This bug was fixed in the package qemu - 2.0.0+dfsg-2ubuntu1.38
---------------
qemu (2.0.0+dfsg-2ubuntu1.38) trusty-security; urgency=medium
* SECURITY UPDATE: Add support for Spectre mitigations (LP: #1744882)
- debian/patches/CVE-2017-5715-1.patch: Lengthen X86CPUDefinition::
model_id in target-i386/cpu.c.
- debian/patches/CVE-2017-5715-2.patch: Add support for SPEC_CTRL MSR
in target-i386/cpu.h, target-i386/kvm.c, target-i386/machine.c.
- debian/patches/CVE-2017-5715-3pre1.patch: add FEAT_7_0_ECX and
FEAT_7_0_EDX in target-i386/cpu.c, target-i386/cpu.h.
- debian/patches/CVE-2017-5715-3.patch: Add spec-ctrl CPUID bit in
target-i386/cpu.c, target-i386/cpu.h.
- debian/patches/CVE-2017-5715-4.patch: Add FEAT_8000_0008_EBX CPUID
feature word in target-i386/cpu.c, target-i386/cpu.h.
- debian/patches/CVE-2017-5715-5.patch: Add new -IBRS versions of Intel
CPU models in target-i386/cpu.c.
- CVE-2017-5715
-- Marc Deslauriers <[email protected]> Thu, 01 Feb 2018
13:27:00 -0500
** Changed in: qemu (Ubuntu Trusty)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1744882
Title:
Add SPEC_CTRL and IBRS changes
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1744882/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs