On Wed, 2018-01-03 at 15:02 -0800, Adam Williamson wrote: > Hi folks! > > So you might have read some stories today about an issue that's being > described as a design flaw in some CPUs which makes it possible for > unprivileged users on an affected system to read from privileged memory > locations. > > It seems like there are some complex questions still being figured out > about this (like exactly what CPUs are and are not affected, and what > practical consequences there are in various cases), but our kernel team > has decided that we should at least ship a preliminary fix for this > issue that should address it for x86_64 CPUs. > > Accordingly, updates are now going out for Fedora 26 and Fedora 27: > > * https://bodhi.fedoraproject.org/updates/FEDORA-2018-8ed5eff2c0 (Fedora 26) > * https://bodhi.fedoraproject.org/updates/FEDORA-2018-22d5fa8a90 (Fedora 27) > > and it would be great if we can get these tested and karma filed as > soon as possible, so they can be pushed to stable. > > The updates are kernel-4.14.11-200.fc26 and kernel-4.14.11-300.fc27, > respectively. As I write this, the Fedora 27 update has been pushed out > to updates-testing, while the Fedora 26 one has not but should soon. Follow-up on this: apparently Bodhi has a bug preventing us from filing feedback on the Fedora 26 update until it completes the push to updates-testing. So please do go ahead and test it, then wait until the push is complete to file your feedback. I'll post another reply to this mail once the push completes and we can leave the feedback. -- Adam Williamson Fedora QA Community Monkey IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net http://www.happyassassin.net _______________________________________________ test-announce mailing list -- test-announce@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to test-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx