jammy/linux: 5.15.0-119.129 -proposed tracker

Bug #2075665 reported by Roxana Nicolescu
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Committed
Medium
Unassigned
Abi-testing
Fix Released
Medium
Unassigned
Automated-testing
Invalid
Medium
Canonical Kernel Team
Boot-testing
Fix Released
Medium
Manuel Diewald
Certification-testing
Invalid
Medium
Canonical Hardware Certification
Kernel-signoff
Fix Released
Medium
Manuel Diewald
New-review
Fix Released
Medium
Timo Aaltonen
Prepare-package
Fix Released
Medium
Manuel Diewald
Prepare-package-generate
Fix Released
Medium
Manuel Diewald
Prepare-package-lrg
Fix Released
Medium
Manuel Diewald
Prepare-package-lrm
Fix Released
Medium
Manuel Diewald
Prepare-package-lrs
Fix Released
Medium
Manuel Diewald
Prepare-package-meta
Fix Released
Medium
Manuel Diewald
Prepare-package-signed
Fix Released
Medium
Manuel Diewald
Promote-signing-to-proposed
Invalid
Medium
Ubuntu Stable Release Updates Team
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Rodrigo Figueiredo Zaiden
Sru-review
Fix Released
Medium
Timo Aaltonen
Verification-testing
Fix Released
Medium
Canonical Kernel Team
canonical-signing-jobs
Task00
Fix Released
Medium
Timo Aaltonen
linux (Ubuntu)
Jammy
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  from: ecc0461156422e58
  route-entry: 2
comments:
  abi-testing: 1
delta:
  promote-to-proposed: [lrm, lrs, main, meta, signed, lrg, generate]
  promote-to-security: []
  promote-to-updates: [lrm, lrs, main, meta, signed]
flag:
  boot-testing-requested: true
  bugs-spammed: true
  proposed-announcement-sent: true
  proposed-testing-requested: true
  stream-from-cycle: true
issue: KSRU-13328
packages:
  generate: linux-generate
  lrg: linux-restricted-generate
  lrm: linux-restricted-modules
  lrs: linux-restricted-signatures
  main: linux
  meta: linux-meta
  signed: linux-signed
phase: Complete
phase-changed: Wednesday, 21. August 2024 10:27 UTC
reason: {}
synthetic:
  :promote-to-as-proposed: Invalid
trackers:
  focal/linux-hwe-5.15: bug 2075663
  focal/linux-riscv-5.15: bug 2075664
  jammy/linux-aws: bug 2075615
  jammy/linux-azure: bug 2075620
  jammy/linux-bluefield: bug 2075621
  jammy/linux-capilano: bug 2075624
  jammy/linux-ein: bug 2075626
  jammy/linux-fips: bug 2075627
  jammy/linux-gcp: bug 2075631
  jammy/linux-gke: bug 2075632
  jammy/linux-gkeop: bug 2075634
  jammy/linux-ibm: bug 2075636
  jammy/linux-ibm-gt: bug 2075638
  jammy/linux-intel-iotg: bug 2075650
  jammy/linux-kvm: bug 2075651
  jammy/linux-lowlatency: bug 2075653
  jammy/linux-nvidia: bug 2075654
  jammy/linux-oracle: bug 2075656
  jammy/linux-raspi: bug 2075658
  jammy/linux-realtime: bug 2075643
  jammy/linux-uc22: bug 2075660
  jammy/linux-xilinx-zynqmp: bug 2075662
variant: debs
versions:
  lrm: 5.15.0-119.129
  main: 5.15.0-119.129
  meta: 5.15.0.119.119
  signed: 5.15.0-119.129
~~:
  announce:
    swm-transition-crankable: 2024-08-02 11:44:18.837969
  clamps:
    new-review: ecc0461156422e58
    promote-to-proposed: ecc0461156422e58
    self: 5.15.0-119.129
    sru-review: ecc0461156422e58
  tracker:
    last-message: '2024-08-20 21:32:23.048758+00:00'

