← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1907343] Re: xenial/linux-gcp: 4.15.0-1090.103~16.04.1 -proposed tracker

 

This bug was fixed in the package linux-gcp - 4.15.0-1090.103~16.04.1

---------------
linux-gcp (4.15.0-1090.103~16.04.1) xenial; urgency=medium

  * xenial/linux-gcp: 4.15.0-1090.103~16.04.1 -proposed tracker (LP:
#1907343)

  [ Ubuntu: 4.15.0-1090.103 ]

  * bionic/linux-gcp-4.15: 4.15.0-1090.103 -proposed tracker (LP: #1907344)
  * bionic/linux: 4.15.0-128.131 -proposed tracker (LP: #1907354)
  * Packaging resync (LP: #1786013)
    - update dkms package versions
  * raid10: discard leads to corrupted file system (LP: #1907262)
    - Revert "md/raid10: improve discard request for far layout"
    - Revert "md/raid10: improve raid10 discard request"
    - Revert "md/raid10: pull codes that wait for blocked dev into one function"
    - Revert "md/raid10: extend r10bio devs to raid disks"
    - Revert "md: add md_submit_discard_bio() for submitting discard bio"
  * bionic/linux: 4.15.0-126.129 -proposed tracker (LP: #1905305)
  * CVE-2020-4788
    - SAUCE: powerpc/64s: Define MASKABLE_RELON_EXCEPTION_PSERIES_OOL
    - SAUCE: powerpc/64s: move some exception handlers out of line
    - powerpc/64s: flush L1D on kernel entry
    - SAUCE: powerpc: Add a framework for user access tracking
    - powerpc: Implement user_access_begin and friends
    - powerpc: Fix __clear_user() with KUAP enabled
    - powerpc/uaccess: Evaluate macro arguments once, before user access is
      allowed
    - powerpc/64s: flush L1D after user accesses

 -- Kelsey Skunberg <kelsey.skunberg@xxxxxxxxxxxxx>  Wed, 09 Dec 2020
15:53:53 -0700

** Changed in: linux-gcp (Ubuntu Xenial)
       Status: Confirmed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-4788

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1907343

Title:
  xenial/linux-gcp: 4.15.0-1090.103~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-gcp source package in Xenial:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
    https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1907344
  packages:
    main: linux-gcp
    meta: linux-meta-gcp
    signed: linux-signed-gcp
  phase: Promote to Updates
  phase-changed: Friday, 11. December 2020 22:30 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
    promote-to-updates: Ongoing -- packages not yet published
  synthetic:
    :promote-to-as-proposed: Fix Released
  trackers:
    xenial/linux-gcp/gcp-kernel: bug 1907341
    xenial/linux-gcp/gke-kernel: bug 1907342
  variant: debs
  versions:
    main: 4.15.0-1090.103~16.04.1
    meta: 4.15.0.1090.91
    signed: 4.15.0-1090.103~16.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1907343/+subscriptions