[Kernel-packages] [Bug 1791080] Re: Xenial update to 4.4.144 stable release

2018-10-01 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-137.163 --- linux (4.4.0-137.163) xenial; urgency=medium * CVE-2018-14633 - iscsi target: Use hex2bin instead of a re-implementation * CVE-2018-17182 - mm: get rid of vmacache_flush_all() entirely linux (4.4.0-136.162) xeni

[Kernel-packages] [Bug 1791080] Re: Xenial update to 4.4.144 stable release

2018-09-10 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1791080 Title: Xenial update to 4.4.144 stable release St

[Kernel-packages] [Bug 1791080] Re: Xenial update to 4.4.144 stable release

2018-09-07 Thread Stefan Bader
Remaining non Spectre v4 import: * block: do not use interruptible wait anywhere -> pick, context -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1791080 Title: Xenial update to 4.4.144

[Kernel-packages] [Bug 1791080] Re: Xenial update to 4.4.144 stable release

2018-09-07 Thread Stefan Bader
Continue Spectre v4 review: * x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation -> skip, no change * x86/bugs/intel: Set proper CPU features and setup RDS -> skip, no change but note that we keep using ibrs_inuse() instead of the feature bit. * x86/bugs: Whit

[Kernel-packages] [Bug 1791080] Re: Xenial update to 4.4.144 stable release

2018-09-07 Thread Stefan Bader
Continue Spectre v4 review: * x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist -> skip, ignore blacklist * selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC -> skip, no change * x86/amd: don't set X86_BUG_SYSRET_SS_ATTRS when running under Xen

[Kernel-packages] [Bug 1791080] Re: Xenial update to 4.4.144 stable release

2018-09-06 Thread Stefan Bader
Continue Spectre v4 review: * x86/speculation: Update Speculation Control microcode blacklist -> skip, we do not carry the blacklist * x86/speculation: Correct Speculation Control microcode blacklist again -> skip, again firmware blacklist * x86/speculation: Clean up various Spectre related

[Kernel-packages] [Bug 1791080] Re: Xenial update to 4.4.144 stable release

2018-09-06 Thread Stefan Bader
This upstream stable update contains the backport for CVE-2018-3639 (x86) aka Spectre v4/SSB. * x86/cpufeatures: Add CPUID_7_EDX CPUID leaf The upstream stable patch adds two previously unknown feature bits for word 18 which I added with a SAUCE patch. * x86/cpufeatures: Add Intel feature bi