This bug was fixed in the package linux - 4.4.0-184.214
---
linux (4.4.0-184.214) xenial; urgency=medium
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1878232
Title:
Xenial update: 4.4.223 upstream stable release
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1878232
Title:
Xenial update: 4.4.223 upstream stable release
Status in
Please note that the following patches have been skipped as they were already
applied to xenial/linux:
* net/mlx4_core: Implement pci_resume callback
* brcmfmac: add eth_type_trans back for PCIe full dongle
* ovs/gre,geneve: fix error path when creating an iface
* Drivers: hv: utils: use
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
5 matches
Mail list logo