xenial/linux-aws: 4.4.0-1103.114 -proposed tracker

Bug #1863311 reported by Kleber Sacilotto de Souza on 2020-02-14
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Canonical Hardware Certification
Prepare-package
Medium
Khaled El Mously
Prepare-package-meta
Medium
Khaled El Mously
Promote-to-proposed
Medium
Andy Whitcroft
Promote-to-security
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Medium
Canonical Kernel Team
Security-signoff
Medium
Steve Beattie
Verification-testing
Medium
Canonical Kernel Team
linux-aws (Ubuntu)
Undecided
Unassigned
Xenial
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1865106
packages:
  main: linux-aws
  meta: linux-meta-aws
phase: Testing
phase-changed: Thursday, 20. February 2020 16:32 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
  security-signoff: Stalled -- waiting for signoff
  verification-testing: Ongoing -- testing in progress
trackers:
  xenial/linux-aws/aws-kernel: bug 1863309
variant: debs

CVE References

tags: added: kernel-release-tracking-bug xenial
Changed in linux-aws (Ubuntu Xenial):
status: New → Confirmed
Changed in linux-aws (Ubuntu):
status: New → Invalid
Changed in linux-aws (Ubuntu Xenial):
importance: Undecided → Medium
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2020.02.17-1
description: updated
tags: added: kernel-sru-derivative-of-1863338
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
summary: - linux-aws: <version to be filled> -proposed tracker
+ xenial/linux-aws: <version to be filled> -proposed tracker
description: updated
description: updated
summary: - xenial/linux-aws: <version to be filled> -proposed tracker
+ xenial/linux-aws: 4.4.0-1103.114 -proposed tracker
description: updated
description: updated
tags: added: block-proposed-xenial
tags: added: block-proposed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Sean Feole (sfeole) on 2020-02-28
tags: added: regression-testing-passed
description: updated
description: updated
tags: removed: kernel-sru-derivative-of-1863338
tags: added: kernel-sru-derivative-of-1865106
tags: removed: kernel-sru-derivative-of-1865106
tags: added: kernel-sru-derivative-of-1865106
tags: removed: kernel-sru-derivative-of-1865106
tags: added: kernel-sru-derivative-of-1865106
tags: removed: kernel-sru-derivative-of-1865106
tags: added: kernel-sru-derivative-of-1865106
tags: removed: kernel-sru-derivative-of-1865106
tags: added: kernel-sru-derivative-of-1865106
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-aws - 4.4.0-1104.115

---------------
linux-aws (4.4.0-1104.115) xenial; urgency=medium

  * xenial/linux-aws: 4.4.0-1104.115 -proposed tracker (LP: #1865245)

  [ Ubuntu: 4.4.0-176.206 ]

  * xenial/linux: 4.4.0-176.206 -proposed tracker (LP: #1865106)
  * CVE-2020-2732
    - x86/vdso: Use RDPID in preference to LSL when available
    - KVM: x86: emulate RDPID
    - KVM: nVMX: Don't emulate instructions in guest mode
    - KVM: nVMX: Refactor IO bitmap checks into helper function
    - KVM: nVMX: Check IO instruction VM-exit conditions

linux-aws (4.4.0-1103.114) xenial; urgency=medium

  * xenial/linux-aws: 4.4.0-1103.114 -proposed tracker (LP: #1863311)

  [ Ubuntu: 4.4.0-175.205 ]

  * xenial/linux: 4.4.0-175.205 -proposed tracker (LP: #1863338)
  * run_afpackettests in ubuntu_kernel_selftests failed with "./in_netns.sh:
    Permission denied" (LP: #1861973)
    - [Debian] autoreconstruct - add resoration of execute permissions
  * pty03 from pty in ubuntu_ltp failed on Eoan (LP: #1862114)
    - can, slip: Protect tty->disc_data in write_wakeup and close with RCU

 -- Khalid Elmously <email address hidden> Mon, 02 Mar 2020 00:35:07 -0500

Changed in linux-aws (Ubuntu Xenial):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers