This bug was fixed in the package qemu - 2.0.0+dfsg-2ubuntu1.38 --------------- qemu (2.0.0+dfsg-2ubuntu1.38) trusty-security; urgency=medium
* SECURITY UPDATE: Add support for Spectre mitigations (LP: #1744882) - debian/patches/CVE-2017-5715-1.patch: Lengthen X86CPUDefinition:: model_id in target-i386/cpu.c. - debian/patches/CVE-2017-5715-2.patch: Add support for SPEC_CTRL MSR in target-i386/cpu.h, target-i386/kvm.c, target-i386/machine.c. - debian/patches/CVE-2017-5715-3pre1.patch: add FEAT_7_0_ECX and FEAT_7_0_EDX in target-i386/cpu.c, target-i386/cpu.h. - debian/patches/CVE-2017-5715-3.patch: Add spec-ctrl CPUID bit in target-i386/cpu.c, target-i386/cpu.h. - debian/patches/CVE-2017-5715-4.patch: Add FEAT_8000_0008_EBX CPUID feature word in target-i386/cpu.c, target-i386/cpu.h. - debian/patches/CVE-2017-5715-5.patch: Add new -IBRS versions of Intel CPU models in target-i386/cpu.c. - CVE-2017-5715 -- Marc Deslauriers <marc.deslauri...@ubuntu.com> Thu, 01 Feb 2018 13:27:00 -0500 ** Changed in: qemu (Ubuntu Trusty) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1744882 Title: Add SPEC_CTRL and IBRS changes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1744882/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs