xenial/linux-aws-hwe: 4.15.0-1061.65~16.04.2 -proposed tracker

Bug #1863320 reported by Kleber Sacilotto de Souza on 2020-02-14
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Canonical Hardware Certification
Prepare-package
Medium
Kleber Sacilotto de Souza
Prepare-package-meta
Medium
Sultan Alsawaf
Promote-to-proposed
Medium
Andy Whitcroft
Promote-to-security
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Medium
Canonical Kernel Team
Security-signoff
Medium
Canonical Security Team
Verification-testing
Medium
Canonical Kernel Team
linux-aws-hwe (Ubuntu)
Undecided
Unassigned
Xenial
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1864734
packages:
  main: linux-aws-hwe
  meta: linux-meta-aws-hwe
phase: Testing
phase-changed: Monday, 24. February 2020 12:36 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
  automated-testing: Ongoing -- testing in progress
  regression-testing: Ongoing -- testing in progress
  security-signoff: Stalled -- waiting for signoff
  verification-testing: Ongoing -- testing in progress
variant: debs

CVE References

tags: added: kernel-release-tracking-bug xenial
Changed in linux-aws-hwe (Ubuntu Xenial):
status: New → Confirmed
Changed in linux-aws-hwe (Ubuntu):
status: New → Invalid
Changed in linux-aws-hwe (Ubuntu Xenial):
importance: Undecided → Medium
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2020.02.17-1
description: updated
tags: added: kernel-sru-backport-of-1863325
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
summary: - linux-aws-hwe: <version to be filled> -proposed tracker
+ xenial/linux-aws-hwe: <version to be filled> -proposed tracker
description: updated
description: updated
summary: - xenial/linux-aws-hwe: <version to be filled> -proposed tracker
+ xenial/linux-aws-hwe: 4.15.0-1061.63~16.04.1 -proposed tracker
description: updated
description: updated
description: updated
summary: - xenial/linux-aws-hwe: 4.15.0-1061.63~16.04.1 -proposed tracker
+ linux-aws-hwe: <version to be filled> -proposed tracker
summary: - linux-aws-hwe: <version to be filled> -proposed tracker
+ xenial/linux-aws-hwe: <version to be filled> -proposed tracker
description: updated
summary: - xenial/linux-aws-hwe: <version to be filled> -proposed tracker
+ xenial/linux-aws-hwe: 4.15.0-1061.65~16.04.1 -proposed tracker
description: updated
description: updated
summary: - xenial/linux-aws-hwe: 4.15.0-1061.65~16.04.1 -proposed tracker
+ xenial/linux-aws-hwe: 4.15.0-1061.65~16.04.2 -proposed tracker
description: updated
description: updated
tags: added: block-proposed-xenial
tags: added: block-proposed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Launchpad Janitor (janitor) wrote :
Download full text (45.3 KiB)

This bug was fixed in the package linux-aws-hwe - 4.15.0-1063.67~16.04.1

---------------
linux-aws-hwe (4.15.0-1063.67~16.04.1) xenial; urgency=medium

  * xenial/linux-aws-hwe: 4.15.0-1063.67~16.04.1 -proposed tracker
    (LP: #1865421)

  [ Ubuntu: 4.15.0-1063.67 ]

  * bionic/linux-aws: 4.15.0-1063.67 -proposed tracker (LP: #1865269)
  * bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
  * CVE-2020-2732
    - KVM: x86: emulate RDPID
    - KVM: nVMX: Don't emulate instructions in guest mode
    - KVM: nVMX: Refactor IO bitmap checks into helper function
    - KVM: nVMX: Check IO instruction VM-exit conditions

linux-aws-hwe (4.15.0-1062.66~16.04.1) xenial; urgency=medium

  * xenial/linux-aws-hwe: 4.15.0-1062.66~16.04.1 -proposed tracker
    (LP: #1864733)

  [ Ubuntu: 4.15.0-1062.66 ]

  * bionic/linux-aws: 4.15.0-1062.66 -proposed tracker (LP: #1864734)
  * bionic/linux: 4.15.0-90.91 -proposed tracker (LP: #1864753)
  * dkms artifacts may expire from the pool (LP: #1850958)
    - [Packaging] autoreconstruct -- manage executable debian files
    - [packaging] handle downloads from the librarian better
  * bionic/linux: 4.15.0-90.90 -proposed tracker (LP: #1864753)
  * vm-segv from ubuntu_stress_smoke_test failed on B (LP: #1864063)
    - Revert "apparmor: don't try to replace stale label in ptrace access check"

linux-aws-hwe (4.15.0-1061.65~16.04.2) xenial; urgency=medium

  * xenial/linux-aws-hwe: 4.15.0-1061.65~16.04.2 -proposed tracker
    (LP: #1863320)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync dkms-build and family

  [ Ubuntu: 4.15.0-1061.65 ]

  * bionic/linux-aws: 4.15.0-1061.65 -proposed tracker (LP: #1863325)
  * dkms artifacts may expire from the pool (LP: #1850958)
    - [Packaging] autoreconstruct -- manage executable debian files
    - [packaging] handle downloads from the librarian better
  * Root can lift kernel lockdown via USB/IP (LP: #1861238)
    - aws: [Config] Update config for sysrq lockdown revert
  * bionic/linux: 4.15.0-89.89 -proposed tracker (LP: #1863350)
  * [SRU][B/OEM-B] Fix multitouch support on some devices (LP: #1862567)
    - HID: core: move the dynamic quirks handling in core
    - HID: quirks: move the list of special devices into a quirk
    - HID: core: move the list of ignored devices in hid-quirks.c
    - HID: core: remove the absolute need of hid_have_special_driver[]
  * [linux] Patch to prevent possible data corruption (LP: #1848739)
    - blk-mq: silence false positive warnings in hctx_unlock()
  * Add bpftool to linux-tools-common (LP: #1774815)
    - tools/bpftool: fix bpftool build with bintutils >= 2.9
    - bpftool: make libbfd optional
    - [Debian] Remove binutils-dev build dependency
    - [Debian] package bpftool in linux-tools-common
  * Root can lift kernel lockdown via USB/IP (LP: #1861238)
    - Revert "UBUNTU: SAUCE: (efi-lockdown) Add a SysRq option to lift kernel
      lockdown"
  * [Bionic] i915 incomplete fix for CVE-2019-14615 (LP: #1862840) //
    CVE-2020-8832
    - drm/i915: Use same test for eviction and submitting kernel context
    - drm/i915: Define an engine class enum for the uABI
    - drm/i915: Force the switch to the i915->kernel_...

Changed in linux-aws-hwe (Ubuntu Xenial):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers