[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190514180743.GA13519@kroah.com>
Date: Tue, 14 May 2019 20:07:43 +0200
From: Greg KH <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>,
torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc: lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Re: Linux 5.1.2
On Tue, May 14, 2019 at 08:04:24PM +0200, Greg KH wrote:
> I'm announcing the release of the 5.1.2 kernel.
>
> All users of the 5.1 kernel series must upgrade. Well, kind of, let me rephrase that...
>
> All users of Intel processors made since 2011 must upgrade.
>
> Note, this release, and the other stable releases that are all being
> released right now at the same time, just went out all contain patches
> that have only seen the "public eye" for about 5 minutes. So be
> forwarned, they might break things, they might not build, but hopefully
> they fix things. Odds are we will be fixing a number of small things in
> this area for the next few weeks as things shake out on real hardware
> and workloads. So don't think you are done updating your kernel, you
> never are done with that :)
>
> As for what specifically these changes fix, I'll let the tech news sites
> fill you in on the details. Or go read the excellently written Xen
> Security Advisory 297:
> https://xenbits.xen.org/xsa/advisory-297.html
> That should give you a good idea of what a number of people have been
> dealing with for many many many months now.
Also see the new in-kernel documentation for how to handle all of this:
https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html
Powered by blists - more mailing lists