xenial/linux-kvm: 4.4.0-1069.76 -proposed tracker
Bug #1867234 reported by
Khaled El Mously
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | |||
Automated-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
Certification-testing |
Invalid
|
Medium
|
Canonical Hardware Certification | |||
Prepare-package |
Fix Released
|
Medium
|
Khaled El Mously | |||
Prepare-package-meta |
Fix Released
|
Medium
|
Khaled El Mously | |||
Promote-to-proposed |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Promote-to-security |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Promote-to-updates |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Regression-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
Security-signoff |
Fix Released
|
Medium
|
Steve Beattie | |||
Verification-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
linux-kvm (Ubuntu) | ||||||
Xenial |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
kernel-
packages:
main: linux-kvm
meta: linux-meta-kvm
phase: Complete
phase-changed: Tuesday, 07. April 2020 13:50 UTC
proposed-
proposed-
reason: {}
variant: debs
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2020.03.16-1 |
description: | updated |
tags: | added: kernel-sru-derivative-of-1867243 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-kvm (Ubuntu Xenial): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → In Progress |
tags: | removed: kernel-sru-derivative-of-1867243 |
tags: | added: kernel-sru-derivative-of-1867243 |
description: | updated |
description: | updated |
summary: |
- xenial/linux-kvm: <version to be filled> -proposed tracker + xenial/linux-kvm: 4.4.0-1069.76 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
tags: | added: block-proposed-xenial |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: regression-testing-passed |
description: | updated |
tags: | removed: block-proposed-xenial |
tags: | removed: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
To post a comment you must log in.
This bug was fixed in the package linux-kvm - 4.4.0-1069.76
---------------
linux-kvm (4.4.0-1069.76) xenial; urgency=medium
* xenial/linux-kvm: 4.4.0-1069.76 -proposed tracker (LP: #1867234)
[ Ubuntu: 4.4.0-177.207 ]
* xenial/linux: 4.4.0-177.207 -proposed tracker (LP: #1867243) CPUID_CLEAR oob_krealloc_ more() battery- gauge: fix use-after-free DEFAULT_ COHERENT & select it on powerpc transaction process_ country_ ie() msr_[get| set]_crash_ data() from Spectre-v1/L1TF write_indirect( ) from Spectre-v1/L1TF attacks read_indirect( ) from Spectre-v1/L1TF attacks to_seg_ unit()
* Packaging resync (LP: #1786013)
- [Packaging] resync getabis
- [Packaging] update helper scripts
* Xenial update: 4.4.214 upstream stable release (LP: #1864775)
- media: iguanair: fix endpoint sanity check
- x86/cpu: Update cached HLE state on write to TSX_CTRL_
- sparc32: fix struct ipc64_perm type definition
- ASoC: qcom: Fix of-node refcount unbalance to link->codec_of_node
- cls_rsvp: fix rsvp_policy
- net: hsr: fix possible NULL deref in hsr_handle_frame()
- net_sched: fix an OOB access in cls_tcindex
- tcp: clear tp->total_retrans in tcp_disconnect()
- tcp: clear tp->segs_{in|out} in tcp_disconnect()
- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors
- mfd: dln2: More sanity checking for endpoints
- brcmfmac: Fix memory leak in brcmf_usbdev_qinit
- usb: gadget: legacy: set max_speed to super-speed
- usb: gadget: f_ncm: Use atomic_t to track in-flight request
- usb: gadget: f_ecm: Use atomic_t to track in-flight request
- ALSA: dummy: Fix PCM format loop in proc output
- lib/test_kasan.c: fix memory leak in kmalloc_
- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable()
- mmc: spi: Toggle SPI polarity, do not hardcode it
- PCI: keystone: Fix link training retries initiation
- crypto: api - Check spawn->alg under lock in crypto_drop_spawn
- scsi: qla2xxx: Fix mtcp dump collection failure
- power: supply: ltc2941-
- of: Add OF_DMA_
- dm space map common: fix to ensure new block isn't already in use
- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request
- crypto: api - Fix race condition in crypto_spawn_alg
- crypto: picoxcell - adjust the position of tasklet_init and fix missed
tasklet_kill
- btrfs: set trans->drity in btrfs_commit_
- ARM: tegra: Enable PLLP bypass during Tegra124 LP1
- mwifiex: fix unbalanced locking in mwifiex_
- sunrpc: expiry_time should be seconds not timeval
- KVM: x86: Refactor prefix decoding to prevent Spectre-v1/L1TF attacks
- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks
- KVM: x86: Protect kvm_hv_
attacks
- KVM: x86: Protect ioapic_
- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF
attacks
- KVM: x86: Protect ioapic_
- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks
in x86.c
- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks
- KVM: x86: Protect MSR-based index computations in fixed_msr_
...