Linux repositories inspector

linux-headers-4.15.0-1038-oem - Linux kernel headers for version 4.15.0 on 64 bit x86 SMP

This package provides kernel header files for version 4.15.0 on 64 bit x86 SMP.
This is for sites that want the latest kernel headers. Please read /usr/share/doc/linux-headers-4.15.0-1038/debian.README.gz for details.
4.15.0
Ubuntu iconUbuntu 18.04 LTS
Ubuntu iconUbuntu 19.04
DistributionVersionSincePackageInstalledPackager
Ubuntu iconUbuntu 18.04 LTS bionic-security/maindeb4.15.0-1038.432019-06-171.08 MiB12.2 MiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/maindeb4.15.0-1038.432019-06-171.08 MiB12.2 MiB
Ubuntu iconUbuntu 19.04 disco-security/maindeb4.15.0-1038.432019-06-171.08 MiB12.2 MiB
Ubuntu iconUbuntu 19.04 disco-updates/maindeb4.15.0-1038.432019-06-171.08 MiB12.2 MiB

Latest updates

Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/main: Version 4.15.0-1038.43 reintroduced

Aug 14
Ubuntu: 4.15.0-50.54
  • CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    • Documentation/l1tf: Fix small spelling typo
    • x86/cpu: Sanitize FAM6_ATOM naming
    • kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    • locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
    • tools include: Adopt linux/bits.h
    • x86/msr-index: Cleanup bit defines
    • x86/speculation: Consolidate CPU whitelists
    • x86/speculation/mds: Add basic bug infrastructure for MDS
    • x86/speculation/mds: Add BUG_MSBDS_ONLY
    • x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    • x86/speculation/mds: Add mds_clear_cpu_buffers()
    • x86/speculation/mds: Clear CPU buffers on exit to user
    • x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    • x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    • x86/speculation/mds: Add mitigation control for MDS
    • x86/speculation/mds: Add sysfs reporting for MDS
    • x86/speculation/mds: Add mitigation mode VMWERV
    • Documentation: Move L1TF to separate directory
    • Documentation: Add MDS vulnerability documentation
    • x86/speculation/mds: Add mds=full,nosmt cmdline option
    • x86/speculation: Move arch_smt_update() call to after mitigation decisions
    • x86/speculation/mds: Add SMT warning message
    • x86/speculation/mds: Fix comment
    • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    • x86/speculation/mds: Add 'mitigations=' support for MDS
  • CVE-2017-5715 // CVE-2017-5753
    • s390/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    • powerpc/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646
    • cpu/speculation: Add 'mitigations=' cmdline option
    • x86/speculation: Support 'mitigations=' cmdline option
  • Packaging resync (LP: #1786013)
    • [Packaging] resync git-ubuntu-log
Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/main: Version 4.15.0-1038.43 removed

Aug 14
Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/main: Version 4.15.0-1038.43 reintroduced

Aug 02
Ubuntu: 4.15.0-50.54
  • CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    • Documentation/l1tf: Fix small spelling typo
    • x86/cpu: Sanitize FAM6_ATOM naming
    • kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    • locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
    • tools include: Adopt linux/bits.h
    • x86/msr-index: Cleanup bit defines
    • x86/speculation: Consolidate CPU whitelists
    • x86/speculation/mds: Add basic bug infrastructure for MDS
    • x86/speculation/mds: Add BUG_MSBDS_ONLY
    • x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    • x86/speculation/mds: Add mds_clear_cpu_buffers()
    • x86/speculation/mds: Clear CPU buffers on exit to user
    • x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    • x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    • x86/speculation/mds: Add mitigation control for MDS
    • x86/speculation/mds: Add sysfs reporting for MDS
    • x86/speculation/mds: Add mitigation mode VMWERV
    • Documentation: Move L1TF to separate directory
    • Documentation: Add MDS vulnerability documentation
    • x86/speculation/mds: Add mds=full,nosmt cmdline option
    • x86/speculation: Move arch_smt_update() call to after mitigation decisions
    • x86/speculation/mds: Add SMT warning message
    • x86/speculation/mds: Fix comment
    • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    • x86/speculation/mds: Add 'mitigations=' support for MDS
  • CVE-2017-5715 // CVE-2017-5753
    • s390/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    • powerpc/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646
    • cpu/speculation: Add 'mitigations=' cmdline option
    • x86/speculation: Support 'mitigations=' cmdline option
  • Packaging resync (LP: #1786013)
    • [Packaging] resync git-ubuntu-log
Ubuntu icon

Ubuntu 19.04 disco-security/main: Version 4.15.0-1038.43 reintroduced

Aug 02
Ubuntu: 4.15.0-50.54
  • CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    • Documentation/l1tf: Fix small spelling typo
    • x86/cpu: Sanitize FAM6_ATOM naming
    • kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    • locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
    • tools include: Adopt linux/bits.h
    • x86/msr-index: Cleanup bit defines
    • x86/speculation: Consolidate CPU whitelists
    • x86/speculation/mds: Add basic bug infrastructure for MDS
    • x86/speculation/mds: Add BUG_MSBDS_ONLY
    • x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    • x86/speculation/mds: Add mds_clear_cpu_buffers()
    • x86/speculation/mds: Clear CPU buffers on exit to user
    • x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    • x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    • x86/speculation/mds: Add mitigation control for MDS
    • x86/speculation/mds: Add sysfs reporting for MDS
    • x86/speculation/mds: Add mitigation mode VMWERV
    • Documentation: Move L1TF to separate directory
    • Documentation: Add MDS vulnerability documentation
    • x86/speculation/mds: Add mds=full,nosmt cmdline option
    • x86/speculation: Move arch_smt_update() call to after mitigation decisions
    • x86/speculation/mds: Add SMT warning message
    • x86/speculation/mds: Fix comment
    • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    • x86/speculation/mds: Add 'mitigations=' support for MDS
  • CVE-2017-5715 // CVE-2017-5753
    • s390/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    • powerpc/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646
    • cpu/speculation: Add 'mitigations=' cmdline option
    • x86/speculation: Support 'mitigations=' cmdline option
  • Packaging resync (LP: #1786013)
    • [Packaging] resync git-ubuntu-log
Ubuntu icon

Ubuntu 18.04 LTS bionic-security/main: Version 4.15.0-1038.43 reintroduced

Aug 02
Ubuntu: 4.15.0-50.54
  • CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    • Documentation/l1tf: Fix small spelling typo
    • x86/cpu: Sanitize FAM6_ATOM naming
    • kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    • locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
    • tools include: Adopt linux/bits.h
    • x86/msr-index: Cleanup bit defines
    • x86/speculation: Consolidate CPU whitelists
    • x86/speculation/mds: Add basic bug infrastructure for MDS
    • x86/speculation/mds: Add BUG_MSBDS_ONLY
    • x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    • x86/speculation/mds: Add mds_clear_cpu_buffers()
    • x86/speculation/mds: Clear CPU buffers on exit to user
    • x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    • x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    • x86/speculation/mds: Add mitigation control for MDS
    • x86/speculation/mds: Add sysfs reporting for MDS
    • x86/speculation/mds: Add mitigation mode VMWERV
    • Documentation: Move L1TF to separate directory
    • Documentation: Add MDS vulnerability documentation
    • x86/speculation/mds: Add mds=full,nosmt cmdline option
    • x86/speculation: Move arch_smt_update() call to after mitigation decisions
    • x86/speculation/mds: Add SMT warning message
    • x86/speculation/mds: Fix comment
    • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    • x86/speculation/mds: Add 'mitigations=' support for MDS
  • CVE-2017-5715 // CVE-2017-5753
    • s390/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    • powerpc/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646
    • cpu/speculation: Add 'mitigations=' cmdline option
    • x86/speculation: Support 'mitigations=' cmdline option
  • Packaging resync (LP: #1786013)
    • [Packaging] resync git-ubuntu-log
Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/main: Version 4.15.0-1038.43 removed

Aug 02
Ubuntu icon

Ubuntu 19.04 disco-security/main: Version 4.15.0-1038.43 removed

Aug 01
Ubuntu icon

Ubuntu 18.04 LTS bionic-security/main: Version 4.15.0-1038.43 removed

Aug 01
Ubuntu icon

Ubuntu 18.10 cosmic-security/main: Version 4.15.0-1038.43 removed

Jul 23
Ubuntu icon

Ubuntu 18.10 cosmic-updates/main: Version 4.15.0-1038.43 removed

Jul 23
Ubuntu icon

Ubuntu 19.04 disco-updates/main: Version 4.15.0-1038.43 introduced

2019-06-17
Ubuntu: 4.15.0-50.54
  • CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    • Documentation/l1tf: Fix small spelling typo
    • x86/cpu: Sanitize FAM6_ATOM naming
    • kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    • locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
    • tools include: Adopt linux/bits.h
    • x86/msr-index: Cleanup bit defines
    • x86/speculation: Consolidate CPU whitelists
    • x86/speculation/mds: Add basic bug infrastructure for MDS
    • x86/speculation/mds: Add BUG_MSBDS_ONLY
    • x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    • x86/speculation/mds: Add mds_clear_cpu_buffers()
    • x86/speculation/mds: Clear CPU buffers on exit to user
    • x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    • x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    • x86/speculation/mds: Add mitigation control for MDS
    • x86/speculation/mds: Add sysfs reporting for MDS
    • x86/speculation/mds: Add mitigation mode VMWERV
    • Documentation: Move L1TF to separate directory
    • Documentation: Add MDS vulnerability documentation
    • x86/speculation/mds: Add mds=full,nosmt cmdline option
    • x86/speculation: Move arch_smt_update() call to after mitigation decisions
    • x86/speculation/mds: Add SMT warning message
    • x86/speculation/mds: Fix comment
    • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    • x86/speculation/mds: Add 'mitigations=' support for MDS
  • CVE-2017-5715 // CVE-2017-5753
    • s390/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    • powerpc/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646
    • cpu/speculation: Add 'mitigations=' cmdline option
    • x86/speculation: Support 'mitigations=' cmdline option
  • Packaging resync (LP: #1786013)
    • [Packaging] resync git-ubuntu-log
Ubuntu icon

