List of already applied patches:
* posix-timers: Sanitize overrun handling
* KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
* x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec
* x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}
* x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec
* x86: fix SMAP in 32-bit environments
* x86: reorganize SMAP handling in user space accesses
* KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
* x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
* x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
* KVM: SVM: Move spec control call after restore of GS
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1811080
Title:
Xenial update: 4.4.168 upstream stable release
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1811080/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs