Focal update: upstream stable patchset 2022-05-11
Bug #1972990 reported by
Timo Aaltonen
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux-oem-5.14 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Focal |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
upstream stable patchset 2022-05-11
from git://git.
Changed in linux-oem-5.14 (Ubuntu): | |
status: | New → Confirmed |
tags: | added: kernel-stable-tracking-bug |
Changed in linux-oem-5.14 (Ubuntu): | |
status: | Confirmed → Invalid |
To post a comment you must log in.
This bug was fixed in the package linux-oem-5.14 - 5.14.0-1042.47
---------------
linux-oem-5.14 (5.14.0-1042.47) focal; urgency=medium
* CVE-2022-1972 desc_concat_ parse()
- netfilter: nf_tables: sanitize nft_set_
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 03 Jun 2022 15:00:01 -0300