jammy/linux: 5.15.0-84.93 -proposed tracker

Bug #2034202 reported by Thadeu Lima de Souza Cascardo
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Invalid
Medium
Canonical Kernel Team
Boot-testing
Fix Released
Medium
Unassigned
Certification-testing
Invalid
Medium
Canonical Hardware Certification
Kernel-signoff
Fix Released
Medium
Canonical Kernel Team
New-review
Fix Released
Medium
Andy Whitcroft
Prepare-package
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-generate
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-lrg
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-lrm
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-lrs
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-meta
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-signed
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Promote-signing-to-proposed
Invalid
Medium
Ubuntu Stable Release Updates Team
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Steve Beattie
Sru-review
Fix Released
Medium
Andy Whitcroft
Verification-testing
Fix Released
Medium
Canonical Kernel Team
canonical-signing-jobs
Task00
Fix Released
Medium
Andy Whitcroft
linux (Ubuntu)
Jammy
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  from: e957af59fcf8d7d3
  route-entry: 2
delta:
  promote-to-proposed: [lrm, lrs, main, meta, signed, lrg, generate]
  promote-to-security: []
  promote-to-updates: [lrm, lrs, main, meta, signed]
flag:
  boot-testing-requested: true
  bugs-spammed: true
  proposed-announcement-sent: true
  proposed-testing-requested: true
issue: KSRU-9671
packages:
  generate: linux-generate
  lrg: linux-restricted-generate
  lrm: linux-restricted-modules
  lrs: linux-restricted-signatures
  main: linux
  meta: linux-meta
  signed: linux-signed
phase: Complete
phase-changed: Tuesday, 19. September 2023 11:23 UTC
reason: {}
synthetic:
  :promote-to-as-proposed: Invalid
trackers:
  focal/linux-hwe-5.15: bug 2034200
  focal/linux-riscv-5.15: bug 2034201
  jammy/linux-aws: bug 2034162
  jammy/linux-azure: bug 2034166
  jammy/linux-bluefield: bug 2034167
  jammy/linux-fips: bug 2034168
  jammy/linux-gcp: bug 2034170
  jammy/linux-gke: bug 2034171
  jammy/linux-gkeop: bug 2034173
  jammy/linux-ibm: bug 2034175
  jammy/linux-ibm-gt: bug 2034177
  jammy/linux-intel-iotg: bug 2034188
  jammy/linux-kvm: bug 2034189
  jammy/linux-lowlatency: bug 2034192
  jammy/linux-nvidia: bug 2034193
  jammy/linux-oracle: bug 2034195, bug 2035217
  jammy/linux-raspi: bug 2034197
  jammy/linux-realtime: bug 2034181
  jammy/linux-uc22: bug 2034199
variant: debs
versions:
  lrm: 5.15.0-84.93
  main: 5.15.0-84.93
  meta: 5.15.0.84.81
  signed: 5.15.0-84.93
~~:
  clamps:
    new-review: e957af59fcf8d7d3
    promote-to-proposed: e957af59fcf8d7d3
    self: 5.15.0-84.93
    sru-review: e957af59fcf8d7d3

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-s2023.08.07-1
description: updated
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux (Ubuntu Jammy):
importance: Undecided → Medium
tags: added: kernel-block-derivatives
tags: added: kernel-regression-testing-early
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
description: updated
description: updated
description: updated
tags: added: kernel-jira-issue-ksru-9671
description: updated
summary: - jammy/linux: <version to be filled> -proposed tracker
+ jammy/linux: 5.15.0-84.93 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
tags: added: boot-testing-passed
tags: added: regression-testing-passed
removed: kernel-block-derivatives
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 5.15.0-84.93

---------------
linux (5.15.0-84.93) jammy; urgency=medium

  * jammy/linux: 5.15.0-84.93 -proposed tracker (LP: #2034202)

  * Packaging resync (LP: #1786013)
    - [Packaging] update helper scripts

  * CVE-2023-4569
    - netfilter: nf_tables: deactivate catchall elements in next generation

  * CVE-2023-40283
    - Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb

  * CVE-2023-20588
    - x86/bugs: Increase the x86 bugs vector size to two u32s
    - x86/CPU/AMD: Do not leak quotient data after a division by 0
    - x86/CPU/AMD: Fix the DIV(0) initial fix attempt

  * CVE-2023-4128
    - net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-
      free
    - net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-
      free
    - net/sched: cls_route: No longer copy tcf_result on update to avoid use-
      after-free

 -- Thadeu Lima de Souza Cascardo <email address hidden> Tue, 05 Sep 2023 10:31:56 -0300

Changed in linux (Ubuntu Jammy):
status: New → Fix Released
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being closed

Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
Changed in kernel-sru-workflow:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.