List of already applied patches:
  * posix-timers: Sanitize overrun handling
  * KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
  * x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
  * x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
  * x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
  * x86: fix SMAP in 32-bit environments
  * x86: reorganize SMAP handling in user space accesses
  * KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
  * x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
  * x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
  * KVM: SVM: Move spec control call after restore of GS

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1811080

Title:
  Xenial update: 4.4.168 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1811080/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to