canonical-hw-cert team mailing list archive
-
canonical-hw-cert team
-
Mailing list archive
-
Message #132535
[Bug 2024151] Re: jammy/linux-oem-6.0: 6.0.0-1019.19 -proposed tracker
This bug was fixed in the package linux-oem-6.0 - 6.0.0-1019.19
---------------
linux-oem-6.0 (6.0.0-1019.19) jammy; urgency=medium
* jammy/linux-oem-6.0: 6.0.0-1019.19 -proposed tracker (LP: #2024151)
* CVE-2023-2430
- io_uring: get rid of double locking
- io_uring: extract a io_msg_install_complete helper
- io_uring/msg_ring: move double lock/unlock helpers higher up
- io_uring/msg_ring: fix missing lock on overflow for IOPOLL
* Various backlight issues with the 6.0 kernel (LP: #2023638)
- ACPI: video: Add auto_detect arg to __acpi_video_get_backlight_type()
- ACPI: video: Make acpi_backlight=video work independent from GPU driver
- SAUCE: ACPI: video: Stop trying to use vendor backlight control on laptops
from after ~2012
* CVE-2022-4842
- fs/ntfs3: Fix attr_punch_hole() null pointer derenference
* CVE-2023-2124
- xfs: verify buffer contents when we skip log replay
* CVE-2023-0597
- x86/kasan: Map shadow for percpu pages on demand
- x86/mm: Randomize per-cpu entry area
- x86/mm: Recompute physical address for every page of per-CPU CEA mapping
- x86/mm: Populate KASAN shadow for entire per-CPU range of CPU entry area
- x86/mm: Do not shuffle CPU entry areas without KASLR
* cls_flower: off-by-one in fl_set_geneve_opt (LP: #2023577)
- net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
* Some INVLPG implementations can leave Global translations unflushed when
PCIDs are enabled (LP: #2023220)
- x86/mm: Avoid incomplete Global INVLPG flushes
* CVE-2023-2176
- RDMA/core: Refactor rdma_bind_addr
* Fix Monitor lost after replug WD19TBS to SUT port with VGA/DVI to type-C
dongle (LP: #2021949)
- thunderbolt: Increase timeout of DP OUT adapter handshake
- thunderbolt: Do not touch CL state configuration during discovery
- thunderbolt: Increase DisplayPort Connection Manager handshake timeout
* CVE-2023-1073
- HID: check empty report_list in hid_validate_values()
* CVE-2023-0459
- uaccess: Add speculation barrier to copy_from_user()
* selftest: fib_tests: Always cleanup before exit (LP: #2015956)
- selftest: fib_tests: Always cleanup before exit
-- Timo Aaltonen <timo.aaltonen@xxxxxxxxxxxxx> Tue, 20 Jun 2023
12:57:07 +0300
** Changed in: linux-oem-6.0 (Ubuntu Jammy)
Status: New => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-4842
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-0459
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-0597
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-1073
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-2124
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-2176
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-2430
--
You received this bug notification because you are a member of Canonical
Hardware Certification, which is a bug assignee.
https://bugs.launchpad.net/bugs/2024151
Title:
jammy/linux-oem-6.0: 6.0.0-1019.19 -proposed tracker
Status in canonical-signing-jobs task00 series:
Fix Released
Status in Kernel SRU Workflow:
In Progress
Status in Kernel SRU Workflow automated-testing series:
Invalid
Status in Kernel SRU Workflow boot-testing series:
Fix Released
Status in Kernel SRU Workflow certification-testing series:
Invalid
Status in Kernel SRU Workflow kernel-signoff series:
Fix Released
Status in Kernel SRU Workflow new-review series:
Fix Released
Status in Kernel SRU Workflow prepare-package series:
Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
Fix Released
Status in Kernel SRU Workflow prepare-package-lrg series:
Fix Released
Status in Kernel SRU Workflow prepare-package-lrm series:
Fix Released
Status in Kernel SRU Workflow prepare-package-lrs series:
Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
Invalid
Status in Kernel SRU Workflow promote-to-proposed series:
Fix Released
Status in Kernel SRU Workflow promote-to-security series:
New
Status in Kernel SRU Workflow promote-to-updates series:
In Progress
Status in Kernel SRU Workflow regression-testing series:
Fix Released
Status in Kernel SRU Workflow security-signoff series:
Fix Released
Status in Kernel SRU Workflow sru-review series:
Fix Released
Status in Kernel SRU Workflow verification-testing series:
Fix Released
Status in linux-oem-6.0 source package in Jammy:
Fix Released
Bug description:
This bug will contain status and test results related to a kernel
source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
built:
from: dec6c6918f2c7e70
route-entry: 2
delta:
promote-to-proposed: []
promote-to-updates: [lrm, lrs, main, meta, signed]
flag:
boot-testing-requested: true
proposed-announcement-sent: true
proposed-testing-requested: true
stream-from-cycle: true
issue: KSRU-7760
packages:
generate: linux-generate-oem-6.0
lrg: linux-restricted-generate-oem-6.0
lrm: linux-restricted-modules-oem-6.0
lrs: linux-restricted-signatures-oem-6.0
main: linux-oem-6.0
meta: linux-meta-oem-6.0
signed: linux-signed-oem-6.0
phase: Promote to Updates
phase-changed: Friday, 14. July 2023 13:06 UTC
reason:
promote-to-updates: Ongoing -- packages not yet published
synthetic:
:promote-to-as-proposed: Invalid
variant: debs
versions:
lrm: 6.0.0-1019.19+1
main: 6.0.0-1019.19
meta: 6.0.0.1019.19
signed: 6.0.0-1019.19
~~:
clamps:
new-review: dec6c6918f2c7e70
promote-to-proposed: dec6c6918f2c7e70
self: 6.0.0-1019.19
sru-review: dec6c6918f2c7e70
To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2024151/+subscriptions