This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
bugs-spammed: true
built:
from: bcef9e4cd9ae893b
route-entry: 1
delta:
promote-to-proposed: [meta, lrm, lrs, main, signed, lrg]
promote-to-security: []
promote-to-updates: [lrm, meta, lrs, main, signed]
issue: KSRU-2200
kernel-stable-master-bug: 1973970
packages:
lrg: linux-restricted-generate-oracle-5.4
lrm: linux-restricted-modules-oracle-5.4
lrs: linux-restricted-signatures-oracle-5.4
main: linux-oracle-5.4
meta: linux-meta-oracle-5.4
signed: linux-signed-oracle-5.4
phase: Complete
phase-changed: Tuesday, 31. May 2022 13:36 UTC
proposed-announcement-sent: true
reason: {}
synthetic:
:promote-to-as-proposed: Fix Released
variant: debs
versions:
lrm: 5.4.0-1073.79~18.04.1
main: 5.4.0-1073.79~18.04.1
meta: 5.4.0.1073.79~18.04.52
signed: 5.4.0-1073.79~18.04.1
versions-replace:
lrm: [5.4.0-1072.78~18.04.1]
main: [5.4.0-1072.78~18.04.1]
meta: [5.4.0.1072.78~18.04.51]
signed: [5.4.0-1072.78~18.04.1]
~~:
clamps:
new-review: bcef9e4cd9ae893b
promote-to-proposed: bcef9e4cd9ae893b
self: 5.4.0-1073.79~18.04.1
sru-review: bcef9e4cd9ae893b
This bug was fixed in the package linux-oracle-5.4 - 5.4.0-1073. 79~18.04. 1
--------------- 1073.79~ 18.04.1) bionic; urgency=medium
linux-oracle-5.4 (5.4.0-
* bionic/ linux-oracle- 5.4: 5.4.0-1073. 79~18.04. 1 -proposed tracker
(LP: #1973969)
[ Ubuntu: 5.4.0-1073.79 ]
* focal/linux-oracle: 5.4.0-1073.79 -proposed tracker (LP: #1973970) O_SUSPEND_ SECCOMP O_SUSPEND_ SECCOMP permission on PTRACE_SEIZE
* focal/linux: 5.4.0-113.127 -proposed tracker (LP: #1973980)
* CVE-2022-29581
- net/sched: cls_u32: fix netns refcount changes in u32_change()
* CVE-2022-1116
- io_uring: fix fs->users overflow
* ext4: limit length to bitmap_maxbytes (LP: #1972281)
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
* Unprivileged users may use PTRACE_SEIZE to set PTRACE_
option (LP: #1972740)
- ptrace: Check PTRACE_
-- Ian May <email address hidden> Wed, 25 May 2022 08:46:16 -0500