*** This bug is a duplicate of bug 1774190 *** https://bugs.launchpad.net/bugs/1774190
This bug was fixed in the package linux - 3.13.0-151.201 --------------- linux (3.13.0-151.201) trusty; urgency=medium * linux: 3.13.0-151.201 -proposed tracker (LP: #1774190) * CVE-2018-3639 (x86) - SAUCE: Set generic SSBD feature for Intel cpus - KVM: vmx: fix MPX detection - KVM: x86: Fix MSR_IA32_BNDCFGS in msrs_to_save - x86/cpu: Add CLZERO detection * Trusty cannot load microcode for family 17h AMD processors (LP: #1774082) - x86/microcode/AMD: Add support for fam17h microcode loading linux (3.13.0-150.200) trusty; urgency=medium * linux: 3.13.0-150.200 -proposed tracker (LP: #1772970) * CVE-2018-3639 (x86) - x86/cpu: Make alternative_msr_write work for 32-bit code - x86/cpu/AMD: Fix erratum 1076 (CPB bit) - x86/bugs: Fix the parameters alignment and missing void - KVM: SVM: Move spec control call after restore of GS - x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP - x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS - x86/cpufeatures: Disentangle SSBD enumeration - x86/cpufeatures: Add FEATURE_ZEN - x86/speculation: Handle HT correctly on AMD - x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL - x86/speculation: Add virtualized speculative store bypass disable support - SAUCE: x86/cpu: Rename x86_amd_ssbd_enable - x86/speculation: Rework speculative_store_bypass_update() - x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host} - x86/bugs: Expose x86_spec_ctrl_base directly - x86/bugs: Remove x86_spec_ctrl_set() - x86/bugs: Rework spec_ctrl base and mask logic - x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG - KVM: x86: introduce num_emulated_msrs - KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD - x86/bugs: Rename SSBD_NO to SSB_NO - KVM: VMX: Expose SSBD properly to guests. * CVE-2018-7492 - rds: Fix NULL pointer dereference in __rds_rdma_map * CVE-2017-0627 - media: uvcvideo: Prevent heap overflow when accessing mapped controls * CVE-2018-8781 - drm: udl: Properly check framebuffer mmap offsets * CVE-2018-1068 - netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets -- Stefan Bader <stefan.ba...@canonical.com> Wed, 30 May 2018 16:02:01 +0200 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1772970 Title: linux: 3.13.0-150.200 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Confirmed Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Bug description: This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: bug 1772971 (linux-lts-trusty) derivatives: -- swm properties -- boot-testing-requested: true bugs-spammed: true phase: Promoted to proposed proposed-announcement-sent: true proposed-testing-requested: true To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1772970/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp