linux-gcp-edge: 4.18.0-1010.11~18.04.1 -proposed tracker
Bug #1826167 reported by
Stefan Bader
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Invalid
|
Medium
|
Unassigned | ||
Automated-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
Certification-testing |
Invalid
|
Medium
|
Canonical Hardware Certification | ||
Prepare-package |
Invalid
|
Medium
|
Khaled El Mously | ||
Prepare-package-meta |
Invalid
|
Medium
|
Khaled El Mously | ||
Prepare-package-signed |
Invalid
|
Medium
|
Khaled El Mously | ||
Promote-to-proposed |
Invalid
|
Medium
|
Łukasz Zemczak | ||
Promote-to-security |
Invalid
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Promote-to-updates |
Invalid
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Regression-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
Security-signoff |
Invalid
|
Medium
|
Canonical Security Team | ||
Verification-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
linux-gcp-edge (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Bionic |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
phase: Holding before Release
phase-changed: Monday, 13. May 2019 10:15 UTC
proposed-
proposed-
Changed in linux-gcp-edge (Ubuntu): | |
status: | New → Invalid |
Changed in linux-gcp-edge (Ubuntu Bionic): | |
importance: | Undecided → Medium |
tags: | added: bionic |
tags: | added: kernel-release-tracking-bug |
tags: | added: kernel-release-tracking-bug-live |
tags: | added: kernel-sru-cycle-2019.04.22-1 |
description: | updated |
tags: | added: kernel-sru-backport-of-1826168 |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
description: | updated |
description: | updated |
summary: |
- linux-gcp-edge: <version to be filled> -proposed tracker + linux-gcp-edge: 4.18.0-1010.11~18.04.1 -proposed tracker |
description: | updated |
description: | updated |
tags: | added: block-proposed-bionic |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: regression-testing-passed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-sru-backport-of-1826168 |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Invalid |
Changed in linux-gcp-edge (Ubuntu Bionic): | |
status: | Fix Released → Invalid |
Changed in linux-gcp-edge (Ubuntu Bionic): | |
status: | Invalid → Fix Released |
To post a comment you must log in.
This bug was fixed in the package linux-gcp-edge - 4.18.0- 1011.12~ 18.04.1
--------------- 1011.12~ 18.04.1) bionic; urgency=medium
linux-gcp-edge (4.18.0-
[ Ubuntu: 4.18.0-1011.12 ]
* CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130 /mds: Add basic bug infrastructure for MDS /mds: Add BUG_MSBDS_ONLY MD_CLEAR to guests /mds: Add mds_clear_ cpu_buffers( ) /mds: Clear CPU buffers on exit to user /mds: Conditionally clear CPU buffers on idle entry /mds: Add mitigation control for MDS /mds: Add sysfs reporting for MDS /mds: Add mitigation mode VMWERV /mds: Add mds=full,nosmt cmdline option /mds: Add SMT warning message /mds: Fix comment /mds: Print SMT vulnerable on MSBDS with mitigations off /mds: Add 'mitigations=' support for MDS speculation: Support 'mitigations=' cmdline option
- Documentation/l1tf: Fix small spelling typo
- x86/cpu: Sanitize FAM6_ATOM naming
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
- locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a
new <linux/bits.h> file
- tools include: Adopt linux/bits.h
- x86/msr-index: Cleanup bit defines
- x86/speculation: Consolidate CPU whitelists
- x86/speculation
- x86/speculation
- x86/kvm: Expose X86_FEATURE_
- x86/speculation
- x86/speculation
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
- x86/speculation
- x86/speculation
- x86/speculation
- x86/speculation
- Documentation: Move L1TF to separate directory
- Documentation: Add MDS vulnerability documentation
- x86/speculation
- x86/speculation: Move arch_smt_update() call to after mitigation decisions
- x86/speculation
- x86/speculation
- x86/speculation
- x86/speculation
* CVE-2017-5715 // CVE-2017-5753
- s390/speculation: Support 'mitigations=' cmdline option
* CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
- powerpc/
* CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 //
CVE-2018-3646
- cpu/speculation: Add 'mitigations=' cmdline option
- x86/speculation: Support 'mitigations=' cmdline option
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
linux-gcp-edge (4.18.0- 1010.11~ 18.04.1) bionic; urgency=medium
* linux-gcp-edge: 4.18.0- 1010.11~ 18.04.1 -proposed tracker (LP: #1826167)
[ Ubuntu: 4.18.0-1010.11 ]
* linux-gcp: 4.18.0-1010.11 -proposed tracker (LP: #1826168) regression- suite skippable on unbootable kernels. misc/sgi- gru: fix Spectre v1 vulnerability
* linux: 4.18.0-19.20 -proposed tracker (LP: #1826171)
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
* autopkgtests run too often, too much and don't skip enough (LP: #1823056)
- [Debian] Set +x on rebuild testcase.
- [Debian] Skip rebuild test, for regression-suite deps.
- [Debian] Make ubuntu-
- [Debian] make rebuild use skippable error codes when skipping.
- [Debian] Only run regression-suite, if requested to.
* CVE-2017-5753
- s390/keyboard: sanitize array index in do_kdsk_ioctl
- drm/bufs: Fix Spectre v1 vulnerability
- drivers/
- ipv4: Fix potential Spectre v1 vulnerability
- ai...