*** This bug is a duplicate of bug 2012093 *** https://bugs.launchpad.net/bugs/2012093
This bug was fixed in the package linux-hwe-5.4 - 5.4.0-146.163~18.04.1 --------------- linux-hwe-5.4 (5.4.0-146.163~18.04.1) bionic; urgency=medium * bionic/linux-hwe-5.4: 5.4.0-146.163~18.04.1 -proposed tracker (LP: #2012093) [ Ubuntu: 5.4.0-146.163 ] * focal/linux: 5.4.0-146.163 -proposed tracker (LP: #2012094) * NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74 (LP: #2009325) - NFS: Correct timing for assigning access cache timestamp linux-hwe-5.4 (5.4.0-145.162~18.04.1) bionic; urgency=medium * bionic/linux-hwe-5.4: 5.4.0-145.162~18.04.1 -proposed tracker (LP: #2008388) * Some derivative kernel tools packages don't depend on linux-tools-common (LP: #1914774) - [Packaging] hwe-5.4: linux-tools-common and linux-cloud-tools-common are one per series [ Ubuntu: 5.4.0-145.162 ] * focal/linux: 5.4.0-145.162 -proposed tracker (LP: #2008389) * [SRU]Update ice driver to support E823 devices (LP: #1986717) - ice: Add device ids for E822 devices - ice: add support for E823 devices * btrfs/154: rename fails with EOVERFLOW when calculating item size during item key collision (LP: #2004132) - btrfs: correctly calculate item size used when item key collision happens * rtcpie in timers from ubuntu_kernel_selftests randomly failing (LP: #1814234) - SAUCE: selftest: rtcpie: Force passing unreliable subtest * [UBUNTU 20.04] KVM: s390: pv: don't allow userspace to set the clock under PV - kernel part (LP: #1999882) - KVM: s390x: fix SCK locking - KVM: s390: pv: don't allow userspace to set the clock under PV * CVE-2021-3669 - ipc: replace costly bailout check in sysvipc_find_ipc() * net:fcnal-test.sh 'nettest' command not found on F/K (LP: #2006391) - selftests/net: Find nettest in current directory * xfs: Preallocated ioend transactions cause deadlock due to log buffer exhaustion (LP: #2007219) - xfs: drop submit side trans alloc for append ioends * CVE-2022-4382 - USB: gadgetfs: Fix race between mounting and unmounting * CVE-2022-2196 - KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS * ubuntu_kernel_selftests: net:udpgso_bench.sh failed (LP: #1951447) - selftests: net: udpgso_bench: Fix racing bug between the rx/tx programs * net:fcnal-test.sh didn't return a non-zero value even with some sub-tests failed (LP: #2006692) - selftests: net/fcnal-test.sh: add exit code * Fix selftests/ftracetests/Meta-selftests in Focal (LP: #2006453) - SAUCE: Fix ftrace/Meta-selftests bashism check * CVE-2023-23559 - wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid -- Luke Nowakowski-Krijger <luke.nowakowskikrij...@canonical.com> Fri, 17 Mar 2023 14:52:53 -0700 ** Changed in: linux-hwe-5.4 (Ubuntu Bionic) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3669 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-2196 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-4382 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-23559 -- You received this bug notification because you are a member of Canonical Hardware Certification, which is a bug assignee. https://bugs.launchpad.net/bugs/2008388 Title: bionic/linux-hwe-5.4: 5.4.0-145.162~18.04.1 -proposed tracker Status in canonical-signing-jobs task00 series: Fix Released Status in Kernel SRU Workflow: Fix Committed Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow boot-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow new-review series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-generate series: Fix Released Status in Kernel SRU Workflow prepare-package-lrg series: Fix Released Status in Kernel SRU Workflow prepare-package-lrm series: Fix Released Status in Kernel SRU Workflow prepare-package-lrs series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Incomplete Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow sru-review series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-hwe-5.4 source package in Bionic: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- built: from: 83760ad2ce7be82b route-entry: 1 delta: promote-to-proposed: [signed, lrm, lrs, main, meta, generate, lrg] flag: boot-testing-requested: true bugs-spammed: true proposed-announcement-sent: true proposed-testing-requested: true stream-from-cycle: true issue: KSRU-6697 kernel-stable-master-bug: 2012094 packages: generate: linux-generate-hwe-5.4 lrg: linux-restricted-generate-hwe-5.4 lrm: linux-restricted-modules-hwe-5.4 lrs: linux-restricted-signatures-hwe-5.4 main: linux-hwe-5.4 meta: linux-meta-hwe-5.4 signed: linux-signed-hwe-5.4 phase: Testing phase-changed: Saturday, 11. March 2023 00:03 UTC reason: automated-testing: Stalled -s testing FAILED regression-testing: Stalled -s testing FAILED verification-testing: Ongoing -s testing in progress synthetic: :promote-to-as-proposed: Fix Released trackers: bionic/linux-ibm-gt-5.4: bug 2008387 variant: debs versions: lrm: 5.4.0-145.162~18.04.1 main: 5.4.0-145.162~18.04.1 meta: 5.4.0.145.162~18.04.116 signed: 5.4.0-145.162~18.04.1 ~~: clamps: new-review: 83760ad2ce7be82b promote-to-proposed: 83760ad2ce7be82b self: 5.4.0-145.162~18.04.1 sru-review: 83760ad2ce7be82b To manage notifications about this bug go to: https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2008388/+subscriptions -- Mailing list: https://launchpad.net/~canonical-hw-cert Post to : canonical-hw-cert@lists.launchpad.net Unsubscribe : https://launchpad.net/~canonical-hw-cert More help : https://help.launchpad.net/ListHelp