This bug was fixed in the package linux - 4.4.0-137.163
---
linux (4.4.0-137.163) xenial; urgency=medium
* CVE-2018-14633
- iscsi target: Use hex2bin instead of a re-implementation
* CVE-2018-17182
- mm: get rid of vmacache_flush_all() entirely
linux (4.4.0-136.162) xeni
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1791080
Title:
Xenial update to 4.4.144 stable release
St
Remaining non Spectre v4 import:
* block: do not use interruptible wait anywhere
-> pick, context
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1791080
Title:
Xenial update to 4.4.144
Continue Spectre v4 review:
* x86/bugs: Provide boot parameters for the
spec_store_bypass_disable mitigation
-> skip, no change
* x86/bugs/intel: Set proper CPU features and setup RDS
-> skip, no change but note that we keep using
ibrs_inuse() instead of the feature bit.
* x86/bugs: Whit
Continue Spectre v4 review:
* x86/speculation: Remove Skylake C2 from Speculation
Control microcode blacklist
-> skip, ignore blacklist
* selftest/seccomp: Fix the flag name
SECCOMP_FILTER_FLAG_TSYNC
-> skip, no change
* x86/amd: don't set X86_BUG_SYSRET_SS_ATTRS when
running under Xen
Continue Spectre v4 review:
* x86/speculation: Update Speculation Control microcode
blacklist
-> skip, we do not carry the blacklist
* x86/speculation: Correct Speculation Control
microcode blacklist again
-> skip, again firmware blacklist
* x86/speculation: Clean up various Spectre related
This upstream stable update contains the backport for CVE-2018-3639 (x86) aka
Spectre v4/SSB.
* x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
The upstream stable patch adds two previously unknown
feature bits for word 18 which I added with a SAUCE
patch.
* x86/cpufeatures: Add Intel feature bi
7 matches
Mail list logo