kinetic/linux-kvm: 5.19.0-1013.14 -proposed tracker

Bug #1997425 reported by Thadeu Lima de Souza Cascardo
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Committed
Medium
Unassigned
Automated-testing
Invalid
Medium
Canonical Kernel Team
Boot-testing
Fix Released
Medium
Unassigned
Certification-testing
Invalid
Medium
Unassigned
New-review
Fix Released
Medium
Andy Whitcroft
Prepare-package
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-meta
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-signed
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Steve Beattie
Sru-review
Fix Released
Medium
Andy Whitcroft
Verification-testing
Fix Released
Medium
Canonical Kernel Team
canonical-signing-jobs
Fix Released
Medium
Andy Whitcroft
linux-kvm (Ubuntu)
Kinetic
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  from: f31b2494040fa654
  route-entry: 2
delta:
  promote-to-proposed: [main, meta, signed]
  promote-to-security: []
  promote-to-updates: [main, meta, signed]
flag:
  boot-testing-requested: true
  bugs-spammed: true
  proposed-announcement-sent: true
  proposed-testing-requested: true
  stream-from-cycle: true
issue: KSRU-5620
kernel-stable-master-bug: 1997434
packages:
  main: linux-kvm
  meta: linux-meta-kvm
  signed: linux-signed-kvm
phase: Complete
phase-changed: Thursday, 01. December 2022 11:42 UTC
reason: {}
synthetic:
  :promote-to-as-proposed: Invalid
variant: debs
versions:
  main: 5.19.0-1013.14
  meta: 5.19.0.1013.10
  signed: 5.19.0-1013.14
~~:
  clamps:
    new-review: f31b2494040fa654
    promote-to-proposed: f31b2494040fa654
    self: 5.19.0-1013.14
    sru-review: f31b2494040fa654

