This bug was fixed in the package linux - 4.4.0-171.200
---
linux (4.4.0-171.200) xenial; urgency=medium
* xenial/linux: 4.4.0-171.200 -proposed tracker (LP: #1854835)
* CVE-2019-14901
- SAUCE: mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()
*
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1852335
Title:
Xenial update: 4.4.201 upstream stable
Also of note:
* ("perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus
precise RIP validity") modified a routine that was expected to be in
"arch/x86/kernel/cpu/perf_event_amd_ibs.c" but was found in
"arch/x86/events/amd/ibs.c"
--
You received this bug notification because you are
The following patches were NOT applied from this upstream stable update
in favor of their UBUNTU SAUCE equivalents:
* drm/i915/gtt: Add read only pages to gen8_pte_encode
* drm/i915/gtt: Read-only pages for insert_entries on bdw+
* drm/i915/gtt: Disable read-only support under GVT
* drm/i915:
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Xenial)
Status: New => In Progress
** Changed in: linux (Ubuntu Xenial)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Xenial)
Assignee: (unassigned) => Connor Kuehl
6 matches
Mail list logo