focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker

Bug #1921042 reported by Kelsey Steele
18
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Certification-testing
Invalid
Medium
Canonical Hardware Certification
Kernel-signoff
Fix Released
Medium
Timo Aaltonen
Prepare-package
Fix Released
Medium
Stefan Bader
Prepare-package-lrg
Fix Released
Medium
Stefan Bader
Prepare-package-lrm
Fix Released
Medium
Stefan Bader
Prepare-package-lrs
Fix Released
Medium
Stefan Bader
Prepare-package-meta
Fix Released
Medium
Stefan Bader
Prepare-package-signed
Fix Released
Medium
Stefan Bader
Promote-signing-to-proposed
Fix Released
Medium
Andy Whitcroft
Promote-to-proposed
Fix Released
Medium
Andy Whitcroft
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Invalid
Medium
Stefan Bader
Security-signoff
Fix Released
Medium
Steve Beattie
Verification-testing
Fix Released
Medium
Stefan Bader
linux-oem-5.6 (Ubuntu)
Focal
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
bugs-spammed: true
built:
  lrg: build#1
  lrm: build#1
  lrs: build#1
  main: build#1
  meta: build#1
  signed: build#1
packages:
  lrg: linux-restricted-generate-oem-5.6
  lrm: linux-restricted-modules-oem-5.6
  lrs: linux-restricted-signatures-oem-5.6
  main: linux-oem-5.6
  meta: linux-meta-oem-5.6
  signed: linux-signed-oem-5.6
phase: Complete
phase-changed: Tuesday, 13. April 2021 14:42 UTC
promote:
- main
- meta
- lrm
- lrs
- signed
proposed-announcement-sent: true
proposed-testing-requested: true
reason: {}
synthetic:
  :promote-to-as-proposed: Fix Released
variant: debs
versions:
  lrm: 5.6.0-1053.57
  main: 5.6.0-1053.57
  meta: 5.6.0.1053.49
  signed: 5.6.0-1053.57
  source: 5.6.0-1053.57

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2021.03.15-2
description: updated
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-oem-5.6 (Ubuntu Focal):
importance: Undecided → Medium
tags: added: kernel-block-derivatives
Changed in kernel-sru-workflow:
status: Confirmed → In Progress
description: updated
tags: added: kernel-trello-blocked-prepare-packages
description: updated
Andy Whitcroft (apw)
tags: removed: kernel-block-derivatives
description: updated
Andy Whitcroft (apw)
Changed in linux-oem-5.6 (Ubuntu Focal):
status: New → Confirmed
Andy Whitcroft (apw)
description: updated
tags: added: kernel-unblock-ppa
description: updated
tags: removed: kernel-trello-blocked-prepare-packages
description: updated
Stefan Bader (smb)
summary: - focal/linux-oem-5.6: <version to be filled> -proposed tracker
+ focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Packages outside of proper component

The following packages ended up in the wrong component in the Proposed pocket:

linux-restricted-signatures-oem-5.6 5.6.0-1053.57 - is in universe instead of restricted
linux-signatures-nvidia-5.6.0-1053-oem 5.6.0-1053.57 - is in universe instead of restricted

Once this is fixed, set the promote-signing-to-proposed to Fix Released again

description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Stefan Bader (smb) wrote :

The bugs which ask for verification are either changes to selftests or packaging changes. The packaging change is verified more or less by the successful build. The selftest changes do not affect end-users.

Revision history for this message
Stefan Bader (smb) wrote :

The changes done were either CVE fixes that already landed in the Ubuntu kernels or selftests. So I would say that with ADT testing and possibly Cert we don't need full RT.

description: updated
Revision history for this message
Timo Aaltonen (tjaalton) wrote :

no need for full cert testing

description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-oem-5.6 - 5.6.0-1053.57

---------------
linux-oem-5.6 (5.6.0-1053.57) focal; urgency=medium

  * focal/linux-oem-5.6: 5.6.0-1053.57 -proposed tracker (LP: #1921042)

  * Packaging resync (LP: #1786013)
    - update dkms package versions

  * LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key
    (LP: #1918134)
    - [Packaging] sync dkms-build et al from LRMv4

  * CVE-2021-29154
    - SAUCE: bpf, x86: Validate computation of branch displacements for x86-64
    - SAUCE: bpf, x86: Validate computation of branch displacements for x86-32

  * xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed sub-
    cases (LP: #1909647)
    - selftests: xfrm: fix test return value override issue in xfrm_policy.sh

  * ip_defrag.sh in net from ubuntu_kernel_selftests failed with exit code 255
    on F-oem-5.6 (LP: #1919147)
    - selftests: net: ip_defrag: modprobe missing nf_defrag_ipv6 support

  * l2tp.sh from net in ubuntu_kernel_selftests cause dmesg flooded with
    "unregister_netdevice: waiting for eth0 to become free. Usage count = 1" on
    F-OEM-5.6 (LP: #1919277)
    - l2tp: remove skb_dst_set() from l2tp_xmit_skb()

  * CVE-2020-0466
    - epoll: Keep a reference on files added to the check list
    - do_epoll_ctl(): clean the failure exits up a bit
    - fix regression in "epoll: Keep a reference on files added to the check list"

  * CVE-2021-3178
    - nfsd4: readdirplus shouldn't return parent of export

  * CVE-2020-25285
    - mm/hugetlb: fix a race between hugetlb sysctl handlers

  * CVE-020-10781
    - Revert "zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()"

  * CVE-2020-14351
    - perf/core: Fix race in the perf_mmap_close() function

  * CVE-2020-25669
    - Input: sunkbd - avoid use-after-free in teardown paths

  * CVE-2020-14390
    - fbcon: remove soft scrollback code

  * CVE-2021-3411
    - x86/kprobes: Fix optprobe to detect INT3 padding correctly

  * CVE-2020-0423
    - binder: fix UAF when releasing todo list

  * CVE-2020-27830
    - speakup: Reject setting the speakup line discipline outside of speakup

  * CVE-2020-0465
    - HID: core: Correctly handle ReportSize being zero
    - HID: core: Sanitize event code and type when mapping input

  * CVE-2020-25645
    - geneve: add transport ports in route lookup for geneve

  * CVE-2021-20194
    - bpf, cgroup: Fix optlen WARN_ON_ONCE toctou
    - bpf, cgroup: Fix problematic bounds check

  * CVE-2020-36158
    - mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start

 -- Stefan Bader <email address hidden> Fri, 09 Apr 2021 16:43:44 +0200

Changed in linux-oem-5.6 (Ubuntu Focal):
status: Confirmed → Fix Released
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.