groovy/linux-riscv: 5.8.0-27.29 -proposed tracker
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | |||
Automated-testing |
Invalid
|
Medium
|
Unassigned | |||
Certification-testing |
Invalid
|
Medium
|
Unassigned | |||
Prepare-package |
Fix Released
|
Medium
|
Kelsey Steele | |||
Prepare-package-meta |
Fix Released
|
Medium
|
Kelsey Steele | |||
Promote-to-proposed |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Promote-to-security |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Promote-to-updates |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Regression-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
Security-signoff |
Fix Released
|
Medium
|
Steve Beattie | |||
Sru-review |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Verification-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
linux-riscv (Ubuntu) | ||||||
Groovy |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
built:
main: build#1
meta: build#1
delta:
promote-
- main
- meta
sru-review:
- main
- meta
kernel-
packages:
main: linux-riscv
meta: linux-meta-riscv
phase: Holding before Promote to Updates
phase-changed: Monday, 21. June 2021 06:04 UTC
proposed-
proposed-
reason:
promote-
synthetic:
:promote-
trackers:
focal/
variant: debs
versions:
main: 5.8.0-27.29
meta: 5.8.0.27.28
source: 5.8.0-27.29
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2021.05.31-1 |
description: | updated |
tags: | added: kernel-sru-derivative-of-1930052 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-riscv (Ubuntu Groovy): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → In Progress |
description: | updated |
description: | updated |
summary: |
- groovy/linux-riscv: <version to be filled> -proposed tracker + groovy/linux-riscv: 5.8.0-27.29 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
This bug was fixed in the package linux-riscv - 5.8.0-29.31
---------------
linux-riscv (5.8.0-29.31) groovy; urgency=medium
[ Ubuntu: 5.8.0-59.66 ]
* UAF on CAN J1939 j1939_can_recv (LP: #1932209)
- SAUCE: can: j1939: delay release of j1939_priv after synchronize_rcu
* UAF on CAN BCM bcm_rx_handler (LP: #1931855)
- SAUCE: can: bcm: delay release of struct bcm_op after synchronize_rcu
[ Ubuntu: 5.8.0-57.64 ]
* groovy/linux: 5.8.0-57.64 -proposed tracker (LP: #1932047)
* pmtu.sh from selftests.net in linux ADT test failure with linux/5.8.0-56.63
(LP: #1931731)
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb
linux-riscv (5.8.0-27.29) groovy; urgency=medium
* groovy/linux-riscv: 5.8.0-27.29 -proposed tracker (LP: #1930050)
[ Ubuntu: 5.8.0-56.63 ]
* groovy/linux: 5.8.0-56.63 -proposed tracker (LP: #1930052) discard_ bio() for submitting discard bio
* Packaging resync (LP: #1786013)
- update dkms package versions
* scsi: storvsc: Parameterize number hardware queues (LP: #1930626)
- scsi: storvsc: Parameterize number hardware queues
* CVE-2021-33200
- bpf: Wrap aux data inside bpf_sanitize_info container
- bpf: Fix mask direction swap upon off reg sign change
- bpf: No need to simulate speculative domain for immediates
* CVE-2021-3490
- SAUCE: Revert "UBUNTU: SAUCE: bpf: verifier: fix ALU32 bounds tracking with
bitwise ops"
- gpf: Fix alu32 const subreg bound tracking on bitwise operations
* CVE-2021-3489
- SAUCE: Revert "UBUNTU: SAUCE: bpf: prevent writable memory-mapping of read-
only ringbuf pages"
- bpf: Prevent writable memory-mapping of read-only ringbuf pages
* Realtek USB hubs in Dell WD19SC/DC/TB fail to work after exiting s2idle
(LP: #1928242)
- USB: Verify the port status when timeout happens during port suspend
* CVE-2020-26145
- ath10k: drop fragments with multicast DA for SDIO
- ath10k: add CCMP PN replay protection for fragmented frames for PCIe
- ath10k: drop fragments with multicast DA for PCIe
* CVE-2020-26141
- ath10k: Fix TKIP Michael MIC verification for PCIe
* CVE-2020-24587
- ath11k: Clear the fragment cache during key install
* CVE-2020-24588
- mac80211: properly handle A-MSDUs that start with an RFC 1042 header
- cfg80211: mitigate A-MSDU aggregation attacks
- mac80211: drop A-MSDUs on old ciphers
- ath10k: drop MPDU which has discard flag set by firmware for SDIO
* CVE-2020-26139
- mac80211: do not accept/forward invalid EAPOL frames
* CVE-2020-24586 // CVE-2020-24587 // CVE-2020-24587 for such cases.
- mac80211: extend protection against mixed key and fragment cache attacks
* CVE-2020-24586 // CVE-2020-24587
- mac80211: prevent mixed key and fragment cache attacks
- mac80211: add fragment cache to sta_info
- mac80211: check defrag PN against current frame
- mac80211: prevent attacks on TKIP/WEP as well
* CVE-2020-26147
- mac80211: assure all fragments are encrypted
* raid10: Block discard is very slow, causing severe delays for mkfs and
fstrim operations (LP: #1896578)
- md: add md_submit_
- m...