focal/linux-hwe-5.15: 5.15.0-33.34~20.04.1 -proposed tracker

Bug #1974191 reported by Andrea Righi
66
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Committed
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Boot-testing
Fix Released
Medium
Unassigned
Certification-testing
Invalid
Medium
Kleber Sacilotto de Souza
New-review
Fix Released
Undecided
Unassigned
Prepare-package
Fix Released
Medium
Andrea Righi
Prepare-package-lrg
Fix Released
Medium
Andrea Righi
Prepare-package-lrm
Fix Released
Medium
Andrea Righi
Prepare-package-lrs
Fix Released
Medium
Andrea Righi
Prepare-package-meta
Fix Released
Medium
Andrea Righi
Prepare-package-signed
Fix Released
Medium
Andrea Righi
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
Fix Released
Medium
Canonical Kernel Team
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Steve Beattie
Sru-review
Fix Released
Medium
Andy Whitcroft
Verification-testing
Fix Released
Medium
Unassigned
linux-hwe-5.15 (Ubuntu)
Focal
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
bugs-spammed: true
built:
  from: 9d4ff6bcdf8bbaab
  route-entry: 1
delta:
  promote-to-proposed: [main, meta, lrs, lrm, signed, lrg]
  promote-to-security: []
  promote-to-updates: [lrm, main, lrs, meta, signed]
packages:
  lrg: linux-restricted-generate-hwe-5.15
  lrm: linux-restricted-modules-hwe-5.15
  lrs: linux-restricted-signatures-hwe-5.15
  main: linux-hwe-5.15
  meta: linux-meta-hwe-5.15
  signed: linux-signed-hwe-5.15
phase: Complete
phase-changed: Wednesday, 01. June 2022 10:36 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason: {}
synthetic:
  :promote-to-as-proposed: Fix Released
variant: debs
versions:
  lrm: 5.15.0-33.34~20.04.1
  main: 5.15.0-33.34~20.04.1
  meta: 5.15.0.33.34~20.04.11
  signed: 5.15.0-33.34~20.04.1
~~:
  clamps:
    new-review: 9d4ff6bcdf8bbaab
    promote-to-proposed: 9d4ff6bcdf8bbaab
    self: 5.15.0-33.34~20.04.1
    sru-review: 9d4ff6bcdf8bbaab

CVE References

Andrea Righi (arighi)
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-d2022.05.09-3
description: updated
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-hwe-5.15 (Ubuntu Focal):
importance: Undecided → Medium
tags: added: kernel-block-derivatives
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
Andrea Righi (arighi)
summary: - focal/linux-hwe-5.15: <version to be filled> -proposed tracker
+ focal/linux-hwe-5.15: 5.15.0-33.34~20.04.1 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Andy Whitcroft (apw)
tags: added: kernel-signing-bot
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Andrea Righi (arighi)
tags: added: regression-testing-passed
description: updated
description: updated
Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

Setting cert-tests to invalid as this is still a -edge kernel.

description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-hwe-5.15 - 5.15.0-33.34~20.04.1

---------------
linux-hwe-5.15 (5.15.0-33.34~20.04.1) focal; urgency=medium

  * focal/linux-hwe-5.15: 5.15.0-33.34~20.04.1 -proposed tracker (LP: #1974191)

  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/master)

  [ Ubuntu: 5.15.0-33.34 ]

  * jammy/linux: 5.15.0-33.34 -proposed tracker (LP: #1973924)
  * CVE-2022-29581
    - net/sched: cls_u32: fix netns refcount changes in u32_change()
  * ext4: limit length to bitmap_maxbytes (LP: #1972281)
    - ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
  * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP
    option (LP: #1972740)
    - ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE

 -- Andrea Righi <email address hidden> Thu, 19 May 2022 16:04:01 +0200

Changed in linux-hwe-5.15 (Ubuntu Focal):
status: New → Fix Released
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being closed

Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
description: updated
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers