Public bug reported:

    SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The following upstream
       stable patches should be included in the Ubuntu kernel:

       v5.15.193 upstream stable release
       from git://git.kernel.org/

Documentation/hw-vuln: Add VMSCAPE documentation
x86/vmscape: Enumerate VMSCAPE bug
x86/vmscape: Add conditional IBPB mitigation
x86/vmscape: Enable the mitigation
UBUNTU: [Config] enable CONFIG_MITIGATION_VMSCAPE
x86/bugs: Move cpu_bugs_smt_update() down
x86/vmscape: Warn when STIBP is disabled with SMT
x86/vmscape: Add old Intel CPUs to affected list
Linux 5.15.193
UBUNTU: Upstream stable to v5.15.193

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Invalid

** Affects: linux (Ubuntu Jammy)
     Importance: Medium
     Assignee: Bethany Jamison (bjamison)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu)
       Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Jammy)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Jammy)
       Status: New => In Progress

** Changed in: linux (Ubuntu Jammy)
     Assignee: (unassigned) => Bethany Jamison (bjamison)

** Description changed:

  
      SRU Justification
  
      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:
  
         v5.15.193 upstream stable release
         from git://git.kernel.org/
  
-             
+ Documentation/hw-vuln: Add VMSCAPE documentation
+ x86/vmscape: Enumerate VMSCAPE bug
+ x86/vmscape: Add conditional IBPB mitigation
+ x86/vmscape: Enable the mitigation
+ UBUNTU: [Config] enable CONFIG_MITIGATION_VMSCAPE
+ x86/bugs: Move cpu_bugs_smt_update() down
+ x86/vmscape: Warn when STIBP is disabled with SMT
+ x86/vmscape: Add old Intel CPUs to affected list
  Linux 5.15.193
- x86/vmscape: Add old Intel CPUs to affected list
- x86/vmscape: Warn when STIBP is disabled with SMT
- x86/bugs: Move cpu_bugs_smt_update() down
- x86/vmscape: Enable the mitigation
- x86/vmscape: Add conditional IBPB mitigation
- x86/vmscape: Enumerate VMSCAPE bug
- Documentation/hw-vuln: Add VMSCAPE documentation
+ UBUNTU: Upstream stable to v5.15.193

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2127112

Title:
  Jammy update: v5.15.193 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  In Progress

Bug description:
  
      SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         v5.15.193 upstream stable release
         from git://git.kernel.org/

  Documentation/hw-vuln: Add VMSCAPE documentation
  x86/vmscape: Enumerate VMSCAPE bug
  x86/vmscape: Add conditional IBPB mitigation
  x86/vmscape: Enable the mitigation
  UBUNTU: [Config] enable CONFIG_MITIGATION_VMSCAPE
  x86/bugs: Move cpu_bugs_smt_update() down
  x86/vmscape: Warn when STIBP is disabled with SMT
  x86/vmscape: Add old Intel CPUs to affected list
  Linux 5.15.193
  UBUNTU: Upstream stable to v5.15.193

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2127112/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to