focal/linux-azure-cvm: 5.4.0-1095.101+cvm1 -proposed tracker
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
built:
from: 65145d31cadb7585
route-entry: 1
delta:
promote-
promote-
flag:
boot-
bugs-spammed: true
proposed-
proposed-
issue: KSRU-5157
kernel-
packages:
lrg: linux-restricte
lrm: linux-restricte
lrs: linux-restricte
main: linux-azure-cvm
meta: linux-meta-
phase: Complete
phase-changed: Tuesday, 15. November 2022 11:02 UTC
reason: {}
synthetic:
:promote-
trackers:
focal/
variant: debs
versions:
lrm: 5.4.0-1095.101+cvm1
main: 5.4.0-1095.101+cvm1
meta: 5.4.0.1095.85
~~:
clamps:
new-review: 65145d31cadb7585
promote-
self: 5.4.0-1095.101+cvm1
sru-review: 65145d31cadb7585
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2022.10.10-1 |
description: | updated |
tags: | added: kernel-sru-derivative-of-1992037 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-azure-cvm (Ubuntu Focal): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → Triaged |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Triaged → In Progress |
description: | updated |
tags: | added: kernel-jira-issue-ksru-5157 |
description: | updated |
description: | updated |
description: | updated |
summary: |
- focal/linux-azure-cvm: <version to be filled> -proposed tracker + focal/linux-azure-cvm: 5.4.0-1092.97+cvm2 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
summary: |
- focal/linux-azure-cvm: 5.4.0-1092.97+cvm2 -proposed tracker + focal/linux-azure-cvm: 5.4.0-1095.101+cvm1 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: kernel-signing-bot |
Changed in canonical-signing-jobs: | |
assignee: | nobody → Andy Whitcroft (apw) |
importance: | Undecided → Medium |
importance explanation: | unset → unset |
status explanation: | unset → # title kernel 1992033 validate --publications ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14059092 ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14059090 ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14059091 ~canonical-kernel-team/+archive/ubuntu/ppa-ps/+sourcepub/14059114 ~canonical-kernel-team/+archive/ubuntu/ppa-ps/+sourcepub/14059115 copy --from ppa:canonical-kernel-team/ubuntu/ppa --from-suite focal --sources linux-restricted-modules-azure-cvm/5.4.0-1095.101+cvm1 linux-azure-cvm/5.4.0-1095.101+cvm1 linux-meta-azure-cvm/5.4.0.1095.85 --from ppa:canonical-kernel-team/ubuntu/ppa-ps --from-suite focal --sources linux-restricted-generate-azure-cvm/5.4.0-1095.101+cvm1 linux-restricted-signatures-azure-cvm/5.4.0-1095.101+cvm1/signing --to ppa:canonical-signing/ubuntu/primary --to-suite focal copy --from ppa:canonical-signing/ubuntu/primary --from-suite focal --sources linux-restricted-modules-azure-cvm/5.4.0-1095.101+cvm1 linux-azure-cvm/5.4.0-1095.101+cvm1 linux-meta-azure-cvm/5.4.0.1095.85 linux-restricted-signatures-azure-cvm/5.4.0-1095.101+cvm1 --to ubuntu --to-suite focal-proposed delete --from ppa:canonical-signing/ubuntu/primary --from-suite focal --sources linux-restricted-modules-azure-cvm/5.4.0-1095.101+cvm1 linux-azure-cvm/5.4.0-1095.101+cvm1 linux-meta-azure-cvm/5.4.0.1095.85 linux-restricted-generate-azure-cvm/5.4.0-1095.101+cvm1 linux-restricted-signatures-azure-cvm/5.4.0-1095.101+cvm1 |
status: | New → Triaged |
Changed in canonical-signing-jobs: | |
status: | Triaged → Incomplete |
description: | updated |
description: | updated |
Changed in canonical-signing-jobs: | |
status: | Incomplete → Triaged |
description: | updated |
tags: | added: boot-testing-passed |
description: | updated |
Changed in canonical-signing-jobs: | |
status: | Triaged → Confirmed |
description: | updated |
Changed in canonical-signing-jobs: | |
status: | Confirmed → In Progress |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in canonical-signing-jobs: | |
importance explanation: | unset → Successful |
status: | In Progress → Fix Released |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Fix Committed → Fix Released |
This bug was fixed in the package linux-azure-cvm - 5.4.0-1095.101+cvm1
--------------- 1095.101+ cvm1) focal; urgency=medium
linux-azure-cvm (5.4.0-
* focal/linux- azure-cvm: 5.4.0-1095.101+cvm1 -proposed tracker (LP: #1992033)
[ Ubuntu: 5.4.0-1095.101 ]
* focal/linux-azure: 5.4.0-1095.101 -proposed tracker (LP: #1992037) object_ open_opts’ undeclared) (LP: #1990794) nongw.sh from ubuntu_ kernel_ selftests failed on B-5.4 v2_select_ mitigation( ) and v2_user_ select_ mitigation( ) vmx_check_ vmentry_ hw ctrl_current
* ubuntu_bpf failed to build on F-azure-5.4 / B-azure-5.4 ( error:
‘bpf_
- Revert "bpf, testing: Add selftest to read/write sockaddr from user space"
* CVE-2022-42719
- mac80211: mlme: find auth challenge directly
- wifi: mac80211: don't parse mbssid in assoc response
- wifi: mac80211: fix MBSSID parsing use-after-free
* iavf: SR-IOV VFs error with no traffic flow when MTU greater than 1500
(LP: #1983656)
- iavf: Fix set max MTU size with port VLAN and jumbo frames
- i40e: Fix VF set max MTU size
* fib_nexthop_
(LP: #1990800)
- SAUCE: selftests/net: skipping tests for older ip command releases
* CVE-2022-29901
- Revert "x86/speculation: Add RSB VM Exit protections"
- Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
- x86/devicetable: Move x86 specific macro out of generic code
- x86/cpu: Add consistent CPU match macros
- x86/cpu: Add a steppings field to struct x86_cpu_id
- x86/kvm/vmx: Make noinstr clean
- x86/cpufeatures: Move RETPOLINE flags to word 11
- x86/bugs: Report AMD retbleed vulnerability
- x86/bugs: Add AMD retbleed= boot parameter
- x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
- x86/entry: Remove skip_r11rcx
- x86/entry: Add kernel IBRS implementation
- x86/bugs: Optimize SPEC_CTRL MSR writes
- x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
- x86/bugs: Split spectre_
spectre_
- x86/bugs: Report Intel retbleed vulnerability
- intel_idle: Disable IBRS during long idle
- x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
- x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
- x86/speculation: Fix firmware entry SPEC_CTRL handling
- x86/speculation: Fix SPEC_CTRL write on SMT state change
- x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
- x86/speculation: Remove x86_spec_ctrl_mask
- KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S
- KVM/nVMX: Use __vmx_vcpu_run in nested_
- KVM: VMX: Flatten __vmx_vcpu_run()
- KVM: VMX: Convert launched argument to flags
- KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
- KVM: VMX: Fix IBRS handling after vmexit
- x86/speculation: Fill RSB on vmexit for IBRS
- x86/common: Stamp out the stepping madness
- x86/cpu/amd: Enumerate BTC_NO
- x86/bugs: Add Cannon lake to RETBleed affected CPU list
- x86/speculation: Disable RRSBA behavior
- x86/speculation: Use DECLARE_PER_CPU for x86_spec_
- x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
- x86/speculation: Add RSB VM Exit protect...