** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Changed in:
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Description changed:
This bug will
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Changed in:
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Tags removed: kernel-release-tracking-bug-live
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको
** Changed in: kernel-sru-workflow/prepare-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Kernel Team
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/promote-signing-to-proposed
Status: New => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux-kvm - 4.15.0-1067.68
---
linux-kvm (4.15.0-1067.68) bionic; urgency=medium
[ Ubuntu: 4.15.0-106.107 ]
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux-azure - 4.15.0-1089.99~16.04.1
---
linux-azure (4.15.0-1089.99~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-1089.99 ]
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table'
This bug was fixed in the package linux-aws-hwe - 4.15.0-1073.77~16.04.1
---
linux-aws-hwe (4.15.0-1073.77~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-1073.77 ]
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add
This bug was fixed in the package linux-gcp - 4.15.0-1077.87~16.04.1
---
linux-gcp (4.15.0-1077.87~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-1077.87 ]
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table'
This bug was fixed in the package linux-kvm - 4.4.0-1075.82
---
linux-kvm (4.4.0-1075.82) xenial; urgency=medium
[ Ubuntu: 4.4.0-184.214 ]
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
This bug was fixed in the package linux-oracle - 4.15.0-1045.49~16.04.1
---
linux-oracle (4.15.0-1045.49~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-1045.49 ]
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table'
*** This bug is a duplicate of bug 1881170 ***
https://bugs.launchpad.net/bugs/1881170
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux-aws - 4.4.0-1109.120
---
linux-aws (4.4.0-1109.120) xenial; urgency=medium
[ Ubuntu: 4.4.0-184.214 ]
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to
*** This bug is a duplicate of bug 1881271 ***
https://bugs.launchpad.net/bugs/1881271
This bug was fixed in the package linux-hwe - 4.15.0-106.107~16.04.1
---
linux-hwe (4.15.0-106.107~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-106.107 ]
* CVE-2020-0543
- SAUCE:
This bug was fixed in the package linux-hwe - 4.15.0-106.107~16.04.1
---
linux-hwe (4.15.0-106.107~16.04.1) xenial; urgency=medium
[ Ubuntu: 4.15.0-106.107 ]
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table'
This bug was fixed in the package linux - 4.15.0-106.107
---
linux (4.15.0-106.107) bionic; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux - 4.15.0-106.107
---
linux (4.15.0-106.107) bionic; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
This bug was fixed in the package linux - 5.3.0-59.53
---
linux (5.3.0-59.53) eoan; urgency=medium
* CVE-2020-0543
- SAUCE: x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu:
This bug was fixed in the package linux - 5.4.0-37.41
---
linux (5.4.0-37.41) focal; urgency=medium
* CVE-2020-0543
- SAUCE: x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu:
This bug was fixed in the package linux - 4.15.0-106.107
---
linux (4.15.0-106.107) bionic; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
Zesty is EOL, so this bug won't be fixed in Zesty.
The problem in Xenial is still valid, but at this stage I think it's no
longer appropriate to fix, as a workaround is available (by overriding
the systemd service locally) and I'd be concerned about changing
behaviour for existing users who did
40 matches
Mail list logo