lp:~tyhicks/ubuntu/+source/linux/+git/bionic
- Get this repository:
-
git clone
https://git.launchpad.net/~tyhicks/ubuntu/+source/linux/+git/bionic
Branches
Name | Last Modified | Last Commit |
---|---|---|
cves/CVE-2020-8832 | 2020-02-11 23:17:42 UTC |
drm/i915: Record the default hw state after reset upon load
Author:
Chris Wilson
drm/i915: Record the default hw state after reset upon load BugLink: https:/ Take a copy of the HW state after a reset upon module loading by v2: Unmap our default state from the GTT after stealing it from the Testcase: igt/gem_ CVE-2020-8832 (backported from commit d2b4b97933f5ada |
i915 | 2020-01-14 20:05:54 UTC |
UBUNTU: SAUCE: drm/i915: Fix use-after-free when destroying GEM context
Author:
Tyler Hicks
UBUNTU: SAUCE: drm/i915: Fix use-after-free when destroying GEM context BugLink: https:/ This patch is a simplified fix to address a use-after-free in 4.14.x and Expand mutex coverage, while destroying the GEM context, to include the ====== CPU: 0 PID: 3124 Comm: i915-poc Not tainted 4.14.164 #1 Allocated by task 2898: Freed by task 104: The buggy address belongs to the object at ffff8881368a8000 Memory state around the buggy address: Fixes: 1acfc104cdf8 ("drm/i915: Enable rcu-only context lookups") CVE-2020-7053 Signed-off-by: Tyler Hicks <tyhicks@ |
speculation-v2 | 2019-03-27 19:58:24 UTC |
x86/speculation: Simplify the CPU bug detection logic
Author:
Dominik Brodowski
x86/speculation: Simplify the CPU bug detection logic Only CPUs which speculate can speculate. Therefore, it seems prudent Signed-off-by: Dominik Brodowski <linux@ CVE-2017-5715 (backported from commit 8ecc4979b1bd9c9 |
speculation | 2019-03-25 18:25:02 UTC |
x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE
Author:
WANG Chao
x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE Commit 4cd24de3a098 ("x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support") replaced the RETPOLINE define with CONFIG_RETPOLINE checks. Remove the [ bp: Massage commit message. ] Fixes: 4cd24de3a098 ("x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support") CVE-2017-5715 (backported from commit e4f358916d528d4 |
master | 2019-02-06 04:57:22 UTC |
UBUNTU: Ubuntu-4.15.0-46.49
Author:
Khaled El Mously
UBUNTU: Ubuntu-4.15.0-46.49 Signed-off-by: Khalid Elmously <khalid. |
spectrersb | 2018-08-28 17:31:54 UTC |
Bump version
Author:
Tyler Hicks
Bump version |
lp1760099- |
2018-04-05 23:41:06 UTC |
powerpc/64s: Wire up cpu_show_spectre_v2()
Author:
Michael Ellerman
powerpc/64s: Wire up cpu_show_ BugLink: https:/ CVE-2017-5715 Add a definition for cpu_show_ The most verbose is: Mitigation: Indirect branch serialisation (kernel only), Indirect We don't treat the ori31 speculation barrier as a mitigation on its Vulnerable, ori31 speculation barrier enabled Signed-off-by: Michael Ellerman <mpe@ellerman. |
1 → 7 of 7 results | First • Previous • Next • Last |