linux: 3.13.0-150.200 -proposed tracker
Bug #1772970 reported by
Stefan Bader
This bug report is a duplicate of:
Bug #1774190: linux: 3.13.0-151.201 -proposed tracker.
Edit
Remove
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | ||
Automated-testing |
Incomplete
|
Medium
|
Canonical Kernel Team | ||
Certification-testing |
Confirmed
|
Medium
|
Canonical Hardware Certification | ||
Prepare-package |
Fix Released
|
Medium
|
Stefan Bader | ||
Prepare-package-meta |
Fix Released
|
Medium
|
Stefan Bader | ||
Prepare-package-signed |
Fix Released
|
Medium
|
Stefan Bader | ||
Promote-to-proposed |
Fix Released
|
Medium
|
Łukasz Zemczak | ||
Promote-to-security |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Promote-to-updates |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Regression-testing |
Confirmed
|
Medium
|
Canonical Kernel Team | ||
Security-signoff |
In Progress
|
Medium
|
Steve Beattie | ||
Upload-to-ppa |
Invalid
|
Medium
|
Unassigned | ||
Verification-testing |
Confirmed
|
Medium
|
Canonical Kernel Team | ||
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Trusty |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see: https:/
backports: bug 1772971 (linux-lts-trusty)
derivatives:
-- swm properties --
boot-testing-
bugs-spammed: true
phase: Promoted to proposed
proposed-
proposed-
tags: | added: kernel-release-tracking-bug |
tags: | added: kernel-release-tracking-bug-live |
tags: | added: trusty |
Changed in linux (Ubuntu Trusty): | |
status: | New → Confirmed |
Changed in linux (Ubuntu): | |
status: | New → Invalid |
Changed in linux (Ubuntu Trusty): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
tags: | added: kernel-sru-cycle-2018.05.21-1 |
tags: | added: kernel-sru-master-kernel |
description: | updated |
summary: |
- linux: <version to be filled> -proposed tracker + linux: 3.13.0-150.200 -proposed tracker |
description: | updated |
description: | updated |
tags: | added: block-proposed-trusty |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
To post a comment you must log in.
This bug was fixed in the package linux - 3.13.0-151.201
---------------
linux (3.13.0-151.201) trusty; urgency=medium
* linux: 3.13.0-151.201 -proposed tracker (LP: #1774190)
* CVE-2018-3639 (x86)
- SAUCE: Set generic SSBD feature for Intel cpus
- KVM: vmx: fix MPX detection
- KVM: x86: Fix MSR_IA32_BNDCFGS in msrs_to_save
- x86/cpu: Add CLZERO detection
* Trusty cannot load microcode for family 17h AMD processors (LP: #1774082)
- x86/microcode/AMD: Add support for fam17h microcode loading
linux (3.13.0-150.200) trusty; urgency=medium
* linux: 3.13.0-150.200 -proposed tracker (LP: #1772970)
* CVE-2018-3639 (x86) msr_write work for 32-bit code store_bypass_ update( ) ctrl_{set_ guest,restore_ host} CTRL/LS_ CFG
- x86/cpu: Make alternative_
- x86/cpu/AMD: Fix erratum 1076 (CPB bit)
- x86/bugs: Fix the parameters alignment and missing void
- KVM: SVM: Move spec control call after restore of GS
- x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
- x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
- x86/cpufeatures: Disentangle SSBD enumeration
- x86/cpufeatures: Add FEATURE_ZEN
- x86/speculation: Handle HT correctly on AMD
- x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
- x86/speculation: Add virtualized speculative store bypass disable support
- SAUCE: x86/cpu: Rename x86_amd_ssbd_enable
- x86/speculation: Rework speculative_
- x86/bugs: Unify x86_spec_
- x86/bugs: Expose x86_spec_ctrl_base directly
- x86/bugs: Remove x86_spec_ctrl_set()
- x86/bugs: Rework spec_ctrl base and mask logic
- x86/speculation, KVM: Implement support for VIRT_SPEC_
- KVM: x86: introduce num_emulated_msrs
- KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
- x86/bugs: Rename SSBD_NO to SSB_NO
- KVM: VMX: Expose SSBD properly to guests.
* CVE-2018-7492
- rds: Fix NULL pointer dereference in __rds_rdma_map
* CVE-2017-0627
- media: uvcvideo: Prevent heap overflow when accessing mapped controls
* CVE-2018-8781
- drm: udl: Properly check framebuffer mmap offsets
* CVE-2018-1068
- netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
-- Stefan Bader <email address hidden> Wed, 30 May 2018 16:02:01 +0200