bionic/linux-gke-5.0: 5.0.0-1042.43 -proposed tracker
Bug #1878824 reported by
Kleber Sacilotto de Souza
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | |||
Automated-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
Certification-testing |
Invalid
|
Medium
|
Unassigned | |||
Prepare-package |
Fix Released
|
Medium
|
Sultan Alsawaf | |||
Prepare-package-meta |
Fix Released
|
Medium
|
Sultan Alsawaf | |||
Prepare-package-signed |
Fix Released
|
Medium
|
Sultan Alsawaf | |||
Promote-to-proposed |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Promote-to-security |
Fix Released
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Promote-to-updates |
Fix Released
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Regression-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
Security-signoff |
Fix Released
|
Medium
|
Steve Beattie | |||
Verification-testing |
Invalid
|
Medium
|
Canonical Kernel Team | |||
linux-gke-5.0 (Ubuntu) | ||||||
Bionic |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
kernel-
packages:
main: linux-gke-5.0
meta: linux-meta-gke-5.0
signed: linux-signed-
phase: Complete
phase-changed: Wednesday, 10. June 2020 10:37 UTC
proposed-
proposed-
reason: {}
trackers:
bionic/
variant: debs
versions:
main: 5.0.0-1042.43
meta: 5.0.0.1042.27
signed: 5.0.0-1042.43
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2020.05.18-1 |
description: | updated |
tags: | added: kernel-sru-backport-of-1878826 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-gke-5.0 (Ubuntu Bionic): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → In Progress |
description: | updated |
description: | updated |
summary: |
- bionic/linux-gke-5.0: <version to be filled> -proposed tracker + bionic/linux-gke-5.0: 5.0.0-1038.39 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: block-proposed-bionic |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in linux-gke-5.0 (Ubuntu Bionic): | |
status: | New → Confirmed |
description: | updated |
tags: | added: regression-testing-passed |
description: | updated |
summary: |
- bionic/linux-gke-5.0: 5.0.0-1038.39 -proposed tracker + bionic/linux-gke-5.0: 5.0.0-1042.43 -proposed tracker |
description: | updated |
description: | updated |
tags: | removed: block-proposed-bionic |
tags: | removed: block-proposed |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
To post a comment you must log in.
This bug was fixed in the package linux-gke-5.0 - 5.0.0-1042.43
---------------
linux-gke-5.0 (5.0.0-1042.43) bionic; urgency=medium
[ Ubuntu: 5.0.0-52.56 ]
* CVE-2020-0543
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add Special Register Buffer Data Sampling (SRBDS)
mitigation
- SAUCE: x86/speculation: Add SRBDS vulnerability and mitigation documentation
- SAUCE: x86/speculation: Add Ivy Bridge to affected list
linux-gke-5.0 (5.0.0-1038.39) bionic; urgency=medium
* bionic/ linux-gke- 5.0: 5.0.0-1038.39 -proposed tracker (LP: #1878824)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
[ Ubuntu: 5.0.0-49.53 ]
* disco/linux: 5.0.0-49.53 -proposed tracker (LP: #1878826) alloc_free_ page() DEBUG_PER_ CPU_MAPS is enabled remap_extent map_ring_ valloc( ) returns proper grant status
* Disco update: upstream stable patchset 2020-05-14 (LP: #1878681)
- remoteproc: Fix wrong rvring index computation
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer
- binder: take read mode of mmap_sem in binder_
- usb: dwc3: gadget: Do link recovery for SS and SSP
- usb: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete
- iio:ad7797: Use correct attribute_group
- ASoC: q6dsp6: q6afe-dai: add missing channels to MI2S DAIs
- ASoC: tas571x: disable regulators on failed probe
- ASoC: wm8960: Fix wrong clock after suspend & resume
- nfsd: memory corruption in nfsd4_lock()
- i2c: altera: use proper variable to hold errno
- rxrpc: Fix DATA Tx to disable nofrag for UDP on AF_INET6 socket
- net/cxgb4: Check the return from t4_query_params properly
- xfs: acquire superblock freeze protection on eofblocks scans
- svcrdma: Fix trace point use-after-free race
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects
- PCI: Avoid ASMedia XHCI USB PME# from D0 defect
- PCI: Move Apex Edge TPU class quirk to fix BAR assignment
- ARM: dts: bcm283x: Disable dsi0 node
- cpumap: Avoid warning when CONFIG_
- net/mlx5: Fix failing fw tracer allocation on s390
- perf/core: fix parent pid/tid in task exit events
- bpf, x86_32: Fix incorrect encoding in BPF_LDX zero-extension
- mm: shmem: disable interrupt when acquiring info->lock in userfaultfd_copy
path
- xfs: clear PF_MEMALLOC before exiting xfsaild thread
- bpf, x86: Fix encoding for lower 8-bit registers in BPF_STX BPF_B
- net: fec: set GPR bit on suspend by DT configuration.
- x86: hyperv: report value of misc_features
- xfs: fix partially uninitialized structure in xfs_reflink_
- ALSA: hda: Keep the controller initialization even if no codecs found
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported
- scsi: target: fix PR IN / READ FULL STATUS for FC
- scsi: target: tcmu: reset_ring should reset TCMU_DEV_BIT_BROKEN
- objtool: Fix CONFIG_UBSAN_TRAP unreachable warnings
- objtool: Support Clang non-section symbols in ORC dump
- xen/xenbus: ensure xenbus_
- ALSA: hda: call runtime_all...