eoan/linux-azure: 5.3.0-1028.29 -proposed tracker
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | |||
Automated-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
Certification-testing |
Invalid
|
Medium
|
Unassigned | |||
Prepare-package |
Fix Released
|
Medium
|
Kleber Sacilotto de Souza | |||
Prepare-package-lrm |
Fix Released
|
Medium
|
Kleber Sacilotto de Souza | |||
Prepare-package-meta |
Fix Released
|
Medium
|
Kleber Sacilotto de Souza | |||
Prepare-package-signed |
Fix Released
|
Medium
|
Kleber Sacilotto de Souza | |||
Promote-to-proposed |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Promote-to-security |
Fix Released
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Promote-to-updates |
Fix Released
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Regression-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
Security-signoff |
Fix Released
|
Medium
|
Steve Beattie | |||
Stakeholder-signoff |
Fix Released
|
Medium
|
linux-azure stakeholder signoff | |||
Verification-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
linux-azure (Ubuntu) | ||||||
Eoan |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
kernel-
packages:
lrm: linux-restricte
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
phase: Complete
phase-changed: Wednesday, 10. June 2020 00:45 UTC
proposed-
proposed-
reason: {}
trackers:
bionic/
variant: debs
versions:
lrm: 5.3.0-1028.29
main: 5.3.0-1028.29
meta: 5.3.0.1028.47
signed: 5.3.0-1028.29
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2020.05.18-1 |
description: | updated |
tags: | added: kernel-sru-derivative-of-1878820 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-azure (Ubuntu Eoan): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → In Progress |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
summary: |
- eoan/linux-azure: <version to be filled> -proposed tracker + eoan/linux-azure: 5.3.0-1023.24 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: block-proposed-eoan |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in linux-azure (Ubuntu Eoan): | |
status: | New → Confirmed |
tags: |
added: kernel-sru-derivative-of-1880111 removed: kernel-sru-derivative-of-1878820 |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: regression-testing-passed |
description: | updated |
description: | updated |
description: | updated |
summary: |
- eoan/linux-azure: 5.3.0-1023.24 -proposed tracker + eoan/linux-azure: 5.3.0-1028.29 -proposed tracker |
description: | updated |
tags: | removed: block-proposed-eoan |
tags: | removed: block-proposed |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
This bug was fixed in the package linux-azure - 5.3.0-1028.29
---------------
linux-azure (5.3.0-1028.29) eoan; urgency=medium
[ Ubuntu: 5.3.0-59.53 ]
* CVE-2020-0543 /spectre_ v2: Exclude Zhaoxin CPUs from SPECTRE_V2
- SAUCE: x86/speculation
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add Special Register Buffer Data Sampling (SRBDS)
mitigation
- SAUCE: x86/speculation: Add SRBDS vulnerability and mitigation documentation
- SAUCE: x86/speculation: Add Ivy Bridge to affected list
linux-azure (5.3.0-1023.24) eoan; urgency=medium
* eoan/linux-azure: 5.3.0-1023.24 -proposed tracker (LP: #1878809)
* Build and ship a signed wireguard.ko (LP: #1861284)
- [Config] azure: wireguard -- enable on all architectures
* linux-azure: Enable FSGSBASE instructions to support SGX (LP: #1877425) x86/fsgsbase: Test GS selector on ptracer-induced GS base /swapgs: Check FSGSBASE in enabling SWAPGS mitigation x86/fsgsbase: Test ptracer-induced GS base write with x86/64: Add documentation for GS/FS addressing mode
- SAUCE: x86/ptrace: Prevent ptrace from clearing the FS/GS selector
- SAUCE: selftests/
write
- SAUCE: x86/cpu: Add 'unsafe_fsgsbase' to enable CR4.FSGSBASE
- SAUCE: x86/entry/64: Clean up paranoid exit
- SAUCE: x86/entry/64: Switch CR3 before SWAPGS in paranoid entry
- SAUCE: x86/entry/64: Introduce the FIND_PERCPU_BASE macro
- SAUCE: x86/entry/64: Handle FSGSBASE enabled paranoid entry/exit
- SAUCE: x86/entry/64: Document GSBASE handling in the paranoid path
- SAUCE: x86/fsgsbase/64: Add intrinsics for FSGSBASE instructions
- SAUCE: x86/fsgsbase/64: Enable FSGSBASE instructions in helper functions
- SAUCE: x86/fsgsbase/64: Use FSGSBASE in switch_to() if available
- SAUCE: x86/fsgsbase/64: Use FSGSBASE instructions on thread copy and ptrace
- SAUCE: x86/speculation
- SAUCE: selftests/
FSGSBASE
- SAUCE: x86/fsgsbase/64: Enable FSGSBASE on 64bit by default and add a
chicken bit
- SAUCE: x86/elf: Enumerate kernel FSGSBASE capability in AT_HWCAP2
- SAUCE: Documentation/
[ Ubuntu: 5.3.0-56.50 ]
* eoan/linux: 5.3.0-56.50 -proposed tracker (LP: #1880111) scripts/ file-downloader does not handle positive failures correctly mountpoint( ) needs mount_lock
* Build and ship a signed wireguard.ko (LP: #1861284)
- [Packaging] wireguard -- add support for building signed .ko
- [Config] wireguard -- enable on all architectures
* Packaging resync (LP: #1786013)
- update dkms package versions
* debian/
(LP: #1878897)
- [Packaging] file-downloader not handling positive failures correctly
* Killer(R) Wi-Fi 6 AX1650i 160MHz Wireless Network Adapter (201NGW),
REV=0x354 [8086:a0f0] subsystem id [1a56:1651] wireless adapter not found
due to firmware crash (LP: #1874685)
- iwlwifi: pcie: handle QuZ configs with killer NICs as well
* CVE-2020-12114
- propagate_one(): mnt_set_
* Eoan update: upstream stable patchset 2020-05-11 (LP: #1878073)
- ext4: fix extent_status fragmentation for plain files
-...