lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 14 May 2019 20:07:43 +0200
From:   Greg KH <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org,
        Andrew Morton <akpm@...ux-foundation.org>,
        torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:     lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Re: Linux 5.1.2

On Tue, May 14, 2019 at 08:04:24PM +0200, Greg KH wrote:
> I'm announcing the release of the 5.1.2 kernel.
> 
> All users of the 5.1 kernel series must upgrade.  Well, kind of, let me rephrase that...
> 
> All users of Intel processors made since 2011 must upgrade.
> 
> Note, this release, and the other stable releases that are all being
> released right now at the same time, just went out all contain patches
> that have only seen the "public eye" for about 5 minutes.  So be
> forwarned, they might break things, they might not build, but hopefully
> they fix things.  Odds are we will be fixing a number of small things in
> this area for the next few weeks as things shake out on real hardware
> and workloads.  So don't think you are done updating your kernel, you
> never are done with that :)
> 
> As for what specifically these changes fix, I'll let the tech news sites
> fill you in on the details.  Or go read the excellently written Xen
> Security Advisory 297:
> 	https://xenbits.xen.org/xsa/advisory-297.html
> That should give you a good idea of what a number of people have been
> dealing with for many many many months now.

Also see the new in-kernel documentation for how to handle all of this:
	https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