← Back to team overview

touch-packages team mailing list archive

[Bug 1398975] Re: hardware-assisted lock elision hazardous on x86

 

Hello Chris, or anyone else affected,

Accepted glibc into utopic-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/glibc/2.19-10ubuntu2.2
in a few hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed.  Your feedback will aid us getting this update
out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, and change the tag
from verification-needed to verification-done. If it does not fix the
bug for you, please add a comment stating that, and change the tag to
verification-failed.  In either case, details of your testing will help
us make a better decision.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance!

** Changed in: glibc (Ubuntu Utopic)
       Status: In Progress => Fix Committed

** Tags added: verification-needed

** Changed in: eglibc (Ubuntu Trusty)
       Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1398975

Title:
  hardware-assisted lock elision hazardous on x86

Status in eglibc package in Ubuntu:
  Invalid
Status in glibc package in Ubuntu:
  Fix Released
Status in eglibc source package in Trusty:
  Fix Committed
Status in glibc source package in Utopic:
  Fix Committed
Status in glibc package in Debian:
  Fix Released

Bug description:
  [Impact]
  See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762195 for a full description of the issue.
  HLE extensions are hazardous due to erratum HSD136.

  Users that upgrade their intel-microcode could encounter illegal
  instruction traps due to microcode updates that blacklist HLE
  instructions. Glibc uses those instructions and thus we need to be
  defensive and patch them here.

  The issue was originally seen here:
  https://bugs.launchpad.net/intel/+bug/1370352

  [Test Case]
  Update to latest intel-microcode with microcode-20140913.dat enabled. Try to boot machine and use applications; check dmesg for trap invalid opcodes in libpthread-2.19.so.

  [Regression Potential]
  This has been fixed in vivid, so I'm requesting this patch be backported to T/U.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/eglibc/+bug/1398975/+subscriptions