linux-aws: 4.4.0-1058.67 -proposed tracker

Bug #1770016 reported by Stefan Bader on 2018-05-08
18
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Canonical Hardware Certification
Prepare-package
Medium
Kleber Sacilotto de Souza
Prepare-package-meta
Medium
Kleber Sacilotto de Souza
Promote-to-proposed
Medium
Łukasz Zemczak
Promote-to-security
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Medium
Canonical Kernel Team
Security-signoff
Medium
Steve Beattie
Snap-release-to-beta
Medium
Canonical Kernel Team
Snap-release-to-candidate
Medium
Canonical Kernel Team
Snap-release-to-edge
Medium
Canonical Kernel Team
Snap-release-to-stable
Medium
Canonical Kernel Team
Upload-to-ppa
Medium
Canonical Kernel Team
Verification-testing
Medium
Canonical Kernel Team
linux-aws (Ubuntu)
Undecided
Unassigned
Xenial
Medium
Unassigned

Bug Description

This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1770011
phase: Promoted to proposed
proposed-announcement-sent: true
proposed-testing-requested: true

Stefan Bader (smb) on 2018-05-08
tags: added: kernel-release-tracking-bug
tags: added: kernel-release-tracking-bug-live
tags: added: xenial
Changed in linux-aws (Ubuntu Xenial):
status: New → Confirmed
Changed in linux-aws (Ubuntu):
status: New → Invalid
Changed in linux-aws (Ubuntu Xenial):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
tags: added: kernel-sru-cycle-2018.04.23-2
tags: added: kernel-sru-derivative-of-1770011
Brad Figg (brad-figg) on 2018-05-09
description: updated
description: updated
summary: - linux-aws: <version to be filled> -proposed tracker
+ linux-aws: 4.4.0-1058.67 -proposed tracker
Brad Figg (brad-figg) on 2018-05-09
description: updated
description: updated
Brad Figg (brad-figg) on 2018-05-09
description: updated
description: updated
Brad Figg (brad-figg) on 2018-05-09
description: updated
Brad Figg (brad-figg) on 2018-05-10
tags: added: block-proposed-xenial
tags: added: block-proposed
Brad Figg (brad-figg) on 2018-05-10
description: updated
description: updated

Regression tests completed for linux-aws 4.4.0-1056.65 (bug 1766614).

Po-Hsu Lin (cypressyew) on 2018-05-15
tags: added: regression-testing-passed
Launchpad Janitor (janitor) wrote :
Download full text (59.7 KiB)

This bug was fixed in the package linux-aws - 4.4.0-1060.69

---------------
linux-aws (4.4.0-1060.69) xenial; urgency=medium

  [ Ubuntu: 4.4.0-127.153 ]

  * CVE-2018-3639 (powerpc)
    - powerpc/pseries: Support firmware disable of RFI flush
    - powerpc/powernv: Support firmware disable of RFI flush
    - powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs code
    - powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again
    - powerpc/rfi-flush: Always enable fallback flush on pseries
    - powerpc/rfi-flush: Differentiate enabled and patched flush types
    - powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration
    - powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
    - powerpc: Add security feature flags for Spectre/Meltdown
    - powerpc/pseries: Set or clear security feature flags
    - powerpc/powernv: Set or clear security feature flags
    - powerpc/64s: Move cpu_show_meltdown()
    - powerpc/64s: Enhance the information in cpu_show_meltdown()
    - powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
    - powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()
    - powerpc/64s: Wire up cpu_show_spectre_v1()
    - powerpc/64s: Wire up cpu_show_spectre_v2()
    - powerpc/pseries: Fix clearing of security feature flags
    - powerpc: Move default security feature flags
    - powerpc/pseries: Restore default security feature flags on setup
    - SAUCE: powerpc/64s: Add support for a store forwarding barrier at kernel
      entry/exit
  * CVE-2018-3639 (x86)
    - SAUCE: Clean up IBPB and IBRS control functions and macros
    - SAUCE: Fix up IBPB and IBRS kernel parameters documentation
    - SAUCE: Remove #define X86_FEATURE_PTI
    - x86/cpufeature: Move some of the scattered feature bits to x86_capability
    - x86/cpufeature: Cleanup get_cpu_cap()
    - x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6
    - x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
    - x86/cpufeatures: Add Intel feature bits for Speculation Control
    - SAUCE: x86/kvm: Expose SPEC_CTRL from the leaf
    - x86/cpufeatures: Add AMD feature bits for Speculation Control
    - x86/msr: Add definitions for new speculation control MSRs
    - SAUCE: x86/msr: Rename MSR spec control feature bits
    - x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
    - x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes
    - x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
    - x86/speculation: Add <asm/msr-index.h> dependency
    - x86/cpufeatures: Clean up Spectre v2 related CPUID flags
    - x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
    - SAUCE: x86/speculation: Move vendor specific IBRS/IBPB control code
    - SAUCE: x86: Add alternative_msr_write
    - SAUCE: x86/nospec: Simplify alternative_msr_write()
    - SAUCE: x86/bugs: Concentrate bug detection into a separate function
    - SAUCE: x86/bugs: Concentrate bug reporting into a separate function
    - arch: Introduce post-init read-only memory
    - SAUCE: x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
    - SAUCE: x86/bugs, KVM...

Changed in linux-aws (Ubuntu Xenial):
status: Confirmed → Fix Released

All tasks have been completed and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Duplicates of this bug

Other bug subscribers