[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2020-01-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-171.200 --- linux (4.4.0-171.200) xenial; urgency=medium * xenial/linux: 4.4.0-171.200 -proposed tracker (LP: #1854835) * CVE-2019-14901 - SAUCE: mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame() * CVE-2019-1

[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2020-01-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.15.0-74.84 --- linux (4.15.0-74.84) bionic; urgency=medium * bionic/linux: 4.15.0-74.84 -proposed tracker (LP: #1856749) * [Hyper-V] KVP daemon fails to start on first boot of disco VM (LP: #1820063) - [Packaging] bind hv_kvp_daemon

[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2020-01-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.0.0-38.41 --- linux (5.0.0-38.41) disco; urgency=medium * disco/linux: 5.0.0-38.41 -proposed tracker (LP: #1854788) * [Regression] Failed to boot disco kernel built from master-next (kernel kernel NULL pointer dereference) (LP: #185

[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2020-01-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.3.0-26.28 --- linux (5.3.0-26.28) eoan; urgency=medium * eoan/linux: 5.3.0-26.28 -proposed tracker (LP: #1856807) * nvidia-435 is in eoan, linux-restricted-modules only builds against 430, ubiquity gives me the self-signed modules e

[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2019-12-06 Thread Daniel Axtens
My colleague has verified all 4 versions. In all cases, on supported hardware, the test now operates as expected: the secret does not leak unless the mitigation is manually turned off. I notice the SRU verification is happening a bit sooner than I expected - when do you expect these kernels to be

[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2019-12-05 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- eoan' to 'verification-done-eoan'. If the problem still exists, change the tag 'verification

[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2019-12-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- xenial' to 'verification-done-xenial'. If the problem still exists, change the tag 'verifica

[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2019-12-03 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- disco' to 'verification-done-disco'. If the problem still exists, change the tag 'verificati

[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2019-12-03 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- bionic' to 'verification-done-bionic'. If the problem still exists, change the tag 'verifica

[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2019-12-02 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Bionic) Status: Triaged => Fix Committed ** Changed in: linux (Ubuntu Xenial) Status: Triaged => Fix Committed ** Changed in: linux (Ubuntu Disco) Status: Triaged => Fix Committed ** Changed in: linux (Ubuntu Eoan) Status: Triaged => Fix C

[Bug 1853142] Re: CVE-2019-18660: patches for Ubuntu

2019-11-28 Thread Daniel Axtens
The embargo has expired so I'm making this public now. ** Description changed: Hi, Recently you would have been notified about CVE-2019-18660 via email to the linux-distros private mailing list. In short, it is a bug in the Spectre v2 class affecting powerpc. We have developed so