This bug was fixed in the package linux-oem-5.6 - 5.6.0-1048.52

---------------
linux-oem-5.6 (5.6.0-1048.52) focal; urgency=medium

  * focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker (LP: #1913153)

  * Packaging resync (LP: #1786013)
    - update dkms package versions

  * udpgro.sh in net from ubuntu_kernel_selftests seems not reflecting sub-test
    result (LP: #1908499)
    - selftests: fix the return value for UDP GRO test

  * CVE-2020-27815
    - jfs: Fix array index bounds check in dbAdjTree

  * CVE-2020-25704
    - perf/core: Fix a memory leak in perf_event_parse_addr_filter()

  * CVE-2020-25643
    - hdlc_ppp: add range checks in ppp_cp_parse_cr()

  * CVE-2020-25641
    - block: allow for_each_bvec to support zero len bvec

  * CVE-2020-25284
    - rbd: require global CAP_SYS_ADMIN for mapping and unmapping

  * CVE-2020-25212
    - nfs: Fix getxattr kernel panic and memory overflow

  * CVE-2020-28588
    - lib/syscall: fix syscall registers retrieval on 32-bit platforms

  * CVE-2020-29371
    - romfs: fix uninitialized memory leak in romfs_dev_read()

  * CVE-2020-29369
    - mm/mmap.c: close race between munmap() and expand_upwards()/downwards()

  * CVE-2020-29368
    - mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()

  * CVE-2020-29660
    - tty: Fix ->session locking

  * CVE-2020-29661
    - tty: Fix ->pgrp locking in tiocspgrp()

  * CVE-2020-35508
    - fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent

  * CVE-2020-24490
    - Bluetooth: fix kernel oops in store_pending_adv_report

  * CVE-2020-14314
    - ext4: fix potential negative array index in do_split()

  * CVE-2020-10135
    - Bluetooth: Consolidate encryption handling in hci_encrypt_cfm
    - Bluetooth: Disconnect if E0 is used for Level 4

  * CVE-2020-27152
    - KVM: ioapic: break infinite recursion on lazy EOI

  * CVE-2020-28915
    - fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h
    - Fonts: Support FONT_EXTRA_WORDS macros for built-in fonts

  * CVE-2020-15437
    - serial: 8250: fix null-ptr-deref in serial8250_start_tx()

  * CVE-2020-15436
    - block: Fix use-after-free in blkdev_get()

  * switch to an autogenerated nvidia series based core via dkms-versions
    (LP: #1912803)
    - [Config] dkms-versions -- add transitional/skip information for nvidia
      packages
    - [Packaging] nvidia -- use dkms-versions to define versions built
    - [Packaging] update-version-dkms -- maintain flags fields

  * S3 stress test fails with amdgpu errors (LP: #1909453)
    - drm/amdgpu: asd function needs to be unloaded in suspend phase
    - drm/amdgpu: add TMR destory function for psp

 -- Timo Aaltonen <[email protected]>  Thu, 18 Feb 2021
13:11:14 +0200

** Changed in: linux-oem-5.6 (Ubuntu Focal)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-10135

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14314

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-15436

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-15437

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-24490

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25212

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25284

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25641

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25643

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25704

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27152

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27815

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28588

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28915

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-29368

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-29369

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-29371

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-29660

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-29661

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-35508

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1909453

Title:
  S3 stress test fails with amdgpu errors

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1909453/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to