New patch available for SRIO function

Bug #1387056 reported by Ike Panhc on 2014-10-29
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-keystone (Ubuntu)
Undecided
Ike Panhc

Bug Description

We have new patches available for SRIO function

Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-keystone - 3.13.0-17.27

---------------
linux-keystone (3.13.0-17.27) trusty; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
    - LP: #1386864
  * Rebase to Ubuntu-3.13.0-39.66

  [ Upstream Kernel Changes ]

  * rapidio: keystone: fix lock-up condition with DIO and packet forwarding
    - LP: #1387056
  * rapidio: Remove duplicate entry from Makefile
    - LP: #1387056
  * rapidio: keystone: move SerDes functions in a separate file and rework
    port init sequence
    - LP: #1387056

  [ Ubuntu: 3.13.0-39.66 ]

  * Release Tracking Bug
    - LP: #1386629
  * KVM: x86: Check non-canonical addresses upon WRMSR
    - LP: #1384539
    - CVE-2014-3610
  * KVM: x86: Prevent host from panicking on shared MSR writes.
    - LP: #1384539
    - CVE-2014-3610
  * KVM: x86: Improve thread safety in pit
    - LP: #1384540
    - CVE-2014-3611
  * KVM: x86: Fix wrong masking on relative jump/call
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: Warn if guest virtual address space is not 48-bits
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: Emulator fixes for eip canonical checks on near branches
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: emulating descriptor load misses long-mode case
    - LP: #1384545
    - CVE-2014-3647
  * KVM: x86: Handle errors when RIP is set during far jumps
    - LP: #1384545
    - CVE-2014-3647
  * kvm: vmx: handle invvpid vm exit gracefully
    - LP: #1384544
    - CVE-2014-3646
  * Input: synaptics - gate forcepad support by DMI check
    - LP: #1381815
 -- Ike Panhc <email address hidden> Wed, 29 Oct 2014 14:48:28 +0800

Changed in linux-keystone (Ubuntu):
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers