** Patch added: "fix-lp1398975-trusty.debdiff" https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1398975/+attachment/4273748/+files/fix-lp1398975-trusty.debdiff
-- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to eglibc in Ubuntu. https://bugs.launchpad.net/bugs/1398975 Title: hardware-assisted lock elision hazardous on x86 Status in eglibc package in Ubuntu: Invalid Status in glibc package in Ubuntu: Fix Released Status in eglibc source package in Trusty: In Progress Status in glibc source package in Utopic: In Progress Status in glibc package in Debian: Unknown Bug description: [Impact] See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762195 for a full description of the issue. HLE extensions are hazardous due to erratum HSD136. Users that upgrade their intel-microcode could encounter illegal instruction traps due to microcode updates that blacklist HLE instructions. Glibc uses those instructions and thus we need to be defensive and patch them here. The issue was originally seen here: https://bugs.launchpad.net/intel/+bug/1370352 [Test Case] Update to latest intel-microcode with microcode-20140913.dat enabled. Try to boot machine and use applications; check dmesg for trap invalid opcodes in libpthread-2.19.so. [Regression Potential] This has been fixed in vivid, so I'm requesting this patch be backported to T/U. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/eglibc/+bug/1398975/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp