Focal update: v5.4.38 upstream stable release
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Focal |
Fix Released
|
Undecided
|
Kamal Mostafa |
Bug Description
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.4.38 upstream stable release
from git://git.
Note: v5.4.38 itself consisted of a single revert (never committed to Ubuntu focal)from v5.4.37 -- so this is just a dummy tracking bug, really.
Linux 5.4.38
UBUNTU: upstream stable to v5.4.38
CVE References
Changed in linux (Ubuntu): | |
status: | New → Confirmed |
tags: | added: kernel-stable-tracking-bug |
Changed in linux (Ubuntu Focal): | |
status: | New → In Progress |
assignee: | nobody → Kamal Mostafa (kamalmostafa) |
description: | updated |
Changed in linux (Ubuntu Focal): | |
status: | In Progress → Fix Committed |
This bug was fixed in the package linux - 5.4.0-37.41
---------------
linux (5.4.0-37.41) focal; urgency=medium
* CVE-2020-0543 /spectre_ v2: Exclude Zhaoxin CPUs from SPECTRE_V2
- SAUCE: x86/speculation
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add Special Register Buffer Data Sampling (SRBDS)
mitigation
- SAUCE: x86/speculation: Add SRBDS vulnerability and mitigation documentation
- SAUCE: x86/speculation: Add Ivy Bridge to affected list
-- Marcelo Henrique Cerri <email address hidden> Wed, 03 Jun 2020 11:24:23 -0300