group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #37829
[Bug 1907338] Re: xenial/linux-azure: 4.15.0-1102.113~16.04.1 -proposed tracker
This bug was fixed in the package linux-azure - 4.15.0-1102.113~16.04.1
---------------
linux-azure (4.15.0-1102.113~16.04.1) xenial; urgency=medium
* xenial/linux-azure: 4.15.0-1102.113~16.04.1 -proposed tracker (LP:
#1907338)
[ Ubuntu: 4.15.0-1102.113 ]
* bionic/linux-azure-4.15: 4.15.0-1102.113 -proposed tracker (LP: #1907340)
* bionic/linux: 4.15.0-128.131 -proposed tracker (LP: #1907354)
* Packaging resync (LP: #1786013)
- update dkms package versions
* raid10: discard leads to corrupted file system (LP: #1907262)
- Revert "md/raid10: improve discard request for far layout"
- Revert "md/raid10: improve raid10 discard request"
- Revert "md/raid10: pull codes that wait for blocked dev into one function"
- Revert "md/raid10: extend r10bio devs to raid disks"
- Revert "md: add md_submit_discard_bio() for submitting discard bio"
* bionic/linux: 4.15.0-126.129 -proposed tracker (LP: #1905305)
* CVE-2020-4788
- SAUCE: powerpc/64s: Define MASKABLE_RELON_EXCEPTION_PSERIES_OOL
- SAUCE: powerpc/64s: move some exception handlers out of line
- powerpc/64s: flush L1D on kernel entry
- SAUCE: powerpc: Add a framework for user access tracking
- powerpc: Implement user_access_begin and friends
- powerpc: Fix __clear_user() with KUAP enabled
- powerpc/uaccess: Evaluate macro arguments once, before user access is
allowed
- powerpc/64s: flush L1D after user accesses
-- Marcelo Henrique Cerri <marcelo.cerri@xxxxxxxxxxxxx> Wed, 09 Dec
2020 17:05:06 -0300
** Changed in: linux-azure (Ubuntu Xenial)
Status: Confirmed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-4788
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1907338
Title:
xenial/linux-azure: 4.15.0-1102.113~16.04.1 -proposed tracker
Status in Kernel SRU Workflow:
In Progress
Status in Kernel SRU Workflow automated-testing series:
Fix Released
Status in Kernel SRU Workflow certification-testing series:
Invalid
Status in Kernel SRU Workflow prepare-package series:
Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
Fix Released
Status in Kernel SRU Workflow promote-to-security series:
New
Status in Kernel SRU Workflow promote-to-updates series:
In Progress
Status in Kernel SRU Workflow regression-testing series:
Fix Released
Status in Kernel SRU Workflow security-signoff series:
Fix Released
Status in Kernel SRU Workflow stakeholder-signoff series:
Invalid
Status in Kernel SRU Workflow verification-testing series:
Fix Released
Status in linux-azure source package in Xenial:
Fix Released
Bug description:
This bug will contain status and test results related to a kernel
source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1907340
packages:
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
phase: Promote to Updates
phase-changed: Friday, 11. December 2020 22:29 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
promote-to-updates: Ongoing -- packages not yet published
synthetic:
:promote-to-as-proposed: Fix Released
trackers:
xenial/linux-azure/azure-kernel: bug 1907337
variant: debs
versions:
main: 4.15.0-1102.113~16.04.1
meta: 4.15.0.1102.95
signed: 4.15.0-1102.113~16.04.1
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1907338/+subscriptions