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2022.10.10-6
description: updated
tags: added: kernel-sru-derivative-of-1997434
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-kvm (Ubuntu Kinetic):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
tags: added: kernel-jira-issue-ksru-5620
description: updated
description: updated
summary: - kinetic/linux-kvm: <version to be filled> -proposed tracker
+ kinetic/linux-kvm: 5.19.0-1013.14 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
Andy Whitcroft (apw)
tags: added: kernel-signing-bot
Changed in canonical-signing-jobs:
assignee: nobody → Andy Whitcroft (apw)
importance: Undecided → Medium
importance explanation: unset → unset
status explanation: unset → # title kernel 1997425 validate --publications ~canonical-kernel-team/+archive/ubuntu/ppa2/+sourcepub/14166501 ~canonical-kernel-team/+archive/ubuntu/ppa2/+sourcepub/14166502 ~canonical-kernel-team/+archive/ubuntu/ppa2/+sourcepub/14166503 copy --from ppa:canonical-kernel-team/ubuntu/ppa2 --from-suite kinetic --sources linux-kvm/5.19.0-1013.14 linux-meta-kvm/5.19.0.1013.10 linux-signed-kvm/5.19.0-1013.14/signing --to ppa:canonical-signing/ubuntu/primary --to-suite kinetic copy --from ppa:canonical-signing/ubuntu/primary --from-suite kinetic --sources linux-kvm/5.19.0-1013.14 linux-meta-kvm/5.19.0.1013.10 linux-signed-kvm/5.19.0-1013.14 --to ppa:canonical-kernel-team/ubuntu/proposed2 --to-suite kinetic delete --from ppa:canonical-signing/ubuntu/primary --from-suite kinetic --sources linux-kvm/5.19.0-1013.14 linux-meta-kvm/5.19.0.1013.10 linux-signed-kvm/5.19.0-1013.14
status: New → Triaged
description: updated
description: updated
description: updated
description: updated
description: updated
Andy Whitcroft (apw)
Changed in canonical-signing-jobs:
status explanation: # title kernel 1997425 validate --publications ~canonical-kernel-team/+archive/ubuntu/ppa2/+sourcepub/14166501 ~canonical-kernel-team/+archive/ubuntu/ppa2/+sourcepub/14166502 ~canonical-kernel-team/+archive/ubuntu/ppa2/+sourcepub/14166503 copy --from ppa:canonical-kernel-team/ubuntu/ppa2 --from-suite kinetic --sources linux-kvm/5.19.0-1013.14 linux-meta-kvm/5.19.0.1013.10 linux-signed-kvm/5.19.0-1013.14/signing --to ppa:canonical-signing/ubuntu/primary --to-suite kinetic copy --from ppa:canonical-signing/ubuntu/primary --from-suite kinetic --sources linux-kvm/5.19.0-1013.14 linux-meta-kvm/5.19.0.1013.10 linux-signed-kvm/5.19.0-1013.14 --to ppa:canonical-kernel-team/ubuntu/proposed2 --to-suite kinetic delete --from ppa:canonical-signing/ubuntu/primary --from-suite kinetic --sources linux-kvm/5.19.0-1013.14 linux-meta-kvm/5.19.0.1013.10 linux-signed-kvm/5.19.0-1013.14 → # title kernel 1997425 validate --exclude kinetic:linux-kvm --publications ~canonical-kernel-team/+archive/ubuntu/ppa2/+sourcepub/14166501 ~canonical-kernel-team/+archive/ubuntu/ppa2/+sourcepub/14166502 ~canonical-kernel-team/+archive/ubuntu/ppa2/+sourcepub/14166503 copy --from ppa:canonical-kernel-team/ubuntu/ppa2 --from-suite kinetic --sources linux-kvm/5.19.0-1013.14 linux-meta-kvm/5.19.0.1013.10 linux-signed-kvm/5.19.0-1013.14/signing --to ppa:canonical-signing/ubuntu/primary --to-suite kinetic copy --from ppa:canonical-signing/ubuntu/primary --from-suite kinetic --sources linux-kvm/5.19.0-1013.14 linux-meta-kvm/5.19.0.1013.10 linux-signed-kvm/5.19.0-1013.14 --to ppa:canonical-kernel-team/ubuntu/proposed2 --to-suite kinetic delete --from ppa:canonical-signing/ubuntu/primary --from-suite kinetic --sources linux-kvm/5.19.0-1013.14 linux-meta-kvm/5.19.0.1013.10 linux-signed-kvm/5.19.0-1013.14
description: updated
Changed in canonical-signing-jobs:
status: Triaged → Confirmed
description: updated
Andy Whitcroft (apw)
Changed in canonical-signing-jobs:
status: Confirmed → In Progress
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Andy Whitcroft (apw)
Changed in canonical-signing-jobs:
importance explanation: unset → Successful
status: In Progress → Fix Released
description: updated
description: updated
description: updated
description: updated
description: updated
tags: added: regression-testing-passed
description: updated
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-kvm - 5.19.0-1013.14

---------------
linux-kvm (5.19.0-1013.14) kinetic; urgency=medium

  * kinetic/linux-kvm: 5.19.0-1013.14 -proposed tracker (LP: #1997425)

  [ Ubuntu: 5.19.0-26.27 ]

  * kinetic/linux: 5.19.0-26.27 -proposed tracker (LP: #1997434)
  * CVE-2022-3566
    - tcp: Fix data races around icsk->icsk_af_ops.
  * CVE-2022-3567
    - ipv6: Fix data races around sk->sk_prot.
  * CVE-2022-3621
    - nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
  * CVE-2022-3565
    - mISDN: fix use-after-free bugs in l1oip timer handlers
  * CVE-2022-3594
    - r8152: Rate limit overflow messages
  * CVE-2022-3564
    - Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu
  * CVE-2022-3524
    - tcp/udp: Fix memory leak in ipv6_renew_options().
  * CVE-2022-43945
    - SUNRPC: Fix svcxdr_init_decode's end-of-buffer calculation
    - SUNRPC: Fix svcxdr_init_encode's buflen calculation
    - NFSD: Protect against send buffer overflow in NFSv2 READDIR
    - NFSD: Protect against send buffer overflow in NFSv3 READDIR
    - NFSD: Protect against send buffer overflow in NFSv2 READ
    - NFSD: Protect against send buffer overflow in NFSv3 READ
    - NFSD: Remove "inline" directives on op_rsize_bop helpers
    - NFSD: Cap rsize_bop result based on send buffer size

 -- Thadeu Lima de Souza Cascardo <email address hidden> Thu, 24 Nov 2022 06:38:54 -0300

Changed in linux-kvm (Ubuntu Kinetic):
status: New → Fix Released
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being closed

Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers