[Kernel-packages] [Bug 1835580] Re: Disco update: 5.0.16 upstream stable release
This bug was fixed in the package linux - 5.0.0-25.26 --- linux (5.0.0-25.26) disco; urgency=medium * CVE-2019-1125 - x86/cpufeatures: Carve out CQM features retrieval - x86/cpufeatures: Combine word 11 and 12 into a new scattered features word - x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations - x86/speculation: Enable Spectre v1 swapgs mitigations - x86/entry/64: Use JMP instead of JMPQ - x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS -- Kleber Sacilotto de Souza Thu, 01 Aug 2019 12:04:35 +0200 ** Changed in: linux (Ubuntu Disco) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-1125 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1835580 Title: Disco update: 5.0.16 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Disco: Fix Released Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.0.16 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1835580/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1835580] Re: Disco update: 5.0.16 upstream stable release
Already applied for CVE-2018-12126, CVE-2018-12127, CVE-2018-12130: - "x86/msr-index: Cleanup bit defines" - "x86/speculation: Consolidate CPU whitelists" - "x86/speculation/mds: Add basic bug infrastructure for MDS" - "x86/speculation/mds: Add BUG_MSBDS_ONLY" - "x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests" - "x86/speculation/mds: Add mds_clear_cpu_buffers()" - "x86/speculation/mds: Clear CPU buffers on exit to user" - "x86/kvm/vmx: Add MDS protection when L1D Flush is not active" - "x86/speculation/mds: Conditionally clear CPU buffers on idle entry" - "x86/speculation/mds: Add mitigation control for MDS" - "x86/speculation/mds: Add sysfs reporting for MDS" - "x86/speculation/mds: Add mitigation mode VMWERV" - "Documentation: Move L1TF to separate directory" - "Documentation: Add MDS vulnerability documentation" - "x86/speculation/mds: Add mds=full,nosmt cmdline option" - "x86/speculation: Move arch_smt_update() call to after mitigation decisions" - "x86/speculation/mds: Add SMT warning message" - "x86/speculation/mds: Fix comment" - "x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off" - "cpu/speculation: Add 'mitigations=' cmdline option" - "x86/speculation: Support 'mitigations=' cmdline option" - "powerpc/speculation: Support 'mitigations=' cmdline option" - "s390/speculation: Support 'mitigations=' cmdline option" - "x86/speculation/mds: Add 'mitigations=' support for MDS" Already applied for CVE-2019-11091: - "x86/mds: Add MDSUM variant to the MDS documentation" Already applied for CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091: - "Documentation: Correct the possible MDS sysfs values" - "x86/speculation/mds: Fix documentation typo" This upstream stable already was completely applied for security. ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12126 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12127 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12130 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11091 ** Changed in: linux (Ubuntu Disco) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1835580 Title: Disco update: 5.0.16 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Disco: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.0.16 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1835580/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1835580] Re: Disco update: 5.0.16 upstream stable release
** Changed in: linux (Ubuntu Disco) Status: New => In Progress ** Changed in: linux (Ubuntu Disco) Assignee: (unassigned) => Stefan Bader (smb) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1835580 Title: Disco update: 5.0.16 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Disco: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.0.16 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1835580/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1835580] Re: Disco update: 5.0.16 upstream stable release
** Changed in: linux (Ubuntu Disco) Status: In Progress => New ** Changed in: linux (Ubuntu Disco) Assignee: Connor Kuehl (connork) => (unassigned) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1835580 Title: Disco update: 5.0.16 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Disco: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 5.0.16 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1835580/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp