focal/linux-hwe-5.8: 5.8.0-61.68~20.04.1 -proposed tracker

Bug #1934092 reported by Stefan Bader
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Stefan Bader
Certification-testing
Fix Released
Medium
Canonical Hardware Certification
Prepare-package
Fix Released
Medium
Stefan Bader
Prepare-package-lrg
Fix Released
Medium
Stefan Bader
Prepare-package-lrm
Fix Released
Medium
Stefan Bader
Prepare-package-lrs
Fix Released
Medium
Stefan Bader
Prepare-package-meta
Fix Released
Medium
Stefan Bader
Prepare-package-signed
Fix Released
Medium
Stefan Bader
Promote-signing-to-proposed
Fix Released
Medium
Andy Whitcroft
Promote-to-proposed
Fix Released
Medium
Andy Whitcroft
Promote-to-security
New
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
New
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Fix Released
Medium
Stefan Bader
Security-signoff
Fix Released
Medium
Canonical Security Team
Sru-review
Fix Released
Medium
Andy Whitcroft
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-hwe-5.8 (Ubuntu)
Focal
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
bugs-spammed: true
built:
  lrg: build#1
  lrm: build#1
  lrs: build#1
  main: build#1
  meta: build#1
  signed: build#1
delta:
  promote-to-proposed:
  - lrg
  - lrs
  - meta
  - lrm
  - main
  - signed
  sru-review:
  - lrm
  - lrs
  - main
  - signed
  - lrg
  - meta
kernel-stable-master-bug: 1934093
packages:
  lrg: linux-restricted-generate-hwe-5.8
  lrm: linux-restricted-modules-hwe-5.8
  lrs: linux-restricted-signatures-hwe-5.8
  main: linux-hwe-5.8
  meta: linux-meta-hwe-5.8
  signed: linux-signed-hwe-5.8
phase: Holding before Promote to Updates
phase-changed: Tuesday, 20. July 2021 07:46 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
  promote-to-updates: Holding -- master bug not ready for release
synthetic:
  :promote-to-as-proposed: Fix Released
variant: debs
versions:
  lrm: 5.8.0-61.68~20.04.1
  main: 5.8.0-61.68~20.04.1
  meta: 5.8.0.61.68~20.04.44
  signed: 5.8.0-61.68~20.04.1
  source: 5.8.0-61.68~20.04.1

CVE References

Stefan Bader (smb)
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2021.06.21-3
description: updated
description: updated
tags: added: kernel-sru-backport-of-1934093
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-hwe-5.8 (Ubuntu Focal):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → In Progress
description: updated
description: updated
Stefan Bader (smb)
summary: - focal/linux-hwe-5.8: <version to be filled> -proposed tracker
+ focal/linux-hwe-5.8: 5.8.0-61.68~20.04.1 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in linux-hwe-5.8 (Ubuntu Focal):
status: New → Confirmed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Stefan Bader (smb) wrote :

Looking at the RT results, I did not see any regressions.

tags: added: regression-testing-passed
description: updated
Revision history for this message
Devices Certification Bot (ce-certification-qa) wrote :

Kernel deb testing completes, no regressions found. Ready for Updates. Results here: https://trello.com/c/xjWwhpRN/1972-focal-hwe-linux-image-580-61-generic-580-616820041

description: updated
description: updated
description: updated
Revision history for this message
Stefan Bader (smb) wrote :

SWM has pulled the ADT testing back because of new uploads to DKMS packages. This changed the status in the ADT matrix into MISS. But as testing was good before I will force it back to good.

tags: added: automated-testing-passed
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (61.0 KiB)

This bug was fixed in the package linux-hwe-5.8 - 5.8.0-63.71~20.04.1

---------------
linux-hwe-5.8 (5.8.0-63.71~20.04.1) focal; urgency=medium

  [ Ubuntu: 5.8.0-63.71 ]

  * Possible io_uring regression with QEMU on Ubuntu's kernel (LP: #1935017)
    - SAUCE: Revert "block: don't ignore REQ_NOWAIT for direct IO"

  [ Ubuntu: 5.8.0-62.70 ]

  * CVE-2021-33909
    - SAUCE: seq_file: Disallow extremely large seq buffer allocations

linux-hwe-5.8 (5.8.0-61.68~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.8: 5.8.0-61.68~20.04.1 -proposed tracker (LP: #1934092)

  [ Ubuntu: 5.8.0-61.68 ]

  * test_pmtu_vti4_link_add_mtu() test from net/pmtu.sh in
    ubuntu_kernel_selftests cannot finish properly on 5.11 and 5.8
    (LP: #1933969)
    - ip6_gre: proper dev_{hold|put} in ndo_[un]init methods
    - sit: proper dev_{hold|put} in ndo_[un]init methods
    - ip6_tunnel: sit: proper dev_{hold|put} in ndo_[un]init methods
    - ipv6: remove extra dev_hold() for fallback tunnels

linux-hwe-5.8 (5.8.0-60.67~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.8: 5.8.0-60.67~20.04.1 -proposed tracker (LP: #1932437)

  * Packaging resync (LP: #1786013)
    - [Packaging] update variants

  [ Ubuntu: 5.8.0-60.67 ]

  * groovy/linux: 5.8.0-60.67 -proposed tracker (LP: #1932438)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync getabis
    - [Packaging] update helper scripts
    - update dkms package versions
  * Add support for IO functions of AAEON devices (LP: #1929504)
    - ODM: mfd: Add support for IO functions of AAEON devices
    - ODM: gpio: add driver for AAEON devices
    - ODM: watchdog: add driver for AAEON devices
    - ODM: hwmon: add driver for AAEON devices
    - ODM: leds: add driver for AAEON devices
    - ODM: [Config] update config for AAEON devices
  * Add support for selective build of special drivers (LP: #1912789)
    - [Packaging] Add support for ODM drivers
    - [Packaging] Turn on ODM support for amd64
    - [Packaging] Fix ODM support in actual build
  * Upstream v5.9 introduced 'module' patches that removed exported symbols
    (LP: #1932065)
    - SAUCE: Revert "modules: inherit TAINT_PROPRIETARY_MODULE"
    - SAUCE: Revert "modules: return licensing information from find_symbol"
    - SAUCE: Revert "modules: rename the licence field in struct symsearch to
      license"
    - SAUCE: Revert "modules: unexport __module_address"
    - SAUCE: Revert "modules: unexport __module_text_address"
    - SAUCE: Revert "modules: mark each_symbol_section static"
    - SAUCE: Revert "modules: mark find_symbol static"
    - SAUCE: Revert "modules: mark ref_module static"
  * Disable hv-kvp-daemon.service on certain instance types (LP: #1932081)
    - [Packaging]: Add kernel command line condition to hv-kvp-daemon service
  * Groovy update: upstream stable patchset 2021-06-10 (LP: #1931637)
    - KEYS: trusted: Fix memory leak on object td
    - tpm: fix error return code in tpm2_get_cc_attrs_tbl()
    - tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt()
    - tpm, tpm_tis: Reserve locality in tpm_tis_resume()
    - KVM: x86/mmu: Remove the defunct update_pte() paging hook
    - PM: runtime: Fix unpaire...

Changed in linux-hwe-5.8 (Ubuntu Focal):
status: Confirmed → Fix Released
Andy Whitcroft (apw)
tags: removed: kernel-release-tracking-bug-live
Changed in kernel-sru-workflow:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.