*** This bug is a duplicate of bug 1741727 *** https://bugs.launchpad.net/bugs/1741727
This bug was fixed in the package linux - 4.4.0-108.131 --------------- linux (4.4.0-108.131) xenial; urgency=low * linux: 4.4.0-108.131 -proposed tracker (LP: #1741727) * CVE-2017-5754 - x86/mm: Disable PCID on 32-bit kernels linux (4.4.0-107.130) xenial; urgency=low * linux: 4.4.0-107.130 -proposed tracker (LP: #1741643) * CVE-2017-5754 - Revert "UBUNTU: SAUCE: arch/x86/entry/vdso: temporarily disable vdso" - KPTI: Report when enabled - x86, vdso, pvclock: Simplify and speed up the vdso pvclock reader - x86/vdso: Get pvclock data from the vvar VMA instead of the fixmap - x86/kasan: Clear kasan_zero_page after TLB flush - kaiser: Set _PAGE_NX only if supported linux (4.4.0-106.129) xenial; urgency=low * linux: 4.4.0-106.129 -proposed tracker (LP: #1741528) * CVE-2017-5754 - KAISER: Kernel Address Isolation - kaiser: merged update - kaiser: do not set _PAGE_NX on pgd_none - kaiser: stack map PAGE_SIZE at THREAD_SIZE-PAGE_SIZE - kaiser: fix build and FIXME in alloc_ldt_struct() - kaiser: KAISER depends on SMP - kaiser: fix regs to do_nmi() ifndef CONFIG_KAISER - kaiser: fix perf crashes - kaiser: ENOMEM if kaiser_pagetable_walk() NULL - kaiser: tidied up asm/kaiser.h somewhat - kaiser: tidied up kaiser_add/remove_mapping slightly - kaiser: kaiser_remove_mapping() move along the pgd - kaiser: cleanups while trying for gold link - kaiser: name that 0x1000 KAISER_SHADOW_PGD_OFFSET - kaiser: delete KAISER_REAL_SWITCH option - kaiser: vmstat show NR_KAISERTABLE as nr_overhead - x86/mm: Enable CR4.PCIDE on supported systems - x86/mm: Build arch/x86/mm/tlb.c even on !SMP - x86/mm, sched/core: Uninline switch_mm() - x86/mm: Add INVPCID helpers - x86/mm: If INVPCID is available, use it to flush global mappings - kaiser: enhanced by kernel and user PCIDs - kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush user - kaiser: PCID 0 for kernel and 128 for user - kaiser: x86_cr3_pcid_noflush and x86_cr3_pcid_user - kaiser: paranoid_entry pass cr3 need to paranoid_exit - kaiser: _pgd_alloc() without __GFP_REPEAT to avoid stalls - kaiser: fix unlikely error in alloc_ldt_struct() - kaiser: add "nokaiser" boot option, using ALTERNATIVE - x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling - x86/boot: Add early cmdline parsing for options with arguments - x86/kaiser: Check boottime cmdline params - kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush - kaiser: drop is_atomic arg to kaiser_pagetable_walk() - kaiser: asm/tlbflush.h handle noPGE at lower level - kaiser: kaiser_flush_tlb_on_return_to_user() check PCID - x86/paravirt: Dont patch flush_tlb_single - x86/kaiser: Reenable PARAVIRT - kaiser: disabled on Xen PV - x86/kaiser: Move feature detection up - kvm: x86: fix RSM when PCID is non-zero - SAUCE: arch/x86/entry/vdso: temporarily disable vdso - [Config]: CONFIG_KAISER=y -- Marcelo Henrique Cerri <marcelo.ce...@canonical.com> Sun, 07 Jan 2018 11:46:05 -0200 ** Changed in: linux (Ubuntu Xenial) Status: Confirmed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5754 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1741528 Title: linux: 4.4.0-106.129 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow snap-certification-testing series: New Status in Kernel SRU Workflow snap-release-to-beta series: New Status in Kernel SRU Workflow snap-release-to-candidate series: New Status in Kernel SRU Workflow snap-release-to-edge series: New Status in Kernel SRU Workflow snap-release-to-stable series: New Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Released Bug description: This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: 1741529,1741530 derivatives: 1741531,1741532,1741533,1741534,1741535,1741537 kernel-stable-phase:Uploaded kernel-stable-phase-changed:Saturday, 06. January 2018 14:33 UTC -- swm properties -- boot-testing-requested: true phase: Uploaded To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1741528/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp