bionic/linux-azure-5.4: 5.4.0-1106.112~18.04.1 -proposed tracker
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
built:
from: a36cc71537ae48a3
route-entry: 1
delta:
promote-
flag:
boot-
bugs-spammed: true
proposed-
proposed-
issue: KSRU-6864
kernel-
packages:
generate: linux-generate-
lrg: linux-restricte
lrm: linux-restricte
lrs: linux-restricte
main: linux-azure-5.4
meta: linux-meta-
signed: linux-signed-
phase: Holding before Promote to Updates
phase-changed: Monday, 10. April 2023 19:31 UTC
reason:
promote-
synthetic:
:promote-
variant: debs
versions:
lrm: 5.4.0-1106.
main: 5.4.0-1106.
meta: 5.4.0.1106.79
signed: 5.4.0-1106.
~~:
clamps:
new-review: a36cc71537ae48a3
promote-
self: 5.4.0-1106.
sru-review: a36cc71537ae48a3
CVE References
- 2021-3669
- 2022-2196
- 2022-2663
- 2022-2978
- 2022-29901
- 2022-3028
- 2022-3061
- 2022-3108
- 2022-3524
- 2022-3545
- 2022-3564
- 2022-3565
- 2022-3566
- 2022-3567
- 2022-3594
- 2022-3621
- 2022-3643
- 2022-3903
- 2022-40768
- 2022-41218
- 2022-4139
- 2022-42703
- 2022-42719
- 2022-42896
- 2022-4382
- 2022-43945
- 2022-45934
- 2022-47520
- 2023-0266
- 2023-0461
- 2023-1281
- 2023-23559
- 2023-26545
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2023.03.20-1 |
description: | updated |
tags: | added: kernel-sru-backport-of-2011933 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-azure-5.4 (Ubuntu Bionic): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → Triaged |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Triaged → In Progress |
tags: | added: kernel-jira-issue-ksru-6864 |
description: | updated |
description: | updated |
summary: |
- bionic/linux-azure-5.4: <version to be filled> -proposed tracker + bionic/linux-azure-5.4: 5.4.0-1106.112~18.04.1 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: kernel-signing-bot |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Committed |
Changed in kernel-sru-workflow: | |
status: | Fix Committed → Fix Released |
This bug was fixed in the package linux-azure-5.4 - 5.4.0-1106. 112~18. 04.1
--------------- 1106.112~ 18.04.1) bionic; urgency=medium
linux-azure-5.4 (5.4.0-
* bionic/ linux-azure- 5.4: 5.4.0-1106. 112~18. 04.1 -proposed tracker
(LP: #2011932)
[ Ubuntu: 5.4.0-1106.112 ]
* focal/linux-azure: 5.4.0-1106.112 -proposed tracker (LP: #2011933) protected( ) to rcu_replace_ pointer( ) unprepare in ramc_probe( ) unprepare in devbus_ probe() unprepare( ) in usb2phy_ power_on( ) register( ) values( )
* focal/linux: 5.4.0-147.164 -proposed tracker (LP: #2011959)
* CVE-2023-26545
- net: mpls: fix stale pointer if allocation fails during device rename
* CVE-2023-1281
- rcu: Upgrade rcu_swap_
- net/sched: tcindex: update imperfect hash filters respecting rcu
* Focal update: v5.4.231 upstream stable release (LP: #2011226)
- clk: generalize devm_clk_get() a bit
- clk: Provide new devm_clk helpers for prepared and enabled clocks
- memory: atmel-sdramc: Fix missing clk_disable_
atmel_
- memory: mvebu-devbus: Fix missing clk_disable_
mvebu_
- ARM: dts: imx6qdl-gw560x: Remove incorrect 'uart-has-rtscts'
- ARM: imx27: Retrieve the SYSCTRL base address from devicetree
- ARM: imx31: Retrieve the IIM base address from devicetree
- ARM: imx35: Retrieve the IIM base address from devicetree
- ARM: imx: add missing of_node_put()
- HID: intel_ish-hid: Add check for ishtp_dma_tx_map
- EDAC/highbank: Fix memory leak in highbank_mc_probe()
- tomoyo: fix broken dependency on *.conf.default
- RDMA/core: Fix ib block iterator counter overflow
- IB/hfi1: Reject a zero-length user expected buffer
- IB/hfi1: Reserve user expected TIDs
- IB/hfi1: Fix expected receive setup error exit issues
- affs: initialize fsdata in affs_truncate()
- amd-xgbe: TX Flow Ctrl Registers are h/w ver dependent
- amd-xgbe: Delay AN timeout during KR training
- bpf: Fix pointer-leak due to insufficient speculative store bypass
mitigation
- phy: rockchip-inno-usb2: Fix missing clk_disable_
rockchip_
- net: nfc: Fix use-after-free in local_cleanup()
- net: wan: Add checks for NULL for utdm in undo_uhdlc_init and unmap_si_regs
- gpio: mxc: Always set GPIOs used as interrupt source to INPUT mode
- net/sched: sch_taprio: fix possible use-after-free
- net: fix a concurrency bug in l2tp_tunnel_
- l2tp: Serialize access to sk_user_data with sk_callback_lock
- l2tp: Don't sleep and disable BH under writer-side sk_callback_lock
- net: usb: sr9700: Handle negative len
- net: mdio: validate parameter addr in mdiobus_get_phy()
- HID: check empty report_list in hid_validate_
- HID: check empty report_list in bigben_probe()
- net: stmmac: fix invalid call to mdiobus_get_phy()
- HID: revert CHERRY_MOUSE_000C quirk
- usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait
- usb: gadget: f_fs: Ensure ep0req is dequeued before free_request
- net: mlx5: eliminate anonymous module_init & module_exit
- drm/panfrost: fix GENERIC_ATOMIC64 dependency
- dmaengine: Fix double increment of client_count in dma_chan_get()
- net: macb: fix PTP...