Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.15.193 upstream stable release
from git://git.kernel.org/
Documentation/hw-vuln: Add VMSCAPE documentation
x86/vmscape: Enumerate VMSCAPE bug
x86/vmscape: Add conditional IBPB mitigation
x86/vmscape: Enable the mitigation
UBUNTU: [Config] enable CONFIG_MITIGATION_VMSCAPE
x86/bugs: Move cpu_bugs_smt_update() down
x86/vmscape: Warn when STIBP is disabled with SMT
x86/vmscape: Add old Intel CPUs to affected list
Linux 5.15.193
UBUNTU: Upstream stable to v5.15.193
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Bethany Jamison (bjamison)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-stable-tracking-bug
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Jammy)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Bethany Jamison (bjamison)
** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.15.193 upstream stable release
from git://git.kernel.org/
-
+ Documentation/hw-vuln: Add VMSCAPE documentation
+ x86/vmscape: Enumerate VMSCAPE bug
+ x86/vmscape: Add conditional IBPB mitigation
+ x86/vmscape: Enable the mitigation
+ UBUNTU: [Config] enable CONFIG_MITIGATION_VMSCAPE
+ x86/bugs: Move cpu_bugs_smt_update() down
+ x86/vmscape: Warn when STIBP is disabled with SMT
+ x86/vmscape: Add old Intel CPUs to affected list
Linux 5.15.193
- x86/vmscape: Add old Intel CPUs to affected list
- x86/vmscape: Warn when STIBP is disabled with SMT
- x86/bugs: Move cpu_bugs_smt_update() down
- x86/vmscape: Enable the mitigation
- x86/vmscape: Add conditional IBPB mitigation
- x86/vmscape: Enumerate VMSCAPE bug
- Documentation/hw-vuln: Add VMSCAPE documentation
+ UBUNTU: Upstream stable to v5.15.193
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2127112
Title:
Jammy update: v5.15.193 upstream stable release
Status in linux package in Ubuntu:
Invalid
Status in linux source package in Jammy:
In Progress
Bug description:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.15.193 upstream stable release
from git://git.kernel.org/
Documentation/hw-vuln: Add VMSCAPE documentation
x86/vmscape: Enumerate VMSCAPE bug
x86/vmscape: Add conditional IBPB mitigation
x86/vmscape: Enable the mitigation
UBUNTU: [Config] enable CONFIG_MITIGATION_VMSCAPE
x86/bugs: Move cpu_bugs_smt_update() down
x86/vmscape: Warn when STIBP is disabled with SMT
x86/vmscape: Add old Intel CPUs to affected list
Linux 5.15.193
UBUNTU: Upstream stable to v5.15.193
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2127112/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp