jammy/linux-gke: 5.15.0-1012.15 -proposed tracker
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Committed
|
Medium
|
Unassigned | |||
Automated-testing |
New
|
Medium
|
Canonical Kernel Team | |||
Boot-testing |
New
|
Medium
|
Unassigned | |||
Certification-testing |
Invalid
|
Medium
|
Unassigned | |||
New-review |
New
|
Medium
|
Unassigned | |||
Prepare-package |
Fix Committed
|
Medium
|
Khaled El Mously | |||
Prepare-package-meta |
Fix Committed
|
Medium
|
Khaled El Mously | |||
Prepare-package-signed |
Fix Committed
|
Medium
|
Khaled El Mously | |||
Promote-signing-to-proposed |
New
|
Medium
|
Unassigned | |||
Promote-to-proposed |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Promote-to-security |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Promote-to-updates |
New
|
Medium
|
Ubuntu Stable Release Updates Team | |||
Regression-testing |
New
|
Medium
|
Canonical Kernel Team | |||
Security-signoff |
New
|
Medium
|
Canonical Security Team | |||
Signing-signoff |
Invalid
|
Medium
|
Unassigned | |||
Sru-review |
Confirmed
|
Medium
|
Unassigned | |||
Verification-testing |
New
|
Medium
|
Canonical Kernel Team | |||
linux-gke (Ubuntu) | ||||||
Jammy |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
built:
from: 1bd268ed91ea4e0e
route-entry: 1
delta:
promote-
issue: KSRU-4368
kernel-
packages:
main: linux-gke
meta: linux-meta-gke
signed: linux-signed-gke
phase: Packaging
phase-changed: Tuesday, 19. July 2022 06:51 UTC
reason:
:prepare-
signed:D)
prepare-package: Ongoing -- main package not yet fully built
prepare-
prepare-
built
sru-review: Pending -s ready for review
trackers:
focal/
variant: debs
versions:
main: 5.15.0-1012.15
meta: 5.15.0.1012.15
signed: 5.15.0-1012.15
~~:
clamps:
new-review: 1bd268ed91ea4e0e
self: 5.15.0-1012.15
sru-review: 1bd268ed91ea4e0e
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2022.07.11-1 |
description: | updated |
tags: | added: kernel-sru-derivative-of-1981243 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-gke (Ubuntu Jammy): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → Triaged |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Triaged → In Progress |
description: | updated |
tags: | added: kernel-jira-issue-ksru-4368 |
description: | updated |
description: | updated |
summary: |
- jammy/linux-gke: <version to be filled> -proposed tracker + jammy/linux-gke: 5.15.0-1012.15 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Committed |
This bug was fixed in the package linux-gke - 5.15.0-1014.17
---------------
linux-gke (5.15.0-1014.17) jammy; urgency=medium
[ Ubuntu: 5.15.0-46.49 ]
* CVE-2022-2585
- SAUCE: posix-cpu-timers: Cleanup CPU timers before freeing them during exec
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another chain
* CVE-2022-2588
- SAUCE: net_sched: cls_route: remove from list when handle is 0
linux-gke (5.15.0-1013.16) jammy; urgency=medium
* jammy/linux-gke: 5.15.0-1013.16 -proposed tracker (LP: #1982300)
[ Ubuntu: 5.15.0-45.48 ]
* CVE-2022-29900 // CVE-2022-29901 atomic64_ 386_32: Rename things line-speculatio n line-speculatio n Makefile. build line-speculatio n mitigation line-speculatio n validation is_preempted emu/64: Don't use RET in vsyscall emulation v2_select_ m...
- x86/lib/
- x86: Prepare asm files for straight-
- x86: Prepare inline-asm for straight-
- x86/alternative: Relax text_poke_bp() constraint
- kbuild: move objtool_args back to scripts/
- x86: Add straight-
- kvm/emulate: Fix SETcc emulation function offsets with SLS
- crypto: x86/poly1305 - Fixup SLS
- objtool: Add straight-
- objtool: Fix SLS validation for kcov tail-call replacement
- objtool: Fix objtool regression on x32 systems
- objtool: Fix symbol creation
- objtool: Introduce CFI hash
- objtool: Default ignore INT3 for unreachable
- x86, kvm: use proper ASM macros for kvm_vcpu_
- x86/traps: Use pt_regs directly in fixup_bad_iret()
- x86/entry: Switch the stack after error_entry() returns
- x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry()
- x86/entry: Don't call error_entry() for XENPV
- x86/entry: Remove skip_r11rcx
- x86/realmode: build with -D__DISABLE_EXPORTS
- x86/ibt,ftrace: Make function-graph play nice
- x86/kvm/vmx: Make noinstr clean
- x86/cpufeatures: Move RETPOLINE flags to word 11
- x86/retpoline: Cleanup some #ifdefery
- x86/retpoline: Swizzle retpoline thunk
- x86/retpoline: Use -mfunction-return
- x86: Undo return-thunk damage
- x86,objtool: Create .return_sites
- objtool: skip non-text sections when adding return-thunk sites
- x86,static_call: Use alternative RET encoding
- x86/ftrace: Use alternative RET encoding
- x86/bpf: Use alternative RET encoding
- x86/kvm: Fix SETcc emulation for return thunks
- x86/vsyscall_
- x86/sev: Avoid using __x86_return_thunk
- x86: Use return-thunk in asm code
- x86/entry: Avoid very early RET
- objtool: Treat .text.__x86.* as noinstr
- x86: Add magic AMD return-thunk
- x86/bugs: Report AMD retbleed vulnerability
- x86/bugs: Add AMD retbleed= boot parameter
- x86/bugs: Enable STIBP for JMP2RET
- x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
- x86/entry: Add kernel IBRS implementation
- x86/bugs: Optimize SPEC_CTRL MSR writes
- x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
- x86/bugs: Split spectre_