This bug was fixed in the package linux - 5.4.0-18.22
---
linux (5.4.0-18.22) focal; urgency=medium
* focal/linux: 5.4.0-18.22 -proposed tracker (LP: #1866488)
* Packaging resync (LP: #1786013)
- [Packaging] resync getabis
- [Packaging] update helper scripts
* Add sysf
This bug was fixed in the package linux - 4.15.0-76.86
---
linux (4.15.0-76.86) bionic; urgency=medium
* bionic/linux: 4.15.0-76.86 -proposed tracker (LP: #1860123)
* Integrate Intel SGX driver into linux-azure (LP: #1844245)
- [Packaging] Add systemd service to load intel_s
This bug was fixed in the package linux - 5.3.0-29.31
---
linux (5.3.0-29.31) eoan; urgency=medium
* eoan/linux: 5.3.0-29.31 -proposed tracker (LP: #1860119)
* Integrate Intel SGX driver into linux-azure (LP: #1844245)
- [Packaging] Add systemd service to load intel_sgx
lin
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when dest
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
bionic' to 'verification-done-bionic'. If the problem still exists,
change the tag 'verifica
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
eoan' to 'verification-done-eoan'. If the problem still exists, change
the tag 'verification
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
disco' to 'verification-done-disco'. If the problem still exists, change
the tag 'verificati
** Changed in: linux (Ubuntu Bionic)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Disco)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Eoan)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Focal)
Status: In Pr
** Description changed:
[Impact]
It was discovered that upstream kernel commit cab15ce604e5 ("arm64:
Introduce execute-only page access permissions"), which introduced
execute-only user mappings, subverted the Privileged Access Never
protections.
The fix is to effectively revert
** Changed in: linux (Ubuntu Bionic)
Status: Triaged => In Progress
** Changed in: linux (Ubuntu Disco)
Status: Triaged => In Progress
** Changed in: linux (Ubuntu Eoan)
Status: Triaged => In Progress
** Changed in: linux (Ubuntu Focal)
Status: Triaged => In Progress
10 matches
Mail list logo