linux-hwe-edge: 5.0.0-14.15~18.04.1 -proposed tracker

Bug #1826147 reported by Stefan Bader on 2019-04-24
54
This bug affects 4 people
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Canonical Hardware Certification
Prepare-package
Medium
Stefan Bader
Prepare-package-meta
Medium
Stefan Bader
Prepare-package-signed
Medium
Stefan Bader
Promote-to-proposed
Medium
Łukasz Zemczak
Promote-to-security
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Medium
Canonical Kernel Team
Security-signoff
Medium
Canonical Security Team
Verification-testing
Medium
Canonical Kernel Team
linux-hwe-edge (Ubuntu)
Undecided
Unassigned
Bionic
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
phase: Ready for Testing
phase-changed: Tuesday, 14. May 2019 18:37 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
  automated-testing: Ongoing -- testing in progress

Stefan Bader (smb) on 2019-04-24
Changed in linux-hwe-edge (Ubuntu):
status: New → Invalid
Changed in linux-hwe-edge (Ubuntu Bionic):
importance: Undecided → Medium
tags: added: bionic
tags: added: kernel-release-tracking-bug
tags: added: kernel-release-tracking-bug-live
tags: added: kernel-sru-cycle-2019.04.22-1
description: updated
tags: added: kernel-sru-backport-of-1826150
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
description: updated
description: updated
Stefan Bader (smb) on 2019-04-25
summary: - linux-hwe-edge: <version to be filled> -proposed tracker
+ linux-hwe-edge: 5.0.0-14.15~18.04.1 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in linux-hwe-edge (Ubuntu Bionic):
status: New → Confirmed
Stefan Bader (smb) on 2019-04-29
tags: added: kernel-block-proposed
description: updated
Stefan Bader (smb) on 2019-04-29
tags: removed: kernel-block-proposed
description: updated
tags: added: block-proposed-bionic
tags: added: block-proposed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Sean Feole (sfeole) on 2019-05-13
tags: added: regression-testing-passed
description: updated
description: updated
Launchpad Janitor (janitor) wrote :
Download full text (3.9 KiB)

This bug was fixed in the package linux-hwe-edge - 5.0.0-15.16~18.04.1

---------------
linux-hwe-edge (5.0.0-15.16~18.04.1) bionic; urgency=medium

  [ Ubuntu: 5.0.0-15.16 ]

  * CVE-2019-11683
    - udp: fix GRO reception in case of length mismatch
    - udp: fix GRO packet of death
  * CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
    - x86/msr-index: Cleanup bit defines
    - x86/speculation: Consolidate CPU whitelists
    - x86/speculation/mds: Add basic bug infrastructure for MDS
    - x86/speculation/mds: Add BUG_MSBDS_ONLY
    - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
    - x86/speculation/mds: Add mds_clear_cpu_buffers()
    - x86/speculation/mds: Clear CPU buffers on exit to user
    - x86/kvm/vmx: Add MDS protection when L1D Flush is not active
    - x86/speculation/mds: Conditionally clear CPU buffers on idle entry
    - x86/speculation/mds: Add mitigation control for MDS
    - x86/speculation/mds: Add sysfs reporting for MDS
    - x86/speculation/mds: Add mitigation mode VMWERV
    - Documentation: Move L1TF to separate directory
    - Documentation: Add MDS vulnerability documentation
    - x86/speculation/mds: Add mds=full,nosmt cmdline option
    - x86/speculation: Move arch_smt_update() call to after mitigation decisions
    - x86/speculation/mds: Add SMT warning message
    - x86/speculation/mds: Fix comment
    - x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
    - x86/speculation/mds: Add 'mitigations=' support for MDS
  * CVE-2017-5715 // CVE-2017-5753
    - s390/speculation: Support 'mitigations=' cmdline option
  * CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
    - powerpc/speculation: Support 'mitigations=' cmdline option
  * CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 //
    CVE-2018-3646
    - cpu/speculation: Add 'mitigations=' cmdline option
    - x86/speculation: Support 'mitigations=' cmdline option
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log

linux-hwe-edge (5.0.0-14.15~18.04.1) bionic; urgency=medium

  * linux-hwe-edge: 5.0.0-14.15~18.04.1 -proposed tracker (LP: #1826147)

  [ Ubuntu: 5.0.0-14.15 ]

  * linux: 5.0.0-14.15 -proposed tracker (LP: #1826150)
  * [SRU] Please sync vbox modules from virtualbox 6.0.6 on next kernel update
    (LP: #1825210)
    - vbox-update: updates for renamed makefiles
    - ubuntu: vbox -- update to 6.0.6-dfsg-1
  * Intel I210 Ethernet card not working after hotplug [8086:1533]
    (LP: #1818490)
    - igb: Fix WARN_ONCE on runtime suspend
  * [regression][snd_hda_codec_realtek] repeating crackling noise after 19.04
    upgrade (LP: #1821663)
    - ALSA: hda - Add two more machines to the power_save_blacklist
  * CVE-2019-9500
    - brcmfmac: assure SSID length from firmware is limited
  * CVE-2019-9503
    - brcmfmac: add subtype check for event handling in data path
  * CVE-2019-3882
    - vfio/type1: Limit DMA mappings per container
  * autofs kernel module missing (LP: #1824333)
    - [Config] Update autofs4 path in inclusion list
  * The Realtek card reader does not enter PCIe 1.1/1.2 (LP: #1825487)
    - misc: rtsx: Enable OCP for rts522a rts524a rts525a rts5260
   ...

Read more...

Changed in linux-hwe-edge (Ubuntu Bionic):
status: Confirmed → Fix Released
Stefan Bader (smb) on 2019-05-15
tags: removed: kernel-sru-backport-of-1826150
description: updated
tags: removed: kernel-release-tracking-bug-live
Changed in kernel-sru-workflow:
status: In Progress → Invalid
Changed in linux-hwe-edge (Ubuntu Bionic):
status: Fix Released → Invalid
Changed in linux-hwe-edge (Ubuntu Bionic):
status: Invalid → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers