lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 14 May 2019 20:05:38 +0200
From:   Greg KH <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org,
        Andrew Morton <akpm@...ux-foundation.org>,
        torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:     lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 4.14.119

I'm announcing the release of the 4.14.119 kernel.

All users of the 4.14 kernel series must upgrade.

The updated 4.14.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.14.y
and can be browsed at the normal kernel.org git web browser:
	https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Documentation/ABI/testing/sysfs-devices-system-cpu    |    4 
 Documentation/admin-guide/hw-vuln/index.rst           |   13 
 Documentation/admin-guide/hw-vuln/l1tf.rst            |  615 ++++++++++++++++++
 Documentation/admin-guide/hw-vuln/mds.rst             |  308 +++++++++
 Documentation/admin-guide/index.rst                   |    6 
 Documentation/admin-guide/kernel-parameters.txt       |   62 +
 Documentation/admin-guide/l1tf.rst                    |  614 -----------------
 Documentation/index.rst                               |    1 
 Documentation/x86/conf.py                             |   10 
 Documentation/x86/index.rst                           |    8 
 Documentation/x86/mds.rst                             |  225 ++++++
 Makefile                                              |    2 
 arch/powerpc/kernel/security.c                        |    6 
 arch/powerpc/kernel/setup_64.c                        |    2 
 arch/s390/kernel/nospec-branch.c                      |    9 
 arch/x86/entry/common.c                               |    3 
 arch/x86/events/intel/core.c                          |   20 
 arch/x86/events/intel/cstate.c                        |    8 
 arch/x86/events/intel/rapl.c                          |    4 
 arch/x86/events/msr.c                                 |    8 
 arch/x86/include/asm/cpufeatures.h                    |    3 
 arch/x86/include/asm/intel-family.h                   |   30 
 arch/x86/include/asm/irqflags.h                       |    4 
 arch/x86/include/asm/msr-index.h                      |   39 -
 arch/x86/include/asm/mwait.h                          |    7 
 arch/x86/include/asm/nospec-branch.h                  |   50 +
 arch/x86/include/asm/processor.h                      |    6 
 arch/x86/kernel/cpu/bugs.c                            |  147 ++++
 arch/x86/kernel/cpu/common.c                          |  134 ++-
 arch/x86/kernel/nmi.c                                 |    4 
 arch/x86/kernel/traps.c                               |    8 
 arch/x86/kernel/tsc.c                                 |    2 
 arch/x86/kvm/cpuid.c                                  |    5 
 arch/x86/kvm/vmx.c                                    |    7 
 arch/x86/mm/pti.c                                     |    4 
 arch/x86/platform/atom/punit_atom_debug.c             |    4 
 arch/x86/platform/intel-mid/device_libs/platform_bt.c |    2 
 drivers/acpi/acpi_lpss.c                              |    2 
 drivers/acpi/x86/utils.c                              |    2 
 drivers/base/cpu.c                                    |    8 
 drivers/cpufreq/intel_pstate.c                        |    4 
 drivers/edac/pnd2_edac.c                              |    2 
 drivers/idle/intel_idle.c                             |   18 
 drivers/mmc/host/sdhci-acpi.c                         |    2 
 drivers/pci/pci-mid.c                                 |    4 
 drivers/platform/x86/intel_int0002_vgpio.c            |    2 
 drivers/platform/x86/intel_mid_powerbtn.c             |    4 
 drivers/platform/x86/intel_telemetry_debugfs.c        |    2 
 drivers/platform/x86/intel_telemetry_pltdrv.c         |    2 
 drivers/powercap/intel_rapl.c                         |   10 
 drivers/thermal/intel_soc_dts_thermal.c               |    2 
 include/linux/bitops.h                                |   22 
 include/linux/bits.h                                  |   26 
 include/linux/cpu.h                                   |   26 
 kernel/cpu.c                                          |   15 
 tools/power/x86/turbostat/Makefile                    |    2 
 tools/power/x86/turbostat/turbostat.c                 |   46 -
 tools/power/x86/x86_energy_perf_policy/Makefile       |    2 
 58 files changed, 1762 insertions(+), 825 deletions(-)

Andi Kleen (2):
      x86/speculation/mds: Add basic bug infrastructure for MDS
      x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests

Boris Ostrovsky (1):
      x86/speculation/mds: Fix comment

Dominik Brodowski (1):
      x86/speculation: Simplify the CPU bug detection logic

Eduardo Habkost (1):
      kvm: x86: Report STIBP on GET_SUPPORTED_CPUID

Greg Kroah-Hartman (1):
      Linux 4.14.119

Josh Poimboeuf (9):
      x86/speculation/mds: Add mds=full,nosmt cmdline option
      x86/speculation: Move arch_smt_update() call to after mitigation decisions
      x86/speculation/mds: Add SMT warning message
      cpu/speculation: Add 'mitigations=' cmdline option
      x86/speculation: Support 'mitigations=' cmdline option
      powerpc/speculation: Support 'mitigations=' cmdline option
      s390/speculation: Support 'mitigations=' cmdline option
      x86/speculation/mds: Add 'mitigations=' support for MDS
      x86/speculation/mds: Fix documentation typo

Konrad Rzeszutek Wilk (1):
      x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off

Peter Zijlstra (1):
      x86/cpu: Sanitize FAM6_ATOM naming

Salvatore Bonaccorso (1):
      Documentation/l1tf: Fix small spelling typo

Thomas Gleixner (12):
      x86/msr-index: Cleanup bit defines
      x86/speculation: Consolidate CPU whitelists
      x86/speculation/mds: Add BUG_MSBDS_ONLY
      x86/speculation/mds: Add mds_clear_cpu_buffers()
      x86/speculation/mds: Clear CPU buffers on exit to user
      x86/kvm/vmx: Add MDS protection when L1D Flush is not active
      x86/speculation/mds: Conditionally clear CPU buffers on idle entry
      x86/speculation/mds: Add mitigation control for MDS
      x86/speculation/mds: Add sysfs reporting for MDS
      x86/speculation/mds: Add mitigation mode VMWERV
      Documentation: Move L1TF to separate directory
      Documentation: Add MDS vulnerability documentation

Tyler Hicks (1):
      Documentation: Correct the possible MDS sysfs values

Will Deacon (1):
      locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file

speck for Pawan Gupta (1):
      x86/mds: Add MDSUM variant to the MDS documentation


Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists