mbox series

[SRU,Trusty,PULL] Updates for CVE-2017-5753

Message ID 20181113161127.14551-1-juergh@canonical.com
State New
Headers show
Series [SRU,Trusty,PULL] Updates for CVE-2017-5753 | expand

Pull-request

git://git.launchpad.net/~juergh/+git/trusty-linux update-spectre-v1

Message

Juerg Haefliger Nov. 13, 2018, 4:11 p.m. UTC
CVE-2017-5753

This pull request contains fix(es) for the following CVE(s): CVE-2017-5753

Add Spectre v1 pointer masking in various places and some minor fixes to
match upstream stable v4.9.

Compile-tested all architectures.

Signed-off-by: Juerg Haefliger <juergh@canonical.com>
---

The following changes since commit 75136bbc88ff3f96baa790d65e2826f64e5d5772:

  drm: fix NULL pointer access by wrong ioctl (2018-11-07 22:47:19 -0500)

are available in the Git repository at:

  git://git.launchpad.net/~juergh/+git/trusty-linux update-spectre-v1

for you to fetch changes up to d56fe24802964e8ba4eff3f4b2f7feab97d668ab:

  tty: vt_ioctl: fix potential Spectre v1 (2018-11-12 16:37:46 +0100)

----------------------------------------------------------------
Dan Williams (2):
      x86/spectre_v1: Disable compiler optimizations over array_index_mask_nospec()
      x86/speculation: Fix up array_index_nospec_mask() asm constraint

Gustavo A. R. Silva (8):
      net: atm: Fix potential Spectre v1
      atm: zatm: Fix potential Spectre v1
      kernel/sys.c: fix potential Spectre v1 issue
      HID: hiddev: fix potential Spectre v1
      atm: zatm: Fix potential Spectre v1
      net: cxgb3_main: fix potential Spectre v1
      misc: hmc6352: fix potential Spectre v1
      tty: vt_ioctl: fix potential Spectre v1

Jeremy Cline (4):
      netlink: Fix spectre v1 gadget in netlink_create()
      net: socket: fix potential spectre v1 gadget in socketcall
      ext4: fix spectre gadget in ext4_mb_regular_allocator()
      fs/quota: Fix spectre gadget in do_quotactl

John Garry (1):
      libahci: Fix possible Spectre-v1 pmp indexing in ahci_led_store()

Peter Zijlstra (2):
      perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_*
      perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map()

Takashi Iwai (7):
      ALSA: opl3: Hardening for potential Spectre v1
      ALSA: asihpi: Hardening for potential Spectre v1
      ALSA: hdspm: Hardening for potential Spectre v1
      ALSA: rme9652: Hardening for potential Spectre v1
      ALSA: control: Hardening for potential Spectre v1
      ALSA: seq: oss: Hardening for potential Spectre v1
      ALSA: hda: Hardening for potential Spectre v1

 arch/x86/include/asm/barrier.h                  |  4 +-
 arch/x86/kernel/cpu/perf_event.c                |  8 ++-
 drivers/ata/libahci.c                           |  7 ++-
 drivers/atm/zatm.c                              |  5 ++
 drivers/hid/usbhid/hiddev.c                     | 11 ++++
 drivers/misc/hmc6352.c                          |  2 +
 drivers/net/ethernet/chelsio/cxgb3/cxgb3_main.c |  2 +
 drivers/tty/vt/vt_ioctl.c                       |  4 ++
 fs/ext4/mballoc.c                               |  4 +-
 fs/quota/quota.c                                |  2 +
 include/sound/control.h                         |  7 ++-
 kernel/sys.c                                    |  4 ++
 net/atm/lec.c                                   |  9 ++-
 net/netlink/af_netlink.c                        |  2 +
 net/socket.c                                    |  2 +
 sound/core/seq/oss/seq_oss_event.c              | 15 +++--
 sound/core/seq/oss/seq_oss_midi.c               |  2 +
 sound/core/seq/oss/seq_oss_synth.c              | 75 ++++++++++++++-----------
 sound/core/seq/oss/seq_oss_synth.h              |  3 +-
 sound/drivers/opl3/opl3_synth.c                 |  7 ++-
 sound/pci/asihpi/hpimsginit.c                   | 13 +++--
 sound/pci/asihpi/hpioctl.c                      |  4 +-
 sound/pci/hda/hda_hwdep.c                       | 12 +++-
 sound/pci/rme9652/hdspm.c                       | 24 ++++----
 sound/pci/rme9652/rme9652.c                     |  6 +-
 25 files changed, 164 insertions(+), 70 deletions(-)

Comments

Stefan Bader Nov. 20, 2018, 10:52 a.m. UTC | #1
On 13.11.18 17:11, Juerg Haefliger wrote:
> CVE-2017-5753
> 
> This pull request contains fix(es) for the following CVE(s): CVE-2017-5753
> 
> Add Spectre v1 pointer masking in various places and some minor fixes to
> match upstream stable v4.9.
> 
> Compile-tested all architectures.
> 
> Signed-off-by: Juerg Haefliger <juergh@canonical.com>
> ---
> 
> The following changes since commit 75136bbc88ff3f96baa790d65e2826f64e5d5772:
> 
>   drm: fix NULL pointer access by wrong ioctl (2018-11-07 22:47:19 -0500)
> 
> are available in the Git repository at:
> 
>   git://git.launchpad.net/~juergh/+git/trusty-linux update-spectre-v1
> 
> for you to fetch changes up to d56fe24802964e8ba4eff3f4b2f7feab97d668ab:
> 
>   tty: vt_ioctl: fix potential Spectre v1 (2018-11-12 16:37:46 +0100)
> 
> ----------------------------------------------------------------
> Dan Williams (2):
>       x86/spectre_v1: Disable compiler optimizations over array_index_mask_nospec()
>       x86/speculation: Fix up array_index_nospec_mask() asm constraint
> 
> Gustavo A. R. Silva (8):
>       net: atm: Fix potential Spectre v1
>       atm: zatm: Fix potential Spectre v1
>       kernel/sys.c: fix potential Spectre v1 issue
>       HID: hiddev: fix potential Spectre v1
>       atm: zatm: Fix potential Spectre v1
>       net: cxgb3_main: fix potential Spectre v1
>       misc: hmc6352: fix potential Spectre v1
>       tty: vt_ioctl: fix potential Spectre v1
> 
> Jeremy Cline (4):
>       netlink: Fix spectre v1 gadget in netlink_create()
>       net: socket: fix potential spectre v1 gadget in socketcall
>       ext4: fix spectre gadget in ext4_mb_regular_allocator()
>       fs/quota: Fix spectre gadget in do_quotactl
> 
> John Garry (1):
>       libahci: Fix possible Spectre-v1 pmp indexing in ahci_led_store()
> 
> Peter Zijlstra (2):
>       perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_*
>       perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map()
> 
> Takashi Iwai (7):
>       ALSA: opl3: Hardening for potential Spectre v1
>       ALSA: asihpi: Hardening for potential Spectre v1
>       ALSA: hdspm: Hardening for potential Spectre v1
>       ALSA: rme9652: Hardening for potential Spectre v1
>       ALSA: control: Hardening for potential Spectre v1
>       ALSA: seq: oss: Hardening for potential Spectre v1
>       ALSA: hda: Hardening for potential Spectre v1
> 
>  arch/x86/include/asm/barrier.h                  |  4 +-
>  arch/x86/kernel/cpu/perf_event.c                |  8 ++-
>  drivers/ata/libahci.c                           |  7 ++-
>  drivers/atm/zatm.c                              |  5 ++
>  drivers/hid/usbhid/hiddev.c                     | 11 ++++
>  drivers/misc/hmc6352.c                          |  2 +
>  drivers/net/ethernet/chelsio/cxgb3/cxgb3_main.c |  2 +
>  drivers/tty/vt/vt_ioctl.c                       |  4 ++
>  fs/ext4/mballoc.c                               |  4 +-
>  fs/quota/quota.c                                |  2 +
>  include/sound/control.h                         |  7 ++-
>  kernel/sys.c                                    |  4 ++
>  net/atm/lec.c                                   |  9 ++-
>  net/netlink/af_netlink.c                        |  2 +
>  net/socket.c                                    |  2 +
>  sound/core/seq/oss/seq_oss_event.c              | 15 +++--
>  sound/core/seq/oss/seq_oss_midi.c               |  2 +
>  sound/core/seq/oss/seq_oss_synth.c              | 75 ++++++++++++++-----------
>  sound/core/seq/oss/seq_oss_synth.h              |  3 +-
>  sound/drivers/opl3/opl3_synth.c                 |  7 ++-
>  sound/pci/asihpi/hpimsginit.c                   | 13 +++--
>  sound/pci/asihpi/hpioctl.c                      |  4 +-
>  sound/pci/hda/hda_hwdep.c                       | 12 +++-
>  sound/pci/rme9652/hdspm.c                       | 24 ++++----
>  sound/pci/rme9652/rme9652.c                     |  6 +-
>  25 files changed, 164 insertions(+), 70 deletions(-)
> 
Acked-by: Stefan Bader <stefan.bader@canonical.com>
Kleber Sacilotto de Souza Nov. 28, 2018, 2:26 p.m. UTC | #2
On 11/13/18 5:11 PM, Juerg Haefliger wrote:
> CVE-2017-5753
>
> This pull request contains fix(es) for the following CVE(s): CVE-2017-5753
>
> Add Spectre v1 pointer masking in various places and some minor fixes to
> match upstream stable v4.9.
>
> Compile-tested all architectures.
>
> Signed-off-by: Juerg Haefliger <juergh@canonical.com>


