional linux-headers-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 4b9b978f4ad46a8f9e7d18f7104f5c84 1436620072 devel optional linux-image-unsigned-6.5.0-1008-aws-dbgsym_6.5.0-1008.8_amd64.ddeb 15b4042ef4f6a91c6802163c51a64a33 14233792 kernel optional linux-image-unsigned-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb c8d5837645422d840c37375b0f80bb95 36341952 kernel optional linux-modules-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 48d33722d3120291b5486c6e12d8988f 93245632 kernel optional linux-modules-extra-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb 0e8f25a62c6efabe5d27a38f86b2c5a4 1782 devel optional linux-tools-6.5.0-1008-aws_6.5.0-1008.8_amd64.deb Ubuntu-Compatible-Signing: ubuntu/4 pro/3