bionic/linux-azure-4.15: 4.15.0-1163.178 -proposed tracker

Bug #2011971 reported by Luke Nowakowski-Krijger
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
In Progress
Medium
Canonical Kernel Team
Boot-testing
Fix Released
Medium
Unassigned
Certification-testing
Invalid
Medium
Unassigned
New-review
Fix Released
Medium
Andy Whitcroft
Prepare-package
Fix Released
Medium
Marcelo Cerri
Prepare-package-generate
Fix Released
Medium
Marcelo Cerri
Prepare-package-lrg
Fix Released
Medium
Marcelo Cerri
Prepare-package-lrm
Fix Released
Medium
Marcelo Cerri
Prepare-package-lrs
Fix Released
Medium
Marcelo Cerri
Prepare-package-meta
Fix Released
Medium
Marcelo Cerri
Prepare-package-signed
Fix Released
Medium
Marcelo Cerri
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
New
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
New
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Steve Beattie
Sru-review
Fix Released
Medium
Andy Whitcroft
Stakeholder-signoff
Fix Released
Medium
linux-azure stakeholder signoff
Verification-testing
Fix Released
Medium
Canonical Kernel Team
canonical-signing-jobs
Task00
Fix Released
Medium
Andy Whitcroft
linux-azure-4.15 (Ubuntu)
Bionic
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  from: 9c79f7b23398435d
  route-entry: 1
delta:
  promote-to-proposed: [lrm, lrs, main, meta, signed, lrg, generate]
flag:
  boot-testing-requested: true
  bugs-spammed: true
  proposed-announcement-sent: true
  proposed-testing-requested: true
issue: KSRU-6896
kernel-stable-master-bug: 2016136
packages:
  generate: linux-generate-azure-4.15
  lrg: linux-restricted-generate-azure-4.15
  lrm: linux-restricted-modules-azure-4.15
  lrs: linux-restricted-signatures-azure-4.15
  main: linux-azure-4.15
  meta: linux-meta-azure-4.15
  signed: linux-signed-azure-4.15
phase: Testing
phase-changed: Thursday, 30. March 2023 16:43 UTC
reason:
  automated-testing: Ongoing -s testing in progress
synthetic:
  :promote-to-as-proposed: Fix Released
trackers:
  bionic/linux-azure-fips: bug 2008398, bug 2011968
  trusty/linux-azure: bug 2011970
  xenial/linux-azure: bug 2011969
variant: debs
versions:
  lrm: 4.15.0-1163.178
  main: 4.15.0-1163.178
  meta: 4.15.0.1163.131
  signed: 4.15.0-1163.178
~~:
  clamps:
    new-review: 9c79f7b23398435d
    promote-to-proposed: 9c79f7b23398435d
    self: 4.15.0-1163.178
    sru-review: 9c79f7b23398435d

CVE References

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2023.03.20-1
description: updated
tags: added: kernel-sru-derivative-of-2011989
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-azure-4.15 (Ubuntu Bionic):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
description: updated
tags: added: kernel-jira-issue-ksru-6896
description: updated
description: updated
description: updated
description: updated
Marcelo Cerri (mhcerri)
summary: - bionic/linux-azure-4.15: <version to be filled> -proposed tracker
+ bionic/linux-azure-4.15: 4.15.0-1163.178 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Andy Whitcroft (apw)
tags: added: kernel-signing-bot
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (6.3 KiB)

This bug was fixed in the package linux-azure-4.15 - 4.15.0-1163.178

---------------
linux-azure-4.15 (4.15.0-1163.178) bionic; urgency=medium

  * bionic/linux-azure-4.15: 4.15.0-1163.178 -proposed tracker (LP: #2011971)

  [ Ubuntu: 4.15.0-209.220 ]

  * bionic/linux: 4.15.0-209.220 -proposed tracker (LP: #2011989)
  * CVE-2023-26545
    - net: mpls: fix stale pointer if allocation fails during device rename
  * CVE-2023-1281
    - rcu: Upgrade rcu_swap_protected() to rcu_replace_pointer()
    - net/sched: tcindex: update imperfect hash filters respecting rcu
  * CVE-2022-3903
    - USB: add usb_control_msg_send() and usb_control_msg_recv()
    - USB: correct API of usb_control_msg_send/recv
    - USB: move snd_usb_pipe_sanity_check into the USB core
    - media: mceusb: Use new usb_control_msg_*() routines
  * Bionic update: upstream stable patchset 2023-03-03 (LP: #2009237)
    - pNFS/filelayout: Fix coalescing test for single DS
    - net/ethtool/ioctl: return -EOPNOTSUPP if we have no phy stats
    - RDMA/srp: Move large values to a new enum for gcc13
    - f2fs: let's avoid panic if extent_tree is not created
    - nilfs2: fix general protection fault in nilfs_btree_insert()
    - xhci-pci: set the dma max_seg_size
    - usb: xhci: Check endpoint is valid before dereferencing it
    - prlimit: do_prlimit needs to have a speculation check
    - USB: serial: option: add Quectel EM05-G (GR) modem
    - USB: serial: option: add Quectel EM05-G (CS) modem
    - USB: serial: option: add Quectel EM05-G (RS) modem
    - USB: serial: option: add Quectel EC200U modem
    - USB: serial: option: add Quectel EM05CN (SG) modem
    - USB: serial: option: add Quectel EM05CN modem
    - USB: misc: iowarrior: fix up header size for USB_DEVICE_ID_CODEMERCS_IOW100
    - usb: core: hub: disable autosuspend for TI TUSB8041
    - USB: serial: cp210x: add SCALANCE LPE-9000 device id
    - usb: host: ehci-fsl: Fix module alias
    - usb: gadget: g_webcam: Send color matching descriptor per frame
    - usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate()
    - usb-storage: apply IGNORE_UAS only for HIKSEMI MD202 on RTL9210
    - serial: pch_uart: Pass correct sg to dma_unmap_sg()
    - serial: atmel: fix incorrect baudrate setup
    - gsmi: fix null-deref in gsmi_get_variable
    - comedi: adv_pci1760: Fix PWM instruction handling
    - ARM: dts: imx6qdl-gw560x: Remove incorrect 'uart-has-rtscts'
    - HID: intel_ish-hid: Add check for ishtp_dma_tx_map
    - EDAC/highbank: Fix memory leak in highbank_mc_probe()
    - tomoyo: fix broken dependency on *.conf.default
    - IB/hfi1: Reject a zero-length user expected buffer
    - IB/hfi1: Reserve user expected TIDs
    - affs: initialize fsdata in affs_truncate()
    - amd-xgbe: TX Flow Ctrl Registers are h/w ver dependent
    - phy: rockchip-inno-usb2: Fix missing clk_disable_unprepare() in
      rockchip_usb2phy_power_on()
    - net: nfc: Fix use-after-free in local_cleanup()
    - net: usb: sr9700: Handle negative len
    - net: mdio: validate parameter addr in mdiobus_get_phy()
    - HID: check empty report_list in hid_validate_values()
    - usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wai...

Read more...

Changed in linux-azure-4.15 (Ubuntu Bionic):
status: New → Fix Released
Changed in kernel-sru-workflow:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.