eoan/linux: 5.3.0-47.39 -proposed tracker
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | |||
Automated-testing |
In Progress
|
Medium
|
Canonical Kernel Team | |||
Certification-testing |
In Progress
|
Medium
|
Canonical Hardware Certification | |||
Prepare-package |
Fix Released
|
Medium
|
Khaled El Mously | |||
Prepare-package-lrm |
Fix Released
|
Medium
|
Khaled El Mously | |||
Prepare-package-meta |
Fix Released
|
Medium
|
Khaled El Mously | |||
Prepare-package-signed |
Fix Released
|
Medium
|
Khaled El Mously | |||
Promote-to-proposed |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Promote-to-security |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Promote-to-updates |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Regression-testing |
In Progress
|
Medium
|
Canonical Kernel Team | |||
Security-signoff |
In Progress
|
Medium
|
Steve Beattie | |||
Verification-testing |
In Progress
|
Medium
|
Canonical Kernel Team | |||
linux (Ubuntu) | ||||||
Eoan |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
bugs-spammed: true
packages:
lrm: linux-restricte
main: linux
meta: linux-meta
signed: linux-signed
phase: Testing
phase-changed: Tuesday, 07. April 2020 09:36 UTC
proposed-
proposed-
reason:
automated-
certification
regression-
security-signoff: Stalled -- waiting for signoff
verification-
trackers:
bionic/linux-hwe: bug 1870719
eoan/linux-aws: bug 1870709
eoan/linux-azure: bug 1870711
eoan/linux-gcp: bug 1870715
eoan/linux-kvm: bug 1870716
eoan/
eoan/
variant: debs
versions:
lrm: 5.3.0-47.39
main: 5.3.0-47.39
meta: 5.3.0.47.40
signed: 5.3.0-47.39
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2020.04.06-1 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Eoan): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → In Progress |
description: | updated |
summary: |
- eoan/linux: <version to be filled> -proposed tracker + eoan/linux: 5.3.0-47.39 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: block-proposed-eoan |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
This bug was fixed in the package linux - 5.3.0-51.44
---------------
linux (5.3.0-51.44) eoan; urgency=medium
* CVE-2020-11884
- SAUCE: s390/mm: fix page table upgrade vs 2ndary address mode accesses
-- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 22 Apr 2020 17:35:41 -0300