This bug was fixed in the package linux - 4.4.0-171.200
---
linux (4.4.0-171.200) xenial; urgency=medium
* xenial/linux: 4.4.0-171.200 -proposed tracker (LP: #1854835)
* CVE-2019-14901
- SAUCE: mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()
* CVE-2019-1
This bug was fixed in the package linux - 4.15.0-74.84
---
linux (4.15.0-74.84) bionic; urgency=medium
* bionic/linux: 4.15.0-74.84 -proposed tracker (LP: #1856749)
* [Hyper-V] KVP daemon fails to start on first boot of disco VM (LP: #1820063)
- [Packaging] bind hv_kvp_daemon
This bug was fixed in the package linux - 5.0.0-38.41
---
linux (5.0.0-38.41) disco; urgency=medium
* disco/linux: 5.0.0-38.41 -proposed tracker (LP: #1854788)
* [Regression] Failed to boot disco kernel built from master-next (kernel
kernel NULL pointer dereference) (LP: #185
This bug was fixed in the package linux - 5.3.0-26.28
---
linux (5.3.0-26.28) eoan; urgency=medium
* eoan/linux: 5.3.0-26.28 -proposed tracker (LP: #1856807)
* nvidia-435 is in eoan, linux-restricted-modules only builds against 430,
ubiquity gives me the self-signed modules e
My colleague has verified all 4 versions. In all cases, on supported
hardware, the test now operates as expected: the secret does not leak
unless the mitigation is manually turned off.
I notice the SRU verification is happening a bit sooner than I expected
- when do you expect these kernels to be
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
eoan' to 'verification-done-eoan'. If the problem still exists, change
the tag 'verification
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'. If the problem still exists,
change the tag 'verifica
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
disco' to 'verification-done-disco'. If the problem still exists, change
the tag 'verificati
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
bionic' to 'verification-done-bionic'. If the problem still exists,
change the tag 'verifica
** Changed in: linux (Ubuntu Bionic)
Status: Triaged => Fix Committed
** Changed in: linux (Ubuntu Xenial)
Status: Triaged => Fix Committed
** Changed in: linux (Ubuntu Disco)
Status: Triaged => Fix Committed
** Changed in: linux (Ubuntu Eoan)
Status: Triaged => Fix C
The embargo has expired so I'm making this public now.
** Description changed:
Hi,
Recently you would have been notified about CVE-2019-18660 via email to
the linux-distros private mailing list. In short, it is a bug in the
Spectre v2 class affecting powerpc.
We have developed so
11 matches
Mail list logo