ACK: [SRU][Trusty][PULL] Updates for CVE-2017-5753
Stefan Bader
stefan.bader at canonical.com
Tue Nov 20 10:52:28 UTC 2018
On 13.11.18 17:11, Juerg Haefliger wrote:
> CVE-2017-5753
>
> This pull request contains fix(es) for the following CVE(s): CVE-2017-5753
>
> Add Spectre v1 pointer masking in various places and some minor fixes to
> match upstream stable v4.9.
>
> Compile-tested all architectures.
>
> Signed-off-by: Juerg Haefliger <juergh at canonical.com>
> ---
>
> The following changes since commit 75136bbc88ff3f96baa790d65e2826f64e5d5772:
>
> drm: fix NULL pointer access by wrong ioctl (2018-11-07 22:47:19 -0500)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~juergh/+git/trusty-linux update-spectre-v1
>
> for you to fetch changes up to d56fe24802964e8ba4eff3f4b2f7feab97d668ab:
>
> tty: vt_ioctl: fix potential Spectre v1 (2018-11-12 16:37:46 +0100)
>
> ----------------------------------------------------------------
> Dan Williams (2):
> x86/spectre_v1: Disable compiler optimizations over array_index_mask_nospec()
> x86/speculation: Fix up array_index_nospec_mask() asm constraint
>
> Gustavo A. R. Silva (8):
> net: atm: Fix potential Spectre v1
> atm: zatm: Fix potential Spectre v1
> kernel/sys.c: fix potential Spectre v1 issue
> HID: hiddev: fix potential Spectre v1
> atm: zatm: Fix potential Spectre v1
> net: cxgb3_main: fix potential Spectre v1
> misc: hmc6352: fix potential Spectre v1
> tty: vt_ioctl: fix potential Spectre v1
>
> Jeremy Cline (4):
> netlink: Fix spectre v1 gadget in netlink_create()
> net: socket: fix potential spectre v1 gadget in socketcall
> ext4: fix spectre gadget in ext4_mb_regular_allocator()
> fs/quota: Fix spectre gadget in do_quotactl
>
> John Garry (1):
> libahci: Fix possible Spectre-v1 pmp indexing in ahci_led_store()
>
> Peter Zijlstra (2):
> perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_*
> perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map()
>
> Takashi Iwai (7):
> ALSA: opl3: Hardening for potential Spectre v1
> ALSA: asihpi: Hardening for potential Spectre v1
> ALSA: hdspm: Hardening for potential Spectre v1
> ALSA: rme9652: Hardening for potential Spectre v1
> ALSA: control: Hardening for potential Spectre v1
> ALSA: seq: oss: Hardening for potential Spectre v1
> ALSA: hda: Hardening for potential Spectre v1
>
> arch/x86/include/asm/barrier.h | 4 +-
> arch/x86/kernel/cpu/perf_event.c | 8 ++-
> drivers/ata/libahci.c | 7 ++-
> drivers/atm/zatm.c | 5 ++
> drivers/hid/usbhid/hiddev.c | 11 ++++
> drivers/misc/hmc6352.c | 2 +
> drivers/net/ethernet/chelsio/cxgb3/cxgb3_main.c | 2 +
> drivers/tty/vt/vt_ioctl.c | 4 ++
> fs/ext4/mballoc.c | 4 +-
> fs/quota/quota.c | 2 +
> include/sound/control.h | 7 ++-
> kernel/sys.c | 4 ++
> net/atm/lec.c | 9 ++-
> net/netlink/af_netlink.c | 2 +
> net/socket.c | 2 +
> sound/core/seq/oss/seq_oss_event.c | 15 +++--
> sound/core/seq/oss/seq_oss_midi.c | 2 +
> sound/core/seq/oss/seq_oss_synth.c | 75 ++++++++++++++-----------
> sound/core/seq/oss/seq_oss_synth.h | 3 +-
> sound/drivers/opl3/opl3_synth.c | 7 ++-
> sound/pci/asihpi/hpimsginit.c | 13 +++--
> sound/pci/asihpi/hpioctl.c | 4 +-
> sound/pci/hda/hda_hwdep.c | 12 +++-
> sound/pci/rme9652/hdspm.c | 24 ++++----
> sound/pci/rme9652/rme9652.c | 6 +-
> 25 files changed, 164 insertions(+), 70 deletions(-)
>
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20181120/41bdfdc6/attachment-0001.sig>
More information about the kernel-team
mailing list