Format: 1.8 Date: Sun, 08 Oct 2023 08:39:57 +0200 Source: linux-raspi Binary: linux-buildinfo-6.5.0-1005-raspi linux-headers-6.5.0-1005-raspi linux-image-6.5.0-1005-raspi linux-modules-6.5.0-1005-raspi linux-modules-extra-6.5.0-1005-raspi linux-raspi-headers-6.5.0-1005 linux-raspi-tools-6.5.0-1005 linux-tools-6.5.0-1005-raspi Built-For-Profiles: noudeb Architecture: armhf armhf_translations Version: 6.5.0-1005.7 Distribution: mantic Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Juerg Haefliger Description: linux-buildinfo-6.5.0-1005-raspi - Linux kernel buildinfo for version 6.5.0 on ARM (hard float) SMP linux-headers-6.5.0-1005-raspi - Linux kernel headers for version 6.5.0 on ARM (hard float) SMP linux-image-6.5.0-1005-raspi - Linux kernel image for version 6.5.0 on ARM (hard float) SMP linux-modules-6.5.0-1005-raspi - Linux kernel extra modules for version 6.5.0 on ARM (hard float) linux-modules-extra-6.5.0-1005-raspi - Linux kernel extra modules for version 6.5.0 on ARM (hard float) linux-raspi-headers-6.5.0-1005 - Header files related to Linux kernel version 6.5.0 linux-raspi-tools-6.5.0-1005 - Linux kernel version specific tools for version 6.5.0-1005 linux-tools-6.5.0-1005-raspi - Linux kernel version specific tools for version 6.5.0-1005 Launchpad-Bugs-Fixed: 1989983 2016908 2017903 2028253 2038567 2038577 2038687 2038702 Changes: linux-raspi (6.5.0-1005.7) mantic; urgency=medium . * mantic/linux-raspi: 6.5.0-1005.7 -proposed tracker (LP: #2038702) . [ Ubuntu: 6.5.0-9.9 ] . * mantic/linux: 6.5.0-9.9 -proposed tracker (LP: #2038687) * update apparmor and LSM stacking patch set (LP: #2028253) - re-apply apparmor 4.0.0 * Disable restricting unprivileged change_profile by default, due to LXD latest/stable not yet compatible with this new apparmor feature (LP: #2038567) - SAUCE: apparmor: Make apparmor_restrict_unprivileged_unconfined opt-in . [ Ubuntu: 6.5.0-8.8 ] . * mantic/linux: 6.5.0-8.8 -proposed tracker (LP: #2038577) * update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [02/60]: rename SK_CTX() to aa_sock and make it an inline fn - SAUCE: apparmor3.2.0 [05/60]: Add sysctls for additional controls of unpriv userns restrictions - SAUCE: apparmor3.2.0 [08/60]: Stacking v38: LSM: Identify modules by more than name - SAUCE: apparmor3.2.0 [09/60]: Stacking v38: LSM: Add an LSM identifier for external use - SAUCE: apparmor3.2.0 [10/60]: Stacking v38: LSM: Identify the process attributes for each module - SAUCE: apparmor3.2.0 [11/60]: Stacking v38: LSM: Maintain a table of LSM attribute data - SAUCE: apparmor3.2.0 [12/60]: Stacking v38: proc: Use lsmids instead of lsm names for attrs - SAUCE: apparmor3.2.0 [13/60]: Stacking v38: integrity: disassociate ima_filter_rule from security_audit_rule - SAUCE: apparmor3.2.0 [14/60]: Stacking v38: LSM: Infrastructure management of the sock security - SAUCE: apparmor3.2.0 [15/60]: Stacking v38: LSM: Add the lsmblob data structure. - SAUCE: apparmor3.2.0 [16/60]: Stacking v38: LSM: provide lsm name and id slot mappings - SAUCE: apparmor3.2.0 [17/60]: Stacking v38: IMA: avoid label collisions with stacked LSMs - SAUCE: apparmor3.2.0 [18/60]: Stacking v38: LSM: Use lsmblob in security_audit_rule_match - SAUCE: apparmor3.2.0 [19/60]: Stacking v38: LSM: Use lsmblob in security_kernel_act_as - SAUCE: apparmor3.2.0 [20/60]: Stacking v38: LSM: Use lsmblob in security_secctx_to_secid - SAUCE: apparmor3.2.0 [21/60]: Stacking v38: LSM: Use lsmblob in security_secid_to_secctx - SAUCE: apparmor3.2.0 [22/60]: Stacking v38: LSM: Use lsmblob in security_ipc_getsecid - SAUCE: apparmor3.2.0 [23/60]: Stacking v38: LSM: Use lsmblob in security_current_getsecid - SAUCE: apparmor3.2.0 [24/60]: Stacking v38: LSM: Use lsmblob in security_inode_getsecid - SAUCE: apparmor3.2.0 [25/60]: Stacking v38: LSM: Use lsmblob in security_cred_getsecid - SAUCE: apparmor3.2.0 [26/60]: Stacking v38: LSM: Specify which LSM to display - SAUCE: apparmor3.2.0 [28/60]: Stacking v38: LSM: Ensure the correct LSM context releaser - SAUCE: apparmor3.2.0 [29/60]: Stacking v38: LSM: Use lsmcontext in security_secid_to_secctx - SAUCE: apparmor3.2.0 [30/60]: Stacking v38: LSM: Use lsmcontext in security_inode_getsecctx - SAUCE: apparmor3.2.0 [31/60]: Stacking v38: Use lsmcontext in security_dentry_init_security - SAUCE: apparmor3.2.0 [32/60]: Stacking v38: LSM: security_secid_to_secctx in netlink netfilter - SAUCE: apparmor3.2.0 [33/60]: Stacking v38: NET: Store LSM netlabel data in a lsmblob - SAUCE: apparmor3.2.0 [34/60]: Stacking v38: binder: Pass LSM identifier for confirmation - SAUCE: apparmor3.2.0 [35/60]: Stacking v38: LSM: security_secid_to_secctx module selection - SAUCE: apparmor3.2.0 [36/60]: Stacking v38: Audit: Keep multiple LSM data in audit_names - SAUCE: apparmor3.2.0 [37/60]: Stacking v38: Audit: Create audit_stamp structure - SAUCE: apparmor3.2.0 [38/60]: Stacking v38: LSM: Add a function to report multiple LSMs - SAUCE: apparmor3.2.0 [39/60]: Stacking v38: Audit: Allow multiple records in an audit_buffer - SAUCE: apparmor3.2.0 [40/60]: Stacking v38: Audit: Add record for multiple task security contexts - SAUCE: apparmor3.2.0 [41/60]: Stacking v38: audit: multiple subject lsm values for netlabel - SAUCE: apparmor3.2.0 [42/60]: Stacking v38: Audit: Add record for multiple object contexts - SAUCE: apparmor3.2.0 [43/60]: Stacking v38: netlabel: Use a struct lsmblob in audit data - SAUCE: apparmor3.2.0 [44/60]: Stacking v38: LSM: Removed scaffolding function lsmcontext_init - SAUCE: apparmor3.2.0 [45/60]: Stacking v38: AppArmor: Remove the exclusive flag - SAUCE: apparmor3.2.0 [46/60]: combine common_audit_data and apparmor_audit_data - SAUCE: apparmor3.2.0 [47/60]: setup slab cache for audit data - SAUCE: apparmor3.2.0 [48/60]: rename audit_data->label to audit_data->subj_label - SAUCE: apparmor3.2.0 [49/60]: pass cred through to audit info. - SAUCE: apparmor3.2.0 [50/60]: Improve debug print infrastructure - SAUCE: apparmor3.2.0 [51/60]: add the ability for profiles to have a learning cache - SAUCE: apparmor3.2.0 [52/60]: enable userspace upcall for mediation - SAUCE: apparmor3.2.0 [53/60]: cache buffers on percpu list if there is lock contention - SAUCE: apparmor3.2.0 [55/60]: advertise availability of exended perms - SAUCE: apparmor3.2.0 [60/60]: [Config] enable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS * LSM stacking and AppArmor for 6.2: additional fixes (LP: #2017903) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [57/60]: fix profile verification and enable it * udev fails to make prctl() syscall with apparmor=0 (as used by maas by default) (LP: #2016908) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [27/60]: Stacking v38: Fix prctl() syscall with apparmor=0 * kinetic: apply new apparmor and LSM stacking patch set (LP: #1989983) // update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor3.2.0 [01/60]: add/use fns to print hash string hex value - SAUCE: apparmor3.2.0 [03/60]: patch to provide compatibility with v2.x net rules - SAUCE: apparmor3.2.0 [04/60]: add user namespace creation mediation - SAUCE: apparmor3.2.0 [06/60]: af_unix mediation - SAUCE: apparmor3.2.0 [07/60]: Add fine grained mediation of posix mqueues Checksums-Sha1: 108fc125365f7f4599eebb9694872bb09c43f8e9 470550 linux-buildinfo-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb ad2ec3dc2cc17bd1cccf73c1d5adc5fbbf47155a 1028956 linux-headers-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb be7acab523b3c609bc2492ca8ce299d4702449bf 1083900096 