group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #21873
[Bug 1742772] Re: powerpc: flush L1D on return to use
This bug was fixed in the package linux - 3.13.0-142.191
---------------
linux (3.13.0-142.191) trusty; urgency=medium
* linux: 3.13.0-142.191 -proposed tracker (LP: #1746900)
* CVE-2017-17806
- crypto: hmac - require that the underlying hash algorithm is unkeyed
* CVE-2017-18017
- netfilter: xt_TCPMSS: add more sanity tests on tcph->doff
* CVE-2017-17450
- netfilter: xt_osf: Add missing permission checks
* CVE-2018-5344
- loop: fix concurrent lo_open/lo_release
* CVE-2017-5715 (Spectre v2 embargoed) // CVE-2017-5753 (Spectre v1 embargoed)
- x86/asm/msr: Make wrmsrl_safe() a function
* CVE-2017-1000407
- KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
* CVE-2017-0861
- ALSA: pcm: prevent UAF in snd_pcm_info
* CVE-2017-14051
- scsi: qla2xxx: Fix an integer overflow in sysfs code
* CVE-2017-15868
- Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with
l2cap socket
* CVE-2018-5333
- RDS: null pointer dereference in rds_atomic_free_op
* powerpc: flush L1D on return to use (LP: #1742772) // CVE-2017-5754
(Meltdown)
- SAUCE: powerpc: Prevent Meltdown attack with L1-D$ flush
- SAUCE: powerpc: Remove dead code in sycall entry
- SAUCE: rfi-flush: Add barriers to the fallback L1D flushing
- SAUCE: rfi-flush: Fallback flush add load dependency
- SAUCE: rfi-flush: Fix the 32-bit KVM build
- SAUCE: rfi-flush: Fix some RFI conversions in the KVM code
- SAUCE: rfi-flush: Make the fallback robust against memory corruption
- SAUCE: powerpc/kernel: Does not use sync
- SAUCE: rfi-flush: Factor out init_fallback_flush()
- SAUCE: rfi-flush: Make setup_rfi_flush() not __init
- SAUCE: rfi-flush: Move the logic to avoid a redo into the sysfs code
- SAUCE: rfi-flush: Make it possible to call setup_rfi_flush() again
- SAUCE: rfi-flush: Call setup_rfi_flush() after LPM migration
- SAUCE: rfi-flush: Fix fallback on distros using bootmem
- SAUCE: rfi-flush: fix package build error (unused variable limit)
- SAUCE: rfi-flush: Fix kernel package build using bootmem
- SAUCE: rfi-flush: Move rfi_flush_fallback_area to end of paca
- SAUCE: rfi-flush: Fix rename of pseries_setup_rfi_flush()
- SAUCE: rfi-flush: Mark DEBUG_RFI as BROKEN
- SAUCE: rfi-flush: Switch to new linear fallback flush
- SAUCE: powerpc/kernel: Remove unused variable
- SAUCE: powerpc/kernel: Fix typo on variable
- SAUCE: powerpc/kernel: Fix instructions usage
- SAUCE: powerpc/kernel: Define PACA_L1D_FLUSH_SIZE
- SAUCE: rfi-flush: Fix for kernel crash.
* upload urgency should be medium by default (LP: #1745338)
- [Packaging] update urgency to medium by default
* CVE-2017-12190
- fix unbalanced page refcounting in bio_map_user_iov
- more bio_map_user_iov() leak fixes
* CVE-2017-15274
- KEYS: fix dereferencing NULL payload with nonzero length
* CVE-2017-14140
- Sanitize 'move_pages()' permission checks
* CVE-2017-15115
- sctp: do not peel off an assoc from one netns to another one
* CVE-2017-14489
- scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse
nlmsg properly
* CVE-2017-12153
- nl80211: check for the required netlink attributes presence
* CVE-2017-16525
- USB: serial: console: fix use-after-free after failed setup
- USB: serial: console: fix use-after-free on disconnect
* CVE-2017-7542
- ipv6: avoid overflow of offset in ip6_find_1stfragopt
- ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt()
* CVE-2017-15102
- usb: misc: legousbtower: Fix NULL pointer deference
* CVE-2017-12192
- KEYS: prevent KEYCTL_READ on negative key
* CVE-2017-14156
- video: fbdev: aty: do not leak uninitialized padding in clk to userspace
* CVE-2017-5669
- ipc/shm: Fix shmat mmap nil-page protection
* CVE-2017-0750
- f2fs: do more integrity verification for superblock
* CVE-2017-7889
- mm: Tighten x86 /dev/mem with zeroing reads
* CVE-2017-8824
- dccp: CVE-2017-8824: use-after-free in DCCP code
-- Stefan Bader <stefan.bader@xxxxxxxxxxxxx> Fri, 02 Feb 2018 13:01:39
+0100
** Changed in: linux (Ubuntu Trusty)
Status: Fix Committed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0750
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-0861
** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000407
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12153
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12190
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12192
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14051
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14140
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14156
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14489
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15102
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15115
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15274
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15868
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-16525
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17450
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17806
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18017
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5669
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7542
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7889
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-8824
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5333
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5344
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1742772
Title:
powerpc: flush L1D on return to use
Status in linux package in Ubuntu:
Fix Released
Status in linux source package in Trusty:
Fix Released
Status in linux source package in Xenial:
Fix Released
Status in linux source package in Artful:
Fix Released
Bug description:
powerpc: flush L1D on return to use
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1742772/+subscriptions