xenial/linux-hwe: 4.15.0-102.103~16.04.1 -proposed tracker
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | |||
Automated-testing |
Incomplete
|
Medium
|
Canonical Kernel Team | |||
Certification-testing |
Confirmed
|
Medium
|
Canonical Hardware Certification | |||
Prepare-package |
Fix Released
|
Medium
|
Sultan Alsawaf | |||
Prepare-package-meta |
Fix Released
|
Medium
|
Sultan Alsawaf | |||
Prepare-package-signed |
Fix Released
|
Medium
|
Sultan Alsawaf | |||
Promote-to-proposed |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Promote-to-security |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Promote-to-updates |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Regression-testing |
In Progress
|
Medium
|
Canonical Kernel Team | |||
Security-signoff |
In Progress
|
Medium
|
Canonical Security Team | |||
Verification-testing |
In Progress
|
Medium
|
Canonical Kernel Team | |||
linux-hwe (Ubuntu) | ||||||
Xenial |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
kernel-
packages:
main: linux-hwe
meta: linux-meta-hwe
signed: linux-signed-hwe
phase: Testing
phase-changed: Monday, 25. May 2020 06:02 UTC
proposed-
proposed-
reason:
automated-
certification
regression-
security-signoff: Stalled -- waiting for signoff
verification-
trackers:
xenial/
variant: debs
versions:
main: 4.15.0-
meta: 4.15.0.102.109
signed: 4.15.0-
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2020.05.18-1 |
description: | updated |
tags: | added: kernel-sru-backport-of-1878856 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-hwe (Ubuntu Xenial): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → In Progress |
description: | updated |
description: | updated |
summary: |
- xenial/linux-hwe: <version to be filled> -proposed tracker + xenial/linux-hwe: 4.15.0-102.103~16.04.1 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: block-proposed-xenial |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in linux-hwe (Ubuntu Xenial): | |
status: | New → Confirmed |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
This bug was fixed in the package linux-hwe - 4.15.0- 106.107~ 16.04.1
--------------- 106.107~ 16.04.1) xenial; urgency=medium
linux-hwe (4.15.0-
[ Ubuntu: 4.15.0-106.107 ]
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add Special Register Buffer Data Sampling (SRBDS)
mitigation
- SAUCE: x86/speculation: Add SRBDS vulnerability and mitigation documentation
- SAUCE: x86/speculation: Add Ivy Bridge to affected list
linux-hwe (4.15.0- 103.104~ 16.04.1) xenial; urgency=medium
* xenial/linux-hwe: 4.15.0- 103.104~ 16.04.1 -proposed tracker (LP: #1881271)
[ Ubuntu: 4.15.0-103.104 ]
* bionic/linux: 4.15.0-103.104 -proposed tracker (LP: #1881272) kvm_smoke_ test.kvm_ smoke_test with B-KVM in proposed (LP: #1881072)
* "BUG: unable to handle kernel paging request" when testing
ubuntu_
- KVM: VMX: Explicitly reference RCX as the vmx_vcpu pointer in asm blobs
- KVM: VMX: Mark RCX, RDX and RSI as clobbered in vmx_vcpu_run()'s asm blob
linux-hwe (4.15.0- 102.103~ 16.04.1) xenial; urgency=medium
* xenial/linux-hwe: 4.15.0- 102.103~ 16.04.1 -proposed tracker (LP: #1878855)
[ Ubuntu: 4.15.0-102.103 ]
* bionic/linux: 4.15.0-102.103 -proposed tracker (LP: #1878856) scripts/ file-downloader does not handle positive failures correctly surface_ alloc() type1_pin_ pages
* Packaging resync (LP: #1786013)
- update dkms package versions
* debian/
(LP: #1878897)
- [Packaging] file-downloader not handling positive failures correctly
* Kernel log flood "ceph: Failed to find inode for 1" (LP: #1875884)
- ceph: don't check quota for snap inode
- ceph: quota: cache inode pointer in ceph_snap_realm
* [UBUNTU 18.04] zpcictl --reset - contribution for kernel (LP: #1870320)
- s390/pci: Recover handle in clp_set_pci_fn()
- s390/pci: Fix possible deadlock in recover_store()
* Bionic update: upstream stable patchset 2020-05-12 (LP: #1878256)
- drm/edid: Fix off-by-one in DispID DTD pixel clock
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb()
- drm/qxl: qxl_release leak in qxl_hw_
- drm/qxl: qxl_release use after free
- btrfs: fix block group leak when removing fails
- btrfs: fix partial loss of prealloc extent past i_size after fsync
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter
- ALSA: hda/hdmi: fix without unlocked before return
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly
- PM: ACPI: Output correct message on target power state
- PM: hibernate: Freeze kernel threads in software_resume()
- dm verity fec: fix hash block number in verity_fec_decode
- RDMA/mlx5: Set GRH fields in query QP on RoCE
- RDMA/mlx4: Initialize ib_spec on the stack
- vfio: avoid possible overflow in vfio_iommu_
- vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn()
- iommu/qcom: Fix local_base status check
- scsi: target/iblock: fix WRITE SAME zeroing
...