linux-hwe (4.13.0-33.36~16.04.1) xenial; urgency=low

  * linux-hwe: 4.13.0-33.36~16.04.1 -proposed tracker (LP: #1746909)

  * linux: 4.13.0-33.36 -proposed tracker (LP: #1746903)

  [ Stefan Bader ]
  * starting VMs causing retpoline4 to reboot (LP: #1747507) // CVE-2017-5715
    (Spectre v2 retpoline)
    - x86/retpoline: Fill RSB on context switch for affected CPUs
    - x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
    - x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
    - x86/retpoline: Remove the esp/rsp thunk
    - x86/retpoline: Simplify vmexit_fill_RSB()

  * Missing install-time driver for QLogic QED 25/40/100Gb Ethernet NIC
    (LP: #1743638)
    - [d-i] Add qede to nic-modules udeb

  * hisi_sas: driver robustness fixes (LP: #1739807)
    - scsi: hisi_sas: fix reset and port ID refresh issues
    - scsi: hisi_sas: avoid potential v2 hw interrupt issue
    - scsi: hisi_sas: fix v2 hw underflow residual value
    - scsi: hisi_sas: add v2 hw DFX feature
    - scsi: hisi_sas: add irq and tasklet cleanup in v2 hw
    - scsi: hisi_sas: service interrupt ITCT_CLR interrupt in v2 hw
    - scsi: hisi_sas: fix internal abort slot timeout bug
    - scsi: hisi_sas: us start_phy in PHY_FUNC_LINK_RESET
    - scsi: hisi_sas: fix NULL check in SMP abort task path
    - scsi: hisi_sas: fix the risk of freeing slot twice
    - scsi: hisi_sas: kill tasklet when destroying irq in v3 hw
    - scsi: hisi_sas: complete all tasklets prior to host reset

  * [Artful/Zesty] ACPI APEI error handling bug fixes (LP: #1732990)
    - ACPI: APEI: fix the wrong iteration of generic error status block
    - ACPI / APEI: clear error status before acknowledging the error

  * [Zesty/Artful] On ARM64 PCIE physical function passthrough guest fails to
    boot (LP: #1732804)
    - vfio/pci: Virtualize Maximum Payload Size
    - vfio/pci: Virtualize Maximum Read Request Size

  * hisi_sas: Add ATA command support for SMR disks (LP: #1739891)
    - scsi: hisi_sas: support zone management commands

  * thunderx2: i2c driver PEC and ACPI clock fixes (LP: #1738073)
    - ACPI / APD: Add clock frequency for ThunderX2 I2C controller
    - i2c: xlp9xx: Get clock frequency with clk API
    - i2c: xlp9xx: Handle I2C_M_RECV_LEN in msg->flags

  * Falkor erratum 1041 needs workaround (LP: #1738497)
    - [Config] CONFIG_QCOM_FALKOR_ERRATUM_E1041=y
    - arm64: Add software workaround for Falkor erratum 1041

  * ThunderX: TX failure unless checksum offload disabled (LP: #1736593)
    - net: thunderx: Fix TCP/UDP checksum offload for IPv6 pkts
    - net: thunderx: Fix TCP/UDP checksum offload for IPv4 pkts

  * arm64/thunderx: Unhandled context faults in ACPI mode (LP: #1736774)
    - PCI: Set Cavium ACS capability quirk flags to assert RR/CR/SV/UF
    - PCI: Apply Cavium ThunderX ACS quirk to more Root Ports

  * arm64: Unfair rwlock can stall the system (LP: #1732238)
    - locking/qrwlock: Use 'struct qrwlock' instead of 'struct __qrwlock'
    - locking/atomic: Add atomic_cond_read_acquire()
    - locking/qrwlock: Use atomic_cond_read_acquire() when spinning in qrwlock
    - locking/qrwlock, arm64: Move rwlock implementation over to qrwlocks
    - locking/qrwlock: Prevent slowpath writers getting held up by fastpath

  * Shutdown hang on 16.04 with iscsi targets (LP: #1569925)
    - scsi: libiscsi: Allow sd_shutdown on bad transport

  * bt_iter() crash due to NULL pointer (LP: #1744300)
    - blk-mq-tag: check for NULL rq when iterating tags

  * hisilicon hibmc regression due to ea642c3216cb ("drm/ttm: add io_mem_pfn
    callback") (LP: #1738334)
    - SAUCE: drm: hibmc: Initialize the hibmc_bo_driver.io_mem_pfn

  * CVE-2017-5754 ARM64 KPTI fixes
    - arm64: Add ASM_BUG()
    - arm64: consistently use bl for C exception entry
    - arm64: syscallno is secretly an int, make it official
    - arm64: Abstract syscallno manipulation
    - arm64: move non-entry code out of .entry.text
    - arm64: unwind: avoid percpu indirection for irq stack
    - arm64: unwind: disregard frame.sp when validating frame pointer
    - arm64: mm: Fix set_memory_valid() declaration
    - arm64: Convert __inval_cache_range() to area-based
    - arm64: Expose DC CVAP to userspace
    - arm64: Handle trapped DC CVAP
    - arm64: Implement pmem API support
    - arm64: uaccess: Implement *_flushcache variants
    - arm64/vdso: Support mremap() for vDSO
    - arm64: unwind: reference pt_regs via embedded stack frame
    - arm64: unwind: remove sp from struct stackframe
    - arm64: uaccess: Add the uaccess_flushcache.c file
    - arm64: fix pmem interface definition
    - arm64: compat: Remove leftover variable declaration
    - fork: allow arch-override of VMAP stack alignment
    - arm64: kernel: remove {THREAD,IRQ_STACK}_START_SP
    - arm64: factor out PAGE_* and CONT_* definitions
    - arm64: clean up THREAD_* definitions
    - arm64: clean up irq stack definitions
    - arm64: move SEGMENT_ALIGN to <asm/memory.h>
    - efi/arm64: add EFI_KIMG_ALIGN
    - arm64: factor out entry stack manipulation
    - arm64: assembler: allow adr_this_cpu to use the stack pointer
    - arm64: use an irq stack pointer
    - arm64: add basic VMAP_STACK support
    - arm64: add on_accessible_stack()
    - arm64: add VMAP_STACK overflow detection
    - arm64: Convert pte handling from inline asm to using (cmp)xchg
    - kvm: arm64: Convert kvm_set_s2pte_readonly() from inline asm to cmpxchg()
    - arm64: Move PTE_RDONLY bit handling out of set_pte_at()
    - arm64: Ignore hardware dirty bit updates in ptep_set_wrprotect()
    - arm64: Remove the !CONFIG_ARM64_HW_AFDBM alternative code paths
    - arm64: introduce separated bits for mm_context_t flags
    - arm64: cleanup {COMPAT_,}SET_PERSONALITY() macro
    - KVM: arm/arm64: Fix guest external abort matching
    - KVM: arm/arm64: vgic: constify seq_operations and file_operations
    - KVM: arm/arm64: vITS: Drop its_ite->lpi field
    - KVM: arm/arm64: Extract GICv3 max APRn index calculation
    - KVM: arm/arm64: Support uaccess of GICC_APRn
    - arm64: move TASK_* definitions to <asm/processor.h>
    - arm64: Use larger stacks when KASAN is selected
    - arm64: sysreg: Move SPE registers and PSB into common header files
    - arm64: head: Init PMSCR_EL2.{PA,PCT} when entered at EL2 without VHE
    - arm64: Update fault_info table with new exception types
    - arm64: Use existing defines for mdscr
    - arm64: Fix single stepping in kernel traps
    - arm64: asm-bug: Renumber macro local labels to avoid clashes
    - arm64: Implement arch-specific pte_access_permitted()
    - arm64: explicitly mask all exceptions
    - arm64: introduce an order for exceptions
    - arm64: Move the async/fiq helpers to explicitly set process context flags
    - arm64: Mask all exceptions during kernel_exit
    - arm64: entry.S: Remove disable_dbg
    - arm64: entry.S: convert el1_sync
    - arm64: entry.S convert el0_sync
    - arm64: entry.S: convert elX_irq
    - arm64: entry.S: move SError handling into a C function for future 
expansion
    - arm64: pgd: Mark pgd_cache as __ro_after_init
    - arm64: cpu_ops: Add missing 'const' qualifiers
    - arm64: context: Fix comments and remove pointless smp_wmb()
    - arm64: SW PAN: Point saved ttbr0 at the zero page when switching to 
init_mm
    - arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb
    - arm64: Expose support for optional ARMv8-A features
    - arm64: KVM: Hide unsupported AArch64 CPU features from guests
    - arm64: mm: Use non-global mappings for kernel space
    - arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN
    - arm64: mm: Move ASID from TTBR0 to TTBR1
    - arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003
    - arm64: mm: Rename post_ttbr0_update_workaround
    - arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN
    - arm64: mm: Allocate ASIDs in pairs
    - arm64: mm: Add arm64_kernel_unmapped_at_el0 helper
    - arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI
    - arm64: entry: Add exception trampoline page for exceptions from EL0
    - arm64: mm: Map entry trampoline into trampoline and kernel page tables
    - arm64: entry: Explicitly pass exception level to kernel_ventry macro
    - arm64: entry: Hook up entry trampoline to exception vectors
    - arm64: erratum: Work around Falkor erratum #E1003 in trampoline code
    - arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks
    - arm64: entry: Add fake CPU feature for unmapping the kernel at EL0
    - arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0
    - arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR
    - arm64: kaslr: Put kernel vectors address in separate data page
    - arm64: use RET instruction for exiting the trampoline
    - arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry
    - arm64: Fix the feature type for ID register fields
    - arm64: Take into account ID_AA64PFR0_EL1.CSV3
    - arm64: cpufeature: Pass capability structure to ->enable callback
    - drivers/firmware: Expose psci_get_version through psci_ops structure
    - arm64: Move post_ttbr_update_workaround to C code
    - arm64: Add skeleton to harden the branch predictor against aliasing 
attacks
    - arm64: KVM: Use per-CPU vector when BP hardening is enabled
    - arm64: KVM: Make PSCI_VERSION a fast path
    - arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75
    - arm64: Implement branch predictor hardening for affected Cortex-A CPUs
    - arm64: Define cputype macros for Falkor CPU
    - arm64: Implement branch predictor hardening for Falkor
    - arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs
    - bpf: inline map in map lookup functions for array and htab
    - bpf: perf event change needed for subsequent bpf helpers
    - bpf: do not test for PCPU_MIN_UNIT_SIZE before percpu allocations
    - arm64: Branch predictor hardening for Cavium ThunderX2
    - arm64: capabilities: Handle duplicate entries for a capability
    - arm64: kpti: Fix the interaction between ASID switching and software PAN
    - SAUCE: arm: Add BTB invalidation on switch_mm for Cortex-A9, A12 and A17
    - SAUCE: arm: Invalidate BTB on prefetch abort outside of user mapping on
      Cortex A8, A9, A12 and A17
    - SAUCE: arm: KVM: Invalidate BTB on guest exit
    - SAUCE: arm: Add icache invalidation on switch_mm for Cortex-A15
    - SAUCE: arm: Invalidate icache on prefetch abort outside of user mapping on
      Cortex-A15
    - SAUCE: arm: KVM: Invalidate icache on guest exit for Cortex-A15
    - SAUCE: asm-generic/barrier: add generic nospec helpers
    - SAUCE: Documentation: document nospec helpers
    - SAUCE: arm64: implement nospec_{load,ptr}()
    - SAUCE: arm: implement nospec_ptr()
    - SAUCE: bpf: inhibit speculated out-of-bounds pointers
    - SAUCE: arm64: Implement branch predictor hardening for Falkor
    - SAUCE: arm64: Branch predictor hardening for Cavium ThunderX2
    - [Config] UNMAP_KERNEL_AT_EL0=y && HARDEN_BRANCH_PREDICTOR=y

