New patch available for SRIO function

Bug #1387056 reported by Ike Panhc
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-keystone (Ubuntu)
Fix Released
Undecided
Ike Panhc

Bug Description

We have new patches available for SRIO function

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-keystone - 3.13.0-17.27

---------------
linux-keystone (3.13.0-17.27) trusty; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
    - LP: #1386864
  * Rebase to Ubuntu-3.13.0-39.66

  [ Upstream Kernel Changes ]

  * rapidio: keystone: fix lock-up condition with DIO and packet forwarding
    - LP: #1387056
  * rapidio: Remove duplicate entry from Makefile
    - LP: #1387056
  * rapidio: keystone: move SerDes functions in a separate file and rework
    port init sequence
    - LP: #1387056

  [ Ubuntu: 3.13.0-39.66 ]

  * Release Tracking Bug
    - LP: #1386629
  * KVM: x86: Check non-canonical addresses upon WRMSR
    - LP: #1384539
    - CVE-2014-3610
  * KVM: x86: Prevent host from panicking on shared MSR writes.
    - LP: #1384539
    - CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
    - LP: #1384540
    - CVE-2014-3611
  * KVM: x86: Fix wrong masking on relative jump/call
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: Warn if guest virtual address space is not 48-bits
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: Emulator fixes for eip canonical checks on near branches
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: emulating descriptor load misses long-mode case
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: Handle errors when RIP is set during far jumps
    - LP: #1384545
    - CVE-2014-3647
  * kvm: vmx: handle invvpid vm exit gracefully
    - LP: #1384544
    - CVE-2014-3646
  * Input: synaptics - gate forcepad support by DMI check
    - LP: #1381815
 -- Ike Panhc <email address hidden> Wed, 29 Oct 2014 14:48:28 +0800

Changed in linux-keystone (Ubuntu):
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.