xenial/linux-kvm: 4.4.0-1083.92 -proposed tracker
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | |||
Automated-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
Certification-testing |
Invalid
|
Medium
|
Unassigned | |||
Prepare-package |
Fix Released
|
Medium
|
William Breathitt Gray | |||
Prepare-package-meta |
Fix Released
|
Medium
|
William Breathitt Gray | |||
Promote-to-proposed |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Promote-to-security |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Promote-to-updates |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Regression-testing |
In Progress
|
Medium
|
Canonical Kernel Team | |||
Security-signoff |
In Progress
|
Medium
|
Steve Beattie | |||
Verification-testing |
In Progress
|
Medium
|
Canonical Kernel Team | |||
linux-kvm (Ubuntu) | ||||||
Xenial |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
kernel-
packages:
main: linux-kvm
meta: linux-meta-kvm
phase: Testing
phase-changed: Thursday, 19. November 2020 10:41 UTC
proposed-
proposed-
reason:
regression-
security-signoff: Stalled -- waiting for signoff
verification-
variant: debs
versions:
main: 4.4.0-1083.92
meta: 4.4.0.1083.81
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2020.11.09-1 |
description: | updated |
tags: | added: kernel-sru-derivative-of-1903107 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-kvm (Ubuntu Xenial): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → In Progress |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
summary: |
- xenial/linux-kvm: <version to be filled> -proposed tracker + xenial/linux-kvm: 4.4.0-1082.90 -proposed tracker |
description: | updated |
summary: |
- xenial/linux-kvm: 4.4.0-1082.90 -proposed tracker + xenial/linux-kvm: 4.4.0-1083.92 -proposed tracker |
tags: | added: kernel-trello-review-prepare-packages |
description: | updated |
tags: | removed: kernel-trello-review-prepare-packages |
description: | updated |
tags: | added: kernel-trello-review-prepare-packages |
description: | updated |
description: | updated |
tags: | removed: kernel-trello-review-prepare-packages |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
This bug was fixed in the package linux-kvm - 4.4.0-1084.93
---------------
linux-kvm (4.4.0-1084.93) xenial; urgency=medium
* xenial/linux-kvm: 4.4.0-1084.93 -proposed tracker (LP: #1905657)
* CONFIG options for (ipip, sit) should not be built-in to the KVM kernels
(LP: #1899832)
- [config] Set CONFIG_NET_IPIP and CONIG_IPV6_SIT =m
linux-kvm (4.4.0-1083.92) xenial; urgency=medium
* xenial/linux-kvm: 4.4.0-1083.92 -proposed tracker (LP: #1903099)
[ Ubuntu: 4.4.0-195.227 ]
* xenial/linux: 4.4.0-195.227 -proposed tracker (LP: #1903107) once_size_ nocheck( ) at_a_time( ) function. FIRMWARE_ NAME attribute in genl_fw_ download( ) shash_update( ) coherent( )' call lookup_ state() " add_new_ sta() txcompletion_ cb() get_host_ stats() '
* Update kernel packaging to support forward porting kernels (LP: #1902957)
- [Debian] Update for leader included in BACKPORT_SUFFIX
* Avoid double newline when running insertchanges (LP: #1903293)
- [Packaging] insertchanges: avoid double newline
* EFI: Fails when BootCurrent entry does not exist (LP: #1899993)
- efivarfs: Replace invalid slashes with exclamation marks in dentries.
* CVE-2020-14351
- perf/core: Fix race in the perf_mmap_close() function
* CVE-2020-25645
- geneve: add transport ports in route lookup for geneve
* Xenial update: v4.4.241 upstream stable release (LP: #1902097)
- ibmveth: Identify ingress large send packets.
- tipc: fix the skb_unshare() in tipc_buf_append()
- net/ipv4: always honour route mtu during forwarding
- r8169: fix data corruption issue on RTL8402
- ALSA: bebob: potential info leak in hwdep_read()
- mm/kasan: print name of mem[set,cpy,move]() caller in report
- mm/kasan: add API to check memory regions
- compiler.h, kasan: Avoid duplicating __read_
- compiler.h: Add read_word_
- lib/strscpy: Shut up KASAN false-positives in strscpy()
- x86/mm/ptdump: Fix soft lockup in page table walker
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling
ether_setup
- nfc: Ensure presence of NFC_ATTR_
nfc_
- tcp: fix to update snd_wl1 in bulk receiver fast path
- icmp: randomize the global rate limiter
- cifs: remove bogus debug code
- ima: Don't ignore errors from crypto_
- EDAC/i5100: Fix error handling order in i5100_init_one()
- crypto: ixp4xx - Fix the size used in a 'dma_free_
- media: Revert "media: exynos4-is: Add missed check for
pinctrl_
- media: m5mols: Check function pointer in m5mols_sensor_power
- media: omap3isp: Fix memleak in isp_probe
- crypto: omap-sham - fix digcnt register handling with export/import
- media: tc358743: initialize variable
- media: ti-vpe: Fix a missing check and reference count leak
- ath6kl: prevent potential array overflow in ath6kl_
- ath9k: Fix potential out of bounds in ath9k_htc_
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680
- mwifiex: Do not use GFP_KERNEL in atomic context
- drm/gma500: fix error check
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_
- scsi: csio...