  * [artful] panic in update_stack_state when reading /proc/<pid>/stack on i386
    (LP: #1747263)
    - x86/unwind: Fix dereference of untrusted pointer

  * CVE-2017-5753 (Spectre v1 Intel)
    - x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature
    - SAUCE: reinstate MFENCE_RDTSC feature definition
    - locking/barriers: introduce new observable speculation barrier
    - bpf: prevent speculative execution in eBPF interpreter
    - x86, bpf, jit: prevent speculative execution when JIT is enabled
    - SAUCE: FIX: x86, bpf, jit: prevent speculative execution when JIT is 
enabled
    - uvcvideo: prevent speculative execution
    - carl9170: prevent speculative execution
    - p54: prevent speculative execution
    - qla2xxx: prevent speculative execution
    - cw1200: prevent speculative execution
    - Thermal/int340x: prevent speculative execution
    - ipv4: prevent speculative execution
    - ipv6: prevent speculative execution
    - fs: prevent speculative execution
    - net: mpls: prevent speculative execution
    - udf: prevent speculative execution
    - userns: prevent speculative execution
    - SAUCE: powerpc: add osb barrier
    - SAUCE: s390/spinlock: add osb memory barrier
    - SAUCE: claim mitigation via observable speculation barrier

  * CVE-2017-5715 (Spectre v2 retpoline)
    - x86/asm: Fix inline asm call constraints for Clang
    - kvm: vmx: Scrub hardware GPRs at VM-exit
    - sysfs/cpu: Add vulnerability folder
    - x86/cpu: Implement CPU vulnerabilites sysfs functions
    - x86/tboot: Unbreak tboot with PTI enabled
    - objtool: Detect jumps to retpoline thunks
    - objtool: Allow alternatives to be ignored
    - x86/retpoline: Add initial retpoline support
    - x86/spectre: Add boot time option to select Spectre v2 mitigation
    - x86/retpoline/crypto: Convert crypto assembler indirect jumps
    - x86/retpoline/entry: Convert entry assembler indirect jumps
    - x86/retpoline/ftrace: Convert ftrace assembler indirect jumps
    - x86/retpoline/hyperv: Convert assembler indirect jumps
    - x86/retpoline/xen: Convert Xen hypercall indirect jumps
    - x86/retpoline/checksum32: Convert assembler indirect jumps
    - x86/retpoline/irq32: Convert assembler indirect jumps
    - x86/retpoline: Fill return stack buffer on vmexit
    - selftests/x86: Add test_vsyscall
    - x86/pti: Fix !PCID and sanitize defines
    - security/Kconfig: Correct the Documentation reference for PTI
    - x86,perf: Disable intel_bts when PTI
    - x86/retpoline: Remove compile time warning
    - [Config] enable CONFIG_GENERIC_CPU_VULNERABILITIES
    - [Config] enable CONFIG_RETPOLINE
    - [Packaging] retpoline -- add call site validation
    - [Config] disable retpoline checks for first upload

  * CVE-2017-5715 (revert embargoed) // CVE-2017-5753 (revert embargoed)
    - Revert "UBUNTU: SAUCE: x86/entry: Fix up retpoline assembler labels"
    - Revert "kvm: vmx: Scrub hardware GPRs at VM-exit"
    - Revert "Revert "x86/svm: Add code to clear registers on VM exit""
    - Revert "UBUNTU: SAUCE: x86/microcode: Extend post microcode reload to
      support IBPB feature -- repair missmerge"
    - Revert "UBUNTU: SAUCE: x86/kvm: Fix stuff_RSB() for 32-bit"
    - Revert "s390/spinlock: add gmb memory barrier"
    - Revert "powerpc: add gmb barrier"
    - Revert "x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature"
    - Revert "x86/svm: Add code to clear registers on VM exit"
    - Revert "x86/svm: Add code to clobber the RSB on VM exit"
    - Revert "KVM: x86: Add speculative control CPUID support for guests"
    - Revert "x86/svm: Set IBPB when running a different VCPU"
    - Revert "x86/svm: Set IBRS value on VM entry and exit"
    - Revert "KVM: SVM: Do not intercept new speculative control MSRs"
    - Revert "x86/microcode: Extend post microcode reload to support IBPB 
feature"
    - Revert "x86/cpu/AMD: Add speculative control support for AMD"
    - Revert "x86/entry: Use retpoline for syscall's indirect calls"
    - Revert "x86/syscall: Clear unused extra registers on 32-bit compatible
      syscall entrance"
    - Revert "x86/syscall: Clear unused extra registers on syscall entrance"
    - Revert "x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb
      control"
    - Revert "x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL 
feature"
    - Revert "x86/kvm: Pad RSB on VM transition"
    - Revert "x86/kvm: Toggle IBRS on VM entry and exit"
    - Revert "x86/kvm: Set IBPB when switching VM"
    - Revert "x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm"
    - Revert "x86/entry: Stuff RSB for entry to kernel for non-SMEP platform"
    - Revert "x86/mm: Only set IBPB when the new thread cannot ptrace current
      thread"
    - Revert "x86/mm: Set IBPB upon context switch"
    - Revert "x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup"
    - Revert "x86/idle: Disable IBRS entering idle and enable it on wakeup"
    - Revert "x86/enter: Use IBRS on syscall and interrupts"
    - Revert "x86/enter: MACROS to set/clear IBRS and set IBPB"
    - Revert "x86/feature: Report presence of IBPB and IBRS control"
    - Revert "x86/feature: Enable the x86 feature to control Speculation"
    - Revert "udf: prevent speculative execution"
    - Revert "net: mpls: prevent speculative execution"
    - Revert "fs: prevent speculative execution"
    - Revert "ipv6: prevent speculative execution"
    - Revert "userns: prevent speculative execution"
    - Revert "Thermal/int340x: prevent speculative execution"
    - Revert "cw1200: prevent speculative execution"
    - Revert "qla2xxx: prevent speculative execution"
    - Revert "p54: prevent speculative execution"
    - Revert "carl9170: prevent speculative execution"
    - Revert "uvcvideo: prevent speculative execution"
    - Revert "x86, bpf, jit: prevent speculative execution when JIT is enabled"
    - Revert "bpf: prevent speculative execution in eBPF interpreter"
    - Revert "locking/barriers: introduce new memory barrier gmb()"

