canonical-hw-cert team mailing list archive
-
canonical-hw-cert team
-
Mailing list archive
-
Message #04167
[Bug 1978639] Re: focal/linux-bluefield: 5.4.0-1040.44 -proposed tracker
This bug was fixed in the package linux-bluefield - 5.4.0-1040.44
---------------
linux-bluefield (5.4.0-1040.44) focal; urgency=medium
* focal/linux-bluefield: 5.4.0-1040.44 -proposed tracker (LP:
#1978639)
* fix ref leak when switching zones (LP: #1979009)
- net/sched: act_ct: fix ref leak when switching zones
* Fix XFRM flags validity check (LP: #1978967)
- SAUCE: net/xfrm: Fix XFRM flags validity check
[ Ubuntu: 5.4.0-121.137 ]
* focal/linux: 5.4.0-121.137 -proposed tracker (LP: #1978666)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (main/2022.05.30)
* CVE-2022-28388
- can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error
path
* test_vxlan_under_vrf.sh in net from ubuntu_kernel_selftests failed (Check VM
connectivity through VXLAN (underlay in the default VRF) [FAIL])
(LP: #1871015)
- selftests: net: test_vxlan_under_vrf: fix HV connectivity test
* [UBUNTU 20.04] CPU-MF: add extended counter set definitions for new IBM z16
(LP: #1974433)
- s390/cpumf: add new extended counter set for IBM z16
* [UBUNTU 20.04] KVM nesting support leaks too much memory, might result in
stalls during cleanup (LP: #1974017)
- KVM: s390: vsie/gmap: reduce gmap_rmap overhead
* [UBUNTU 20.04] Null Pointer issue in nfs code running Ubuntu on IBM Z
(LP: #1968096)
- NFS: Fix up nfs_ctx_key_to_expire()
[ Ubuntu: 5.4.0-120.136 ]
* CVE-2022-21123 // CVE-2022-21125 // CVE-2022-21166
- cpu/speculation: Add prototype for cpu_show_srbds()
- x86/cpu: Add Jasper Lake to Intel family
- x86/cpu: Add Lakefield, Alder Lake and Rocket Lake models to the to Intel
CPU family
- x86/cpu: Add another Alder Lake CPU to the Intel family
- Documentation: Add documentation for Processor MMIO Stale Data
- x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug
- x86/speculation: Add a common function for MD_CLEAR mitigation update
- x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations
- x86/speculation/mmio: Enable CPU Fill buffer clearing on idle
- x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data
- x86/speculation/srbds: Update SRBDS mitigation selection
- x86/speculation/mmio: Reuse SRBDS mitigation for SBDS
- KVM: x86/speculation: Disable Fill buffer clear within guests
- x86/speculation/mmio: Print SMT warning
-- Zachary Tahenakos <zachary.tahenakos@xxxxxxxxxxxxx> Tue, 21 Jun
2022 13:59:23 -0400
** Changed in: linux-bluefield (Ubuntu Focal)
Status: Confirmed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-21123
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-21125
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-21166
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28388
--
You received this bug notification because you are a member of Canonical
Hardware Certification, which is a bug assignee.
https://bugs.launchpad.net/bugs/1978639
Title:
focal/linux-bluefield: 5.4.0-1040.44 -proposed tracker
Status in Kernel SRU Workflow:
In Progress
Status in Kernel SRU Workflow automated-testing series:
Invalid
Status in Kernel SRU Workflow boot-testing series:
Invalid
Status in Kernel SRU Workflow certification-testing series:
Fix Released
Status in Kernel SRU Workflow new-review series:
Fix Released
Status in Kernel SRU Workflow prepare-package series:
Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
Fix Released
Status in Kernel SRU Workflow promote-to-security series:
New
Status in Kernel SRU Workflow promote-to-updates series:
In Progress
Status in Kernel SRU Workflow regression-testing series:
Invalid
Status in Kernel SRU Workflow security-signoff series:
Fix Released
Status in Kernel SRU Workflow sru-review series:
Fix Released
Status in Kernel SRU Workflow stakeholder-signoff series:
Fix Released
Status in Kernel SRU Workflow verification-testing series:
In Progress
Status in linux-bluefield source package in Focal:
Fix Released
Bug description:
This bug will contain status and test results related to a kernel
source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
bugs-spammed: true
built:
from: ae9407b751505271
route-entry: 1
delta:
promote-to-proposed: [meta, main, signed]
promote-to-updates: [main, signed, meta]
issue: KSRU-2642
kernel-stable-master-bug: 1978666
packages:
main: linux-bluefield
meta: linux-meta-bluefield
signed: linux-signed-bluefield
phase: Testing
phase-changed: Monday, 11. July 2022 16:28 UTC
proposed-announcement-sent: true
reason:
promote-to-updates: Ongoing -- packages not yet published
verification-testing: Ongoing -s testing in progress
synthetic:
:promote-to-as-proposed: Fix Released
variant: debs
versions:
main: 5.4.0-1040.44
meta: 5.4.0.1040.40
signed: 5.4.0-1040.44
~~:
clamps:
new-review: ae9407b751505271
promote-to-proposed: ae9407b751505271
self: 5.4.0-1040.44
sru-review: ae9407b751505271
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1978639/+subscriptions