linux-kvm: 5.0.0-1005.5 -proposed tracker
Bug #1826145 reported by
Stefan Bader
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Invalid
|
Medium
|
Unassigned | ||
Automated-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
Certification-testing |
Invalid
|
Medium
|
Canonical Hardware Certification | ||
Prepare-package |
Invalid
|
Medium
|
Andrea Righi | ||
Prepare-package-meta |
Invalid
|
Medium
|
Andrea Righi | ||
Promote-to-proposed |
Invalid
|
Medium
|
Andy Whitcroft | ||
Promote-to-security |
Invalid
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Promote-to-updates |
Invalid
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Regression-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
Security-signoff |
Invalid
|
Medium
|
Canonical Security Team | ||
Verification-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
linux-kvm (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Disco |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
phase: Holding before Release
phase-changed: Monday, 13. May 2019 15:14 UTC
proposed-
proposed-
Changed in linux-kvm (Ubuntu): | |
status: | New → Invalid |
Changed in linux-kvm (Ubuntu Disco): | |
importance: | Undecided → Medium |
tags: | added: disco |
tags: | added: kernel-release-tracking-bug |
tags: | added: kernel-release-tracking-bug-live |
tags: | added: kernel-sru-cycle-2019.04.22-1 |
description: | updated |
tags: | added: kernel-sru-derivative-of-1826150 |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
description: | updated |
description: | updated |
summary: |
- linux-kvm: <version to be filled> -proposed tracker + linux-kvm: 5.0.0-1005.5 -proposed tracker |
description: | updated |
description: | updated |
tags: | added: block-proposed-disco |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: regression-testing-passed |
description: | updated |
description: | updated |
tags: | removed: kernel-sru-derivative-of-1826150 |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Invalid |
Changed in linux-kvm (Ubuntu Disco): | |
status: | Fix Released → Invalid |
Changed in linux-kvm (Ubuntu Disco): | |
status: | Invalid → Fix Released |
Changed in linux-kvm (Ubuntu): | |
status: | Invalid → Fix Released |
To post a comment you must log in.
This bug was fixed in the package linux-kvm - 5.0.0-1006.6
---------------
linux-kvm (5.0.0-1006.6) disco; urgency=medium
[ Ubuntu: 5.0.0-15.16 ]
* CVE-2019-11683 /mds: Add basic bug infrastructure for MDS /mds: Add BUG_MSBDS_ONLY MD_CLEAR to guests /mds: Add mds_clear_ cpu_buffers( ) /mds: Clear CPU buffers on exit to user /mds: Conditionally clear CPU buffers on idle entry /mds: Add mitigation control for MDS /mds: Add sysfs reporting for MDS /mds: Add mitigation mode VMWERV /mds: Add mds=full,nosmt cmdline option /mds: Add SMT warning message /mds: Fix comment /mds: Print SMT vulnerable on MSBDS with mitigations off /mds: Add 'mitigations=' support for MDS speculation: Support 'mitigations=' cmdline option
- udp: fix GRO reception in case of length mismatch
- udp: fix GRO packet of death
* CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130
- x86/msr-index: Cleanup bit defines
- x86/speculation: Consolidate CPU whitelists
- x86/speculation
- x86/speculation
- x86/kvm: Expose X86_FEATURE_
- x86/speculation
- x86/speculation
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
- x86/speculation
- x86/speculation
- x86/speculation
- x86/speculation
- Documentation: Move L1TF to separate directory
- Documentation: Add MDS vulnerability documentation
- x86/speculation
- x86/speculation: Move arch_smt_update() call to after mitigation decisions
- x86/speculation
- x86/speculation
- x86/speculation
- x86/speculation
* CVE-2017-5715 // CVE-2017-5753
- s390/speculation: Support 'mitigations=' cmdline option
* CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639
- powerpc/
* CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 //
CVE-2018-3646
- cpu/speculation: Add 'mitigations=' cmdline option
- x86/speculation: Support 'mitigations=' cmdline option
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
linux-kvm (5.0.0-1005.5) disco; urgency=medium
* linux-kvm: 5.0.0-1005.5 -proposed tracker (LP: #1826145)
[ Ubuntu: 5.0.0-14.15 ]
* linux: 5.0.0-14.15 -proposed tracker (LP: #1826150) [snd_hda_ codec_realtek] repeating crackling noise after 19.04 blacklist
* [SRU] Please sync vbox modules from virtualbox 6.0.6 on next kernel update
(LP: #1825210)
- vbox-update: updates for renamed makefiles
- ubuntu: vbox -- update to 6.0.6-dfsg-1
* Intel I210 Ethernet card not working after hotplug [8086:1533]
(LP: #1818490)
- igb: Fix WARN_ONCE on runtime suspend
* [regression]
upgrade (LP: #1821663)
- ALSA: hda - Add two more machines to the power_save_
* CVE-2019-9500
- brcmfmac: assure SSID length from firmware is limited
* CVE-2019-9503
- brcmfmac: add subtype check for event handling in data path
* CVE-2019-3882
- vfio/type1: Limit DMA mappings per container
* autofs kernel module missing (LP: #1824333)
- [Config] Update autofs4 path in inclusion list
* The Realtek card reader does not enter PCIe 1.1/1.2 (LP: #1825487)
- misc: rtsx: Enable OCP for rts522a rts524a rts525a rts5260
- SAUCE: misc: rtsx: Fixed rts5260 power saving p...