linux: 3.13.0-164.214 -proposed tracker
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Medium
|
Unassigned | |||
Automated-testing |
Medium
|
Canonical Kernel Team | |||
Certification-testing |
Medium
|
Taihsiang Ho | |||
Prepare-package |
Medium
|
Khaled El Mously | |||
Prepare-package-meta |
Medium
|
Khaled El Mously | |||
Prepare-package-signed |
Medium
|
Khaled El Mously | |||
Promote-to-proposed |
Medium
|
Łukasz Zemczak | |||
Promote-to-security |
Medium
|
Steve Langasek | |||
Promote-to-updates |
Medium
|
Steve Langasek | |||
Regression-testing |
Medium
|
Po-Hsu Lin | |||
Security-signoff |
Medium
|
Steve Beattie | |||
Upload-to-ppa-dnu |
Medium
|
Unassigned | |||
Verification-testing |
Medium
|
Canonical Kernel Team | |||
linux (Ubuntu) |
Undecided
|
Unassigned | |||
Trusty |
Medium
|
Unassigned |
Bug Description
This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see: https:/
backports: bug 1806429 (linux-lts-trusty)
derivatives:
-- swm properties --
boot-testing-
bugs-spammed: true
phase: Released
phase-changed: Thursday, 20. December 2018 06:11 UTC
proposed-
proposed-
tags: | added: kernel-release-tracking-bug |
tags: | added: kernel-release-tracking-bug-live |
tags: | added: trusty |
Changed in linux (Ubuntu Trusty): | |
status: | New → Confirmed |
Changed in linux (Ubuntu): | |
status: | New → Invalid |
Changed in linux (Ubuntu Trusty): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
tags: | added: kernel-sru-cycle-2018.12.03-1 |
tags: | added: kernel-sru-master-kernel |
description: | updated |
description: | updated |
summary: |
- linux: <version to be filled> -proposed tracker + linux: 3.13.0-164.214 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
tags: | added: block-proposed-trusty |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Stefan Bader (smb) wrote : | #1 |
description: | updated |
Po-Hsu Lin (cypressyew) wrote : | #2 |
3.13.0-164.214 - generic
Regression test CMPL, RTB.
Issue to note in amd64:
ubuntu_
ubuntu_
ubuntu_
Issue to note in arm64:
hwclock - issue for HP m400 (bug 1716603)
libhugetlbfs - noresv-
ubuntu_
ubuntu_
ubuntu_
ubuntu_
Issue to note in i386:
ubuntu_
ubuntu_
ubuntu_
Issue to note in ppc64le (P8):
ubuntu_
ubuntu_
tags: | added: regression-testing-passed |
description: | updated |
Taihsiang Ho (taihsiangho) wrote : | #3 |
Hardware Certification have begun testing this -proposed kernel.
description: | updated |
Taihsiang Ho (taihsiangho) wrote : | #4 |
Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here: http://
tags: | added: certification-testing-passed |
description: | updated |
description: | updated |
tags: | removed: block-proposed-trusty |
tags: | removed: block-proposed |
description: | updated |
Launchpad Janitor (janitor) wrote : | #5 |
This bug was fixed in the package linux - 3.13.0-164.214
---------------
linux (3.13.0-164.214) trusty; urgency=medium
* linux: 3.13.0-164.214 -proposed tracker (LP: #1806428)
* CVE-2018-12896
- posix-timers: Sanitize overrun handling
* CVE-2018-16276
- USB: yurex: fix out-of-bounds uaccess in read handler
* CVE-2018-10902
- ALSA: rawmidi: Change resized buffers atomically
* CVE-2018-18386
- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)
* CVE-2017-5753
- x86/spectre_v1: Disable compiler optimizations over
array_
- x86/speculation: Fix up array_index_
- ALSA: opl3: Hardening for potential Spectre v1
- ALSA: asihpi: Hardening for potential Spectre v1
- ALSA: hdspm: Hardening for potential Spectre v1
- ALSA: rme9652: Hardening for potential Spectre v1
- ALSA: control: Hardening for potential Spectre v1
- ALSA: seq: oss: Hardening for potential Spectre v1
- ALSA: hda: Hardening for potential Spectre v1
- net: atm: Fix potential Spectre v1
- atm: zatm: Fix potential Spectre v1
- perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_*
- perf/x86: Fix possible Spectre-v1 indexing for x86_pmu:
- kernel/sys.c: fix potential Spectre v1 issue
- HID: hiddev: fix potential Spectre v1
- atm: zatm: Fix potential Spectre v1
- net: cxgb3_main: fix potential Spectre v1
- netlink: Fix spectre v1 gadget in netlink_create()
- net: socket: fix potential spectre v1 gadget in socketcall
- libahci: Fix possible Spectre-v1 pmp indexing in ahci_led_store()
- ext4: fix spectre gadget in ext4_mb_
- fs/quota: Fix spectre gadget in do_quotactl
- misc: hmc6352: fix potential Spectre v1
- tty: vt_ioctl: fix potential Spectre v1
* CVE-2018-18710
- cdrom: fix improper type cast, which can leat to information leak.
* CVE-2018-18690
- xfs: don't fail when converting shortform attr to long form during
ATTR_REPLACE
* CVE-2018-14734
- infiniband: fix a possible use-after-free bug
* CVE-2017-2647 // CVE-2017-2647 / CVE-2017-6951
- keys: Guard against null match function in keyring_
-- Khalid Elmously <email address hidden> Wed, 05 Dec 2018 06:47:30 +0000
Changed in linux (Ubuntu Trusty): | |
status: | Confirmed → Fix Released |
status: | Confirmed → Fix Released |
description: | updated |
Brad Figg (brad-figg) wrote : Package Released! | #7 |
The package has been published and the bug is being set to Fix Released
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
No pending verification.