Acked-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>


> ---
>
> The following changes since commit 75136bbc88ff3f96baa790d65e2826f64e5d5772:
>
>   drm: fix NULL pointer access by wrong ioctl (2018-11-07 22:47:19 -0500)
>
> are available in the Git repository at:
>
>   git://git.launchpad.net/~juergh/+git/trusty-linux update-spectre-v1
>
> for you to fetch changes up to d56fe24802964e8ba4eff3f4b2f7feab97d668ab:
>
>   tty: vt_ioctl: fix potential Spectre v1 (2018-11-12 16:37:46 +0100)
>
> ----------------------------------------------------------------
> Dan Williams (2):
>       x86/spectre_v1: Disable compiler optimizations over array_index_mask_nospec()
>       x86/speculation: Fix up array_index_nospec_mask() asm constraint
>
> Gustavo A. R. Silva (8):
>       net: atm: Fix potential Spectre v1
>       atm: zatm: Fix potential Spectre v1
>       kernel/sys.c: fix potential Spectre v1 issue
>       HID: hiddev: fix potential Spectre v1
>       atm: zatm: Fix potential Spectre v1
>       net: cxgb3_main: fix potential Spectre v1
>       misc: hmc6352: fix potential Spectre v1
>       tty: vt_ioctl: fix potential Spectre v1
>
> Jeremy Cline (4):
>       netlink: Fix spectre v1 gadget in netlink_create()
>       net: socket: fix potential spectre v1 gadget in socketcall
>       ext4: fix spectre gadget in ext4_mb_regular_allocator()
>       fs/quota: Fix spectre gadget in do_quotactl
>
> John Garry (1):
>       libahci: Fix possible Spectre-v1 pmp indexing in ahci_led_store()
>
> Peter Zijlstra (2):
>       perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_*
>       perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map()
>
> Takashi Iwai (7):
>       ALSA: opl3: Hardening for potential Spectre v1
>       ALSA: asihpi: Hardening for potential Spectre v1
>       ALSA: hdspm: Hardening for potential Spectre v1
>       ALSA: rme9652: Hardening for potential Spectre v1
>       ALSA: control: Hardening for potential Spectre v1
>       ALSA: seq: oss: Hardening for potential Spectre v1
>       ALSA: hda: Hardening for potential Spectre v1
>
>  arch/x86/include/asm/barrier.h                  |  4 +-
>  arch/x86/kernel/cpu/perf_event.c                |  8 ++-
>  drivers/ata/libahci.c                           |  7 ++-
>  drivers/atm/zatm.c                              |  5 ++
>  drivers/hid/usbhid/hiddev.c                     | 11 ++++
>  drivers/misc/hmc6352.c                          |  2 +
>  drivers/net/ethernet/chelsio/cxgb3/cxgb3_main.c |  2 +
>  drivers/tty/vt/vt_ioctl.c                       |  4 ++
>  fs/ext4/mballoc.c                               |  4 +-
>  fs/quota/quota.c                                |  2 +
>  include/sound/control.h                         |  7 ++-
>  kernel/sys.c                                    |  4 ++
>  net/atm/lec.c                                   |  9 ++-
>  net/netlink/af_netlink.c                        |  2 +
>  net/socket.c                                    |  2 +
>  sound/core/seq/oss/seq_oss_event.c              | 15 +++--
>  sound/core/seq/oss/seq_oss_midi.c               |  2 +
>  sound/core/seq/oss/seq_oss_synth.c              | 75 ++++++++++++++-----------
>  sound/core/seq/oss/seq_oss_synth.h              |  3 +-
>  sound/drivers/opl3/opl3_synth.c                 |  7 ++-
>  sound/pci/asihpi/hpimsginit.c                   | 13 +++--
>  sound/pci/asihpi/hpioctl.c                      |  4 +-
>  sound/pci/hda/hda_hwdep.c                       | 12 +++-
>  sound/pci/rme9652/hdspm.c                       | 24 ++++----
>  sound/pci/rme9652/rme9652.c                     |  6 +-
>  25 files changed, 164 insertions(+), 70 deletions(-)
>
Khalid Elmously Nov. 29, 2018, 7:31 a.m. UTC | #3
On 2018-11-13 17:11:27 , Juerg Haefliger wrote:
> CVE-2017-5753
> 
> This pull request contains fix(es) for the following CVE(s): CVE-2017-5753
> 
