focal/linux-bluefield: 5.4.0-1027.30 -proposed tracker

Bug #1959791 reported by Stefan Bader
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Invalid
Medium
Unassigned
Boot-testing
Invalid
Medium
Unassigned
Certification-testing
Confirmed
Medium
Canonical Hardware Certification
Prepare-package
Fix Released
Medium
Zachary Tahenakos
Prepare-package-meta
Fix Released
Medium
Zachary Tahenakos
Prepare-package-signed
Fix Released
Medium
Zachary Tahenakos
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
Fix Released
Medium
Andy Whitcroft
Promote-to-security
New
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
New
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Invalid
Medium
Unassigned
Security-signoff
In Progress
Medium
Steve Beattie
Sru-review
Fix Released
Medium
Andy Whitcroft
Stakeholder-signoff
Confirmed
Medium
Kernel SRU linux-bluefield Signoff
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-bluefield (Ubuntu)
Focal
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
bugs-spammed: true
built:
  route-entry: 1
delta:
  promote-to-proposed:
  - signed
  - meta
  - main
  sru-review:
  - signed
  - main
  - meta
issue: KSRU-1012
kernel-stable-master-bug: 1959817
packages:
  main: linux-bluefield
  meta: linux-meta-bluefield
  signed: linux-signed-bluefield
phase: Signoff
phase-changed: Friday, 04. February 2022 20:59 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
  certification-testing: Ongoing -- testing in progress
  security-signoff: Stalled -- waiting for signoff
  stakeholder-signoff: Stalled -- waiting for signoff
synthetic:
  :promote-to-as-proposed: Fix Released
variant: debs
versions:
  main: 5.4.0-1027.30
  meta: 5.4.0.1027.28
  signed: 5.4.0-1027.30
  source: 5.4.0-1027.30

Stefan Bader (smb)
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2022.01.03-7
description: updated
description: updated
tags: added: kernel-sru-derivative-of-1959817
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-bluefield (Ubuntu Focal):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
tags: added: kernel-jira-issue-ksru-1012
description: updated
description: updated
summary: - focal/linux-bluefield: <version to be filled> -proposed tracker
+ focal/linux-bluefield: 5.4.0-1027.30 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in linux-bluefield (Ubuntu Focal):
status: New → Confirmed
description: updated
Andy Whitcroft (apw)
tags: added: kernel-signing-bot
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

This re-spin was done to fix a cifs regression (bug 1959665) which doesn't affect the linux-bluefield kernel as it doesn't enable CONFIG_CIFS, so this build doesn't need to be promoted to -updates with urgency. Therefore I'm going to duplicate this tracking bug against the one for the current SRU cycle (bug 1959252).

Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (17.9 KiB)

This bug was fixed in the package linux-bluefield - 5.4.0-1028.31

---------------
linux-bluefield (5.4.0-1028.31) focal; urgency=medium

  * focal/linux-bluefield: 5.4.0-1028.31 -proposed tracker (LP: #1959252)

  * Support CIFS for CUDA (LP: #1958299)
    - [Config] bluefield: CONFIG_CIFS=m
    - [Config] bluefield: Additional config options for CIFS

  * Fix ct_state nat matching and nat action not being executed (LP: #1957807)
    - net: zero-initialize tc skb extension on allocation
    - net/sched: Extend qdisc control block with tc control block
    - net/sched: flow_dissector: Fix matching on zone id for invalid conns
    - net: openvswitch: Fix matching zone id for invalid conns arriving from tc
    - net: openvswitch: Fix ct_state nat flags for conns arriving from tc

  * Fix sprintf usage that may lead to buffer overflow (LP: #1959119)
    - SAUCE: Fix references to sprintf that may cause buffer overflow

  [ Ubuntu: 5.4.0-100.113 ]

  * focal/linux: 5.4.0-100.113 -proposed tracker (LP: #1959900)
  * CVE-2022-22942
    - SAUCE: drm/vmwgfx: Fix stale file descriptors on failed usercopy
  * CVE-2022-0330
    - drm/i915: Flush TLBs before releasing backing store
  * Focal update: v5.4.166 upstream stable release (LP: #1957008)
    - netfilter: selftest: conntrack_vrf.sh: fix file permission
    - Linux 5.4.166
    - net/packet: rx_owner_map depends on pg_vec
    - USB: gadget: bRequestType is a bitfield, not a enum
    - HID: holtek: fix mouse probing
    - udp: using datalen to cap ipv6 udp max gso segments
    - selftests: Calculate udpgso segment count without header adjustment
  * Focal update: v5.4.165 upstream stable release (LP: #1957007)
    - serial: tegra: Change lower tolerance baud rate limit for tegra20 and
      tegra30
    - ntfs: fix ntfs_test_inode and ntfs_init_locked_inode function type
    - HID: quirks: Add quirk for the Microsoft Surface 3 type-cover
    - HID: google: add eel USB id
    - HID: add hid_is_usb() function to make it simpler for USB detection
    - HID: add USB_HID dependancy to hid-prodikeys
    - HID: add USB_HID dependancy to hid-chicony
    - HID: add USB_HID dependancy on some USB HID drivers
    - HID: bigbenff: prevent null pointer dereference
    - HID: wacom: fix problems when device is not a valid USB device
    - HID: check for valid USB device for many HID drivers
    - can: kvaser_usb: get CAN clock frequency from device
    - can: kvaser_pciefd: kvaser_pciefd_rx_error_frame(): increase correct
      stats->{rx,tx}_errors counter
    - can: sja1000: fix use after free in ems_pcmcia_add_card()
    - nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
    - selftests: netfilter: add a vrf+conntrack testcase
    - vrf: don't run conntrack on vrf with !dflt qdisc
    - bpf: Fix the off-by-two error in range markings
    - ice: ignore dropped packets during init
    - bonding: make tx_rebalance_counter an atomic
    - nfp: Fix memory leak in nfp_cpp_area_cache_add()
    - seg6: fix the iif in the IPv6 socket control block
    - udp: using datalen to cap max gso segments
    - iavf: restore MSI state on reset
    - iavf: Fix reporting when setting descriptor count
    - IB/hfi1: ...

Changed in linux-bluefield (Ubuntu Focal):
status: Confirmed → Fix Released
Andy Whitcroft (apw)
tags: removed: kernel-release-tracking-bug-live
Changed in kernel-sru-workflow:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.