xenial/linux-kvm: 4.4.0-1056.63 -proposed tracker
Bug #1841534 reported by
Stefan Bader
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | ||
Automated-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | ||
Certification-testing |
Invalid
|
Medium
|
Canonical Hardware Certification | ||
Prepare-package |
Fix Released
|
Medium
|
Kleber Sacilotto de Souza | ||
Prepare-package-meta |
Fix Released
|
Medium
|
Kleber Sacilotto de Souza | ||
Promote-to-proposed |
Fix Released
|
Medium
|
Andy Whitcroft | ||
Promote-to-security |
Fix Released
|
Medium
|
Andy Whitcroft | ||
Promote-to-updates |
Fix Released
|
Medium
|
Andy Whitcroft | ||
Regression-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | ||
Security-signoff |
Fix Released
|
Medium
|
Steve Beattie | ||
Verification-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | ||
linux-kvm (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
kernel-
packages:
main: linux-kvm
meta: linux-meta-kvm
phase: Complete
phase-changed: Tuesday, 03. September 2019 15:06 UTC
proposed-
proposed-
variant: debs
CVE References
tags: | added: kernel-release-tracking-bug xenial |
Changed in linux-kvm (Ubuntu Xenial): | |
status: | New → Confirmed |
Changed in linux-kvm (Ubuntu): | |
status: | New → Invalid |
Changed in linux-kvm (Ubuntu Xenial): | |
importance: | Undecided → Medium |
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2019.08.12-7 |
description: | updated |
tags: | added: kernel-sru-derivative-of-1841544 |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
summary: |
- linux-kvm: <version to be filled> -proposed tracker + xenial/linux-kvm: <version to be filled> -proposed tracker |
description: | updated |
description: | updated |
summary: |
- xenial/linux-kvm: <version to be filled> -proposed tracker + xenial/linux-kvm: 4.4.0-1056.63 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
tags: | added: block-proposed-xenial |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: regression-testing-passed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: block-proposed-xenial |
tags: | removed: block-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
To post a comment you must log in.
This bug was fixed in the package linux-kvm - 4.4.0-1056.63
---------------
linux-kvm (4.4.0-1056.63) xenial; urgency=medium
* xenial/linux-kvm: 4.4.0-1056.63 -proposed tracker (LP: #1841534)
[ Ubuntu: 4.4.0-161.189 ]
* xenial/linux: 4.4.0-161.189 -proposed tracker (LP: #1841544)
* flock not mediated by 'k' (LP: 1658219)
- Revert "UBUNTU: SAUCE: apparmor: flock mediation is not being, enforced on
cache check"
* Packaging resync (LP: #1786013)
- [Packaging] resync getabis
linux-kvm (4.4.0-1055.62) xenial; urgency=medium
* xenial/linux-kvm: 4.4.0-1055.62 -proposed tracker (LP: #1840012)
* CVE-2019-10638
- [Config] kvm: CONFIG_TEST_HASH=n
[ Ubuntu: 4.4.0-160.188 ]
* xenial/linux: 4.4.0-160.188 -proposed tracker (LP: #1840021) thread( ): hung task timeout (LP: #1784665) // Tight thread( ): hung task timeout (LP: #1784665) avail_empty( ) weight( ) weight( )
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
* EeePC 1005px laptop backlight is off after system boot up (LP: #1837117)
- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from
asus_nb_wmi
* CVE-2019-10638
- [Config] CONFIG_TEST_HASH=n
- siphash: add cryptographically secure PRF
- inet: switch IP ID generator to siphash
* Stacked onexec transitions fail when under NO NEW PRIVS restrictions
(LP: #1839037)
- SAUCE: apparmor: fix nnp subset check failure, when stacking
* AppArmor onexec transition causes WARN kernel stack trace (LP: #1838627)
- SAUCE: apparmor: fix audit failures when performing profile transitions
* flock not mediated by 'k' (LP: #1658219) // Ubuntu 16.04: read access
incorrectly implies 'm' rule (LP: #1838090)
- SAUCE: apparmor: flock mediation is not being, enforced on cache check
* bcache: bch_allocator_
timeout for bcache removal causes spurious failures (LP: #1796292)
- SAUCE: bcache: fix deadlock in bcache_allocator
* bcache: bch_allocator_
- bcache: improve bcache_reboot()
- bcache: add journal statistic
- bcache: fix high CPU occupancy during journal
- bcache: fix incorrect sysfs output value of strip size
- bcache: fix error return value in memory shrink
- bcache: fix using of loop variable in memory shrink
- bcache: Fix indentation
- bcache: Add __printf annotation to __bch_check_keys()
- bcache: Annotate switch fall-through
- bcache: Fix kernel-doc warnings
- bcache: Remove an unused variable
- bcache: Suppress more warnings about set-but-not-used variables
- bcache: Reduce the number of sparse complaints about lock imbalances
- bcache: Move couple of functions to sysfs.c
* CVE-2019-3900
- vhost: introduce vhost_vq_
- vhost_net: tx batching
- vhost_net: do not stall on zerocopy depletion
- vhost-net: set packet weight of tx polling to 2 * vq size
- vhost_net: use packet weight for rx handler, too
- vhost_net: introduce vhost_exceeds_
- vhost: introduce vhost_exceeds_
- vhost_net: fix possible infinite loop
- vhost: scsi: add weight support
* Xenial: ZFS deadlock in shrinker path with xattrs (LP: #1839521)
- SAUCE: (noup) ...