  * Unable to boot with i386 4.13.0-25 / 4.13.0-26 / 4.13.0-31 kernel on Xenial
    / Artful (LP: #1745118)
    - x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP

  * 4.13: unable to increase MTU configuration for GRE devices (LP: #1743746)
    - ip_gre: remove the incorrect mtu limit for ipgre tap

  * CVE-2017-17712
    - net: ipv4: fix for a race condition in raw_sendmsg

  * upload urgency should be medium by default (LP: #1745338)
    - [Packaging] update urgency to medium by default

  * CVE-2017-15115
    - sctp: do not peel off an assoc from one netns to another one

  * CVE-2017-8824
    - dccp: CVE-2017-8824: use-after-free in DCCP code

Date: Wed, 07 Feb 2018 23:39:45 +0100
Changed-By: Kleber Sacilotto de Souza <kleber.so...@canonical.com>
Maintainer: Launchpad Build Daemon <buildd@lcy01-amd64-012.buildd>

Format: 1.8
Date: Wed, 07 Feb 2018 23:39:45 +0100
Source: linux-hwe
Binary: linux-source-4.13.0 linux-headers-4.13.0-33 linux-hwe-tools-4.13.0-33 
linux-hwe-cloud-tools-4.13.0-33 linux-image-4.13.0-33-generic 
linux-image-extra-4.13.0-33-generic linux-headers-4.13.0-33-generic 
linux-image-4.13.0-33-generic-dbgsym linux-tools-4.13.0-33-generic 
linux-cloud-tools-4.13.0-33-generic linux-hwe-udebs-generic 
linux-image-4.13.0-33-generic-lpae linux-image-extra-4.13.0-33-generic-lpae 
linux-headers-4.13.0-33-generic-lpae linux-image-4.13.0-33-generic-lpae-dbgsym 
linux-tools-4.13.0-33-generic-lpae linux-cloud-tools-4.13.0-33-generic-lpae 
linux-hwe-udebs-generic-lpae linux-image-4.13.0-33-lowlatency 
linux-image-extra-4.13.0-33-lowlatency linux-headers-4.13.0-33-lowlatency 
linux-image-4.13.0-33-lowlatency-dbgsym linux-tools-4.13.0-33-lowlatency 
linux-cloud-tools-4.13.0-33-lowlatency linux-hwe-udebs-lowlatency 
kernel-image-4.13.0-33-generic-di fat-modules-4.13.0-33-generic-di 
fb-modules-4.13.0-33-generic-di firewire-core-modules-4.13.0-33-generic-di
 floppy-modules-4.13.0-33-generic-di fs-core-modules-4.13.0-33-generic-di 
fs-secondary-modules-4.13.0-33-generic-di input-modules-4.13.0-33-generic-di 
irda-modules-4.13.0-33-generic-di md-modules-4.13.0-33-generic-di 
nic-modules-4.13.0-33-generic-di nic-pcmcia-modules-4.13.0-33-generic-di 
nic-usb-modules-4.13.0-33-generic-di nic-shared-modules-4.13.0-33-generic-di 
parport-modules-4.13.0-33-generic-di pata-modules-4.13.0-33-generic-di 
pcmcia-modules-4.13.0-33-generic-di pcmcia-storage-modules-4.13.0-33-generic-di 
plip-modules-4.13.0-33-generic-di ppp-modules-4.13.0-33-generic-di 
sata-modules-4.13.0-33-generic-di scsi-modules-4.13.0-33-generic-di 
serial-modules-4.13.0-33-generic-di storage-core-modules-4.13.0-33-generic-di 
usb-modules-4.13.0-33-generic-di nfs-modules-4.13.0-33-generic-di 
block-modules-4.13.0-33-generic-di message-modules-4.13.0-33-generic-di 
crypto-modules-4.13.0-33-generic-di virtio-modules-4.13.0-33-generic-di 
mouse-modules-4.13.0-33-generic-di
 vlan-modules-4.13.0-33-generic-di ipmi-modules-4.13.0-33-generic-di
 multipath-modules-4.13.0-33-generic-di
Architecture: amd64 all
Version: 4.13.0-33.36~16.04.1
Distribution: xenial
Urgency: low
Maintainer: Launchpad Build Daemon <buildd@lcy01-amd64-012.buildd>
Changed-By: Kleber Sacilotto de Souza <kleber.so...@canonical.com>
Description:
 block-modules-4.13.0-33-generic-di - Block storage devices (udeb)
 crypto-modules-4.13.0-33-generic-di - crypto modules (udeb)
 fat-modules-4.13.0-33-generic-di - FAT filesystem support (udeb)
 fb-modules-4.13.0-33-generic-di - Framebuffer modules (udeb)
 firewire-core-modules-4.13.0-33-generic-di - Firewire (IEEE-1394) Support 
(udeb)
 floppy-modules-4.13.0-33-generic-di - Floppy driver support (udeb)
 fs-core-modules-4.13.0-33-generic-di - Base filesystem modules (udeb)
 fs-secondary-modules-4.13.0-33-generic-di - Extra filesystem modules (udeb)
 input-modules-4.13.0-33-generic-di - Support for various input methods (udeb)
 ipmi-modules-4.13.0-33-generic-di - ipmi modules (udeb)
 irda-modules-4.13.0-33-generic-di - Support for Infrared protocols (udeb)
 kernel-image-4.13.0-33-generic-di - kernel image and system map (udeb)
 linux-cloud-tools-4.13.0-33-generic - Linux kernel version specific cloud 
tools for version 4.13.0-33
 linux-cloud-tools-4.13.0-33-generic-lpae - Linux kernel version specific cloud 
tools for version 4.13.0-33
 linux-cloud-tools-4.13.0-33-lowlatency - Linux kernel version specific cloud 
tools for version 4.13.0-33
 linux-headers-4.13.0-33 - Header files related to Linux kernel version 4.13.0
 linux-headers-4.13.0-33-generic - Linux kernel headers for version 4.13.0 on 
64 bit x86 SMP
 linux-headers-4.13.0-33-generic-lpae - Linux kernel headers for version 4.13.0 
on 64 bit x86 SMP
 linux-headers-4.13.0-33-lowlatency - Linux kernel headers for version 4.13.0 
on 64 bit x86 SMP
 linux-hwe-cloud-tools-4.13.0-33 - Linux kernel version specific cloud tools 
for version 4.13.0-33
 linux-hwe-tools-4.13.0-33 - Linux kernel version specific tools for version 
4.13.0-33
 linux-hwe-udebs-generic - Metapackage depending on kernel udebs (udeb)
 linux-hwe-udebs-generic-lpae - Metapackage depending on kernel udebs (udeb)
 linux-hwe-udebs-lowlatency - Metapackage depending on kernel udebs (udeb)
 linux-image-4.13.0-33-generic - Linux kernel image for version 4.13.0 on 64 
bit x86 SMP
 linux-image-4.13.0-33-generic-dbgsym - Linux kernel debug image for version 
4.13.0 on 64 bit x86 SMP
 linux-image-4.13.0-33-generic-lpae - Linux kernel image for version 4.13.0 on 
64 bit x86 SMP
 linux-image-4.13.0-33-generic-lpae-dbgsym - Linux kernel debug image for 
version 4.13.0 on 64 bit x86 SMP
 linux-image-4.13.0-33-lowlatency - Linux kernel image for version 4.13.0 on 64 
bit x86 SMP
 linux-image-4.13.0-33-lowlatency-dbgsym - Linux kernel debug image for version 
4.13.0 on 64 bit x86 SMP
 linux-image-extra-4.13.0-33-generic - Linux kernel extra modules for version 
4.13.0 on 64 bit x86 SMP
 linux-image-extra-4.13.0-33-generic-lpae - Linux kernel extra modules for 
version 4.13.0 on 64 bit x86 SMP
 linux-image-extra-4.13.0-33-lowlatency - Linux kernel extra modules for 
version 4.13.0 on 64 bit x86 SMP
 linux-source-4.13.0 - Linux kernel source for version 4.13.0 with Ubuntu 
patches
 linux-tools-4.13.0-33-generic - Linux kernel version specific tools for 
version 4.13.0-33
 linux-tools-4.13.0-33-generic-lpae - Linux kernel version specific tools for 
version 4.13.0-33
 linux-tools-4.13.0-33-lowlatency - Linux kernel version specific tools for 
version 4.13.0-33
 md-modules-4.13.0-33-generic-di - Multi-device support (raid, device-mapper, 
lvm) (udeb)
 message-modules-4.13.0-33-generic-di - Fusion and i2o storage modules (udeb)
 mouse-modules-4.13.0-33-generic-di - Mouse support (udeb)
 multipath-modules-4.13.0-33-generic-di - DM-Multipath support (udeb)
 nfs-modules-4.13.0-33-generic-di - NFS filesystem drivers (udeb)
 nic-modules-4.13.0-33-generic-di - Network interface support (udeb)
 nic-pcmcia-modules-4.13.0-33-generic-di - PCMCIA network interface support 
(udeb)
 nic-shared-modules-4.13.0-33-generic-di - nic shared modules (udeb)
 nic-usb-modules-4.13.0-33-generic-di - USB network interface support (udeb)
 parport-modules-4.13.0-33-generic-di - Parallel port support (udeb)
 pata-modules-4.13.0-33-generic-di - PATA support modules (udeb)
 pcmcia-modules-4.13.0-33-generic-di - PCMCIA Modules (udeb)
 pcmcia-storage-modules-4.13.0-33-generic-di - PCMCIA storage support (udeb)
 plip-modules-4.13.0-33-generic-di - PLIP (parallel port) networking support 
(udeb)
 ppp-modules-4.13.0-33-generic-di - PPP (serial port) networking support (udeb)
 sata-modules-4.13.0-33-generic-di - SATA storage support (udeb)
 scsi-modules-4.13.0-33-generic-di - SCSI storage support (udeb)
