This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
bugs-spammed: true
built:
from: 5e0bf3946e374a8f
route-entry: 1
delta:
promote-to-proposed:
- lrm
- main
- meta
- signed
- lrs
- lrg
promote-to-security: []
promote-to-updates:
- lrs
- lrm
- meta
- main
- signed
sru-review:
- lrg
- signed
- main
- lrm
- meta
- lrs
issue: KSRU-2161
kernel-stable-master-bug: 1973929
packages:
lrg: linux-restricted-generate-aws-5.13
lrm: linux-restricted-modules-aws-5.13
lrs: linux-restricted-signatures-aws-5.13
main: linux-aws-5.13
meta: linux-meta-aws-5.13
signed: linux-signed-aws-5.13
phase: Complete
phase-changed: Tuesday, 24. May 2022 10:34 UTC
proposed-announcement-sent: true
reason: {}
synthetic:
:promote-to-as-proposed: Fix Released
variant: debs
versions:
lrm: 5.13.0-1025.27~20.04.1
main: 5.13.0-1025.27~20.04.1
meta: 5.13.0.1025.27~20.04.20
signed: 5.13.0-1025.27~20.04.1
versions-replace:
lrm:
- 5.13.0-1024.26~20.04.1+2
main:
- 5.13.0-1024.26~20.04.1
meta:
- 5.13.0.1024.26~20.04.19
signed:
- 5.13.0-1024.26~20.04.1
~~:
clamps:
new-review: 5e0bf3946e374a8f
promote-to-proposed: 5e0bf3946e374a8f
self: 5.13.0-1025.27~20.04.1
sru-review: 5e0bf3946e374a8f
This bug was fixed in the package linux-aws-5.13 - 5.13.0- 1025.27~ 20.04.1
--------------- 1025.27~ 20.04.1) focal; urgency=medium
linux-aws-5.13 (5.13.0-
* focal/linux- aws-5.13: 5.13.0- 1025.27~ 20.04.1 -proposed tracker
(LP: #1973928)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
[ Ubuntu: 5.13.0-1025.27 ]
* impish/linux-aws: 5.13.0-1025.27 -proposed tracker (LP: #1973929) O_SUSPEND_ SECCOMP O_SUSPEND_ SECCOMP permission on PTRACE_SEIZE
* impish/linux: 5.13.0-44.49 -proposed tracker (LP: #1973941)
* CVE-2022-29581
- net/sched: cls_u32: fix netns refcount changes in u32_change()
* Unprivileged users may use PTRACE_SEIZE to set PTRACE_
option (LP: #1972740)
- ptrace: Check PTRACE_
* ext4: limit length to bitmap_maxbytes (LP: #1972281)
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
-- Tim Gardner <email address hidden> Thu, 19 May 2022 09:01:09 -0600