Ubuntu 19.04 disco-security/main: Version 4.15.0-1038.43 introduced

2019-06-17
Ubuntu: 4.15.0-50.54
  • CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    • Documentation/l1tf: Fix small spelling typo
    • x86/cpu: Sanitize FAM6_ATOM naming
    • kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    • locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
    • tools include: Adopt linux/bits.h
    • x86/msr-index: Cleanup bit defines
    • x86/speculation: Consolidate CPU whitelists
    • x86/speculation/mds: Add basic bug infrastructure for MDS
    • x86/speculation/mds: Add BUG_MSBDS_ONLY
    • x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    • x86/speculation/mds: Add mds_clear_cpu_buffers()
    • x86/speculation/mds: Clear CPU buffers on exit to user
    • x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    • x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    • x86/speculation/mds: Add mitigation control for MDS
    • x86/speculation/mds: Add sysfs reporting for MDS
    • x86/speculation/mds: Add mitigation mode VMWERV
    • Documentation: Move L1TF to separate directory
    • Documentation: Add MDS vulnerability documentation
    • x86/speculation/mds: Add mds=full,nosmt cmdline option
    • x86/speculation: Move arch_smt_update() call to after mitigation decisions
    • x86/speculation/mds: Add SMT warning message
    • x86/speculation/mds: Fix comment
    • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    • x86/speculation/mds: Add 'mitigations=' support for MDS
  • CVE-2017-5715 // CVE-2017-5753
    • s390/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    • powerpc/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646
    • cpu/speculation: Add 'mitigations=' cmdline option
    • x86/speculation: Support 'mitigations=' cmdline option
  • Packaging resync (LP: #1786013)
    • [Packaging] resync git-ubuntu-log
Ubuntu icon

Ubuntu 18.10 cosmic-updates/main: Version 4.15.0-1038.43 introduced

2019-06-17
Ubuntu: 4.15.0-50.54
  • CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    • Documentation/l1tf: Fix small spelling typo
    • x86/cpu: Sanitize FAM6_ATOM naming
    • kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    • locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
    • tools include: Adopt linux/bits.h
    • x86/msr-index: Cleanup bit defines
    • x86/speculation: Consolidate CPU whitelists
    • x86/speculation/mds: Add basic bug infrastructure for MDS
    • x86/speculation/mds: Add BUG_MSBDS_ONLY
    • x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    • x86/speculation/mds: Add mds_clear_cpu_buffers()
    • x86/speculation/mds: Clear CPU buffers on exit to user
    • x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    • x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    • x86/speculation/mds: Add mitigation control for MDS
    • x86/speculation/mds: Add sysfs reporting for MDS
    • x86/speculation/mds: Add mitigation mode VMWERV
    • Documentation: Move L1TF to separate directory
    • Documentation: Add MDS vulnerability documentation
    • x86/speculation/mds: Add mds=full,nosmt cmdline option
    • x86/speculation: Move arch_smt_update() call to after mitigation decisions
    • x86/speculation/mds: Add SMT warning message
    • x86/speculation/mds: Fix comment
    • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    • x86/speculation/mds: Add 'mitigations=' support for MDS
  • CVE-2017-5715 // CVE-2017-5753
    • s390/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    • powerpc/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646
    • cpu/speculation: Add 'mitigations=' cmdline option
    • x86/speculation: Support 'mitigations=' cmdline option
  • Packaging resync (LP: #1786013)
    • [Packaging] resync git-ubuntu-log
Ubuntu icon