 serial-modules-4.13.0-33-generic-di - Serial port support (udeb)
 storage-core-modules-4.13.0-33-generic-di - Core storage support (udeb)
 usb-modules-4.13.0-33-generic-di - Core USB support (udeb)
 virtio-modules-4.13.0-33-generic-di - VirtIO Modules (udeb)
 vlan-modules-4.13.0-33-generic-di - vlan modules (udeb)
Launchpad-Bugs-Fixed: 1569925 1732238 1732804 1732990 1736593 1736774 1738073 
1738334 1738497 1739807 1739891 1743638 1743746 1744300 1745118 1745338 1746903 
1746909 1747263 1747507
Changes:
 linux-hwe (4.13.0-33.36~16.04.1) xenial; urgency=low
 .
   * linux-hwe: 4.13.0-33.36~16.04.1 -proposed tracker (LP: #1746909)
 .
   * linux: 4.13.0-33.36 -proposed tracker (LP: #1746903)
 .
   [ Stefan Bader ]
   * starting VMs causing retpoline4 to reboot (LP: #1747507) // CVE-2017-5715
     (Spectre v2 retpoline)
     - x86/retpoline: Fill RSB on context switch for affected CPUs
     - x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
     - x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
     - x86/retpoline: Remove the esp/rsp thunk
     - x86/retpoline: Simplify vmexit_fill_RSB()
 .
   * Missing install-time driver for QLogic QED 25/40/100Gb Ethernet NIC
     (LP: #1743638)
     - [d-i] Add qede to nic-modules udeb
 .
   * hisi_sas: driver robustness fixes (LP: #1739807)
     - scsi: hisi_sas: fix reset and port ID refresh issues
     - scsi: hisi_sas: avoid potential v2 hw interrupt issue
     - scsi: hisi_sas: fix v2 hw underflow residual value
     - scsi: hisi_sas: add v2 hw DFX feature
     - scsi: hisi_sas: add irq and tasklet cleanup in v2 hw
     - scsi: hisi_sas: service interrupt ITCT_CLR interrupt in v2 hw
     - scsi: hisi_sas: fix internal abort slot timeout bug
     - scsi: hisi_sas: us start_phy in PHY_FUNC_LINK_RESET
     - scsi: hisi_sas: fix NULL check in SMP abort task path
     - scsi: hisi_sas: fix the risk of freeing slot twice
     - scsi: hisi_sas: kill tasklet when destroying irq in v3 hw
     - scsi: hisi_sas: complete all tasklets prior to host reset
 .
   * [Artful/Zesty] ACPI APEI error handling bug fixes (LP: #1732990)
     - ACPI: APEI: fix the wrong iteration of generic error status block
     - ACPI / APEI: clear error status before acknowledging the error
 .
   * [Zesty/Artful] On ARM64 PCIE physical function passthrough guest fails to
     boot (LP: #1732804)
     - vfio/pci: Virtualize Maximum Payload Size
     - vfio/pci: Virtualize Maximum Read Request Size
 .
   * hisi_sas: Add ATA command support for SMR disks (LP: #1739891)
     - scsi: hisi_sas: support zone management commands
 .
   * thunderx2: i2c driver PEC and ACPI clock fixes (LP: #1738073)
     - ACPI / APD: Add clock frequency for ThunderX2 I2C controller
     - i2c: xlp9xx: Get clock frequency with clk API
     - i2c: xlp9xx: Handle I2C_M_RECV_LEN in msg->flags
 .
   * Falkor erratum 1041 needs workaround (LP: #1738497)
     - [Config] CONFIG_QCOM_FALKOR_ERRATUM_E1041=y
     - arm64: Add software workaround for Falkor erratum 1041
 .
   * ThunderX: TX failure unless checksum offload disabled (LP: #1736593)
     - net: thunderx: Fix TCP/UDP checksum offload for IPv6 pkts
     - net: thunderx: Fix TCP/UDP checksum offload for IPv4 pkts
 .
   * arm64/thunderx: Unhandled context faults in ACPI mode (LP: #1736774)
     - PCI: Set Cavium ACS capability quirk flags to assert RR/CR/SV/UF
     - PCI: Apply Cavium ThunderX ACS quirk to more Root Ports
 .
   * arm64: Unfair rwlock can stall the system (LP: #1732238)
     - locking/qrwlock: Use 'struct qrwlock' instead of 'struct __qrwlock'
     - locking/atomic: Add atomic_cond_read_acquire()
     - locking/qrwlock: Use atomic_cond_read_acquire() when spinning in qrwlock
     - locking/qrwlock, arm64: Move rwlock implementation over to qrwlocks
     - locking/qrwlock: Prevent slowpath writers getting held up by fastpath
 .
   * Shutdown hang on 16.04 with iscsi targets (LP: #1569925)
     - scsi: libiscsi: Allow sd_shutdown on bad transport
 .
   * bt_iter() crash due to NULL pointer (LP: #1744300)
     - blk-mq-tag: check for NULL rq when iterating tags
 .
   * hisilicon hibmc regression due to ea642c3216cb ("drm/ttm: add io_mem_pfn
     callback") (LP: #1738334)
     - SAUCE: drm: hibmc: Initialize the hibmc_bo_driver.io_mem_pfn
 .
   * CVE-2017-5754 ARM64 KPTI fixes
     - arm64: Add ASM_BUG()
     - arm64: consistently use bl for C exception entry
     - arm64: syscallno is secretly an int, make it official
     - arm64: Abstract syscallno manipulation
     - arm64: move non-entry code out of .entry.text
     - arm64: unwind: avoid percpu indirection for irq stack
     - arm64: unwind: disregard frame.sp when validating frame pointer
     - arm64: mm: Fix set_memory_valid() declaration
     - arm64: Convert __inval_cache_range() to area-based
     - arm64: Expose DC CVAP to userspace
     - arm64: Handle trapped DC CVAP
     - arm64: Implement pmem API support
     - arm64: uaccess: Implement *_flushcache variants
     - arm64/vdso: Support mremap() for vDSO
     - arm64: unwind: reference pt_regs via embedded stack frame
     - arm64: unwind: remove sp from struct stackframe
     - arm64: uaccess: Add the uaccess_flushcache.c file
     - arm64: fix pmem interface definition
     - arm64: compat: Remove leftover variable declaration
     - fork: allow arch-override of VMAP stack alignment
     - arm64: kernel: remove {THREAD,IRQ_STACK}_START_SP
     - arm64: factor out PAGE_* and CONT_* definitions
     - arm64: clean up THREAD_* definitions
     - arm64: clean up irq stack definitions
     - arm64: move SEGMENT_ALIGN to <asm/memory.h>
     - efi/arm64: add EFI_KIMG_ALIGN
     - arm64: factor out entry stack manipulation
     - arm64: assembler: allow adr_this_cpu to use the stack pointer
     - arm64: use an irq stack pointer
     - arm64: add basic VMAP_STACK support
     - arm64: add on_accessible_stack()
     - arm64: add VMAP_STACK overflow detection
     - arm64: Convert pte handling from inline asm to using (cmp)xchg
     - kvm: arm64: Convert kvm_set_s2pte_readonly() from inline asm to cmpxchg()
     - arm64: Move PTE_RDONLY bit handling out of set_pte_at()
     - arm64: Ignore hardware dirty bit updates in ptep_set_wrprotect()
     - arm64: Remove the !CONFIG_ARM64_HW_AFDBM alternative code paths
     - arm64: introduce separated bits for mm_context_t flags
     - arm64: cleanup {COMPAT_,}SET_PERSONALITY() macro
     - KVM: arm/arm64: Fix guest external abort matching
     - KVM: arm/arm64: vgic: constify seq_operations and file_operations
     - KVM: arm/arm64: vITS: Drop its_ite->lpi field
     - KVM: arm/arm64: Extract GICv3 max APRn index calculation
     - KVM: arm/arm64: Support uaccess of GICC_APRn
     - arm64: move TASK_* definitions to <asm/processor.h>
     - arm64: Use larger stacks when KASAN is selected
     - arm64: sysreg: Move SPE registers and PSB into common header files
     - arm64: head: Init PMSCR_EL2.{PA,PCT} when entered at EL2 without VHE
     - arm64: Update fault_info table with new exception types
     - arm64: Use existing defines for mdscr
     - arm64: Fix single stepping in kernel traps
     - arm64: asm-bug: Renumber macro local labels to avoid clashes
     - arm64: Implement arch-specific pte_access_permitted()
     - arm64: explicitly mask all exceptions
     - arm64: introduce an order for exceptions
     - arm64: Move the async/fiq helpers to explicitly set process context flags
     - arm64: Mask all exceptions during kernel_exit
     - arm64: entry.S: Remove disable_dbg
     - arm64: entry.S: convert el1_sync
     - arm64: entry.S convert el0_sync
     - arm64: entry.S: convert elX_irq
     - arm64: entry.S: move SError handling into a C function for future 
expansion
