canonical-hw-cert team mailing list archive
-
canonical-hw-cert team
-
Mailing list archive
-
Message #18440
[Bug 1983925] Re: bionic/linux-gcp-5.4: 5.4.0-1087.95~18.04.1 -proposed tracker
This bug was fixed in the package linux-gcp-5.4 - 5.4.0-1087.95~18.04.1
---------------
linux-gcp-5.4 (5.4.0-1087.95~18.04.1) bionic; urgency=medium
* bionic/linux-gcp-5.4: 5.4.0-1087.95~18.04.1 -proposed tracker (LP:
#1983925)
[ Ubuntu: 5.4.0-1087.95 ]
* focal/linux-gcp: 5.4.0-1087.95 -proposed tracker (LP: #1983926)
* Backport patches needed to allow live migration under SEV (LP: #1984034)
- KVM: X86: Introduce KVM_HC_MAP_GPA_RANGE hypercall
- x86/kvm: Add AMD SEV specific Hypercall3
- mm: x86: Invoke hypercall when page encryption status is changed
- EFI: Introduce the new AMD Memory Encryption GUID.
- x86/kvm: Add guest support for detecting and enabling SEV Live Migration
feature.
- x86/kvm: Add kexec support for SEV Live Migration.
* focal/linux: 5.4.0-125.141 -proposed tracker (LP: #1983947)
* nbd: requests can become stuck when disconnecting from server with qemu-nbd
(LP: #1896350)
- blk-mq: blk-mq: provide forced completion method
- blk-mq: move failure injection out of blk_mq_complete_request
- nbd: don't handle response without a corresponding request message
- nbd: make sure request completion won't concurrent
- nbd: don't clear 'NBD_CMD_INFLIGHT' flag if request is not completed
- nbd: fix io hung while disconnecting device
* CVE-2021-33656
- vt: drop old FONT ioctls
* CVE-2021-33061
- ixgbe: add the ability for the PF to disable VF link state
- ixgbe: add improvement for MDD response functionality
- ixgbevf: add disable link state
-- Khalid Elmously <khalid.elmously@xxxxxxxxxxxxx> Fri, 19 Aug 2022
02:15:33 -0400
** Changed in: linux-gcp-5.4 (Ubuntu Bionic)
Status: Confirmed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-33061
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-33656
--
You received this bug notification because you are a member of hardware-
certification-users, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1983925
Title:
bionic/linux-gcp-5.4: 5.4.0-1087.95~18.04.1 -proposed tracker
Status in Kernel SRU Workflow:
In Progress
Status in Kernel SRU Workflow automated-testing series:
Fix Released
Status in Kernel SRU Workflow boot-testing series:
Fix Released
Status in Kernel SRU Workflow certification-testing series:
Invalid
Status in Kernel SRU Workflow new-review series:
Fix Released
Status in Kernel SRU Workflow prepare-package series:
Fix Released
Status in Kernel SRU Workflow prepare-package-lrg series:
Fix Released
Status in Kernel SRU Workflow prepare-package-lrm series:
Fix Released
Status in Kernel SRU Workflow prepare-package-lrs series:
Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
Fix Released
Status in Kernel SRU Workflow promote-to-security series:
New
Status in Kernel SRU Workflow promote-to-updates series:
In Progress
Status in Kernel SRU Workflow regression-testing series:
Fix Released
Status in Kernel SRU Workflow security-signoff series:
Fix Released
Status in Kernel SRU Workflow sru-review series:
Fix Released
Status in Kernel SRU Workflow verification-testing series:
Fix Released
Status in linux-gcp-5.4 source package in Bionic:
Fix Released
Bug description:
This bug will contain status and test results related to a kernel
source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
bugs-spammed: true
built:
from: 96f3ca2491d7bad5
route-entry: 1
delta:
promote-to-proposed: [lrs, main, meta, lrm, signed, lrg]
promote-to-updates: [meta, signed, lrm, main, lrs]
flag:
boot-testing-requested: true
bugs-spammed: true
proposed-announcement-sent: true
proposed-testing-requested: true
issue: KSRU-4651
kernel-stable-master-bug: 1983926
packages:
lrg: linux-restricted-generate-gcp-5.4
lrm: linux-restricted-modules-gcp-5.4
lrs: linux-restricted-signatures-gcp-5.4
main: linux-gcp-5.4
meta: linux-meta-gcp-5.4
signed: linux-signed-gcp-5.4
phase: Promote to Updates
phase-changed: Wednesday, 31. August 2022 08:12 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
promote-to-updates: Ongoing -- packages not yet published
synthetic:
:promote-to-as-proposed: Fix Released
trackers:
bionic/linux-gcp-5.4/gcp-kernel: bug 1983924
variant: debs
versions:
lrm: 5.4.0-1087.95~18.04.1
main: 5.4.0-1087.95~18.04.1
meta: 5.4.0.1087.66
signed: 5.4.0-1087.95~18.04.1
~~:
clamps:
new-review: 96f3ca2491d7bad5
promote-to-proposed: 96f3ca2491d7bad5
self: 5.4.0-1087.95~18.04.1
sru-review: 96f3ca2491d7bad5
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1983925/+subscriptions