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-s2024.07.08-1
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux (Ubuntu Jammy):
importance: Undecided → Medium
tags: added: kernel-block-derivatives
tags: added: kernel-regression-testing-early
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
description: updated
tags: added: kernel-jira-issue-ksru-13328
description: updated
Manuel Diewald (diewald)
summary: - jammy/linux: <version to be filled> -proposed tracker
+ jammy/linux: 5.15.0-119.129 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Ancillary Bot (ubuntu-kernel-ancillary-bot) wrote : ABI testing

amd64/generic canonical-certs.pem unchanged
amd64/generic canonical-revoked-certs.pem unchanged
amd64/generic fwinfo unchanged
amd64/generic modules unchanged
amd64/generic retpoline unchanged
arm64/generic canonical-certs.pem unchanged
arm64/generic canonical-revoked-certs.pem unchanged
arm64/generic fwinfo unchanged
arm64/generic modules unchanged
arm64/generic retpoline unchanged
arm64/generic-64k canonical-certs.pem unchanged
arm64/generic-64k canonical-revoked-certs.pem unchanged
arm64/generic-64k fwinfo unchanged
arm64/generic-64k modules unchanged
arm64/generic-64k retpoline unchanged
armhf/generic canonical-certs.pem unchanged
armhf/generic canonical-revoked-certs.pem unchanged
armhf/generic fwinfo unchanged
armhf/generic modules unchanged
armhf/generic retpoline unchanged
armhf/generic-lpae canonical-certs.pem unchanged
armhf/generic-lpae canonical-revoked-certs.pem unchanged
armhf/generic-lpae fwinfo unchanged
armhf/generic-lpae modules unchanged
armhf/generic-lpae retpoline unchanged
ppc64el/generic canonical-certs.pem unchanged
ppc64el/generic canonical-revoked-certs.pem unchanged
ppc64el/generic fwinfo unchanged
ppc64el/generic modules unchanged
ppc64el/generic retpoline unchanged
s390x/generic canonical-certs.pem unchanged
s390x/generic canonical-revoked-certs.pem unchanged
s390x/generic fwinfo unchanged
s390x/generic modules unchanged
s390x/generic retpoline unchanged

description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Manuel Diewald (diewald) wrote :

Machines gunyolk.arm64 and hinyari.arm64 currently blocked by users, so cannot be deployed for BT.

tags: added: boot-testing-passed
tags: added: kernel-unblock-derivatives
removed: kernel-block-derivatives
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 5.15.0-119.129

---------------
linux (5.15.0-119.129) jammy; urgency=medium

  * jammy/linux: 5.15.0-119.129 -proposed tracker (LP: #2075665)

  * Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4
    (LP: #2073267)
    - SAUCE: Revert "randomize_kstack: Improve entropy diffusion"

  * CVE-2024-26921
    - inet: inet_defrag: prevent sk release while still in use

  * Jammy update: v5.15.162 upstream stable release (LP: #2073765) //
    CVE-2024-39484
    - mmc: davinci: Don't strip remove function when driver is builtin

  * Jammy update: v5.15.162 upstream stable release (LP: #2073765)
    - mmc: davinci_mmc: Convert to platform remove callback returning void

  * CVE-2024-39292
    - um: Add winch to winch_handlers before registering winch IRQ

  * CVE-2024-36901
    - ipv6: prevent NULL dereference in ip6_output()

  * CVE-2024-26830
    - i40e: Do not allow untrusted VF to remove administratively set MAC

  * CVE-2024-26680
    - net: atlantic: Fix DMA mapping for PTP hwts ring

  * CVE-2023-52760
    - gfs2: Fix slab-use-after-free in gfs2_qd_dealloc

  * CVE-2023-52629
    - sh: push-switch: Reorder cleanup operations to avoid use-after-free bug

 -- Manuel Diewald <email address hidden> Fri, 02 Aug 2024 16:15:36 +0200

Changed in linux (Ubuntu Jammy):
status: New → Fix Released
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being closed

Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.