This bug was fixed in the package linux - 4.15.0-171.180
--------------- linux (4.15.0-171.180) bionic; urgency=medium
* CVE-2022-0001 - cpu/SMT: create and export cpu_smt_possible() - x86/speculation: Merge one test in spectre_v2_user_select_mitigation() - x86,bugs: Unconditionally allow spectre_v2=retpoline,amd - SAUCE: x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE - SAUCE: x86/speculation: Add eIBRS + Retpoline options - SAUCE: Documentation/hw-vuln: Update spectre doc
* Disable unprivileged BPF by default (LP: #1961338) - bpf: Add kconfig knob for disabling unpriv bpf by default - [Config] set CONFIG_BPF_UNPRIV_DEFAULT_OFF=y
-- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 02 Mar 2022 13:21:15 -0300
This bug was fixed in the package linux - 4.15.0-171.180
---------------
linux (4.15.0-171.180) bionic; urgency=medium
* CVE-2022-0001 v2_user_ select_ mitigation( ) v2=retpoline, amd hw-vuln: Update spectre doc
- cpu/SMT: create and export cpu_smt_possible()
- x86/speculation: Merge one test in spectre_
- x86,bugs: Unconditionally allow spectre_
- SAUCE: x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
- SAUCE: x86/speculation: Add eIBRS + Retpoline options
- SAUCE: Documentation/
* Disable unprivileged BPF by default (LP: #1961338) BPF_UNPRIV_ DEFAULT_ OFF=y
- bpf: Add kconfig knob for disabling unpriv bpf by default
- [Config] set CONFIG_
-- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 02 Mar 2022 13:21:15 -0300