This bug was fixed in the package linux - 5.2.0-8.9
---------------
linux (5.2.0-8.9) eoan; urgency=medium
* linux: 5.2.0-8.9 -proposed tracker (LP: #1835700)
* Miscellaneous Ubuntu changes
- [Packaging] replace zfs and spl build with zfs 0.8.1-1ubuntu1
- SAUCE: test_bpf: remove expected fail for Ctx heavy transformations test
on
s390
- SAUCE: add -fcf-protection=none to retpoline flags
- SAUCE: usbip: ensure strings copied using strncpy are null-terminated
- SAUCE: usbip: add -Wno-address-of-packed-member to EXTRA_CFLAGS
- SAUCE: perf jvmti: ensure strncpy result is null-terminated
- update dkms package versions
- add removed zfs modules to modules.ignore
[ Upstream Kernel Changes ]
* Rebase to v5.2
-- Seth Forshee <[email protected]> Mon, 08 Jul 2019 07:13:41
-0500
** Changed in: linux (Ubuntu Eoan)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1829050
Title:
Eoan update: v5.1.2 upstream stable release
Status in linux package in Ubuntu:
Fix Released
Status in linux source package in Eoan:
Fix Released
Bug description:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.1.2 upstream stable release
from git://git.kernel.org/
Linux 5.1.2
x86/speculation/mds: Fix documentation typo
Documentation: Correct the possible MDS sysfs values
x86/mds: Add MDSUM variant to the MDS documentation
x86/speculation/mds: Add 'mitigations=' support for MDS
s390/speculation: Support 'mitigations=' cmdline option
powerpc/speculation: Support 'mitigations=' cmdline option
x86/speculation: Support 'mitigations=' cmdline option
cpu/speculation: Add 'mitigations=' cmdline option
x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
x86/speculation/mds: Fix comment
x86/speculation/mds: Add SMT warning message
x86/speculation: Move arch_smt_update() call to after mitigation decisions
x86/speculation/mds: Add mds=full,nosmt cmdline option
Documentation: Add MDS vulnerability documentation
Documentation: Move L1TF to separate directory
x86/speculation/mds: Add mitigation mode VMWERV
x86/speculation/mds: Add sysfs reporting for MDS
x86/speculation/mds: Add mitigation control for MDS
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
x86/kvm/vmx: Add MDS protection when L1D Flush is not active
x86/speculation/mds: Clear CPU buffers on exit to user
x86/speculation/mds: Add mds_clear_cpu_buffers()
x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
x86/speculation/mds: Add BUG_MSBDS_ONLY
x86/speculation/mds: Add basic bug infrastructure for MDS
x86/speculation: Consolidate CPU whitelists
x86/msr-index: Cleanup bit defines
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1829050/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp