This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
bugs-spammed: true
built:
lrg: build#1
lrm: build#1
lrs: build#1
main: build#1
meta: build#1
signed: build#1
delta:
promote-signing-to-proposed:
- meta
- signed
- lrm
- main
- lrs
promote-to-proposed:
- lrm
- main
- lrg
- meta
- signed
- lrs
sru-review:
- main
- meta
- signed
- lrs
- lrm
- lrg
kernel-stable-master-bug: 1930052
packages:
lrg: linux-restricted-generate-hwe-5.8
lrm: linux-restricted-modules-hwe-5.8
lrs: linux-restricted-signatures-hwe-5.8
main: linux-hwe-5.8
meta: linux-meta-hwe-5.8
signed: linux-signed-hwe-5.8
phase: Testing
phase-changed: Wednesday, 09. June 2021 10:34 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
automated-testing: Stalled -- testing FAILED
certification-testing: Ongoing -- testing in progress
regression-testing: Ongoing -- testing in progress
security-signoff: Stalled -- waiting for signoff
synthetic:
:promote-to-as-proposed: Fix Released
variant: debs
versions:
lrm: 5.8.0-56.63~20.04.1
main: 5.8.0-56.63~20.04.1
meta: 5.8.0.56.63~20.04.40
signed: 5.8.0-56.63~20.04.1
source: 5.8.0-56.63~20.04.1
This bug was fixed in the package linux-hwe-5.8 - 5.8.0-59.66~20.04.1
--------------- 59.66~20. 04.1) focal; urgency=medium
linux-hwe-5.8 (5.8.0-
[ Ubuntu: 5.8.0-59.66 ]
* UAF on CAN J1939 j1939_can_recv (LP: #1932209)
- SAUCE: can: j1939: delay release of j1939_priv after synchronize_rcu
* UAF on CAN BCM bcm_rx_handler (LP: #1931855)
- SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu
linux-hwe-5.8 (5.8.0- 57.64~20. 04.1) focal; urgency=medium
* focal/linux- hwe-5.8: 5.8.0-57.64~20.04.1 -proposed tracker (LP: #1932046)
[ Ubuntu: 5.8.0-57.64 ]
* groovy/linux: 5.8.0-57.64 -proposed tracker (LP: #1932047)
* pmtu.sh from selftests.net in linux ADT test failure with linux/5.8.0-56.63
(LP: #1931731)
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb
linux-hwe-5.8 (5.8.0- 56.63~20. 04.1) focal; urgency=medium
* focal/linux- hwe-5.8: 5.8.0-56.63~20.04.1 -proposed tracker (LP: #1930051)
[ Ubuntu: 5.8.0-56.63 ]
* groovy/linux: 5.8.0-56.63 -proposed tracker (LP: #1930052)
* Packaging resync (LP: #1786013)
- update dkms package versions
* scsi: storvsc: Parameterize number hardware queues (LP: #1930626)
- scsi: storvsc: Parameterize number hardware queues
* CVE-2021-33200
- bpf: Wrap aux data inside bpf_sanitize_info container
- bpf: Fix mask direction swap upon off reg sign change
- bpf: No need to simulate speculative domain for immediates
* CVE-2021-3490
- SAUCE: Revert "UBUNTU: SAUCE: bpf: verifier: fix ALU32 bounds tracking with
bitwise ops"
- gpf: Fix alu32 const subreg bound tracking on bitwise operations
* CVE-2021-3489
- SAUCE: Revert "UBUNTU: SAUCE: bpf: prevent writable memory-mapping of read-
only ringbuf pages"
- bpf: Prevent writable memory-mapping of read-only ringbuf pages
* Realtek USB hubs in Dell WD19SC/DC/TB fail to work after exiting s2idle
(LP: #1928242)
- USB: Verify the port status when timeout happens during port suspend
* CVE-2020-26145
- ath10k: drop fragments with multicast DA for SDIO
- ath10k: add CCMP PN replay protection for fragmented frames for PCIe
- ath10k: drop fragments with multicast DA for PCIe
* CVE-2020-26141
- ath10k: Fix TKIP Michael MIC verification for PCIe
* CVE-2020-24587
- ath11k: Clear the fragment cache during key install
* CVE-2020-24588
- mac80211: properly handle A-MSDUs that start with an RFC 1042 header
- cfg80211: mitigate A-MSDU aggregation attacks
- mac80211: drop A-MSDUs on old ciphers
- ath10k: drop MPDU which has discard flag set by firmware for SDIO
* CVE-2020-26139
- mac80211: do not accept/forward invalid EAPOL frames
* CVE-2020-24586 // CVE-2020-24587 // CVE-2020-24587 for such cases.
- mac80211: extend protection against mixed key and fragment cache attacks
* CVE-2020-24586 // CVE-2020-24587
- mac80211: prevent mixed key and fragment cache attacks
- mac80211: add fragment cache to sta_info
- mac80211: check defrag PN against current frame
- mac80211: prevent attacks on TKIP/WEP as well
* CVE-2020-26147
- mac80211: assure all fragments are encrypted
* raid1...