[Kernel-packages] [Bug 1959890] Re: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option
This bug was fixed in the package linux - 5.19.0-18.18 --- linux (5.19.0-18.18) kinetic; urgency=medium * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366) * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084 (LP: #1990236) - Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label flags" - Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS" - Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer"" - Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup"" - Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy"" - Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending request"" - Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before reset"" - Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making request"" - Revert "UBUNTU: [Config] update configs after apply new apparmor patch set" - Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation" - Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook" - Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable" - Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()" - Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive flag" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for full LSM context" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function lsmcontext_init" - Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in audit data" - Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple object contexts" - Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm values for netlabel" - Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple task security contexts" - Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in an audit_buffer" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report multiple LSMs" - Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp structure" - Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in audit_names" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx module selection" - Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for confirmation" - Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a lsmblob" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in netlink netfilter" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in security_dentry_init_security" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in security_inode_getsecctx" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in security_secid_to_secctx" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM context releaser" - Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to display" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to display" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in security_cred_getsecid" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in security_inode_getsecid" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in security_current_getsecid" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in security_ipc_getsecid" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in security_secid_to_secctx" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in security_secctx_to_secid" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in security_kernel_act_as" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in security_audit_rule_match" - Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with stacked LSMs" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot mappings" - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data structure." - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of the sock security" - Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate ima_filter_rule from security_audit_rule" - Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to aa_sock()" - Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix mqueues" - Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()" -
[Kernel-packages] [Bug 1959890] Re: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option
This is incl. in linux-generic 5.19.0-16.16 (meanwhile overruled by 5.19.0.18.18) and is with that in kinetic-proposed, hence updating the status to Fix Committed. ** Changed in: linux (Ubuntu Kinetic) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959890 Title: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option Status in Ubuntu on IBM z Systems: Fix Released Status in linux package in Ubuntu: Fix Committed Status in linux source package in Kinetic: Fix Committed Bug description: Deactivitate CONFIG_QETH_OSX by dropping this kernel config option To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959890/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1959890] Re: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option
** Also affects: linux (Ubuntu Kinetic) Importance: High Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Fix Released ** Changed in: linux (Ubuntu Kinetic) Status: Fix Released => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959890 Title: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option Status in Ubuntu on IBM z Systems: Fix Released Status in linux package in Ubuntu: Confirmed Status in linux source package in Kinetic: Confirmed Bug description: Deactivitate CONFIG_QETH_OSX by dropping this kernel config option To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959890/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1959890] Re: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option
This bug is already Fix Released and closed and was requested for jammy only. So it wasn't requested for focal, hence updating the tags to 'verification-done-focal' to unblock any processes. ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959890 Title: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option Status in Ubuntu on IBM z Systems: Fix Released Status in linux package in Ubuntu: Fix Released Bug description: Deactivitate CONFIG_QETH_OSX by dropping this kernel config option To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959890/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1959890] Re: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option
This bug is awaiting verification that the linux- oracle-5.15/5.15.0-1006.8~20.04.1 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-focal' to 'verification-done-focal'. If the problem still exists, change the tag 'verification-needed-focal' to 'verification-failed-focal'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959890 Title: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option Status in Ubuntu on IBM z Systems: Fix Released Status in linux package in Ubuntu: Fix Released Bug description: Deactivitate CONFIG_QETH_OSX by dropping this kernel config option To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959890/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1959890] Re: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option
** Changed in: ubuntu-z-systems Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959890 Title: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option Status in Ubuntu on IBM z Systems: Fix Released Status in linux package in Ubuntu: Fix Released Bug description: Deactivitate CONFIG_QETH_OSX by dropping this kernel config option To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959890/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1959890] Re: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option
This bug was fixed in the package linux - 5.15.0-23.23 --- linux (5.15.0-23.23) jammy; urgency=medium * jammy/linux: 5.15.0-23.23 -proposed tracker (LP: #1964573) * Packaging resync (LP: #1786013) - [Packaging] resync dkms-build{,--nvidia-N} from LRMv5 - debian/dkms-versions -- update from kernel-versions (main/master) * [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests (LP: #1959977) - KVM: s390: pv: make use of ultravisor AIV support * intel_iommu breaks Intel IPU6 camera: isys port open ready failed -16 (LP: #1958004) - SAUCE: iommu: intel-ipu: use IOMMU passthrough mode for Intel IPUs * CVE-2022-23960 - ARM: report Spectre v2 status through sysfs - ARM: early traps initialisation - ARM: use LOADADDR() to get load address of sections - ARM: Spectre-BHB workaround - ARM: include unprivileged BPF status in Spectre V2 reporting - arm64: Add Neoverse-N2, Cortex-A710 CPU part definition - arm64: Add HWCAP for self-synchronising virtual counter - arm64: Add Cortex-X2 CPU part definition - arm64: add ID_AA64ISAR2_EL1 sys register - arm64: cpufeature: add HWCAP for FEAT_AFP - arm64: cpufeature: add HWCAP for FEAT_RPRES - arm64: entry.S: Add ventry overflow sanity checks - arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit - KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A - arm64: entry: Make the trampoline cleanup optional - arm64: entry: Free up another register on kpti's tramp_exit path - arm64: entry: Move the trampoline data page before the text page - arm64: entry: Allow tramp_alias to access symbols after the 4K boundary - arm64: entry: Don't assume tramp_vectors is the start of the vectors - arm64: entry: Move trampoline macros out of ifdef'd section - arm64: entry: Make the kpti trampoline's kpti sequence optional - arm64: entry: Allow the trampoline text to occupy multiple pages - arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations - arm64: entry: Add vectors that have the bhb mitigation sequences - arm64: entry: Add macro for reading symbol addresses from the trampoline - arm64: Add percpu vectors for EL1 - arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2 - arm64: Mitigate spectre style branch history side channels - KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated - arm64: Use the clearbhb instruction in mitigations - arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting - ARM: fix build error when BPF_SYSCALL is disabled * CVE-2021-26401 - x86/speculation: Use generic retpoline by default on AMD - x86/speculation: Update link to AMD speculation whitepaper - x86/speculation: Warn about Spectre v2 LFENCE mitigation - x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT * CVE-2022-0001 - x86,bugs: Unconditionally allow spectre_v2=retpoline,amd - x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE - x86/speculation: Add eIBRS + Retpoline options - Documentation/hw-vuln: Update spectre doc - x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting * Jammy update: v5.15.27 upstream stable release (LP: #1964361) - mac80211_hwsim: report NOACK frames in tx_status - mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work - i2c: bcm2835: Avoid clock stretching timeouts - ASoC: rt5668: do not block workqueue if card is unbound - ASoC: rt5682: do not block workqueue if card is unbound - regulator: core: fix false positive in regulator_late_cleanup() - Input: clear BTN_RIGHT/MIDDLE on buttonpads - btrfs: get rid of warning on transaction commit when using flushoncommit - KVM: arm64: vgic: Read HW interrupt pending state from the HW - block: loop:use kstatfs.f_bsize of backing file to set discard granularity - tipc: fix a bit overflow in tipc_crypto_key_rcv() - cifs: do not use uninitialized data in the owner/group sid - cifs: fix double free race when mount fails in cifs_get_root() - cifs: modefromsids must add an ACE for authenticated users - selftests/seccomp: Fix seccomp failure by adding missing headers - drm/amd/pm: correct UMD pstate clocks for Dimgrey Cavefish and Beige Goby - dmaengine: shdma: Fix runtime PM imbalance on error - i2c: cadence: allow COMPILE_TEST - i2c: imx: allow COMPILE_TEST - i2c: qup: allow COMPILE_TEST - net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 - block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern - usb: gadget: don't release an existing dev->buf - usb: gadget: clear related members when goto fail - exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() - exfat: fix i_blocks for files truncated over
[Kernel-packages] [Bug 1959890] Re: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option
** Information type changed from Private to Public -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1959890 Title: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option Status in Ubuntu on IBM z Systems: In Progress Status in linux package in Ubuntu: In Progress Bug description: Deactivitate CONFIG_QETH_OSX by dropping this kernel config option To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959890/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp