This bug was fixed in the package linux - 3.13.0-160.210 --------------- linux (3.13.0-160.210) trusty; urgency=medium
* CVE-2018-14633 - iscsi target: Use hex2bin instead of a re-implementation * CVE-2018-14634 - exec: Limit arg stack to at most 75% of _STK_LIM linux (3.13.0-159.209) trusty; urgency=medium * linux: 3.13.0-159.209 -proposed tracker (LP: #1791754) * L1TF mitigation not effective in some CPU and RAM combinations (LP: #1788563) // CVE-2018-3620 // CVE-2018-3646 - x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit - x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM - x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ * CVE-2018-15594 - x86/paravirt: Fix spectre-v2 mitigations for paravirt guests * i40e NIC not recognized (LP: #1789215) - SAUCE: i40e_bpo: Import the i40e driver from Xenial 4.4 - SAUCE: i40e_bpo: Add a compatibility layer - SAUCE: i40e_bpo: Don't probe for NICs supported by the in-tree driver - SAUCE: i40e_bpo: Rename the driver to i40e_bpo - SAUCE: i40e_bpo: Hook the driver into the kernel tree - [Config] Add CONFIG_I40E_BPO=m * Probable regression with EXT3 file systems and CVE-2018-1093 patches (LP: #1789131) - ext4: fix bitmap position validation * CVE-2018-3620 // CVE-2018-3646 - mm: x86 pgtable: drop unneeded preprocessor ifdef - x86/asm: Move PUD_PAGE macros to page_types.h - x86/asm: Add pud/pmd mask interfaces to handle large PAT bit - x86/asm: Fix pud/pmd interfaces to handle large PAT bit - x86/mm: Fix regression with huge pages on PAE - SAUCE: x86/speculation/l1tf: Protect NUMA hinting PTEs against speculation - Revert "UBUNTU: [Config] disable NUMA_BALANCING" * CVE-2018-15572 - x86/retpoline: Fill RSB on context switch for affected CPUs - x86/speculation: Protect against userspace-userspace spectreRSB * CVE-2018-6555 - SAUCE: irda: Only insert new objects into the global database via setsockopt * CVE-2018-6554 - SAUCE: irda: Fix memory leak caused by repeated binds of irda socket * BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119] (LP: #1788817) - drm/ast: Fixed system hanged if disable P2A * errors when scanning partition table of corrupted AIX disk (LP: #1787281) - partitions/aix: fix usage of uninitialized lv_info and lvname structures - partitions/aix: append null character to print data from disk -- Stefan Bader <stefan.ba...@canonical.com> Mon, 24 Sep 2018 19:38:31 +0200 ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14633 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14634 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15572 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15594 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3620 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3646 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6554 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6555 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1789131 Title: Probable regression with EXT3 file systems and CVE-2018-1093 patches Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: Fix Released Bug description: == SRU Justification == Mainline commit 7dac4a1726a9 introduced a regression in v4.17-rc1, which made it's way into Trusty via upstream stable updates. This regression is resolved by mainline commit 22be37acce25. This commit has been cc'd to upstream stable, but has not made it's way into Trusty as of yet. == Fix == 22be37acce25 ("ext4: fix bitmap position validation") == Regression Potential == Low. This commit has been cc'd to upstream stable, so it has had additional upstream review. == Test Case == A test kernel was built with this patch and tested by the original bug reporter. The bug reporter states the test kernel resolved the bug. A customer reported on all of their ext3 and none of their ext4 systems that the file system was in read-only mode, I believe after rebooting into 3.13.0-157.207 from 3.13.0-156.206. Here is the output of tune2fs -l for one of the file systems: tune2fs 1.42.12 (29-Aug-2014) Last mounted on: / Filesystem UUID: 748f503a-443d-4769-8dd2-45ff46b48555 Filesystem magic number: 0xEF53 Filesystem revision #: 1 (dynamic) Filesystem features: has_journal ext_attr resize_inode dir_index filetype needs_recovery sparse_super large_file Filesystem flags: signed_directory_hash Default mount options: (none) Filesystem state: clean with errors Errors behavior: Continue Filesystem OS type: Linux Inode count: 1966080 Block count: 7863296 Reserved block count: 393164 Free blocks: 4568472 Free inodes: 1440187 First block: 0 Block size: 4096 Fragment size: 4096 Reserved GDT blocks: 1022 Blocks per group: 32768 Fragments per group: 32768 Inodes per group: 8192 Inode blocks per group: 512 RAID stride: 128 RAID stripe width: 512 Filesystem created: Thu Feb 25 21:54:24 2016 Last mount time: Fri Aug 24 07:40:51 2018 Last write time: Fri Aug 24 07:40:51 2018 Mount count: 1 Maximum mount count: 25 Last checked: Fri Aug 24 07:38:54 2018 Check interval: 15552000 (6 months) Next check after: Wed Feb 20 07:38:54 2019 Lifetime writes: 7381 GB Reserved blocks uid: 0 (user root) Reserved blocks gid: 0 (group root) First inode: 11 Inode size: 256 Required extra isize: 28 Desired extra isize: 28 Journal inode: 8 Default directory hash: half_md4 Directory Hash Seed: d6564a54-cd2a-4804-ad94-1e4e0e47933a Journal backup: inode blocks FS Error count: 210 First error time: Fri Aug 24 07:40:51 2018 First error function: ext4_validate_block_bitmap First error line #: 376 First error inode #: 0 First error block #: 0 Last error time: Sun Aug 26 19:35:16 2018 Last error function: ext4_remount Last error line #: 4833 Last error inode #: 0 Last error block #: 0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1789131/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp