You can install 5.4.0-150 from ppa:canonical-kernel-team/proposed2. That version has the fix for CVE-2023-32233 and other vulnerabilities.
-- You received this bug notification because you are a member of Canonical Hardware Certification, which is a bug assignee. https://bugs.launchpad.net/bugs/2019375 Title: focal/linux: 5.4.0-151.168 -proposed tracker Status in canonical-signing-jobs task00 series: Fix Released Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow boot-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow kernel-signoff series: Confirmed Status in Kernel SRU Workflow new-review series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-generate series: Fix Released Status in Kernel SRU Workflow prepare-package-lrg series: Fix Released Status in Kernel SRU Workflow prepare-package-lrm series: Fix Released Status in Kernel SRU Workflow prepare-package-lrs series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Incomplete Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow sru-review series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Focal: Confirmed Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- built: from: 0d9a42437a03bc1a route-entry: 1 delta: promote-to-proposed: [lrm, lrs, main, meta, signed, lrg, generate] flag: boot-testing-requested: true bugs-spammed: true proposed-announcement-sent: true proposed-testing-requested: true issue: KSRU-7434 packages: generate: linux-generate lrg: linux-restricted-generate lrm: linux-restricted-modules lrs: linux-restricted-signatures main: linux meta: linux-meta signed: linux-signed phase: Testing phase-changed: Monday, 22. May 2023 11:46 UTC reason: automated-testing: Stalled -s testing FAILED certification-testing: Ongoing -s testing in progress kernel-signoff: Stalled -s waiting for signoff regression-testing: Stalled -s testing FAILED security-signoff: Stalled -s waiting for signoff synthetic: :promote-to-as-proposed: Fix Released trackers: bionic/linux-hwe-5.4: bug 2019374 focal/linux-aws: bug 2019346 focal/linux-azure: bug 2019349 focal/linux-bluefield: bug 2019350 focal/linux-fips: bug 2019351 focal/linux-gcp: bug 2019354 focal/linux-gke: bug 2019355 focal/linux-gkeop: bug 2019356 focal/linux-ibm: bug 2019358 focal/linux-iot: bug 2019361 focal/linux-kvm: bug 2019362 focal/linux-nv-dgx: bug 2019363 focal/linux-oracle: bug 2019365 focal/linux-raspi: bug 2019369 focal/linux-uc20-efi: bug 2019371 focal/linux-xilinx-zynqmp: bug 2019372 variant: debs versions: lrm: 5.4.0-151.168 main: 5.4.0-151.168 meta: 5.4.0.151.148 signed: 5.4.0-151.168 ~~: clamps: new-review: 0d9a42437a03bc1a promote-to-proposed: 0d9a42437a03bc1a self: 5.4.0-151.168 sru-review: 0d9a42437a03bc1a To manage notifications about this bug go to: https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2019375/+subscriptions -- Mailing list: https://launchpad.net/~canonical-hw-cert Post to : [email protected] Unsubscribe : https://launchpad.net/~canonical-hw-cert More help : https://help.launchpad.net/ListHelp

