linux-oracle: 4.15.0-1012.14~16.04.1 -proposed tracker
Bug #1826346 reported by
Stefan Bader
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Invalid
|
Medium
|
Unassigned | ||
Automated-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
Certification-testing |
Invalid
|
Medium
|
Canonical Hardware Certification | ||
Prepare-package |
Invalid
|
Medium
|
Andrea Righi | ||
Prepare-package-meta |
Invalid
|
Medium
|
Andrea Righi | ||
Prepare-package-signed |
Invalid
|
Medium
|
Andrea Righi | ||
Promote-to-proposed |
Invalid
|
Medium
|
Łukasz Zemczak | ||
Promote-to-security |
Invalid
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Promote-to-updates |
Invalid
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Regression-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
Security-signoff |
Invalid
|
Medium
|
Steve Beattie | ||
Verification-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
linux-oracle (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
phase: Holding before Release
phase-changed: Monday, 13. May 2019 10:15 UTC
proposed-
proposed-
Changed in linux-oracle (Ubuntu): | |
status: | New → Invalid |
Changed in linux-oracle (Ubuntu Xenial): | |
importance: | Undecided → Medium |
tags: | added: xenial |
tags: | added: kernel-release-tracking-bug |
tags: | added: kernel-release-tracking-bug-live |
tags: | added: kernel-sru-cycle-2019.04.22-1 |
description: | updated |
tags: | added: kernel-sru-backport-of-1826348 |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
description: | updated |
description: | updated |
summary: |
- linux-oracle: <version to be filled> -proposed tracker + linux-oracle: 4.15.0-1012.14~16.04.1 -proposed tracker |
description: | updated |
tags: | added: block-proposed-xenial |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: regression-testing-passed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-sru-backport-of-1826348 |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Invalid |
Changed in linux-oracle (Ubuntu Xenial): | |
status: | Fix Released → Invalid |
Changed in linux-oracle (Ubuntu Xenial): | |
status: | Invalid → Fix Released |
To post a comment you must log in.
This bug was fixed in the package linux-oracle - 4.15.0- 1013.15~ 16.04.1
--------------- 1013.15~ 16.04.1) xenial; urgency=medium
linux-oracle (4.15.0-
[ Ubuntu: 4.15.0-1013.15 ]
* CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130 /mds: Add basic bug infrastructure for MDS /mds: Add BUG_MSBDS_ONLY MD_CLEAR to guests /mds: Add mds_clear_ cpu_buffers( ) /mds: Clear CPU buffers on exit to user /mds: Conditionally clear CPU buffers on idle entry /mds: Add mitigation control for MDS /mds: Add sysfs reporting for MDS /mds: Add mitigation mode VMWERV /mds: Add mds=full,nosmt cmdline option /mds: Add SMT warning message /mds: Fix comment /mds: Print SMT vulnerable on MSBDS with mitigations off /mds: Add 'mitigations=' support for MDS speculation: Support 'mitigations=' cmdline option
- Documentation/l1tf: Fix small spelling typo
- x86/cpu: Sanitize FAM6_ATOM naming
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
- locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a
new <linux/bits.h> file
- tools include: Adopt linux/bits.h
- x86/msr-index: Cleanup bit defines
- x86/speculation: Consolidate CPU whitelists
- x86/speculation
- x86/speculation
- x86/kvm: Expose X86_FEATURE_
- x86/speculation
- x86/speculation
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
- x86/speculation
- x86/speculation
- x86/speculation
- x86/speculation
- Documentation: Move L1TF to separate directory
- Documentation: Add MDS vulnerability documentation
- x86/speculation
- x86/speculation: Move arch_smt_update() call to after mitigation decisions
- x86/speculation
- x86/speculation
- x86/speculation
- x86/speculation
* CVE-2017-5715 // CVE-2017-5753
- s390/speculation: Support 'mitigations=' cmdline option
* CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
- powerpc/
* CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 //
CVE-2018-3646
- cpu/speculation: Add 'mitigations=' cmdline option
- x86/speculation: Support 'mitigations=' cmdline option
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
linux-oracle (4.15.0- 1012.14~ 16.04.1) xenial; urgency=medium
* linux-oracle: 4.15.0- 1012.14~ 16.04.1 -proposed tracker (LP: #1826346)
[ Ubuntu: 4.15.0-1012.14 ]
* linux-oracle: 4.15.0-1012.14 -proposed tracker (LP: #1826348)
* linux-oracle: Use upstream approach to fix a race when hot adding a VF
(LP: #1825229)
- Revert "UBUNTU: SAUCE: net_failover: delay taking over primary device to
accommodate udevd renaming"
- ipvlan, l3mdev: fix broken l3s mode wrt local routes
- SAUCE: failover: allow name change on IFF_UP slave interfaces
* linux: 4.15.0-49.53 -proposed tracker (LP: #1826358)
* Backport support for software count cache flush Spectre v2 mitigation. (CVE)
(required for POWER9 DD2.3) (LP: #1822870)
- powerpc/64s: Add support for ori barrier_nospec patching
- powerpc/64s: Patch barrier_nospec in modules
- powerpc/64s: Enable barrier_nospec based on firmware settings
- powerpc: Use barrier_nospec in copy_from_user()
- po...