focal/linux-kvm: 5.4.0-1008.8 -proposed tracker

Bug #1871936 reported by Seth Forshee
14
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Kernel-signoff
Invalid
Medium
Unassigned
Prepare-package
Fix Released
Medium
Seth Forshee
Prepare-package-meta
Fix Released
Medium
Paolo Pisati
Promote-to-proposed
Fix Released
Medium
Seth Forshee
Promote-to-release
Fix Released
Medium
Ubuntu Package Archive Administrators
Regression-testing
Fix Released
Medium
Canonical Kernel Team
linux-kvm (Ubuntu)
Focal
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1871939
packages:
  main: linux-kvm
  meta: linux-meta-kvm
phase: Complete
phase-changed: Tuesday, 14. April 2020 21:16 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason: {}
variant: debs
versions:
  main: 5.4.0-1008.8
  meta: 5.4.0.1008.8

CVE References

Seth Forshee (sforshee)
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-d2020.04.09-1
description: updated
tags: added: kernel-sru-derivative-of-1871939
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-kvm (Ubuntu Focal):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → In Progress
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in linux-kvm (Ubuntu Focal):
status: New → Confirmed
description: updated
Paolo Pisati (p-pisati)
summary: - focal/linux-kvm: <version to be filled> -proposed tracker
+ focal/linux-kvm: 5.4.0-1008.8 -proposed tracker
description: updated
description: updated
description: updated
tags: added: block-proposed-focal
tags: added: block-proposed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Seth Forshee (sforshee)
tags: added: regression-testing-passed
description: updated
description: updated
tags: removed: block-proposed-focal
tags: removed: block-proposed
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (13.7 KiB)

This bug was fixed in the package linux-kvm - 5.4.0-1008.8

---------------
linux-kvm (5.4.0-1008.8) focal; urgency=medium

  * focal/linux-kvm: 5.4.0-1008.8 -proposed tracker (LP: #1871936)

  * Packaging resync (LP: #1786013)
    - [Packaging] update helper scripts

  * Miscellaneous Ubuntu changes
    - [Config] CONFIG_RT_GROUP_SCHED=y

  [ Ubuntu: 5.4.0-24.28 ]

  * focal/linux: 5.4.0-24.28 -proposed tracker (LP: #1871939)
  * getitimer returns it_value=0 erroneously (LP: #1349028)
    - [Config] CONTEXT_TRACKING_FORCE policy should be unset
  * 12d1:1038 Dual-Role OTG device on non-HNP port - unable to enumerate USB
    device on port 1 (LP: #1047527)
    - [Config] USB_OTG_FSM policy not needed
  * Add DCPD backlight support for HP CML system (LP: #1871589)
    - SAUCE: drm/i915: Force DPCD backlight mode for HP CML 2020 system
  * Backlight brightness cannot be adjusted using keys (LP: #1860303)
    - SAUCE drm/i915: Force DPCD backlight mode for HP Spectre x360 Convertible
      13t-aw100
  * CVE-2020-11494
    - slcan: Don't transmit uninitialized stack data in padding
  * Ubuntu Kernel Support for OpenPOWER NV Secure & Trusted Boot (LP: #1866909)
    - powerpc: Detect the secure boot mode of the system
    - powerpc/ima: Add support to initialize ima policy rules
    - powerpc: Detect the trusted boot state of the system
    - powerpc/ima: Define trusted boot policy
    - ima: Make process_buffer_measurement() generic
    - certs: Add wrapper function to check blacklisted binary hash
    - ima: Check against blacklisted hashes for files with modsig
    - powerpc/ima: Update ima arch policy to check for blacklist
    - powerpc/ima: Indicate kernel modules appended signatures are enforced
    - powerpc/powernv: Add OPAL API interface to access secure variable
    - powerpc: expose secure variables to userspace via sysfs
    - x86/efi: move common keyring handler functions to new file
    - powerpc: Load firmware trusted keys/hashes into kernel keyring
    - x86/efi: remove unused variables
  * [roce-0227]sync mainline kernel 5.6rc3 roce patchset into ubuntu HWE kernel
    branch (LP: #1864950)
    - RDMA/hns: Cleanups of magic numbers
    - RDMA/hns: Optimize eqe buffer allocation flow
    - RDMA/hns: Add the workqueue framework for flush cqe handler
    - RDMA/hns: Delayed flush cqe process with workqueue
    - RDMA/hns: fix spelling mistake: "attatch" -> "attach"
    - RDMA/hns: Initialize all fields of doorbells to zero
    - RDMA/hns: Treat revision HIP08_A as a special case
    - RDMA/hns: Use flush framework for the case in aeq
    - RDMA/hns: Stop doorbell update while qp state error
    - RDMA/hns: Optimize qp destroy flow
    - RDMA/hns: Optimize qp context create and destroy flow
    - RDMA/hns: Optimize qp number assign flow
    - RDMA/hns: Optimize qp buffer allocation flow
    - RDMA/hns: Optimize qp param setup flow
    - RDMA/hns: Optimize kernel qp wrid allocation flow
    - RDMA/hns: Optimize qp doorbell allocation flow
    - RDMA/hns: Check if depth of qp is 0 before configure
  * [hns3-0316]sync mainline kernel 5.6rc4 hns3 patchset into ubuntu HWE kernel
    branch (LP: #1867586)
    - net: hns3: modify an unsuita...

Changed in linux-kvm (Ubuntu Focal):
status: Confirmed → Fix Released
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
Andy Whitcroft (apw)
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.