jammy/linux-azure-6.2: 6.2.0-1013.13~22.04.1 -proposed tracker
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
built:
from: 492401c16cb1aef2
route-entry: 1
delta:
promote-
flag:
boot-
bugs-spammed: true
proposed-
proposed-
stream-
issue: KSRU-9552
kernel-
packages:
generate: linux-generate-
lrg: linux-restricte
lrm: linux-restricte
lrs: linux-restricte
main: linux-azure-6.2
meta: linux-meta-
signed: linux-signed-
phase: Testing
phase-changed: Tuesday, 12. September 2023 04:41 UTC
reason:
automated-
regression-
security-signoff: Stalled -s waiting for signoff
stakeholder-
verification-
synthetic:
:promote-
trackers:
jammy/
variant: debs
versions:
lrm: 6.2.0-1013.
main: 6.2.0-1013.
meta: 6.2.0.1013.
signed: 6.2.0-1013.
~~:
announce:
swm-
clamps:
new-review: 492401c16cb1aef2
promote-
self: 6.2.0-1013.
sru-review: 492401c16cb1aef2
CVE References
- 2022-40982
- 2023-1206
- 2023-20569
- 2023-20588
- 2023-20593
- 2023-2124
- 2023-21264
- 2023-2176
- 2023-2640
- 2023-2898
- 2023-3090
- 2023-31084
- 2023-31248
- 2023-3141
- 2023-3212
- 2023-32629
- 2023-3269
- 2023-3389
- 2023-3390
- 2023-35001
- 2023-3609
- 2023-3610
- 2023-3611
- 2023-3776
- 2023-3777
- 2023-3995
- 2023-4004
- 2023-4015
- 2023-40283
- 2023-4128
- 2023-4155
- 2023-4194
- 2023-4273
- 2023-4569
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2023.09.04-1 |
description: | updated |
tags: | added: kernel-sru-backport-of-2033766 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-azure-6.2 (Ubuntu Jammy): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → Triaged |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Triaged → In Progress |
tags: | added: kernel-jira-issue-ksru-9552 |
description: | updated |
description: | updated |
summary: |
- jammy/linux-azure-6.2: <version to be filled> -proposed tracker + jammy/linux-azure-6.2: 6.2.0-1013.13~22.04.1 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Committed |
Changed in kernel-sru-workflow: | |
status: | Fix Committed → Fix Released |
This bug was fixed in the package linux-azure-6.2 - 6.2.0-1014. 14~22.04. 1
--------------- 1014.14~ 22.04.1) jammy; urgency=medium
linux-azure-6.2 (6.2.0-
* jammy/linux- azure-6. 2: 6.2.0-1014. 14~22.04. 1 -proposed tracker
(LP: #2035365)
[ Ubuntu: 6.2.0-1014.14 ]
* lunar/linux-azure: 6.2.0-1014.14 -proposed tracker (LP: #2035366)
* TDX azure instances crash during boot because of glibc bug (LP: #2011421)
- Revert "UBUNTU: SAUCE: TDX: Work around the segfault issue in glibc 2.35 in
Ubuntu 22.04."
linux-azure-6.2 (6.2.0- 1013.13~ 22.04.1) jammy; urgency=medium
* jammy/linux- azure-6. 2: 6.2.0-1013. 13~22.04. 1 -proposed tracker
(LP: #2033765)
[ Ubuntu: 6.2.0-1013.13 ]
* lunar/linux-azure: 6.2.0-1013.13 -proposed tracker (LP: #2033766) hw-vuln: Unify filename specification in index mitigated( ) declaration to header kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG kprobes: Skip optprobe check for indirect jumps with thunk() call_fixup( )
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
* Azure: net: mana: Fix MANA VF unload when hardware is unresponsive
(LP: #2033531)
- net: mana: Fix MANA VF unload when hardware is unresponsive
* Azure: net: mana: Add page pool for RX buffers (LP: #2034277)
- net: mana: Add page pool for RX buffers
* lunar/linux: 6.2.0-34.34 -proposed tracker (LP: #2033779)
* CVE-2023-20569
- x86/cpu, kvm: Add support for CPUID_80000021_EAX
- tools headers x86 cpufeatures: Sync with the kernel sources
- x86/alternative: Optimize returns patching
- x86/retbleed: Add __x86_return_thunk alignment checks
- x86/srso: Add a Speculative RAS Overflow mitigation
- x86/srso: Add IBPB_BRTYPE support
- x86/srso: Add SRSO_NO support
- x86/srso: Add IBPB
- x86/srso: Add IBPB on VMEXIT
- x86/srso: Fix return thunks in generated code
- x86/srso: Add a forgotten NOENDBR annotation
- x86/srso: Tie SBPB bit setting to microcode patch detection
- Documentation/
- Documentation/srso: Document IBPB aspect and fix formatting
- x86/srso: Fix build breakage with the LLVM linker
- x86: Move gds_ucode_
- x86/retpoline: Don't clobber RFLAGS during srso_safe_ret()
- x86/srso: Disable the mitigation on unaffected configurations
- x86/retpoline,
- x86/retpoline,
retpolines and IBT
- x86/cpu: Fix __x86_return_thunk symbol type
- x86/cpu: Fix up srso_safe_ret() and __x86_return_
- objtool/x86: Fix SRSO mess
- x86/alternative: Make custom return thunk unconditional
- x86/cpu: Clean up SRSO return thunk mess
- x86/cpu: Rename original retbleed methods
- x86/cpu: Rename srso_(.*)_alias to srso_alias_\1
- x86/cpu: Cleanup the untrain mess
- x86/srso: Explain the untraining sequences a bit more
- objtool/x86: Fixup frame-pointer vs rethunk
- x86/static_call: Fix __static_
- x86/srso: Correct the mitigation status when SMT is disabled
- Ubuntu: [Config]: enable Speculative Return Stack Overflow mitigation
* Please enable Renesas RZ platform serial installer (LP: #2022361)
- [Config] enable hihope RZ/G2M serial console
- [Config] Mark sh-sci a...