bionic/linux-azure-4.15: 4.15.0-1163.178 -proposed tracker
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
built:
from: 9c79f7b23398435d
route-entry: 1
delta:
promote-
flag:
boot-
bugs-spammed: true
proposed-
proposed-
issue: KSRU-6896
kernel-
packages:
generate: linux-generate-
lrg: linux-restricte
lrm: linux-restricte
lrs: linux-restricte
main: linux-azure-4.15
meta: linux-meta-
signed: linux-signed-
phase: Testing
phase-changed: Thursday, 30. March 2023 16:43 UTC
reason:
automated-
synthetic:
:promote-
trackers:
bionic/
trusty/
xenial/
variant: debs
versions:
lrm: 4.15.0-1163.178
main: 4.15.0-1163.178
meta: 4.15.0.1163.131
signed: 4.15.0-1163.178
~~:
clamps:
new-review: 9c79f7b23398435d
promote-
self: 4.15.0-1163.178
sru-review: 9c79f7b23398435d
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2023.03.20-1 |
description: | updated |
tags: | added: kernel-sru-derivative-of-2011989 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-azure-4.15 (Ubuntu Bionic): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → Triaged |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Triaged → In Progress |
description: | updated |
tags: | added: kernel-jira-issue-ksru-6896 |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
summary: |
- bionic/linux-azure-4.15: <version to be filled> -proposed tracker + bionic/linux-azure-4.15: 4.15.0-1163.178 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: kernel-signing-bot |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Committed |
Changed in kernel-sru-workflow: | |
status: | Fix Committed → Fix Released |
This bug was fixed in the package linux-azure-4.15 - 4.15.0-1163.178
---------------
linux-azure-4.15 (4.15.0-1163.178) bionic; urgency=medium
* bionic/ linux-azure- 4.15: 4.15.0-1163.178 -proposed tracker (LP: #2011971)
[ Ubuntu: 4.15.0-209.220 ]
* bionic/linux: 4.15.0-209.220 -proposed tracker (LP: #2011989) protected( ) to rcu_replace_ pointer( ) msg_send( ) and usb_control_ msg_recv( ) msg_send/ recv pipe_sanity_ check into the USB core insert( ) ID_CODEMERCS_ IOW100 unprepare( ) in usb2phy_ power_on( ) values( ) queue_wai. ..
* CVE-2023-26545
- net: mpls: fix stale pointer if allocation fails during device rename
* CVE-2023-1281
- rcu: Upgrade rcu_swap_
- net/sched: tcindex: update imperfect hash filters respecting rcu
* CVE-2022-3903
- USB: add usb_control_
- USB: correct API of usb_control_
- USB: move snd_usb_
- media: mceusb: Use new usb_control_msg_*() routines
* Bionic update: upstream stable patchset 2023-03-03 (LP: #2009237)
- pNFS/filelayout: Fix coalescing test for single DS
- net/ethtool/ioctl: return -EOPNOTSUPP if we have no phy stats
- RDMA/srp: Move large values to a new enum for gcc13
- f2fs: let's avoid panic if extent_tree is not created
- nilfs2: fix general protection fault in nilfs_btree_
- xhci-pci: set the dma max_seg_size
- usb: xhci: Check endpoint is valid before dereferencing it
- prlimit: do_prlimit needs to have a speculation check
- USB: serial: option: add Quectel EM05-G (GR) modem
- USB: serial: option: add Quectel EM05-G (CS) modem
- USB: serial: option: add Quectel EM05-G (RS) modem
- USB: serial: option: add Quectel EC200U modem
- USB: serial: option: add Quectel EM05CN (SG) modem
- USB: serial: option: add Quectel EM05CN modem
- USB: misc: iowarrior: fix up header size for USB_DEVICE_
- usb: core: hub: disable autosuspend for TI TUSB8041
- USB: serial: cp210x: add SCALANCE LPE-9000 device id
- usb: host: ehci-fsl: Fix module alias
- usb: gadget: g_webcam: Send color matching descriptor per frame
- usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate()
- usb-storage: apply IGNORE_UAS only for HIKSEMI MD202 on RTL9210
- serial: pch_uart: Pass correct sg to dma_unmap_sg()
- serial: atmel: fix incorrect baudrate setup
- gsmi: fix null-deref in gsmi_get_variable
- comedi: adv_pci1760: Fix PWM instruction handling
- ARM: dts: imx6qdl-gw560x: Remove incorrect 'uart-has-rtscts'
- HID: intel_ish-hid: Add check for ishtp_dma_tx_map
- EDAC/highbank: Fix memory leak in highbank_mc_probe()
- tomoyo: fix broken dependency on *.conf.default
- IB/hfi1: Reject a zero-length user expected buffer
- IB/hfi1: Reserve user expected TIDs
- affs: initialize fsdata in affs_truncate()
- amd-xgbe: TX Flow Ctrl Registers are h/w ver dependent
- phy: rockchip-inno-usb2: Fix missing clk_disable_
rockchip_
- net: nfc: Fix use-after-free in local_cleanup()
- net: usb: sr9700: Handle negative len
- net: mdio: validate parameter addr in mdiobus_get_phy()
- HID: check empty report_list in hid_validate_
- usb: gadget: f_fs: Prevent race during ffs_ep0_