← Back to team overview

canonical-hw-cert team mailing list archive

[Bug 2024151] Re: jammy/linux-oem-6.0: 6.0.0-1019.19 -proposed tracker

 

This bug was fixed in the package linux-oem-6.0 - 6.0.0-1019.19

---------------
linux-oem-6.0 (6.0.0-1019.19) jammy; urgency=medium

  * jammy/linux-oem-6.0: 6.0.0-1019.19 -proposed tracker (LP: #2024151)

  * CVE-2023-2430
    - io_uring: get rid of double locking
    - io_uring: extract a io_msg_install_complete helper
    - io_uring/msg_ring: move double lock/unlock helpers higher up
    - io_uring/msg_ring: fix missing lock on overflow for IOPOLL

  * Various backlight issues with the 6.0 kernel (LP: #2023638)
    - ACPI: video: Add auto_detect arg to __acpi_video_get_backlight_type()
    - ACPI: video: Make acpi_backlight=video work independent from GPU driver
    - SAUCE: ACPI: video: Stop trying to use vendor backlight control on laptops
      from after ~2012

  * CVE-2022-4842
    - fs/ntfs3: Fix attr_punch_hole() null pointer derenference

  * CVE-2023-2124
    - xfs: verify buffer contents when we skip log replay

  * CVE-2023-0597
    - x86/kasan: Map shadow for percpu pages on demand
    - x86/mm: Randomize per-cpu entry area
    - x86/mm: Recompute physical address for every page of per-CPU CEA mapping
    - x86/mm: Populate KASAN shadow for entire per-CPU range of CPU entry area
    - x86/mm: Do not shuffle CPU entry areas without KASLR

  * cls_flower: off-by-one in fl_set_geneve_opt (LP: #2023577)
    - net/sched: flower: fix possible OOB write in fl_set_geneve_opt()

  * Some INVLPG implementations can leave Global translations unflushed when
    PCIDs are enabled (LP: #2023220)
    - x86/mm: Avoid incomplete Global INVLPG flushes

  * CVE-2023-2176
    - RDMA/core: Refactor rdma_bind_addr

  * Fix Monitor lost after replug WD19TBS to SUT port with VGA/DVI to type-C
    dongle (LP: #2021949)
    - thunderbolt: Increase timeout of DP OUT adapter handshake
    - thunderbolt: Do not touch CL state configuration during discovery
    - thunderbolt: Increase DisplayPort Connection Manager handshake timeout

  * CVE-2023-1073
    - HID: check empty report_list in hid_validate_values()

  * CVE-2023-0459
    - uaccess: Add speculation barrier to copy_from_user()

  *  selftest: fib_tests: Always cleanup before exit  (LP: #2015956)
    - selftest: fib_tests: Always cleanup before exit

 -- Timo Aaltonen <timo.aaltonen@xxxxxxxxxxxxx>  Tue, 20 Jun 2023
12:57:07 +0300

** Changed in: linux-oem-6.0 (Ubuntu Jammy)
       Status: New => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-4842

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-0459

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-0597

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-1073

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-2124

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-2176

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-2430

-- 
You received this bug notification because you are a member of Canonical
Hardware Certification, which is a bug assignee.
https://bugs.launchpad.net/bugs/2024151

Title:
  jammy/linux-oem-6.0: 6.0.0-1019.19 -proposed tracker

Status in canonical-signing-jobs task00 series:
  Fix Released
Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow boot-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow kernel-signoff series:
  Fix Released
Status in Kernel SRU Workflow new-review series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lrg series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lrm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lrs series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow sru-review series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-oem-6.0 source package in Jammy:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
    https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
    from: dec6c6918f2c7e70
    route-entry: 2
  delta:
    promote-to-proposed: []
    promote-to-updates: [lrm, lrs, main, meta, signed]
  flag:
    boot-testing-requested: true
    proposed-announcement-sent: true
    proposed-testing-requested: true
    stream-from-cycle: true
  issue: KSRU-7760
  packages:
    generate: linux-generate-oem-6.0
    lrg: linux-restricted-generate-oem-6.0
    lrm: linux-restricted-modules-oem-6.0
    lrs: linux-restricted-signatures-oem-6.0
    main: linux-oem-6.0
    meta: linux-meta-oem-6.0
    signed: linux-signed-oem-6.0
  phase: Promote to Updates
  phase-changed: Friday, 14. July 2023 13:06 UTC
  reason:
    promote-to-updates: Ongoing -- packages not yet published
  synthetic:
    :promote-to-as-proposed: Invalid
  variant: debs
  versions:
    lrm: 6.0.0-1019.19+1
    main: 6.0.0-1019.19
    meta: 6.0.0.1019.19
    signed: 6.0.0-1019.19
  ~~:
    clamps:
      new-review: dec6c6918f2c7e70
      promote-to-proposed: dec6c6918f2c7e70
      self: 6.0.0-1019.19
      sru-review: dec6c6918f2c7e70

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2024151/+subscriptions