eoan/linux: 5.3.0-41.33 -proposed tracker
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Medium
|
Unassigned | |||
Automated-testing |
Medium
|
Canonical Kernel Team | |||
Certification-testing |
Medium
|
Canonical Hardware Certification | |||
Prepare-package |
Medium
|
Kleber Sacilotto de Souza | |||
Prepare-package-lrm |
Medium
|
Kleber Sacilotto de Souza | |||
Prepare-package-meta |
Medium
|
Kleber Sacilotto de Souza | |||
Prepare-package-signed |
Medium
|
Kleber Sacilotto de Souza | |||
Promote-to-proposed |
Medium
|
Andy Whitcroft | |||
Promote-to-security |
Medium
|
Ubuntu Stable Release Updates Team | |||
Promote-to-updates |
Medium
|
Ubuntu Stable Release Updates Team | |||
Regression-testing |
Medium
|
Canonical Kernel Team | |||
Security-signoff |
Medium
|
Steve Beattie | |||
Verification-testing |
Medium
|
Canonical Kernel Team | |||
linux (Ubuntu) |
Undecided
|
Unassigned | |||
Eoan |
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
bugs-spammed: true
packages:
lrm: linux-restricte
main: linux
meta: linux-meta
signed: linux-signed
phase: Testing
phase-changed: Monday, 17. February 2020 22:51 UTC
proposed-
proposed-
reason:
certification
security-signoff: Stalled -- waiting for signoff
verification-
trackers:
bionic/linux-hwe: bug 1863292
eoan/linux-aws: bug 1863272
eoan/linux-azure: bug 1863274
eoan/linux-gcp: bug 1863280
eoan/linux-kvm: bug 1863283
eoan/
eoan/
variant: debs
tags: | added: eoan kernel-release-tracking-bug |
Changed in linux (Ubuntu Eoan): | |
status: | New → Confirmed |
Changed in linux (Ubuntu): | |
status: | New → Invalid |
Changed in linux (Ubuntu Eoan): | |
importance: | Undecided → Medium |
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2020.02.17-1 |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
summary: |
- linux: <version to be filled> -proposed tracker + eoan/linux: <version to be filled> -proposed tracker |
description: | updated |
summary: |
- eoan/linux: <version to be filled> -proposed tracker + eoan/linux: 5.3.0-41.33 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: block-proposed-eoan |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Launchpad Janitor (janitor) wrote : | #2 |
This bug was fixed in the package linux - 5.3.0-42.34
---------------
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into helper function
- KVM: nVMX: Check IO instruction VM-exit conditions
linux (5.3.0-41.33) eoan; urgency=medium
* eoan/linux: 5.3.0-41.33 -proposed tracker (LP: #1863294)
* CVE-2019-3016
- x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
- x86/kvm: Introduce kvm_(un)map_gfn()
- x86/kvm: Cache gfn to pfn translation
- x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not missed
- x86/KVM: Clean up host's steal time structure
* Reduce s2idle power consumption when ethernet cable is connected on e1000e
(LP: #1859126)
- e1000e: Add support for S0ix
* alsa/sof: let legacy hda driver and sof driver co-exist (LP: #1837828)
- ASoC: Intel: Skylake: move NHLT header to common directory
- ALSA: hda: move parts of NHLT code to new module
- ALSA: hda: intel-nhlt: handle NHLT VENDOR_DEFINED DMIC geometry
- ASoC: Intel: Skylake: use common NHLT module
- ALSA: hda/intel: stop probe if DMICS are detected on Skylake+ platforms
- [Config] Enable SND_HDA_
* USB key cannot be detected by hotplug on Sunix USB Type-A 3.1 Gen 2 card
[1b21:2142] (LP: #1858988)
- SAUCE: PCI: Avoid ASMedia XHCI USB PME# from D0 defect
* ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets
(LP: #1860969)
- vti[6]: fix packet tx through bpf_redirect()
- xfrm interface: fix packet tx through bpf_redirect()
* peripheral devices on Dell WD19TB cannot be detected after suspend resume
(LP: #1859407)
- PCI: irq: Introduce rearm_wake_irq()
- ACPICA: Return u32 from acpi_dispatch_gpe()
- ACPI: EC: Return bool from acpi_ec_
- ACPI: PM: Set s2idle_wakeup earlier and clear it later
- PM: sleep: Simplify suspend-to-idle control flow
- ACPI: EC: Rework flushing of pending work
* Dell XPS 13 (7390) Display Flickering - 19.10 (LP: #1849947)
- SAUCE: drm/i915: Disable PSR by default on all platforms
* Root can lift kernel lockdown via USB/IP (LP: #1861238)
- Revert "UBUNTU: SAUCE: (efi-lockdown) Add a SysRq option to lift kernel
lockdown"
* [CML-H] Add intel_thermal_pch driver support Comet Lake -H (LP: #1853219)
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support
* Eoan update: upstream stable patchset 2020-02-07 (LP: #1862429)
- ARM: dts: meson8: fix the size of the PMU registers
- clk: qcom: gcc-sdm845: Add missing flag to votable GDSCs
- dt-bindings: reset: meson8b: fix duplicate reset IDs
- ARM: dts: imx6q-dhcom: fix rtc compatible
- clk: Don't try to enable critical clocks if prepare failed
- ASoC: msm8916-
- iio: buffer: align the size of scan bytes to size of the largest element
- USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx
- USB: serial: option: Add support for Quec...
Changed in linux (Ubuntu Eoan): | |
status: | Confirmed → Fix Released |
SRU Bugs: /bugs.launchpad .net/ubuntu- kernel- tests/+ bugs?field. tag=sru- 20200217+ 5.3&field. tags_combinator =ALL
https:/