** Changed in: linux (Ubuntu) Importance: Undecided => Medium ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New
** Changed in: linux (Ubuntu Trusty) Status: New => Incomplete ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete ** Changed in: linux (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Trusty) Status: Incomplete => Triaged ** Changed in: linux (Ubuntu) Status: Incomplete => Triaged ** Tags added: kernel-da-key trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1789834 Title: off-by-one bug in L1TF mitigation Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: Triaged Bug description: due to an off-by-one bug in the L1TF patch, the "rare" case of systems still vulnerable is more frequent. This typically happens on Nehalem+ destop/entry-level server systems with 32G memory installed. Originally this was reported in OpenSUSE, but I can confirm this is also happens with the latest trusty kernel (3.13.0-157-generic) https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b0a182f875689647b014bc01d36b340217792852 The following patch increases the memory limit for the mitigation on these systems in general: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?h=x86/urgent&id=cc51e5428ea54f575d49cfcede1d4cb3a72b4ec4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1789834/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp