Already applied for CVE-2018-12126, CVE-2018-12127, CVE-2018-12130:
- "x86/msr-index: Cleanup bit defines"
- "x86/speculation: Consolidate CPU whitelists"
- "x86/speculation/mds: Add basic bug infrastructure for MDS"
- "x86/speculation/mds: Add BUG_MSBDS_ONLY"
- "x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests"
- "x86/speculation/mds: Add mds_clear_cpu_buffers()"
- "x86/speculation/mds: Clear CPU buffers on exit to user"
- "x86/kvm/vmx: Add MDS protection when L1D Flush is not active"
- "x86/speculation/mds: Conditionally clear CPU buffers on idle entry"
- "x86/speculation/mds: Add mitigation control for MDS"
- "x86/speculation/mds: Add sysfs reporting for MDS"
- "x86/speculation/mds: Add mitigation mode VMWERV"
- "Documentation: Move L1TF to separate directory"
- "Documentation: Add MDS vulnerability documentation"
- "x86/speculation/mds: Add mds=full,nosmt cmdline option"
- "x86/speculation: Move arch_smt_update() call to after mitigation decisions"
- "x86/speculation/mds: Add SMT warning message"
- "x86/speculation/mds: Fix comment"
- "x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off"
- "cpu/speculation: Add 'mitigations=' cmdline option"
- "x86/speculation: Support 'mitigations=' cmdline option"
- "powerpc/speculation: Support 'mitigations=' cmdline option"
- "s390/speculation: Support 'mitigations=' cmdline option"
- "x86/speculation/mds: Add 'mitigations=' support for MDS"

Already applied for CVE-2019-11091:
- "x86/mds: Add MDSUM variant to the MDS documentation"

Already applied for CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, 
CVE-2019-11091:
- "Documentation: Correct the possible MDS sysfs values"
- "x86/speculation/mds: Fix documentation typo"

This upstream stable already was completely applied for security.

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12126

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12127

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-12130

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11091

** Changed in: linux (Ubuntu Disco)
       Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1835580

Title:
  Disco update: 5.0.16 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Disco:
  Fix Committed

Bug description:
  
      SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         5.0.16 upstream stable release
         from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1835580/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to