This bug was fixed in the package linux - 5.4.0-21.25

---------------
linux (5.4.0-21.25) focal; urgency=medium

  * CVE-2020-8835
    - SAUCE: bpf: undo incorrect __reg_bound_offset32 handling

 -- Thadeu Lima de Souza Cascardo <casca...@canonical.com>  Thu, 26 Mar
2020 17:51:28 -0300

** Changed in: linux (Ubuntu)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-8835

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1835531

Title:
  [20.04 FEAT] Base KVM setup for secure guests - kernel part

Status in Ubuntu on IBM z Systems:
  Fix Committed
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  Enable KVM guests to start and control a guest running in secure mode.
  With that Customers can securely run sensitive workloads in KVM on premise 
and in the cloud.
  Feature Request for kernel contribution

  Target kernel will be 5.3. Currently not available.
  Git-commit / backport will be provided

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1835531/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to