Hello Chris, or anyone else affected, Accepted eglibc into trusty-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/eglibc/2.19-0ubuntu6.5 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, and change the tag from verification-needed to verification-done. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed. In either case, details of your testing will help us make a better decision. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance! -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to eglibc in Ubuntu. https://bugs.launchpad.net/bugs/1398975 Title: hardware-assisted lock elision hazardous on x86 Status in eglibc package in Ubuntu: Invalid Status in glibc package in Ubuntu: Fix Released Status in eglibc source package in Trusty: Fix Committed Status in glibc source package in Utopic: Fix Committed Status in glibc package in Debian: Fix Released Bug description: [Impact] See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762195 for a full description of the issue. HLE extensions are hazardous due to erratum HSD136. Users that upgrade their intel-microcode could encounter illegal instruction traps due to microcode updates that blacklist HLE instructions. Glibc uses those instructions and thus we need to be defensive and patch them here. The issue was originally seen here: https://bugs.launchpad.net/intel/+bug/1370352 [Test Case] Update to latest intel-microcode with microcode-20140913.dat enabled. Try to boot machine and use applications; check dmesg for trap invalid opcodes in libpthread-2.19.so. [Regression Potential] This has been fixed in vivid, so I'm requesting this patch be backported to T/U. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/eglibc/+bug/1398975/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp

