[Kernel-packages] [Bug 1835580] Re: Disco update: 5.0.16 upstream stable release

2019-08-13 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-25.26

---
linux (5.0.0-25.26) disco; urgency=medium

  * CVE-2019-1125
- x86/cpufeatures: Carve out CQM features retrieval
- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word
- x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations
- x86/speculation: Enable Spectre v1 swapgs mitigations
- x86/entry/64: Use JMP instead of JMPQ
- x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS

 -- Kleber Sacilotto de Souza   Thu, 01 Aug
2019 12:04:35 +0200

** Changed in: linux (Ubuntu Disco)
   Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-1125

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1835580

Title:
  Disco update: 5.0.16 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Disco:
  Fix Released

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.0.16 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1835580/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1835580] Re: Disco update: 5.0.16 upstream stable release

2019-07-15 Thread Stefan Bader
Already applied for CVE-2018-12126, CVE-2018-12127, CVE-2018-12130:
- "x86/msr-index: Cleanup bit defines"
- "x86/speculation: Consolidate CPU whitelists"
- "x86/speculation/mds: Add basic bug infrastructure for MDS"
- "x86/speculation/mds: Add BUG_MSBDS_ONLY"
- "x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests"
- "x86/speculation/mds: Add mds_clear_cpu_buffers()"
- "x86/speculation/mds: Clear CPU buffers on exit to user"
- "x86/kvm/vmx: Add MDS protection when L1D Flush is not active"
- "x86/speculation/mds: Conditionally clear CPU buffers on idle entry"
- "x86/speculation/mds: Add mitigation control for MDS"
- "x86/speculation/mds: Add sysfs reporting for MDS"
- "x86/speculation/mds: Add mitigation mode VMWERV"
- "Documentation: Move L1TF to separate directory"
- "Documentation: Add MDS vulnerability documentation"
- "x86/speculation/mds: Add mds=full,nosmt cmdline option"
- "x86/speculation: Move arch_smt_update() call to after mitigation decisions"
- "x86/speculation/mds: Add SMT warning message"
- "x86/speculation/mds: Fix comment"
- "x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off"
- "cpu/speculation: Add 'mitigations=' cmdline option"
- "x86/speculation: Support 'mitigations=' cmdline option"
- "powerpc/speculation: Support 'mitigations=' cmdline option"
- "s390/speculation: Support 'mitigations=' cmdline option"
- "x86/speculation/mds: Add 'mitigations=' support for MDS"

Already applied for CVE-2019-11091:
- "x86/mds: Add MDSUM variant to the MDS documentation"

Already applied for CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, 
CVE-2019-11091:
- "Documentation: Correct the possible MDS sysfs values"
- "x86/speculation/mds: Fix documentation typo"

This upstream stable already was completely applied for security.

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12126

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12127

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12130

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11091

** Changed in: linux (Ubuntu Disco)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1835580

Title:
  Disco update: 5.0.16 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Disco:
  Fix Committed

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.0.16 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1835580/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1835580] Re: Disco update: 5.0.16 upstream stable release

2019-07-15 Thread Stefan Bader
** Changed in: linux (Ubuntu Disco)
   Status: New => In Progress

** Changed in: linux (Ubuntu Disco)
 Assignee: (unassigned) => Stefan Bader (smb)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1835580

Title:
  Disco update: 5.0.16 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Disco:
  In Progress

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.0.16 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1835580/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1835580] Re: Disco update: 5.0.16 upstream stable release

2019-07-08 Thread Connor Kuehl
** Changed in: linux (Ubuntu Disco)
   Status: In Progress => New

** Changed in: linux (Ubuntu Disco)
 Assignee: Connor Kuehl (connork) => (unassigned)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1835580

Title:
  Disco update: 5.0.16 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Disco:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 5.0.16 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1835580/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp