This bug was fixed in the package linux - 4.4.0-166.195
---
linux (4.4.0-166.195) xenial; urgency=medium
* xenial/linux: 4.4.0-166.195 -proposed tracker (LP: #1846069)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
* CVE-2017-18232
- scsi: libsas
The following commit has already been applied and was skipped:
* f9921443b26c KVM: coalesced_mmio: add bounds checking
- Applied for CVE-2019-14821
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-14821
--
You received this bug notification because you are a member of Kernel
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
3 matches
Mail list logo