> Add Spectre v1 pointer masking in various places and some minor fixes to
> match upstream stable v4.9.
> 
> Compile-tested all architectures.
> 
> Signed-off-by: Juerg Haefliger <juergh@canonical.com>
> ---
> 
> The following changes since commit 75136bbc88ff3f96baa790d65e2826f64e5d5772:
> 
>   drm: fix NULL pointer access by wrong ioctl (2018-11-07 22:47:19 -0500)
> 
> are available in the Git repository at:
> 
>   git://git.launchpad.net/~juergh/+git/trusty-linux update-spectre-v1
> 
> for you to fetch changes up to d56fe24802964e8ba4eff3f4b2f7feab97d668ab:
> 
>   tty: vt_ioctl: fix potential Spectre v1 (2018-11-12 16:37:46 +0100)
> 
> ----------------------------------------------------------------
> Dan Williams (2):
>       x86/spectre_v1: Disable compiler optimizations over array_index_mask_nospec()
>       x86/speculation: Fix up array_index_nospec_mask() asm constraint
> 
> Gustavo A. R. Silva (8):
>       net: atm: Fix potential Spectre v1
>       atm: zatm: Fix potential Spectre v1
>       kernel/sys.c: fix potential Spectre v1 issue
>       HID: hiddev: fix potential Spectre v1
>       atm: zatm: Fix potential Spectre v1
>       net: cxgb3_main: fix potential Spectre v1
>       misc: hmc6352: fix potential Spectre v1
>       tty: vt_ioctl: fix potential Spectre v1
> 
> Jeremy Cline (4):
>       netlink: Fix spectre v1 gadget in netlink_create()
>       net: socket: fix potential spectre v1 gadget in socketcall
>       ext4: fix spectre gadget in ext4_mb_regular_allocator()
>       fs/quota: Fix spectre gadget in do_quotactl
> 
> John Garry (1):
>       libahci: Fix possible Spectre-v1 pmp indexing in ahci_led_store()
> 
> Peter Zijlstra (2):
>       perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_*
>       perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map()
> 
> Takashi Iwai (7):
>       ALSA: opl3: Hardening for potential Spectre v1
>       ALSA: asihpi: Hardening for potential Spectre v1
>       ALSA: hdspm: Hardening for potential Spectre v1
>       ALSA: rme9652: Hardening for potential Spectre v1
>       ALSA: control: Hardening for potential Spectre v1
>       ALSA: seq: oss: Hardening for potential Spectre v1
>       ALSA: hda: Hardening for potential Spectre v1
> 
>  arch/x86/include/asm/barrier.h                  |  4 +-
>  arch/x86/kernel/cpu/perf_event.c                |  8 ++-
>  drivers/ata/libahci.c                           |  7 ++-
>  drivers/atm/zatm.c                              |  5 ++
>  drivers/hid/usbhid/hiddev.c                     | 11 ++++
>  drivers/misc/hmc6352.c                          |  2 +
>  drivers/net/ethernet/chelsio/cxgb3/cxgb3_main.c |  2 +
>  drivers/tty/vt/vt_ioctl.c                       |  4 ++
>  fs/ext4/mballoc.c                               |  4 +-
>  fs/quota/quota.c                                |  2 +
>  include/sound/control.h                         |  7 ++-
>  kernel/sys.c                                    |  4 ++
>  net/atm/lec.c                                   |  9 ++-
>  net/netlink/af_netlink.c                        |  2 +
>  net/socket.c                                    |  2 +
>  sound/core/seq/oss/seq_oss_event.c              | 15 +++--
>  sound/core/seq/oss/seq_oss_midi.c               |  2 +
>  sound/core/seq/oss/seq_oss_synth.c              | 75 ++++++++++++++-----------
>  sound/core/seq/oss/seq_oss_synth.h              |  3 +-
>  sound/drivers/opl3/opl3_synth.c                 |  7 ++-
>  sound/pci/asihpi/hpimsginit.c                   | 13 +++--
>  sound/pci/asihpi/hpioctl.c                      |  4 +-
>  sound/pci/hda/hda_hwdep.c                       | 12 +++-
>  sound/pci/rme9652/hdspm.c                       | 24 ++++----
>  sound/pci/rme9652/rme9652.c                     |  6 +-
>  25 files changed, 164 insertions(+), 70 deletions(-)
> 
> -- 
> kernel-team mailing list
> kernel-team@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team