This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
bugs-spammed: true
built:
lrg: build#1
lrm: build#1
lrs: build#1
main: build#1
meta: build#1
signed: build#1
delta:
promote-signing-to-proposed:
- lrm
- lrs
- meta
- main
- signed
promote-to-proposed:
- lrg
- lrm
- lrs
- meta
- main
- signed
sru-review:
- meta
- lrm
- signed
- lrg
- lrs
- main
packages:
lrg: linux-restricted-generate
lrm: linux-restricted-modules
lrs: linux-restricted-signatures
main: linux
meta: linux-meta
signed: linux-signed
phase: Testing
phase-changed: Wednesday, 02. June 2021 19:58 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
automated-testing: Stalled -- testing FAILED
certification-testing: Ongoing -- testing in progress
kernel-signoff: Stalled -- waiting for signoff
regression-testing: Ongoing -- testing in progress
security-signoff: Stalled -- waiting for signoff
verification-testing: Stalled -- testing FAILED
synthetic:
:promote-to-as-proposed: Fix Released
trackers:
focal/linux-hwe-5.11: bug 1930073
focal/linux-intel: bug 1930074
hirsute/linux-aws: bug 1930058
hirsute/linux-azure: bug 1930060
hirsute/linux-gcp: bug 1930062
hirsute/linux-kvm: bug 1930064
hirsute/linux-oracle: bug 1930066
hirsute/linux-raspi: bug 1930068
hirsute/linux-realtime: bug 1930070
hirsute/linux-riscv: bug 1930072
impish/linux: bug 1930056
variant: debs
versions:
lrm: 5.11.0-19.20
main: 5.11.0-19.20
meta: 5.11.0.19.20
signed: 5.11.0-19.20
source: 5.11.0-19.20
This bug was fixed in the package linux - 5.11.0-22.23
---------------
linux (5.11.0-22.23) hirsute; urgency=medium
* UAF on CAN J1939 j1939_can_recv (LP: #1932209)
- SAUCE: can: j1939: delay release of j1939_priv after synchronize_rcu
* UAF on CAN BCM bcm_rx_handler (LP: #1931855)
- SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu
linux (5.11.0-20.21) hirsute; urgency=medium
* hirsute/linux: 5.11.0-20.21 -proposed tracker (LP: #1930854)
* ath11k WIFI not working in proposed kernel 5.11.0-19-generic (LP: #1930637)
- bus: mhi: core: Download AMSS image from appropriate function
linux (5.11.0-19.20) hirsute; urgency=medium
* hirsute/linux: 5.11.0-19.20 -proposed tracker (LP: #1930075)
* Packaging resync (LP: #1786013)
- update dkms package versions
* CVE-2021-33200
- bpf: Wrap aux data inside bpf_sanitize_info container
- bpf: Fix mask direction swap upon off reg sign change
- bpf: No need to simulate speculative domain for immediates
* AX201 BT will cause system could not enter S0i3 (LP: #1928047)
- SAUCE: drm/i915: Tweaked Wa_14010685332 for all PCHs
* CVE-2021-3490
- SAUCE: Revert "UBUNTU: SAUCE: bpf: verifier: fix ALU32 bounds tracking with
bitwise ops"
- gpf: Fix alu32 const subreg bound tracking on bitwise operations
* CVE-2021-3489
- SAUCE: Revert "UBUNTU: SAUCE: bpf: prevent writable memory-mapping of read-
only ringbuf pages"
- bpf: Prevent writable memory-mapping of read-only ringbuf pages
* Select correct boot VGA when BIOS doesn't do it properly (LP: #1929217)
- vgaarb: Use ACPI HID name to find integrated GPU
* Realtek USB hubs in Dell WD19SC/DC/TB fail to work after exiting s2idle
(LP: #1928242)
- USB: Verify the port status when timeout happens during port suspend
* CVE-2020-26145
- ath10k: drop fragments with multicast DA for SDIO
- ath10k: add CCMP PN replay protection for fragmented frames for PCIe
- ath10k: drop fragments with multicast DA for PCIe
* CVE-2020-26141
- ath10k: Fix TKIP Michael MIC verification for PCIe
* CVE-2020-24587
- ath11k: Clear the fragment cache during key install
* CVE-2020-24588
- mac80211: properly handle A-MSDUs that start with an RFC 1042 header
- cfg80211: mitigate A-MSDU aggregation attacks
- mac80211: drop A-MSDUs on old ciphers
- ath10k: drop MPDU which has discard flag set by firmware for SDIO
* CVE-2020-26139
- mac80211: do not accept/forward invalid EAPOL frames
* CVE-2020-24586 // CVE-2020-24587 // CVE-2020-24587 for such cases.
- mac80211: extend protection against mixed key and fragment cache attacks
* CVE-2020-24586 // CVE-2020-24587
- mac80211: prevent mixed key and fragment cache attacks
- mac80211: add fragment cache to sta_info
- mac80211: check defrag PN against current frame
- mac80211: prevent attacks on TKIP/WEP as well
* CVE-2020-26147
- mac80211: assure all fragments are encrypted
* raid10: Block discard is very slow, causing severe delays for mkfs and discard_ bio() for submitting discard bio
fstrim operations (LP: #1896578)
- md: add md_submit_
- ...