This bug was fixed in the package linux-azure - 4.18.0-1023.24~18.04.1 --------------- linux-azure (4.18.0-1023.24~18.04.1) bionic; urgency=medium
* linux-azure: 4.18.0-1023.24~18.04.1 -proposed tracker (LP: #1833945) [ Ubuntu: 4.18.0-1023.24 ] * linux-azure: 4.18.0-1023.24 -proposed tracker (LP: #1833946) * [linux-azure] XDP generic fixes (LP: #1831254) - netvsc: unshare skb in VF rx handler - net: convert rps_needed and rfs_needed to new static - net: core: support XDP generic on stacked devices. * Enable eBPF JIT in the linux-azure kernels (LP: #1827916) - [Config] linux-azure: CONFIG_MLX{4,5}_INFINIBAND=m * Azure: Backport vIOMMU driver (increase vCPU limits) (LP: #1826447) - PCI: hv: Replace hv_vp_set with hv_vpset - PCI: hv: Refactor hv_irq_unmask() to use cpumask_to_vpset() - x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available - iommu/hyper-v: Add Hyper-V stub IOMMU driver - [Config] linux-azure: CONFIG_HYPERV_IOMMU=y * [linux-azure] Please Include Mainline Commit ebaf39e6032f in the 16.04 and 18.04 linux-azure kernels (LP: #1830266) - ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes * [Packaging] Improve config annotations check on custom kernels (LP: #1820075) - [Config] linux-azure: Include custom annotations files * linux: 4.18.0-25.26 -proposed tracker (LP: #1833952) * CVE-2019-11479 - SAUCE: tcp: add tcp_min_snd_mss sysctl - SAUCE: tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() * Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard manipulation (LP: #1831638) // CVE-2019-11478 - tcp: refine memory limit test in tcp_fragment() * CVE-2019-12817 - SAUCE: powerpc/mm/64s/hash: Reallocate context ids on fork -- Marcelo Henrique Cerri <marcelo.ce...@canonical.com> Tue, 25 Jun 2019 11:42:46 -0300 ** Changed in: linux-azure (Ubuntu Bionic) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11478 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11479 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-12817 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-azure in Ubuntu. https://bugs.launchpad.net/bugs/1833945 Title: linux-azure: 4.18.0-1023.24~18.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow stakeholder-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-azure package in Ubuntu: Invalid Status in linux-azure source package in Bionic: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow derivatives: bug 1833941 (azure-kernel), bug 1833943 (linux-azure- edge) -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1833946 phase: Release phase-changed: Wednesday, 26. June 2019 20:52 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-updates: Ongoing -- packages not yet published variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1833945/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp