focal/linux-oracle: 5.4.0-1087.96 -proposed tracker
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
built:
from: 3c68eba9a7884a1a
route-entry: 1
delta:
promote-
flag:
boot-
bugs-spammed: true
proposed-
proposed-
issue: KSRU-5177
kernel-
packages:
lrg: linux-restricte
lrm: linux-restricte
lrs: linux-restricte
main: linux-oracle
meta: linux-meta-oracle
signed: linux-signed-oracle
phase: Signoff
phase-changed: Wednesday, 26. October 2022 19:58 UTC
reason:
promote-
security-
security-signoff: Stalled -s waiting for signoff
synthetic:
:promote-
trackers:
bionic/
variant: debs
versions:
lrm: 5.4.0-1087.96
main: 5.4.0-1087.96
meta: 5.4.0.1087.83
signed: 5.4.0-1087.96
~~:
clamps:
new-review: 3c68eba9a7884a1a
promote-
self: 5.4.0-1087.96
sru-review: 3c68eba9a7884a1a
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2022.10.10-1 |
description: | updated |
tags: | added: kernel-sru-derivative-of-1992064 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-oracle (Ubuntu Focal): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → Triaged |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Triaged → In Progress |
tags: | added: kernel-jira-issue-ksru-5177 |
description: | updated |
description: | updated |
description: | updated |
summary: |
- focal/linux-oracle: <version to be filled> -proposed tracker + focal/linux-oracle: 5.4.0-1087.96 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: kernel-signing-bot |
Changed in canonical-signing-jobs: | |
assignee: | nobody → Andy Whitcroft (apw) |
importance: | Undecided → Medium |
status explanation: | unset → # title kernel 1992054 validate --publications ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14005612 ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14005609 ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14005610 ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14005611 ~canonical-kernel-team/+archive/ubuntu/ppa-ps/+sourcepub/14005621 ~canonical-kernel-team/+archive/ubuntu/ppa-ps/+sourcepub/14005622 copy --from ppa:canonical-kernel-team/ubuntu/ppa --from-suite focal --sources linux-restricted-modules-oracle/5.4.0-1087.96 linux-oracle/5.4.0-1087.96 linux-meta-oracle/5.4.0.1087.83 linux-signed-oracle/5.4.0-1087.96/signing --from ppa:canonical-kernel-team/ubuntu/ppa-ps --from-suite focal --sources linux-restricted-generate-oracle/5.4.0-1087.96 linux-restricted-signatures-oracle/5.4.0-1087.96/signing --to ppa:canonical-signing/ubuntu/primary --to-suite focal copy --from ppa:canonical-signing/ubuntu/primary --from-suite focal --sources linux-restricted-modules-oracle/5.4.0-1087.96 linux-oracle/5.4.0-1087.96 linux-meta-oracle/5.4.0.1087.83 linux-signed-oracle/5.4.0-1087.96 linux-restricted-signatures-oracle/5.4.0-1087.96 --to ubuntu --to-suite focal-proposed delete --from ppa:canonical-signing/ubuntu/primary --from-suite focal --sources linux-restricted-modules-oracle/5.4.0-1087.96 linux-oracle/5.4.0-1087.96 linux-meta-oracle/5.4.0.1087.83 linux-signed-oracle/5.4.0-1087.96 linux-restricted-generate-oracle/5.4.0-1087.96 linux-restricted-signatures-oracle/5.4.0-1087.96 |
status: | New → Triaged |
description: | updated |
Changed in canonical-signing-jobs: | |
status: | Triaged → Confirmed |
description: | updated |
Changed in canonical-signing-jobs: | |
status: | Confirmed → In Progress |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in canonical-signing-jobs: | |
status: | In Progress → Fix Released |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: automated-testing-failed |
tags: |
added: automated-testing-passed removed: automated-testing-failed |
description: | updated |
description: | updated |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Committed |
Changed in kernel-sru-workflow: | |
status: | Fix Committed → Fix Released |
This bug was fixed in the package linux-oracle - 5.4.0-1087.96
---------------
linux-oracle (5.4.0-1087.96) focal; urgency=medium
* focal/linux-oracle: 5.4.0-1087.96 -proposed tracker (LP: #1992054)
[ Ubuntu: 5.4.0-132.148 ]
* CVE-2022-42719 nongw.sh from ubuntu_ kernel_ selftests failed on B-5.4 v2_select_ mitigation( ) and v2_user_ select_ mitigation( ) vmx_check_ vmentry_ hw ctrl_current
- mac80211: mlme: find auth challenge directly
- wifi: mac80211: don't parse mbssid in assoc response
- wifi: mac80211: fix MBSSID parsing use-after-free
* iavf: SR-IOV VFs error with no traffic flow when MTU greater than 1500
(LP: #1983656)
- iavf: Fix set max MTU size with port VLAN and jumbo frames
- i40e: Fix VF set max MTU size
* fib_nexthop_
(LP: #1990800)
- SAUCE: selftests/net: skipping tests for older ip command releases
* CVE-2022-29901
- Revert "x86/speculation: Add RSB VM Exit protections"
- Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
- x86/devicetable: Move x86 specific macro out of generic code
- x86/cpu: Add consistent CPU match macros
- x86/cpu: Add a steppings field to struct x86_cpu_id
- x86/kvm/vmx: Make noinstr clean
- x86/cpufeatures: Move RETPOLINE flags to word 11
- x86/bugs: Report AMD retbleed vulnerability
- x86/bugs: Add AMD retbleed= boot parameter
- x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
- x86/entry: Remove skip_r11rcx
- x86/entry: Add kernel IBRS implementation
- x86/bugs: Optimize SPEC_CTRL MSR writes
- x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
- x86/bugs: Split spectre_
spectre_
- x86/bugs: Report Intel retbleed vulnerability
- intel_idle: Disable IBRS during long idle
- x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
- x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
- x86/speculation: Fix firmware entry SPEC_CTRL handling
- x86/speculation: Fix SPEC_CTRL write on SMT state change
- x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
- x86/speculation: Remove x86_spec_ctrl_mask
- KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S
- KVM/nVMX: Use __vmx_vcpu_run in nested_
- KVM: VMX: Flatten __vmx_vcpu_run()
- KVM: VMX: Convert launched argument to flags
- KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
- KVM: VMX: Fix IBRS handling after vmexit
- x86/speculation: Fill RSB on vmexit for IBRS
- x86/common: Stamp out the stepping madness
- x86/cpu/amd: Enumerate BTC_NO
- x86/bugs: Add Cannon lake to RETBleed affected CPU list
- x86/speculation: Disable RRSBA behavior
- x86/speculation: Use DECLARE_PER_CPU for x86_spec_
- x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
- x86/speculation: Add RSB VM Exit protections
* ACPI: processor idle: Practically limit "Dummy wait" workaround to old Intel
systems (LP: #1990985)
- ACPI: processor_idle: Skip dummy wait if kernel is in guest
- ACPI: processor idle: Practically limit "Dummy wait" workaround to old Intel
systems
* cgroup: all controllers...