This bug was fixed in the package linux-bluefield - 5.4.0-1097.104 --------------- linux-bluefield (5.4.0-1097.104) focal; urgency=medium
* focal/linux-bluefield: 5.4.0-1097.104 -proposed tracker (LP: #2090042) * BF2: Add support for eMMC HW reset (LP: #2089455) - mmc: dw_mmc: Add support for platform specific eMMC HW reset - mmc: dw_mmc-bluefield: Add support for eMMC HW reset [ Ubuntu: 5.4.0-204.224 ] * focal/linux: 5.4.0-204.224 -proposed tracker (LP: #2091090) * CVE-2024-50264 - vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans * CVE-2024-53057 - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT * CVE-2024-49967 - ext4: no need to continue when the number of entries is 1 * CVE-2024-43892 - memcg: protect concurrent access to mem_cgroup_idr * CVE-2024-38553 - net: fec: remove .ndo_poll_controller to avoid deadlocks * CVE-2024-38597 - eth: sungem: remove .ndo_poll_controller to avoid deadlocks * CVE-2023-52821 - drm/panel: fix a possible null pointer dereference * CVE-2024-36952 - scsi: lpfc: Move NPIV's transport unregistration to after resource clean up * CVE-2024-40910 - ax25: Fix refcount imbalance on inbound connections * CVE-2024-35963 - Bluetooth: hci_sock: Fix not validating setsockopt user input * CVE-2024-35965 - Bluetooth: L2CAP: uninitialized variables in l2cap_sock_setsockopt() - Bluetooth: L2CAP: Fix not validating setsockopt user input * CVE-2024-35966 - Bluetooth: RFCOMM: Fix not validating setsockopt user input * CVE-2024-35967 - Bluetooth: SCO: Fix not validating setsockopt user input * CVE-2021-47101 - net: asix: fix uninit value bugs - asix: fix wrong return value in asix_check_host_enable() - asix: fix uninit-value in asix_mdio_read() * CVE-2022-38096 - drm/vmwgfx: Fix possible null pointer derefence with invalid contexts * CVE-2021-47001 - xprtrdma: Fix cwnd update ordering -- Bartlomiej Zolnierkiewicz <bartlomiej.zolnierkiew...@canonical.com> Mon, 09 Dec 2024 17:49:11 +0100 ** Changed in: linux-bluefield (Ubuntu Focal) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-47001 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-47101 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-38096 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-52821 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35963 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35965 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35966 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35967 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-36952 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38553 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38597 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-40910 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-43892 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-49967 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50264 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53057 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2089455 Title: BF2: Add support for eMMC HW reset Status in linux-bluefield package in Ubuntu: New Status in linux-bluefield source package in Focal: Fix Released Bug description: This is a cherry-pick of https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2072675 from jammy to focal. SRU Justification: [Impact] This is a cherry-pick fix from upstream to Add support for BF2 eMMC HW reset [Fix] BLueField eMMC RST_N register is implemented as secure, thus the default hw_reset() implementation won't work. This patch provides BlueField specific hw_reset() which send SMC call to ATF to update the same RST_N register. [Test Case] Same functionality and testing as on BlueField-1/2. [Regression Potential] Same behavior from user perspective. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2089455/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp