[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2019-07-24 Thread Brad Figg
** Tags added: cscc -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled pointer Status in linux package in Ubuntu: Invalid Status in l

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2019-06-13 Thread Juerg Haefliger
** Changed in: linux (Ubuntu) Status: Incomplete => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled pointer Status in

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2019-05-14 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled po

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-12-04 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Precise) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled poi

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-11-12 Thread Juerg Haefliger
** Changed in: linux (Ubuntu Precise) Status: New => In Progress ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) => Juerg Haefliger (juergh) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https:/

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-08-23 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-157.207 --- linux (3.13.0-157.207) trusty; urgency=medium * linux: 3.13.0-157.207 -proposed tracker (LP: #1787982) * CVE-2017-5715 (Spectre v2 retpoline) - SAUCE: Fix "x86/retpoline/entry: Convert entry assembler indirect jumps

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-08-22 Thread Juerg Haefliger
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled p

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-08-02 Thread Brad Figg
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- trusty' to 'verification-done-trusty'. If the problem still exists, change the tag 'verifica

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-07-27 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled pointer Sta

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-07-02 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-130.156 --- linux (4.4.0-130.156) xenial; urgency=medium * linux: 4.4.0-130.156 -proposed tracker (LP: #1776822) * CVE-2018-3665 (x86) - x86/fpu: Fix early FPU command-line parsing - x86/fpu: Fix 'no387' regression - x86

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-06-22 Thread Juerg Haefliger
** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled p

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-06-13 Thread Brad Figg
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- xenial' to 'verification-done-xenial'. If the problem still exists, change the tag 'verifica

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-06-07 Thread Khaled El Mously
** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled pointer Sta

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-06-06 Thread Kleber Sacilotto de Souza
** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https:

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-06-06 Thread Stefan Bader
** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1775137 Title: Prevent speculation on user controlled po

[Kernel-packages] [Bug 1775137] Re: Prevent speculation on user controlled pointer

2018-06-06 Thread Juerg Haefliger
** Description changed: - Upstream's Spectre v1 mitigation prevents speculation on a user - controlled pointer. This part of the Spectre v1 patchset was never - backported to 4.4 (for unknown reasons) so Xenial is lacking it as well. - All the other stable upstream kernels include it, so add it to