focal/linux-kvm: 5.4.0-1015.15 -proposed tracker

Bug #1878795 reported by Kleber Sacilotto de Souza
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Certification-testing
Invalid
Medium
Unassigned
Prepare-package
Fix Released
Medium
Khaled El Mously
Prepare-package-meta
Fix Released
Medium
Khaled El Mously
Promote-to-proposed
Fix Released
Medium
Andy Whitcroft
Promote-to-security
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
Fix Released
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Fix Released
Medium
Po-Hsu Lin
Security-signoff
Fix Released
Medium
Steve Beattie
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-kvm (Ubuntu)
Focal
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1880118
packages:
  main: linux-kvm
  meta: linux-meta-kvm
phase: Complete
phase-changed: Wednesday, 10. June 2020 03:12 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason: {}
variant: debs
versions:
  main: 5.4.0-1015.15
  meta: 5.4.0.1015.14

CVE References

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2020.05.18-1
description: updated
tags: added: kernel-sru-derivative-of-1878800
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-kvm (Ubuntu Focal):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → In Progress
description: updated
description: updated
description: updated
description: updated
description: updated
summary: - focal/linux-kvm: <version to be filled> -proposed tracker
+ focal/linux-kvm: 5.4.0-1012.12 -proposed tracker
description: updated
Andy Whitcroft (apw)
description: updated
tags: added: kernel-sru-derivative-of-1880118
removed: kernel-sru-derivative-of-1878800
description: updated
Andy Whitcroft (apw)
description: updated
Andy Whitcroft (apw)
Changed in linux-kvm (Ubuntu Focal):
status: New → Confirmed
description: updated
description: updated
description: updated
tags: added: block-proposed-focal
tags: added: block-proposed
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Po-Hsu Lin (cypressyew) wrote : Re: focal/linux-kvm: 5.4.0-1012.12 -proposed tracker

5.4.0-1012.12 - kvm
Regression test CMPL, RTB.

Issue to note in amd64:
  ubuntu_kernel_selftests - rtnetlink.sh in net (bug 1812194) fib_tests in net (bug 1812622) fib-onlink-tests in net (bug 1812622) pmtu.sh failed because some modules not found in net (bug 1870099) ip_defrag in net (bug 1826848) fib_rule_tests in net (bug 1812622) msg_zerocopy.sh in net (bug 1812620) test_vxlan_under_vrf.sh (bug 1837348) so_txtime.sh in net (bug 1870106)
  ubuntu_ltp - proc01 (bug 1829849) hackbench01 (bug 1830675) netns_sysfs (bug 1830678) memcg_max_usage_in_bytes (bug 1829979) memcg_stat (bug 1829983) memcg_use_hierarchy (bug 1829989) memcg_usage_in_bytes (bug 1829984) cpuacct_100_100 (bug 1829978) mkfs01_ext3_sh, mkfs01_ext4_sh (bug 1853610) cve-2018-1000199 (bug 1874006) tpci (bug 1868707)
  ubuntu_ltp_syscalls - btrfs fill_fs test in fallocate06 (bug 1866323) fanotify09 case 3 (bug 1876684) msgstress03 (bug 1797341) msgstress04 (bug 1797348) ptrace08 (bug 1873781) kill11 (bug 1865965)
  ubuntu_sysdig_smoke_test - failed to trace read / write (bug 1844493)
  ubuntu_xfstests_btrfs - No scratch drive available for the test
  ubuntu_xfstests_ext4 - No scratch drive available for the test
  ubuntu_xfstests_xfs - No scratch drive available for the test

tags: added: regression-testing-passed
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (38.4 KiB)

This bug was fixed in the package linux-kvm - 5.4.0-1015.15

---------------
linux-kvm (5.4.0-1015.15) focal; urgency=medium

  [ Ubuntu: 5.4.0-37.41 ]

  * CVE-2020-0543
    - SAUCE: x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2
    - SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
    - SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
    - SAUCE: x86/speculation: Add Special Register Buffer Data Sampling (SRBDS)
      mitigation
    - SAUCE: x86/speculation: Add SRBDS vulnerability and mitigation documentation
    - SAUCE: x86/speculation: Add Ivy Bridge to affected list

linux-kvm (5.4.0-1012.12) focal; urgency=medium

  * focal/linux-kvm: 5.4.0-1012.12 -proposed tracker (LP: #1878795)

  * rtkit-daemon[*]: Failed to make ourselves RT: Operation not permitted after
    upgrade to 20.04 (LP: #1875665)
    - [Config] Turn off CONFIG_RT_GROUP_SCHED

  [ Ubuntu: 5.4.0-34.38 ]

  * focal/linux: 5.4.0-34.38 -proposed tracker (LP: #1880118)
  * debian/scripts/file-downloader does not handle positive failures correctly
    (LP: #1878897)
    - [Packaging] file-downloader not handling positive failures correctly
  * Focal update: v5.4.41 upstream stable release (LP: #1878649)
    - USB: serial: qcserial: Add DW5816e support
    - nvme: refactor nvme_identify_ns_descs error handling
    - nvme: fix possible hang when ns scanning fails during error recovery
    - tracing/kprobes: Fix a double initialization typo
    - net: macb: Fix runtime PM refcounting
    - drm/amdgpu: move kfd suspend after ip_suspend_phase1
    - drm/amdgpu: drop redundant cg/pg ungate on runpm enter
    - vt: fix unicode console freeing with a common interface
    - tty: xilinx_uartps: Fix missing id assignment to the console
    - devlink: fix return value after hitting end in region read
    - dp83640: reverse arguments to list_add_tail
    - fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks
    - ipv6: Use global sernum for dst validation with nexthop objects
    - mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly
    - neigh: send protocol value in neighbor create notification
    - net: dsa: Do not leave DSA master with NULL netdev_ops
    - net: macb: fix an issue about leak related system resources
    - net: macsec: preserve ingress frame ordering
    - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()
    - net_sched: sch_skbprio: add message validation to skbprio_change()
    - net: stricter validation of untrusted gso packets
    - net: tc35815: Fix phydev supported/advertising mask
    - net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict()
    - net/tls: Fix sk_psock refcnt leak when in tls_data_ready()
    - net: usb: qmi_wwan: add support for DW5816e
    - nfp: abm: fix a memory leak bug
    - sch_choke: avoid potential panic in choke_reset()
    - sch_sfq: validate silly quantum values
    - tipc: fix partial topology connection closure
    - tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040
    - bnxt_en: Fix VF anti-spoof filter setup.
    - bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF.
    - bnxt_en: Improve AER slot reset.
    - bnxt_en: Retu...

Changed in linux-kvm (Ubuntu Focal):
status: Confirmed → Fix Released
Andy Whitcroft (apw)
summary: - focal/linux-kvm: 5.4.0-1012.12 -proposed tracker
+ focal/linux-kvm: 5.4.0-1015.15 -proposed tracker
description: updated
description: updated
description: updated
Revision history for this message
Khaled El Mously (kmously) wrote :

No remaining ADT issues.

tags: removed: block-proposed-focal
tags: removed: block-proposed
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
Andy Whitcroft (apw)
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.