linux-image-6.5.0-1005-raspi-dbgsym_6.5.0-1005.7_armhf.ddeb 0708e3cc5002660a1bc96948e5c132330c939049 8724672 linux-image-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb 15270bf630103f5c0e5867b8046eae106b151d85 55234752 linux-modules-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb a885b33bec7ee1b3d8d58dd6837ec200b2b43451 24955072 linux-modules-extra-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb edd95b4d73db1cf73e62de981cbb7dda8156ef66 13266498 linux-raspi-headers-6.5.0-1005_6.5.0-1005.7_armhf.deb 7bf79aa72359f1f045ac01df51fc996c1ea7ede8 6785156 linux-raspi-tools-6.5.0-1005_6.5.0-1005.7_armhf.deb 85c826a3ffdfc4ff1b09c0b9831988e87cd56eaa 17521 linux-raspi_6.5.0-1005.7_armhf.buildinfo 013d94a2abc48af7e06d63ecaff8e878e5cf6962 68522 linux-raspi_6.5.0-1005.7_armhf_translations.tar.gz a391b03713972a2616a791862a3794147e7a97aa 1706 linux-tools-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb Checksums-Sha256: be61d9566173a72cf4a090b23a953750f62d381116f1bb74b9a3fd935532a2c0 470550 linux-buildinfo-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb b6e29b924361c202b8af62407115f0dd7867ff4cd2e7f771fc3de9c3aed84187 1028956 linux-headers-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb 37c166d0689f61e0c4417b35efad76cfd2d4023b6181b05287d2a637ccb001f1 1083900096 linux-image-6.5.0-1005-raspi-dbgsym_6.5.0-1005.7_armhf.ddeb a27f994795f01f15e1ddf1df3fe72beb8f355fe24b0956849091f3c43e59f07b 8724672 linux-image-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb 39e8cf5d8a404866bc5ffb95f1346985dadebbc2db25f438ae682ead1d93f9ea 55234752 linux-modules-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb f236fd4899963393e37e90dc92ac5ad6e7b54585df728420bd5f689e1f0846ef 24955072 linux-modules-extra-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb efc761d8dbe6ed18fc0369d3230453bb5d777efc995f8c9b521265b95082403a 13266498 linux-raspi-headers-6.5.0-1005_6.5.0-1005.7_armhf.deb 4925c05f6e632682e9088120db2118e4d927b9cb98b8c72376ad853fbddd11cf 6785156 linux-raspi-tools-6.5.0-1005_6.5.0-1005.7_armhf.deb 899a85f3aeb736f791eccba42c8e4fc97369ede256029aee8f0fa945827f149c 17521 linux-raspi_6.5.0-1005.7_armhf.buildinfo 3bfb2d2894326caf1aa2b3f4661453ecbea72c362491b355ea4ca62446343940 68522 linux-raspi_6.5.0-1005.7_armhf_translations.tar.gz 6ee0d1a2b730c9fb50d51b864ef1389b11462e08f86485bb8145e95512ed68f7 1706 linux-tools-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb Files: b62d507f81814885fe30d165cb277c1e 470550 kernel optional linux-buildinfo-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb bbd59ea2a996e04937f9e4c1f59f5e04 1028956 devel optional linux-headers-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb a4f136abdfce36bdfa6bb9452f976d8b 1083900096 devel optional linux-image-6.5.0-1005-raspi-dbgsym_6.5.0-1005.7_armhf.ddeb a6d1faffaf4c22d53da95893ff01a6c2 8724672 kernel optional linux-image-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb 87a771598f81c2ac79975a7c922a5bb4 55234752 kernel optional linux-modules-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb 32982790abdc539a45c17b43fe213d98 24955072 kernel optional linux-modules-extra-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb 6dd405890c31c02a65434c3653c214c9 13266498 devel optional linux-raspi-headers-6.5.0-1005_6.5.0-1005.7_armhf.deb c646cfe42da433b9530e51171a8565f2 6785156 devel optional linux-raspi-tools-6.5.0-1005_6.5.0-1005.7_armhf.deb 2284545c37114605aa89f90d252f890a 17521 devel optional linux-raspi_6.5.0-1005.7_armhf.buildinfo 3a516419e1c8ae604cb00e505ec39bf5 68522 raw-translations - linux-raspi_6.5.0-1005.7_armhf_translations.tar.gz 74a9c6c4c056bb6a3197f9e82d580eb1 1706 devel optional linux-tools-6.5.0-1005-raspi_6.5.0-1005.7_armhf.deb Ubuntu-Compatible-Signing: ubuntu/4 pro/3