This upstream stable update contains the backport for CVE-2018-3639 (x86) aka Spectre v4/SSB. * x86/cpufeatures: Add CPUID_7_EDX CPUID leaf The upstream stable patch adds two previously unknown feature bits for word 18 which I added with a SAUCE patch. * x86/cpufeatures: Add Intel feature bits for Speculation Control -> skip, no change * x86/cpufeatures: Add AMD feature bits for Speculation Control -> skip, no change * x86/msr: Add definitions for new speculation control MSRs -> skip, no change * x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown -> skip, no change * x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes -> skip, we have actually reverted this at some point * x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support -> Picked in reduced form (only adding definition for indirect_branch_prediction_barrier(). Not sure this will be needed in the end. * x86/cpufeatures: Clean up Spectre v2 related CPUID flags -> Mostly can be skipped. Only picking up a small change to indirect_branch_prediction_barrier() which is still not used. Not picking up the firmware blacklist code. * x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel -> skipped, no change
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3639 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1791080 Title: Xenial update to 4.4.144 stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.144 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.144 stable release shall be applied: To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1791080/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp