[ubuntu/trusty-updates] linux 3.13.0-170.220 (Accepted)
Andy Whitcroft
apw at canonical.com
Tue May 14 19:51:59 UTC 2019
linux (3.13.0-170.220) trusty; urgency=medium
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
* CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
- KVM: x86: pass host_initiated to functions that read MSRs
- KVM: x86: remove data variable from kvm_get_msr_common
- x86/cpufeature: Move some of the scattered feature bits to x86_capability
- x86/cpufeature: Cleanup get_cpu_cap()
- x86/cpufeature: Use enum cpuid_leafs instead of magic numbers
- KVM: x86: remove magic number with enum cpuid_leafs
- SAUCE: KVM/VMX: Move spec_ctrl from kvm_vcpu_arch to vcpu_vmx
- KVM: VMX: fixes for vmentry_l1d_flush module parameter
- perf/x86/intel: Use Intel family macros for core perf events
- SAUCE: perf/x86/uncore: Use Intel Model name macros
- x86/speculation: Simplify the CPU bug detection logic
- x86/cpu: Sanitize FAM6_ATOM naming
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
- bitops: avoid integer overflow in GENMASK(_ULL)
- locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a
new <linux/bits.h> file
- tools include: Adopt linux/bits.h
- x86/msr-index: Cleanup bit defines
- x86/speculation: Consolidate CPU whitelists
- x86/speculation/mds: Add basic bug infrastructure for MDS
- x86/speculation/mds: Add BUG_MSBDS_ONLY
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
- x86/speculation/mds: Add mds_clear_cpu_buffers()
- locking/static_keys: Provide DECLARE and well as DEFINE macros
- include/linux/jump_label.h: expose the reference count
- jump_label: Allow asm/jump_label.h to be included in assembly
- jump_label: Allow jump labels to be used in assembly
- x86/headers: Don't include asm/processor.h in asm/atomic.h
- SAUCE: locking/static_key: Mimick the new static key API
- x86/speculation/mds: Clear CPU buffers on exit to user
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry
- SAUCE: sched: Expose cpu_smt_mask()
- SAUCE: jump_label: Introduce static_branch_{inc,dec}
- SAUCE: sched/smt: Introduce sched_smt_{active,present}
- SAUCE: Rename the Ubuntu-only spec_ctrl_mutex mutex
- SAUCE: x86/speculation: Introduce arch_smt_update()
- x86/speculation: Rework SMT state change
- x86/speculation: Reorder the spec_v2 code
- x86/speculation: Unify conditional spectre v2 print functions
- x86/speculation/mds: Add mitigation control for MDS
- x86/speculation/mds: Add sysfs reporting for MDS
- x86/speculation/mds: Add mitigation mode VMWERV
- Documentation: Move L1TF to separate directory
- Documentation: Add MDS vulnerability documentation
- x86/speculation/mds: Add mds=full,nosmt cmdline option
- x86/speculation: Move arch_smt_update() call to after mitigation decisions
- x86/speculation/mds: Add SMT warning message
- x86/speculation/mds: Fix comment
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
- x86/speculation/mds: Add 'mitigations=' support for MDS
* CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
- powerpc/speculation: Support 'mitigations=' cmdline option
* CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 //
CVE-2018-3646
- cpu/speculation: Add 'mitigations=' cmdline option
- x86/speculation: Support 'mitigations=' cmdline option
* CVE-2017-5715
- SAUCE: Fix 'check_fpu defined but not used' compiler warning on x86_64
- SAUCE: x86/speculation: Cleanup IBRS and IBPB runtime control handling (v2)
- SAUCE: KVM/x86: Expose IBRS to guests
- SAUCE: x86/speculation: Use x86_spec_ctrl_base in entry/exit code
* CVE-2017-5715 // CVE-2018-3639
- SAUCE: KVM/x86: Use host_initiated when accessing MSRs
Date: 2019-05-09 12:35:13.543532+00:00
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Signed-By: Andy Whitcroft <apw at canonical.com>
https://launchpad.net/ubuntu/+source/linux/3.13.0-170.220
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list