[Canonical-hw-cert] [Bug 2102572] Re: jammy/linux-kvm: 5.15.0-1078.83 -proposed tracker
This bug was fixed in the package linux-kvm - 5.15.0-1078.83 --- linux-kvm (5.15.0-1078.83) jammy; urgency=medium * jammy/linux-kvm: 5.15.0-1078.83 -proposed tracker (LP: #2102572) * Build failure when CONFIG_NET_SWITCHDEV=n due to CVE-2024-26837 fix backport (LP: #2104380) - SAUCE: net: switchdev: fix compilation error for CONFIG_NET_SWITCHDEV=n [ Ubuntu: 5.15.0-138.148 ] * jammy/linux: 5.15.0-138.148 -proposed tracker (LP: #2102587) * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J (LP: #2096976) - SAUCE: selftest: netfilter: fix null IP field in kci_test_ipsec_offload * CVE-2025-21756 - vsock: Keep the binding until socket destruction - vsock: Orphan socket after transport release * CVE-2024-50256 - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() * CVE-2025-21702 - pfifo_tail_enqueue: Drop new packet when sch->limit == 0 * CVE-2025-21703 - netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() * CVE-2025-21700 - net: sched: Disallow replacing of child qdisc from one parent to another * CVE-2024-46826 - ELF: fix kernel.randomize_va_space double read * CVE-2024-56651 - can: hi311x: hi3110_can_ist(): fix potential use-after-free * iBFT iSCSI out-of-bounds shift UBSAN warning (LP: #2097824) - iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() * CVE-2024-50248 - ntfs3: Add bounds checking to mi_enum_attr() - fs/ntfs3: Sequential field availability check in mi_enum_attr() * CVE-2022-0995 - watch_queue: Use the bitmap API when applicable * CVE-2024-26837 - net: bridge: switchdev: Skip MDB replays of deferred events on offload * CVE-2025-21701 - net: avoid race between device unregistration and ethnl ops * CVE-2024-57798 - drm/dp_mst: Skip CSN if topology probing is not done yet - drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() * CVE-2024-56658 - net: defer final 'struct net' free in netns dismantle * CVE-2024-35864 - smb: client: fix potential UAF in smb2_is_valid_lease_break() * CVE-2024-35864/CVE-2024-26928 - smb: client: fix potential UAF in cifs_debug_files_proc_show() -- Stefan Bader Thu, 27 Mar 2025 16:48:45 +0100 ** Changed in: linux-kvm (Ubuntu Jammy) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-0995 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26837 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26928 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35864 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46826 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50248 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50256 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56651 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56658 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57798 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21700 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21701 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21702 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21703 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21756 -- You received this bug notification because you are a member of hardware- certification-users, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/2102572 Title: jammy/linux-kvm: 5.15.0-1078.83 -proposed tracker Status in canonical-signing-jobs task00 series: Fix Released Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow abi-testing series: Fix Released Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow boot-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow new-review series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-generate series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow sru-review series: Fix Released Status in Kernel SRU Workflow verification-tes
[Canonical-hw-cert] [Bug 2102572] Re: jammy/linux-kvm: 5.15.0-1078.83 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of hardware- certification-users, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/2102572 Title: jammy/linux-kvm: 5.15.0-1078.83 -proposed tracker Status in canonical-signing-jobs task00 series: Fix Released Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow abi-testing series: Fix Released Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow boot-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow new-review series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-generate series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow sru-review series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-kvm source package in Jammy: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- built: from: 3bb140f2625a93ee route-entry: 1 comments: abi-testing: 1 delta: promote-to-proposed: [main, meta, signed, generate] flag: boot-testing-requested: true bugs-spammed: true proposed-announcement-sent: true proposed-testing-requested: true stream-from-cycle: true flavours: linux-image-kvm: [amd64] issue: KSRU-16209 kernel-stable-master-bug: 2102587 packages: generate: linux-generate-kvm main: linux-kvm meta: linux-meta-kvm signed: linux-signed-kvm phase: Signoff phase-changed: Friday, 04. April 2025 02:11 UTC reason: promote-to-updates: 'Holding -- waiting for signoffs: security-signoff' security-signoff: Stalled -s waiting for signoff synthetic: :promote-to-as-proposed: Fix Released :promote-to-build-public: Invalid testing: verification-bugs: [2104380, 2102572] variant: debs versions: main: 5.15.0-1078.83 meta: 5.15.0.1078.74 signed: 5.15.0-1078.83 ~~: announce: swm-transition-crankable: 2025-03-25 20:07:43.574927 clamps: new-review: 3bb140f2625a93ee promote-to-proposed: 3bb140f2625a93ee self: 5.15.0-1078.83 sru-review: 3bb140f2625a93ee tracker: last-message: '2025-03-27 18:45:15.372033+00:00' To manage notifications about this bug go to: https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2102572/+subscriptions -- Mailing list: https://launchpad.net/~canonical-hw-cert Post to : [email protected] Unsubscribe : https://launchpad.net/~canonical-hw-cert More help : https://help.launchpad.net/ListHelp

