xenial/linux-kvm: 4.4.0-1067.74 -proposed tracker

Bug #1863319 reported by Kleber Sacilotto de Souza on 2020-02-14
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Canonical Hardware Certification
Prepare-package
Medium
Khaled El Mously
Prepare-package-meta
Medium
Khaled El Mously
Promote-to-proposed
Medium
Łukasz Zemczak
Promote-to-security
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Medium
Canonical Kernel Team
Security-signoff
Medium
Steve Beattie
Verification-testing
Medium
Canonical Kernel Team
linux-kvm (Ubuntu)
Undecided
Unassigned
Xenial
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1865106
packages:
  main: linux-kvm
  meta: linux-meta-kvm
phase: Testing
phase-changed: Wednesday, 19. February 2020 10:56 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
  regression-testing: Ongoing -- testing in progress
  security-signoff: Stalled -- waiting for signoff
  verification-testing: Ongoing -- testing in progress
variant: debs

CVE References

tags: added: kernel-release-tracking-bug xenial
Changed in linux-kvm (Ubuntu Xenial):
status: New → Confirmed
Changed in linux-kvm (Ubuntu):
status: New → Invalid
Changed in linux-kvm (Ubuntu Xenial):
importance: Undecided → Medium
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2020.02.17-1
description: updated
tags: added: kernel-sru-derivative-of-1863338
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
summary: - linux-kvm: <version to be filled> -proposed tracker
+ xenial/linux-kvm: <version to be filled> -proposed tracker
description: updated
description: updated
summary: - xenial/linux-kvm: <version to be filled> -proposed tracker
+ xenial/linux-kvm: 4.4.0-1067.74 -proposed tracker
description: updated
description: updated
tags: added: block-proposed-xenial
tags: added: block-proposed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-kvm - 4.4.0-1068.75

---------------
linux-kvm (4.4.0-1068.75) xenial; urgency=medium

  * xenial/linux-kvm: 4.4.0-1068.75 -proposed tracker (LP: #1865243)

  [ Ubuntu: 4.4.0-176.206 ]

  * xenial/linux: 4.4.0-176.206 -proposed tracker (LP: #1865106)
  * CVE-2020-2732
    - x86/vdso: Use RDPID in preference to LSL when available
    - KVM: x86: emulate RDPID
    - KVM: nVMX: Don't emulate instructions in guest mode
    - KVM: nVMX: Refactor IO bitmap checks into helper function
    - KVM: nVMX: Check IO instruction VM-exit conditions

linux-kvm (4.4.0-1067.74) xenial; urgency=medium

  * xenial/linux-kvm: 4.4.0-1067.74 -proposed tracker (LP: #1863319)

  [ Ubuntu: 4.4.0-175.205 ]

  * xenial/linux: 4.4.0-175.205 -proposed tracker (LP: #1863338)
  * run_afpackettests in ubuntu_kernel_selftests failed with "./in_netns.sh:
    Permission denied" (LP: #1861973)
    - [Debian] autoreconstruct - add resoration of execute permissions
  * pty03 from pty in ubuntu_ltp failed on Eoan (LP: #1862114)
    - can, slip: Protect tty->disc_data in write_wakeup and close with RCU

 -- Khalid Elmously <email address hidden> Sun, 01 Mar 2020 22:39:05 -0500

Changed in linux-kvm (Ubuntu Xenial):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers