linux-gcp: 4.15.0-1031.33~16.04.1 -proposed tracker
Bug #1826339 reported by
Stefan Bader
This bug affects 1 person
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
phase: Holding before Release
phase-changed: Monday, 13. May 2019 10:15 UTC
proposed-
proposed-
Changed in linux-gcp (Ubuntu): | |
status: | New → Invalid |
Changed in linux-gcp (Ubuntu Xenial): | |
importance: | Undecided → Medium |
tags: | added: xenial |
tags: | added: kernel-release-tracking-bug |
tags: | added: kernel-release-tracking-bug-live |
tags: | added: kernel-sru-cycle-2019.04.22-1 |
description: | updated |
tags: | added: kernel-sru-backport-of-1826340 |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
description: | updated |
description: | updated |
summary: |
- linux-gcp: <version to be filled> -proposed tracker + linux-gcp: 4.15.0-1031.33~16.04.1 -proposed tracker |
description: | updated |
description: | updated |
tags: | added: block-proposed-xenial |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: regression-testing-passed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-sru-backport-of-1826340 |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Invalid |
Changed in linux-gcp (Ubuntu Xenial): | |
status: | Fix Released → Invalid |
Changed in linux-gcp (Ubuntu Xenial): | |
status: | Invalid → Fix Released |
To post a comment you must log in.
This bug was fixed in the package linux-gcp - 4.15.0- 1032.34~ 16.04.1
--------------- 1032.34~ 16.04.1) xenial; urgency=medium
linux-gcp (4.15.0-
[ Ubuntu: 4.15.0-1032.34 ]
* CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130 /mds: Add basic bug infrastructure for MDS /mds: Add BUG_MSBDS_ONLY MD_CLEAR to guests /mds: Add mds_clear_ cpu_buffers( ) /mds: Clear CPU buffers on exit to user /mds: Conditionally clear CPU buffers on idle entry /mds: Add mitigation control for MDS /mds: Add sysfs reporting for MDS /mds: Add mitigation mode VMWERV /mds: Add mds=full,nosmt cmdline option /mds: Add SMT warning message /mds: Fix comment /mds: Print SMT vulnerable on MSBDS with mitigations off /mds: Add 'mitigations=' support for MDS speculation: Support 'mitigations=' cmdline option
- Documentation/l1tf: Fix small spelling typo
- x86/cpu: Sanitize FAM6_ATOM naming
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
- locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a
new <linux/bits.h> file
- tools include: Adopt linux/bits.h
- x86/msr-index: Cleanup bit defines
- x86/speculation: Consolidate CPU whitelists
- x86/speculation
- x86/speculation
- x86/kvm: Expose X86_FEATURE_
- x86/speculation
- x86/speculation
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
- x86/speculation
- x86/speculation
- x86/speculation
- x86/speculation
- Documentation: Move L1TF to separate directory
- Documentation: Add MDS vulnerability documentation
- x86/speculation
- x86/speculation: Move arch_smt_update() call to after mitigation decisions
- x86/speculation
- x86/speculation
- x86/speculation
- x86/speculation
* CVE-2017-5715 // CVE-2017-5753
- s390/speculation: Support 'mitigations=' cmdline option
* CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
- powerpc/
* CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 //
CVE-2018-3646
- cpu/speculation: Add 'mitigations=' cmdline option
- x86/speculation: Support 'mitigations=' cmdline option
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
* linux: 4.15.0-49.53 -proposed tracker (LP: #1826358)
* bionic: fork out linux-snapdragon into its own topic kernel (LP: #1820868)
- [Packaging] arm64: Drop snapdragon from kernel-versions
linux-gcp (4.15.0- 1031.33~ 16.04.1) xenial; urgency=medium
* linux-gcp: 4.15.0- 1031.33~ 16.04.1 -proposed tracker (LP: #1826339)
[ Ubuntu: 4.15.0-1031.33 ]
* linux-gcp: 4.15.0-1031.33 -proposed tracker (LP: #1826340) spectre_ v1()
* linux: 4.15.0-49.52 -proposed tracker (LP: #1826358)
* Backport support for software count cache flush Spectre v2 mitigation. (CVE)
(required for POWER9 DD2.3) (LP: #1822870)
- powerpc/64s: Add support for ori barrier_nospec patching
- powerpc/64s: Patch barrier_nospec in modules
- powerpc/64s: Enable barrier_nospec based on firmware settings
- powerpc: Use barrier_nospec in copy_from_user()
- powerpc/64: Use barrier_nospec in syscall entry
- powerpc/64s: Enhance the information in cpu_show_
- powerpc/64: Disable the specula...