     - arm64: pgd: Mark pgd_cache as __ro_after_init
     - arm64: cpu_ops: Add missing 'const' qualifiers
     - arm64: context: Fix comments and remove pointless smp_wmb()
     - arm64: SW PAN: Point saved ttbr0 at the zero page when switching to 
init_mm
     - arm64: SW PAN: Update saved ttbr0 value on enter_lazy_tlb
     - arm64: Expose support for optional ARMv8-A features
     - arm64: KVM: Hide unsupported AArch64 CPU features from guests
     - arm64: mm: Use non-global mappings for kernel space
     - arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN
     - arm64: mm: Move ASID from TTBR0 to TTBR1
     - arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003
     - arm64: mm: Rename post_ttbr0_update_workaround
     - arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN
     - arm64: mm: Allocate ASIDs in pairs
     - arm64: mm: Add arm64_kernel_unmapped_at_el0 helper
     - arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI
     - arm64: entry: Add exception trampoline page for exceptions from EL0
     - arm64: mm: Map entry trampoline into trampoline and kernel page tables
     - arm64: entry: Explicitly pass exception level to kernel_ventry macro
     - arm64: entry: Hook up entry trampoline to exception vectors
     - arm64: erratum: Work around Falkor erratum #E1003 in trampoline code
     - arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks
     - arm64: entry: Add fake CPU feature for unmapping the kernel at EL0
     - arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0
     - arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR
     - arm64: kaslr: Put kernel vectors address in separate data page
     - arm64: use RET instruction for exiting the trampoline
     - arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry
     - arm64: Fix the feature type for ID register fields
     - arm64: Take into account ID_AA64PFR0_EL1.CSV3
     - arm64: cpufeature: Pass capability structure to ->enable callback
     - drivers/firmware: Expose psci_get_version through psci_ops structure
     - arm64: Move post_ttbr_update_workaround to C code
     - arm64: Add skeleton to harden the branch predictor against aliasing 
attacks
     - arm64: KVM: Use per-CPU vector when BP hardening is enabled
     - arm64: KVM: Make PSCI_VERSION a fast path
     - arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75
     - arm64: Implement branch predictor hardening for affected Cortex-A CPUs
     - arm64: Define cputype macros for Falkor CPU
     - arm64: Implement branch predictor hardening for Falkor
     - arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs
     - bpf: inline map in map lookup functions for array and htab
     - bpf: perf event change needed for subsequent bpf helpers
     - bpf: do not test for PCPU_MIN_UNIT_SIZE before percpu allocations
     - arm64: Branch predictor hardening for Cavium ThunderX2
     - arm64: capabilities: Handle duplicate entries for a capability
     - arm64: kpti: Fix the interaction between ASID switching and software PAN
     - SAUCE: arm: Add BTB invalidation on switch_mm for Cortex-A9, A12 and A17
     - SAUCE: arm: Invalidate BTB on prefetch abort outside of user mapping on
       Cortex A8, A9, A12 and A17
     - SAUCE: arm: KVM: Invalidate BTB on guest exit
     - SAUCE: arm: Add icache invalidation on switch_mm for Cortex-A15
     - SAUCE: arm: Invalidate icache on prefetch abort outside of user mapping 
on
       Cortex-A15
     - SAUCE: arm: KVM: Invalidate icache on guest exit for Cortex-A15
     - SAUCE: asm-generic/barrier: add generic nospec helpers
     - SAUCE: Documentation: document nospec helpers
     - SAUCE: arm64: implement nospec_{load,ptr}()
     - SAUCE: arm: implement nospec_ptr()
     - SAUCE: bpf: inhibit speculated out-of-bounds pointers
     - SAUCE: arm64: Implement branch predictor hardening for Falkor
     - SAUCE: arm64: Branch predictor hardening for Cavium ThunderX2
     - [Config] UNMAP_KERNEL_AT_EL0=y && HARDEN_BRANCH_PREDICTOR=y
 .
   * [artful] panic in update_stack_state when reading /proc/<pid>/stack on i386
     (LP: #1747263)
     - x86/unwind: Fix dereference of untrusted pointer
 .
   * CVE-2017-5753 (Spectre v1 Intel)
     - x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature
     - SAUCE: reinstate MFENCE_RDTSC feature definition
     - locking/barriers: introduce new observable speculation barrier
     - bpf: prevent speculative execution in eBPF interpreter
     - x86, bpf, jit: prevent speculative execution when JIT is enabled
     - SAUCE: FIX: x86, bpf, jit: prevent speculative execution when JIT is 
enabled
     - uvcvideo: prevent speculative execution
     - carl9170: prevent speculative execution
     - p54: prevent speculative execution
     - qla2xxx: prevent speculative execution
     - cw1200: prevent speculative execution
     - Thermal/int340x: prevent speculative execution
     - ipv4: prevent speculative execution
     - ipv6: prevent speculative execution
     - fs: prevent speculative execution
     - net: mpls: prevent speculative execution
     - udf: prevent speculative execution
     - userns: prevent speculative execution
     - SAUCE: powerpc: add osb barrier
     - SAUCE: s390/spinlock: add osb memory barrier
     - SAUCE: claim mitigation via observable speculation barrier
 .
   * CVE-2017-5715 (Spectre v2 retpoline)
     - x86/asm: Fix inline asm call constraints for Clang
     - kvm: vmx: Scrub hardware GPRs at VM-exit
     - sysfs/cpu: Add vulnerability folder
     - x86/cpu: Implement CPU vulnerabilites sysfs functions
     - x86/tboot: Unbreak tboot with PTI enabled
     - objtool: Detect jumps to retpoline thunks
     - objtool: Allow alternatives to be ignored
     - x86/retpoline: Add initial retpoline support
     - x86/spectre: Add boot time option to select Spectre v2 mitigation
     - x86/retpoline/crypto: Convert crypto assembler indirect jumps
     - x86/retpoline/entry: Convert entry assembler indirect jumps
     - x86/retpoline/ftrace: Convert ftrace assembler indirect jumps
     - x86/retpoline/hyperv: Convert assembler indirect jumps
     - x86/retpoline/xen: Convert Xen hypercall indirect jumps
     - x86/retpoline/checksum32: Convert assembler indirect jumps
     - x86/retpoline/irq32: Convert assembler indirect jumps
     - x86/retpoline: Fill return stack buffer on vmexit
     - selftests/x86: Add test_vsyscall
     - x86/pti: Fix !PCID and sanitize defines
     - security/Kconfig: Correct the Documentation reference for PTI
     - x86,perf: Disable intel_bts when PTI
     - x86/retpoline: Remove compile time warning
     - [Config] enable CONFIG_GENERIC_CPU_VULNERABILITIES
     - [Config] enable CONFIG_RETPOLINE
     - [Packaging] retpoline -- add call site validation
     - [Config] disable retpoline checks for first upload
 .
   * CVE-2017-5715 (revert embargoed) // CVE-2017-5753 (revert embargoed)
     - Revert "UBUNTU: SAUCE: x86/entry: Fix up retpoline assembler labels"
     - Revert "kvm: vmx: Scrub hardware GPRs at VM-exit"
     - Revert "Revert "x86/svm: Add code to clear registers on VM exit""
     - Revert "UBUNTU: SAUCE: x86/microcode: Extend post microcode reload to
       support IBPB feature -- repair missmerge"
     - Revert "UBUNTU: SAUCE: x86/kvm: Fix stuff_RSB() for 32-bit"
     - Revert "s390/spinlock: add gmb memory barrier"
     - Revert "powerpc: add gmb barrier"
     - Revert "x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC 
feature"
     - Revert "x86/svm: Add code to clear registers on VM exit"
     - Revert "x86/svm: Add code to clobber the RSB on VM exit"
     - Revert "KVM: x86: Add speculative control CPUID support for guests"
     - Revert "x86/svm: Set IBPB when running a different VCPU"
     - Revert "x86/svm: Set IBRS value on VM entry and exit"
     - Revert "KVM: SVM: Do not intercept new speculative control MSRs"
     - Revert "x86/microcode: Extend post microcode reload to support IBPB 
feature"
     - Revert "x86/cpu/AMD: Add speculative control support for AMD"
     - Revert "x86/entry: Use retpoline for syscall's indirect calls"
     - Revert "x86/syscall: Clear unused extra registers on 32-bit compatible
       syscall entrance"
     - Revert "x86/syscall: Clear unused extra registers on syscall entrance"
     - Revert "x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb
       control"
     - Revert "x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL 
feature"
     - Revert "x86/kvm: Pad RSB on VM transition"
     - Revert "x86/kvm: Toggle IBRS on VM entry and exit"
     - Revert "x86/kvm: Set IBPB when switching VM"
     - Revert "x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm"
     - Revert "x86/entry: Stuff RSB for entry to kernel for non-SMEP platform"
     - Revert "x86/mm: Only set IBPB when the new thread cannot ptrace current
       thread"
     - Revert "x86/mm: Set IBPB upon context switch"
     - Revert "x86/idle: Disable IBRS when offlining cpu and re-enable on 
wakeup"
     - Revert "x86/idle: Disable IBRS entering idle and enable it on wakeup"
     - Revert "x86/enter: Use IBRS on syscall and interrupts"
     - Revert "x86/enter: MACROS to set/clear IBRS and set IBPB"
     - Revert "x86/feature: Report presence of IBPB and IBRS control"
     - Revert "x86/feature: Enable the x86 feature to control Speculation"
     - Revert "udf: prevent speculative execution"
     - Revert "net: mpls: prevent speculative execution"
     - Revert "fs: prevent speculative execution"
     - Revert "ipv6: prevent speculative execution"
     - Revert "userns: prevent speculative execution"
     - Revert "Thermal/int340x: prevent speculative execution"
     - Revert "cw1200: prevent speculative execution"
     - Revert "qla2xxx: prevent speculative execution"
     - Revert "p54: prevent speculative execution"
     - Revert "carl9170: prevent speculative execution"
     - Revert "uvcvideo: prevent speculative execution"
     - Revert "x86, bpf, jit: prevent speculative execution when JIT is enabled"
     - Revert "bpf: prevent speculative execution in eBPF interpreter"
     - Revert "locking/barriers: introduce new memory barrier gmb()"
 .
   * Unable to boot with i386 4.13.0-25 / 4.13.0-26 / 4.13.0-31 kernel on Xenial
     / Artful (LP: #1745118)
     - x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP
 .
   * 4.13: unable to increase MTU configuration for GRE devices (LP: #1743746)
     - ip_gre: remove the incorrect mtu limit for ipgre tap
 .
   * CVE-2017-17712
     - net: ipv4: fix for a race condition in raw_sendmsg
 .
   * upload urgency should be medium by default (LP: #1745338)
     - [Packaging] update urgency to medium by default
 .
   * CVE-2017-15115
     - sctp: do not peel off an assoc from one netns to another one
 .
   * CVE-2017-8824
     - dccp: CVE-2017-8824: use-after-free in DCCP code
Checksums-Sha1:
 43d8b902164ce2d2e407c305215987111a5eaa39 385384 
block-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 c9db8894021653214f94cc81e5084f9c31fd477b 323234 
crypto-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 c2f3ffb93ae7d2773f3e9786d20726c45a164c11 4230 
fat-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 bf5aaa87f23a0088e2816b5a6f354a948e6247ba 13508 
fb-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 7d06e76c6fbed4edc85bfb1cd748f9ef0ff437a7 64416 
firewire-core-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 30d47445595d93ab44ab0ae33191c744c29075a5 34256 
floppy-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 8433185e2fb8b69185fc5e7a4d1ca1ee6d0aee88 1145738 
fs-core-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 723885fcec32d0d3c0f89b91469cde09a5018d87 624426 
fs-secondary-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 a8cf0790796116cdf09e71d9ba5109bea526a784 418924 
input-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 ec2932e88dd236f52d1c36f889f4db0acf6cdd41 56240 
ipmi-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 0026339cf3e23d06f436d9c828e13719303ee480 225604 
irda-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 83d51466273d744665bb52ef1760100436d2095a 8416114 
kernel-image-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 59ec72266ca6083b4fdd8d629ebad88a190b961e 50106 
linux-cloud-tools-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 bd5d2c9dc944f684873fc7e2a9ce12038e141c08 50122 
linux-cloud-tools-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 70abeb5f5d4727a6620463f2bbb97efc3b5ac0d9 734352 
linux-headers-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 de5aa2964eda4013c5a25ee12c0fd58827f16b9a 732630 
linux-headers-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 11cc52492abd503a27025f655b5416ac4a403202 10769552 
linux-headers-4.13.0-33_4.13.0-33.36~16.04.1_all.deb
 0395a6a7a3cb999f750177db051e2c0cdce94a95 850 
linux-hwe-cloud-tools-4.13.0-33-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 9fa11fb0b28cc88aaf9d188fbadf764579fd7ed6 64034 
linux-hwe-cloud-tools-4.13.0-33_4.13.0-33.36~16.04.1_amd64.deb
 19f0ccfb7b6c5a4e53efe1326da9df34762d3252 874 
linux-hwe-tools-4.13.0-33-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 3ca530ec62a6b275e39a8aaecde299b57659ca42 990538 
linux-hwe-tools-4.13.0-33_4.13.0-33.36~16.04.1_amd64.deb
 27fa612bfd34d5754c7ddd0c0bec606c931ebaff 938 
linux-hwe-udebs-generic_4.13.0-33.36~16.04.1_amd64.udeb
 fd182e68a574c80423dbbdbeba05d8a7ad43eb52 15048535 
linux-hwe_4.13.0-33.36~16.04.1_amd64.tar.gz
 9edafe7cda5837f6dcebabb998ae90ed3f7c6593 600926816 
linux-image-4.13.0-33-generic-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 926fd0e9e16420976e362e84c7fd35d7c0be48c1 20890736 
linux-image-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 7b7d7ee0f0427152ec301e99e423ba54b2ed7cbb 600952998 
linux-image-4.13.0-33-lowlatency-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 5c73975b2c8e5377949491a50f1655361d1aec71 52586146 
linux-image-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 dda00d76cf1a8c768deb73309ebfa8fb667b341d 31590696 
linux-image-extra-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 61a0d35de49b13f962750eb721c30c67b1f24049 127141976 
linux-source-4.13.0_4.13.0-33.36~16.04.1_all.deb
 baed52292867506953870408063622cc4664c764 50166 
linux-tools-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 33e873e15e7607a168dca4859530f6757aaf2b6d 50164 
linux-tools-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 f96b69a2e1782d0e3d30f0331618afdc96e71984 280972 
md-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 417fb876dcd1ac60e985df30ab6f1edf17c9f2cd 198554 
message-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 ee772ba34d281d1413e9bed8103ec729d69476aa 57756 
mouse-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 0f5f0f17db7390a0d6762e7d616338ef93043905 18042 
multipath-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 20efcfa9f0ab7761b08aa70b910b76bd636448c5 501236 
nfs-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 c5a4df52240054aaddb46984a742972058e941d5 4998586 
nic-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 b7105156933c4efabe58b82804cead81d6f40276 143202 
nic-pcmcia-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 cd2a27bf7a4c6a82e5ad6d28deae3a98030e10aa 541332 
nic-shared-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 d982ee923b3c1bc3e0cd2356e4f55c225af2ea30 288578 
nic-usb-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 5d955276ccf60caaa2bec2276534fe9fca12c9a2 31356 
parport-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 1deb15e5153c4c517bd5e64dac18fa9dac40a5b4 121674 
pata-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 db55898252672fd8b51e1da2eec48debe13ea915 63066 
pcmcia-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 e9ae86c9e47c420a877a6399b95c658cec106541 65720 
pcmcia-storage-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 4aac00dee7dafdd01a8e93f00cf116a3ab4399e6 8652 
plip-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 5225f4a6715a76fa32e4a7e0caf3bd2cc62bdf46 24570 
ppp-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 56e71091628eaddfea3e3b5def711aaa259c69e8 94052 
sata-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 3af3b10c72a99251e1ac95c155a78d4819eb968c 2466934 
scsi-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 b8db471b2a66ee434bf93853684b58fc69fb46fd 84444 
serial-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 a560a9bab47c040d235ba11e5bd02a2898ecaa33 49412 
storage-core-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 e4fcec9f8adc19d511e69e348cbe4527bfebd218 138190 
usb-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 7472c27cec959426e488b8fad59f5b6d772eceec 102176 
virtio-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 c8c9583a7093109edc07848997cd8eee3ab1ad6d 25700 
vlan-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
Checksums-Sha256:
 e0b5eff45068ebdfeeea1341d5efa6cdd5e91507167a180591dadeaf677979e2 385384 
block-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 44ab24b6f6a81713d8121a94461f6dfb895530856afd49dd73ea8286bb8bb760 323234 
crypto-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 10b3b95b90c6f2cc6da9e9222b70a76db5adaf3b844dedbeb97010b06a3c4cf8 4230 
fat-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 b4c7fff3856a42d1883130da97db202ba883aff222d3ededdbb847a7a420168e 13508 
fb-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 f141546c5c29240c46cf4451399d593ebf53ef4c5fcd07a76bd01c5c5af14627 64416 
firewire-core-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 bf55b510afbe23de305915b550e0c87e9e59bc646ee7bc1e0e274811717c2396 34256 
floppy-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 83941123223f3111ae363e65a99e76ed1fb0a43058264d4afd35d53898c22302 1145738 
fs-core-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 ac0f78d1ff7c9458ce0538f917818d91a43c3da06fd798f06ff86cf61cb640cb 624426 
fs-secondary-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 b254d5b8ce4ae8c445ec93b8c9232c0f0b360cf7e5e69289c7b3d00d41a0814f 418924 
input-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 eb99e0531a17700383b23b0f56422b8f7f9217d32c4616dd4d86ca18f8361605 56240 
ipmi-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 a6370fbb8e1f23cea92bd9cbce69777094c7c2c5be28662dc9e76dcf060b0296 225604 
irda-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 f0a2e716b10ff67b0b945c990257813d78f3f2234b2ff53d7e57a6d54c862db6 8416114 
kernel-image-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 b48ceab9ebb998224e8ea24a1ff22da45d860a91f77671eff2bb5d471bef0722 50106 
linux-cloud-tools-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 c8da1cf33beda44750487f83bc25206df67c86dcd9e61ef5ebae98f31167bd3d 50122 
linux-cloud-tools-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 0669fce8f801325fb838e44663caf6f4e661eaf67982897b339c6197bb7e4ac3 734352 
linux-headers-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 05a93f6f9bc91b9a2a80b7fb4a32ef183ed417f15f5227fd9d9c2478d12b1dfd 732630 
linux-headers-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 ddc6d2d8de798423aee923780df501f0d9d18de938802ad92f71377fe6a10118 10769552 
linux-headers-4.13.0-33_4.13.0-33.36~16.04.1_all.deb
 b1079b685344012d3e7e2e7d0e565f381676748761a3422782e745809028b046 850 
linux-hwe-cloud-tools-4.13.0-33-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 d823a2b9de704706e10992b02c2e27a0d52b81a5f45cdc3424b4ccfbc4ae123b 64034 
linux-hwe-cloud-tools-4.13.0-33_4.13.0-33.36~16.04.1_amd64.deb
 2dbf52112f27e1fdd4ba3c376d3efb41f2febcfc5a82de8483f65fb6c5bb501e 874 
linux-hwe-tools-4.13.0-33-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 86c4e625429abefaa8924fc259477bb43096e5e0b01829d27fc065bc58eec6e8 990538 
linux-hwe-tools-4.13.0-33_4.13.0-33.36~16.04.1_amd64.deb
 fb48c0b9cfbc4d7c1fcf93da997f1b5c87d59f7937c59d38789f068025765835 938 
linux-hwe-udebs-generic_4.13.0-33.36~16.04.1_amd64.udeb
 4414663d38b9df07a7dd935b4992612b019c00114466517b75d6c1ac1bfe20bb 15048535 
linux-hwe_4.13.0-33.36~16.04.1_amd64.tar.gz
 25579b133d642f546abee57679907996e9bdbb3ac4154d2b81454f20ed10f4f8 600926816 
linux-image-4.13.0-33-generic-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 ea1f40f0ed0f59748505dfbc2dfbf8f98cd90cb3b990c3d34a31b8cf18d62a1d 20890736 
linux-image-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 d04f4e1ba8d9caf7ac36ad52194f2928de117cf1847e4b71f083b4817fab25b5 600952998 
linux-image-4.13.0-33-lowlatency-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 cdf6d835f11e5373549804a1cb91a7ebcfe08a89597f12f6a6c7f395fe314ee6 52586146 
linux-image-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 1a65f4c7498133b9cecf7dbbba054c0317af5beecd3393ffc7574ef5131f4d03 31590696 
linux-image-extra-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 0c8c830999a027950e5971d44ad8e670fc5fd6bc430be4fa2b5367fb5477b245 127141976 
linux-source-4.13.0_4.13.0-33.36~16.04.1_all.deb
 0750cf8cf297898c1839a085f9915836781019ba01fde09257f5d6aa605ef70c 50166 
linux-tools-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 1630660f91e01ae2e47a4a166454ce3e536f7f948494411ba74a43e94dec6a27 50164 
linux-tools-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 c9c570d1fb7b4b8203424f1ed86ea6052279af275b541892d8654c4cb248a5c3 280972 
md-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 b0954bd5c3c6c6eb3d55232b50cbf8626cf7af6f9057985a7afe8f6cf207417f 198554 
message-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 ed2854118a12a5d4f9a75f9dbae1872504004e9b02202264c343e0996fca3e2f 57756 
mouse-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 7366735d33ef4a59b11beef7ed0752a6297c5e954f3db8a2676859f9226767ad 18042 
multipath-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 0897417aa19df972e6a238b38ce327cae68eabc21b932afebeccf214240ff657 501236 
nfs-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 47d349a8d0d1be49da04a2e94a7c6b336272251b69cfff30664cfbbabd436196 4998586 
nic-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 6a501aae1bb9c4976e1a1ff4ef4e8e3621085592458cac8a8b193e78692b2e78 143202 
nic-pcmcia-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 85058cfdf112e6d2b11fedfb611d956943f1b35d8e5e641b60af93c30d7fdc19 541332 
nic-shared-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 4aa8000e48576ee07597fe4d36612f055db7869ff92623484f73acb28453e30a 288578 
nic-usb-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 6d84618724716b3011f8c137f15e1aae5e286af463d59b6d67ecad66e1e507d1 31356 
parport-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 c56a53f77c1697822b9659fb58bca7b86c00a09b134b7ad5be5a61028d23a31c 121674 
pata-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 d700a5e6e8cab354db465761629df2c62695abc497cb6756b087192006419ee9 63066 
pcmcia-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 ed841e730b9722aca5bc7fd7d0158fd7281732afb3382ce9bbbf079ec75b66f4 65720 
pcmcia-storage-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 6be4b729a86eb6b2ac37cd7e0c8aa9da1f14021c63a650ab786c817138a67fdf 8652 
plip-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 d4fe2c06e6cc0566421765beb5d032f5922502a00695ef552cd5313c96c66a6a 24570 
