jammy/linux-oem-6.0: 6.0.0-1012.12 -proposed tracker
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
built:
from: 7d60908798942bc4
route-entry: 1
delta:
promote-
promote-
promote-
flag:
boot-
bugs-spammed: true
proposed-
proposed-
stream-
issue: KSRU-6465
packages:
generate: linux-generate-
lrg: linux-restricte
lrm: linux-restricte
lrs: linux-restricte
main: linux-oem-6.0
meta: linux-meta-oem-6.0
signed: linux-signed-
phase: Complete
phase-changed: Thursday, 02. March 2023 10:08 UTC
reason: {}
synthetic:
:promote-
variant: debs
versions:
lrm: 6.0.0-1012.12
main: 6.0.0-1012.12
meta: 6.0.0.1012.12
signed: 6.0.0-1012.12
~~:
clamps:
new-review: 7d60908798942bc4
promote-
self: 6.0.0-1012.12
sru-review: 7d60908798942bc4
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2023.01.30-1 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-oem-6.0 (Ubuntu Jammy): | |
importance: | Undecided → Medium |
tags: | added: kernel-block-derivatives |
Changed in kernel-sru-workflow: | |
status: | Confirmed → Triaged |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Triaged → In Progress |
tags: | added: kernel-jira-issue-ksru-6465 |
description: | updated |
description: | updated |
summary: |
- jammy/linux-oem-6.0: <version to be filled> -proposed tracker + jammy/linux-oem-6.0: 6.0.0-1012.12 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: kernel-signing-bot |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: automated-testing-passed verification-testing-passed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Fix Committed → Fix Released |
This bug was fixed in the package linux-oem-6.0 - 6.0.0-1012.12
---------------
linux-oem-6.0 (6.0.0-1012.12) jammy; urgency=medium
* jammy/linux- oem-6.0: 6.0.0-1012.12 -proposed tracker (LP: #2004348)
* CVE-2023-0469
- io_uring/filetable: fix file reference underflow
* LSM: Configuring Too Many LSMs Causes Kernel Panic on Boot (LP: #1987998)
- SAUCE: LSM: Change Landlock from LSMBLOB_NEEDED to LSMBLOB_NOT_NEEDED
* CVE-2023-0045
- x86/bugs: Flush IBP in ib_prctl_set()
* CVE-2022-47520
- wifi: wilc1000: validate pairwise and authentication suite offsets
* CVE-2022-3567
- ipv6: Fix data races around sk->sk_prot.
* CVE-2022-45934
- Bluetooth: L2CAP: Fix u8 overflow
* CVE-2022-42896 chan_by_ psm
- Bluetooth: L2CAP: Fix l2cap_global_
* CVE-2022-43945
- NFSD: Remove "inline" directives on op_rsize_bop helpers
- NFSD: Cap rsize_bop result based on send buffer size
* CVE-2022-20369
- NFSD: fix use-after-free in __nfs42_ssc_open()
* CVE-2023-0461
- net/ulp: prevent ULP without clone op from entering the LISTEN status
- net/ulp: use consistent error code when blocking ULP
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and revoked certificates
-- Timo Aaltonen <email address hidden> Fri, 10 Feb 2023 12:37:27 +0200