mbox series

[SRU,Trusty,Artful,0/1] Fix for CVE-2017-1000407

Message ID 20180126165758.5977-1-kleber.souza@canonical.com
Headers show
Series Fix for CVE-2017-1000407 | expand

Message

Kleber Sacilotto de Souza Jan. 26, 2018, 4:57 p.m. UTC
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-1000407.html

Clean cherry-pick for Artful, a simple backport for Trusty since the bit was
cleared originally in a different function. The fix for Xenial is queued as
part of upstream stable update to 4.4.106.

Andrew Honig (1):
  KVM: VMX: remove I/O port 0x80 bypass on Intel hosts

 arch/x86/kvm/vmx.c | 5 -----
 1 file changed, 5 deletions(-)

Comments

Khalid Elmously Jan. 26, 2018, 5:15 p.m. UTC | #1
On 2018-01-26 17:57:56 , Kleber Sacilotto de Souza wrote:
> https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-1000407.html
> 
> Clean cherry-pick for Artful, a simple backport for Trusty since the bit was
> cleared originally in a different function. The fix for Xenial is queued as
> part of upstream stable update to 4.4.106.
> 
> Andrew Honig (1):
>   KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
> 
>  arch/x86/kvm/vmx.c | 5 -----
>  1 file changed, 5 deletions(-)
>

Wouldn't these patches complicate the stable-update pull? Do the stable updates need to be redone now after these fixes?

Acked-by: Khalid Elmously <khalid.elmously@canonical.com>
Colin Ian King Jan. 26, 2018, 5:19 p.m. UTC | #2
On 26/01/18 16:57, Kleber Sacilotto de Souza wrote:
> https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-1000407.html
> 
> Clean cherry-pick for Artful, a simple backport for Trusty since the bit was
> cleared originally in a different function. The fix for Xenial is queued as
> part of upstream stable update to 4.4.106.
> 
> Andrew Honig (1):
>   KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
> 
>  arch/x86/kvm/vmx.c | 5 -----
>  1 file changed, 5 deletions(-)
> 

Seems reasonable to me.

Acked-by: Colin Ian King <colin.king@canonical.com>
Kleber Sacilotto de Souza Jan. 29, 2018, 9:30 a.m. UTC | #3
On 01/26/18 18:15, Khaled Elmously wrote:
> On 2018-01-26 17:57:56 , Kleber Sacilotto de Souza wrote:
>> https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-1000407.html
>>
>> Clean cherry-pick for Artful, a simple backport for Trusty since the bit was
>> cleared originally in a different function. The fix for Xenial is queued as
>> part of upstream stable update to 4.4.106.
>>
>> Andrew Honig (1):
>>   KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
>>
>>  arch/x86/kvm/vmx.c | 5 -----
>>  1 file changed, 5 deletions(-)
>>
> 
> Wouldn't these patches complicate the stable-update pull? Do the stable updates need to be redone now after these fixes?

4.13 didn't get this fix on the stable tree and it stopped receiving
stable updates, so we should be good and have no conflicts :-).


Kleber

> 
> Acked-by: Khalid Elmously <khalid.elmously@canonical.com> 
>
Khalid Elmously Jan. 30, 2018, 7:01 p.m. UTC | #4
On 2018-01-29 10:30:36 , Kleber Souza wrote:
> On 01/26/18 18:15, Khaled Elmously wrote:
> > On 2018-01-26 17:57:56 , Kleber Sacilotto de Souza wrote:
> >> https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-1000407.html
> >>
> >> Clean cherry-pick for Artful, a simple backport for Trusty since the bit was
> >> cleared originally in a different function. The fix for Xenial is queued as
> >> part of upstream stable update to 4.4.106.
> >>
> >> Andrew Honig (1):
> >>   KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
> >>
> >>  arch/x86/kvm/vmx.c | 5 -----
> >>  1 file changed, 5 deletions(-)
> >>
> > 
> > Wouldn't these patches complicate the stable-update pull? Do the stable updates need to be redone now after these fixes?
> 
> 4.13 didn't get this fix on the stable tree and it stopped receiving
> stable updates, so we should be good and have no conflicts :-).
> 
> 

I guess I was wondering more about Trust (4.4) not 4.13. No worries though, we'll cross that bridge when we get to it.
Still ACK


> Kleber
> 
> > 
> > Acked-by: Khalid Elmously <khalid.elmously@canonical.com> 
> >
Khalid Elmously Feb. 3, 2018, 2:06 a.m. UTC | #5
Applied to artful

On 2018-01-26 17:57:56 , Kleber Sacilotto de Souza wrote:
> https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-1000407.html
> 
> Clean cherry-pick for Artful, a simple backport for Trusty since the bit was
> cleared originally in a different function. The fix for Xenial is queued as
> part of upstream stable update to 4.4.106.
> 
> Andrew Honig (1):
>   KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
> 
>  arch/x86/kvm/vmx.c | 5 -----
>  1 file changed, 5 deletions(-)
> 
> -- 
> 2.14.1
> 
> 
> -- 
> kernel-team mailing list
> kernel-team@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team