ppp-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 dd9d759ccbff33e76dd5db91a97d59e2c36506478dc5091d6b8f0fb52b1a124b 94052 
sata-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 63afb129e5890491ba6667471467c43355535cd155fda61f7d50283065820898 2466934 
scsi-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 49a146ead710662c9ddc2ae9db33a76dbff1955ecf26fd27a36d1be14227d0be 84444 
serial-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 e17d6d95e59d71e37f467a3f8c7914720bf3c1da72cc0590c231643f4239bdfd 49412 
storage-core-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 4610521d77a1b10ed604d00a11f492dbacb8ed36510be8ebf9748e8ab7081714 138190 
usb-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 1204e15d64b5d06ae40d77da52ec3f0afc22074ac3ebf45e3170eb194d205060 102176 
virtio-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 385e30e9b4a86bcc7e833927c88159d7399d196843aecb07f701cbdb859cbcce 25700 
vlan-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
Files:
 3b87e403b382e46605193618f77cbb1c 385384 debian-installer standard 
block-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 8c2993c23e342a4ff803cb2c0726b731 323234 debian-installer extra 
crypto-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 84317f50cea2bec402d4664f1b05f5bd 4230 debian-installer standard 
fat-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 c05c995a033300b2d90ec74e0696dfc3 13508 debian-installer standard 
fb-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 d3e837089a966336db4b0f7eb458734b 64416 debian-installer standard 
firewire-core-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 79227be965daa97857f9f9b10bac6d75 34256 debian-installer standard 
floppy-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 0d69474f775041593b425bff1cab5851 1145738 debian-installer standard 
fs-core-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 37fb2550ad590af9dccdbd5c13d26321 624426 debian-installer standard 
fs-secondary-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 a98e4412db44abbdce556280e8d03d80 418924 debian-installer standard 
input-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 39e25b61e5a51d61b0fa4b80725cbdfc 56240 debian-installer standard 
ipmi-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 f93707d43888103f481c0e2f1049eb47 225604 debian-installer standard 
irda-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 7313e623b1aae4c5da8814a2ab5301eb 8416114 debian-installer optional 
kernel-image-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 7c47cd53d7bafb618c2becd430fd2207 50106 devel optional 
linux-cloud-tools-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 7dd37144a66f9f040caa9ff8d46b7453 50122 devel optional 
linux-cloud-tools-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 78594a75a115bfc85ae402189bc74dca 734352 devel optional 
linux-headers-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 badef0e0e11349ce84393a71994df8ae 732630 devel optional 
linux-headers-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 82a6719da66fa439ac8b9585aef7805c 10769552 devel optional 
linux-headers-4.13.0-33_4.13.0-33.36~16.04.1_all.deb
 8c0dd2ba287b7e0b5a510f553d981fae 850 devel extra 
linux-hwe-cloud-tools-4.13.0-33-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 9394550cb19a2a6a414430c9afd5b075 64034 devel optional 
linux-hwe-cloud-tools-4.13.0-33_4.13.0-33.36~16.04.1_amd64.deb
 bf0bb10fb2323dd9e2f50d8267555abc 874 devel extra 
linux-hwe-tools-4.13.0-33-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 325ef6d26ac682712cbec1d6d6e31c78 990538 devel optional 
linux-hwe-tools-4.13.0-33_4.13.0-33.36~16.04.1_amd64.deb
 cd790ebe75a9f908a60ad47aaff05d71 938 debian-installer optional 
linux-hwe-udebs-generic_4.13.0-33.36~16.04.1_amd64.udeb
 eaac5044c286a3ab18102d8b75093b21 15048535 raw-uefi - 
linux-hwe_4.13.0-33.36~16.04.1_amd64.tar.gz
 ba8976a5be230f4bdef354291b52f422 600926816 devel optional 
linux-image-4.13.0-33-generic-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 6f18a697c4a9847d754459f9817851a3 20890736 kernel optional 
linux-image-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 bd7f9ac5775d8f60bdfc7bf15f7e975e 600952998 devel optional 
linux-image-4.13.0-33-lowlatency-dbgsym_4.13.0-33.36~16.04.1_amd64.ddeb
 79098f47e3867fa6a0b883df9e242965 52586146 kernel optional 
linux-image-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 042a15e0a9d0f0ff67005d243ab03f3c 31590696 kernel optional 
linux-image-extra-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 c2d402145dfba6c87a956ef06bf01237 127141976 devel optional 
linux-source-4.13.0_4.13.0-33.36~16.04.1_all.deb
 74e19ef36338ee9456ba5db013c68cb9 50166 devel optional 
linux-tools-4.13.0-33-generic_4.13.0-33.36~16.04.1_amd64.deb
 4846f4ec69fca73368b2781dc84dcce4 50164 devel optional 
linux-tools-4.13.0-33-lowlatency_4.13.0-33.36~16.04.1_amd64.deb
 887ca01f60a1844faed9bc146431ee0c 280972 debian-installer standard 
md-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 d547ee3251a0f05d0372c7dd02a1ef5c 198554 debian-installer standard 
message-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 c170b63aceee666e794b4ac683c0f750 57756 debian-installer extra 
mouse-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 6983c76fbe8cd368976c1f32ada3028e 18042 debian-installer extra 
multipath-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 fc3eb0523157cddde707d6231869c58b 501236 debian-installer standard 
nfs-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 4d1c2ff3d8500db86e7e1c5b56e763ff 4998586 debian-installer standard 
nic-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 b5acf7d61469d693dcef6a02e5867750 143202 debian-installer standard 
nic-pcmcia-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 6ec3767be486d5c7c66393da96898c03 541332 debian-installer standard 
nic-shared-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 aecf897abf0a86470d87b35f002f4563 288578 debian-installer standard 
nic-usb-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 20385889d6b3c70aafae20842659b45f 31356 debian-installer standard 
parport-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 90d7bcf5a1ee4f18afd081223e1a9fc5 121674 debian-installer standard 
pata-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 8179296140e503e1eb5f7c019ec6aebf 63066 debian-installer standard 
pcmcia-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 bb52600782fee0a848592b761e21393b 65720 debian-installer standard 
pcmcia-storage-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 0ef942167d1579081c02dc825a88b9f4 8652 debian-installer standard 
plip-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 35eb26b2d87f10fa14f64e134f333057 24570 debian-installer standard 
ppp-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 4d455ff5315f8e345dd50360eeea1115 94052 debian-installer standard 
sata-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 d341d6b8b1c4ee514ba71954b598024b 2466934 debian-installer standard 
scsi-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 963d18900688aae57aec6828d8f23cfb 84444 debian-installer standard 
serial-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 646647ead7007334ff09698152c7a13b 49412 debian-installer standard 
storage-core-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 e2b4fc71a8d7fa0b11162b73186b969d 138190 debian-installer standard 
usb-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 66d368199e335b6896db468157069ba9 102176 debian-installer standard 
virtio-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
 1423d67c8f5223832d33d8bf7083af9a 25700 debian-installer extra 
vlan-modules-4.13.0-33-generic-di_4.13.0-33.36~16.04.1_amd64.udeb
Package-Type: udeb
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to