Ubuntu 18.10 cosmic-security/main: Version 4.15.0-1038.43 introduced

2019-06-17
Ubuntu: 4.15.0-50.54
  • CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    • Documentation/l1tf: Fix small spelling typo
    • x86/cpu: Sanitize FAM6_ATOM naming
    • kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    • locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
    • tools include: Adopt linux/bits.h
    • x86/msr-index: Cleanup bit defines
    • x86/speculation: Consolidate CPU whitelists
    • x86/speculation/mds: Add basic bug infrastructure for MDS
    • x86/speculation/mds: Add BUG_MSBDS_ONLY
    • x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    • x86/speculation/mds: Add mds_clear_cpu_buffers()
    • x86/speculation/mds: Clear CPU buffers on exit to user
    • x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    • x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    • x86/speculation/mds: Add mitigation control for MDS
    • x86/speculation/mds: Add sysfs reporting for MDS
    • x86/speculation/mds: Add mitigation mode VMWERV
    • Documentation: Move L1TF to separate directory
    • Documentation: Add MDS vulnerability documentation
    • x86/speculation/mds: Add mds=full,nosmt cmdline option
    • x86/speculation: Move arch_smt_update() call to after mitigation decisions
    • x86/speculation/mds: Add SMT warning message
    • x86/speculation/mds: Fix comment
    • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    • x86/speculation/mds: Add 'mitigations=' support for MDS
  • CVE-2017-5715 // CVE-2017-5753
    • s390/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    • powerpc/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646
    • cpu/speculation: Add 'mitigations=' cmdline option
    • x86/speculation: Support 'mitigations=' cmdline option
  • Packaging resync (LP: #1786013)
    • [Packaging] resync git-ubuntu-log
Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/main: Version 4.15.0-1038.43 introduced

2019-06-17
Ubuntu: 4.15.0-50.54
  • CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    • Documentation/l1tf: Fix small spelling typo
    • x86/cpu: Sanitize FAM6_ATOM naming
    • kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    • locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
    • tools include: Adopt linux/bits.h
    • x86/msr-index: Cleanup bit defines
    • x86/speculation: Consolidate CPU whitelists
    • x86/speculation/mds: Add basic bug infrastructure for MDS
    • x86/speculation/mds: Add BUG_MSBDS_ONLY
    • x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    • x86/speculation/mds: Add mds_clear_cpu_buffers()
    • x86/speculation/mds: Clear CPU buffers on exit to user
    • x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    • x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    • x86/speculation/mds: Add mitigation control for MDS
    • x86/speculation/mds: Add sysfs reporting for MDS
    • x86/speculation/mds: Add mitigation mode VMWERV
    • Documentation: Move L1TF to separate directory
    • Documentation: Add MDS vulnerability documentation
    • x86/speculation/mds: Add mds=full,nosmt cmdline option
    • x86/speculation: Move arch_smt_update() call to after mitigation decisions
    • x86/speculation/mds: Add SMT warning message
    • x86/speculation/mds: Fix comment
    • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    • x86/speculation/mds: Add 'mitigations=' support for MDS
  • CVE-2017-5715 // CVE-2017-5753
    • s390/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    • powerpc/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646
    • cpu/speculation: Add 'mitigations=' cmdline option
    • x86/speculation: Support 'mitigations=' cmdline option
  • Packaging resync (LP: #1786013)
    • [Packaging] resync git-ubuntu-log
Ubuntu icon

Ubuntu 18.04 LTS bionic-security/main: Version 4.15.0-1038.43 introduced

2019-06-17
Ubuntu: 4.15.0-50.54
  • CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    • Documentation/l1tf: Fix small spelling typo
    • x86/cpu: Sanitize FAM6_ATOM naming
    • kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
    • locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
    • tools include: Adopt linux/bits.h
    • x86/msr-index: Cleanup bit defines
    • x86/speculation: Consolidate CPU whitelists
    • x86/speculation/mds: Add basic bug infrastructure for MDS
    • x86/speculation/mds: Add BUG_MSBDS_ONLY
    • x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    • x86/speculation/mds: Add mds_clear_cpu_buffers()
    • x86/speculation/mds: Clear CPU buffers on exit to user
    • x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    • x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    • x86/speculation/mds: Add mitigation control for MDS
    • x86/speculation/mds: Add sysfs reporting for MDS
    • x86/speculation/mds: Add mitigation mode VMWERV
    • Documentation: Move L1TF to separate directory
    • Documentation: Add MDS vulnerability documentation
    • x86/speculation/mds: Add mds=full,nosmt cmdline option
    • x86/speculation: Move arch_smt_update() call to after mitigation decisions
    • x86/speculation/mds: Add SMT warning message
    • x86/speculation/mds: Fix comment
    • x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    • x86/speculation/mds: Add 'mitigations=' support for MDS
  • CVE-2017-5715 // CVE-2017-5753
    • s390/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    • powerpc/speculation: Support 'mitigations=' cmdline option
  • CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646
    • cpu/speculation: Add 'mitigations=' cmdline option
    • x86/speculation: Support 'mitigations=' cmdline option
  • Packaging resync (LP: #1786013)
    • [Packaging] resync git-ubuntu-log

Related packages

linux - The Linux kernel and modules
linux-headers - Header files and scripts for building modules for Linux kernel
⇧ Top