--- Comment From tmri...@de.ibm.com 2022-06-08 01:32 EDT---
No worries, I took this as a refreshing knowledge exercise
I do not install ubuntu very often on s390x, so this came at the right time.
--
You received this bug notification because you are a member of Kernel
Packages, which
I installed Mainline Kernel 5.17.11 and the problem has disappeared
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1970965
Title:
Wifi randomly disconnects [AR9462]
Status in linux
cal-20.04-amd64-server-20220607
(ami-04f23e7f9aab5eab8)
# dpkg -s linux-aws
Package: linux-aws
Status: install ok installed
Priority: optional
Section: kernel
Installed-Size: 12
Maintainer: Ubuntu Kernel Team
Architecture: amd64
Source: linux-meta-aws-5.13
Version: 5.13.0.1
-20.04-amd64-server-20220607
(ami-04f23e7f9aab5eab8)
# dpkg -s linux-aws
Package: linux-aws
Status: install ok installed
Priority: optional
Section: kernel
Installed-Size: 12
Maintainer: Ubuntu Kernel Team
Architecture: amd64
Source: linux-meta-aws-5.13
Version: 5.13.0.1028.31~20.04.22
Provides: ke
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
[Expired for linux-oem-5.14 (Ubuntu Focal) because there has been no
activity for 60 days.]
** Changed in: linux-oem-5.14 (Ubuntu Focal)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
bam, I don't have any bluetooth keyboard or mouse but I tried with an
App on an android device that acts as bluetooth keyboard/mouse, it did
nothing (i.e. no wakeup)
Although, the moment the system went to sleep, the app disconnected, so,
I think the bluetooth connection isn't maintained in deep
Does `fwupdmgr refresh && fwupdmgr update` update the thunderbolt
firmware?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1970392
Title:
22.04 USB devices do not work after sleep on
PDJB, is this also a regression?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1898301
Title:
Intel 9462 and 9560 wifi cards detected but not functional on boot
Status in
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1968391
Title:
Unreliable wifi with loads of CTRL-EVENT-BEACON-LOSS
I think `modprobe -r` may work better. Can you please list what modules
are unloaded so we can rule them out?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1912935
Title:
battery drain
Here's a great guide:
https://www.kernel.org/doc/html/latest/admin-guide/acpi/initrd_table_override.html
Here's the ASL in DSDT:
Device (BAT1)
{
Name (BATP, 0x0F)
Method (_STA, 0, NotSerialized) // _STA: Status
{
SRU requested:
https://lists.ubuntu.com/archives/kernel-team/2022-June/130877.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1973167
Title:
linux-image-4.15.0-177-generic freezes
** Description changed:
- After updating to linux-image-4.15.0-177-generic, my machine completely
- freezes on the Ubuntu Welcome screen, i.e. right after switching to GUI
- mode. The mouse pointer is frozen, the keyboard does not even respond to
- CAPS LOCK or NUM LOCK, pressing CTRL+ALT+F2
** Changed in: oem-priority
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1889384
Title:
ASPM not enabled on child devices behind VMD
bug 1969239 has been marked as fix-released with 5.4.0-117.132
** Changed in: linux (Ubuntu Focal)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: kunpeng920/ubuntu-20.04-hwe
Status: Fix Committed => Fix Released
** Changed in: kunpeng920/ubuntu-20.04
Status: Fix Committed => Fix Released
** Changed in: kunpeng920
Status: Fix Committed => Fix Released
--
You received this bug notification because you
** Tags added: originate-from-197
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14 in Ubuntu.
https://bugs.launchpad.net/bugs/1976503
Title:
Power cycle USB ports on shutdown/reboot
Status in HWE Next:
New
Status
** Tags added: ppc64el sru-20220509 sru-20220530 ubuntu-kernel-selftests
** Tags added: 5.15 jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977898
Title:
net:fib_nexthops.sh in
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1977898
and then change the status of the bug to 'Confirmed'.
If, due to the
Public bug reported:
Issue found on 5.15.0-36.37
Test failed with:
TEST: IPv6 compat mode on - route add notification [FAIL]
Test log:
# selftests: net: fib_nexthops.sh
#
# Basic functional tests
# --
# TEST: List with nothing defined
Update to 5.15.0-35-generic seems to have fixed the WiFi issues. I no
longer have unstable WiFi and not more CTRL-EVENT-BEACON-LOSS in the
logs either. I've been using it for the past two days.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed
** Changed in: oem-priority
Status: Fix Committed => Fix Released
** Changed in: linux-oem-5.17 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
** Changed in: oem-priority
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1972802
Title:
enable config for fixing 5.17 kernel
I have the same issue with 4.15.0-184 as with .177 and .180.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1973167
Title:
linux-image-4.15.0-177-generic freezes on the welcome screen
I applied all of the patches as they did cherry pick cleanly. I had to
make the following changes to get it to build:
On line 4007 I made this change:
drivers/scsi/mpi3mr/mpi3mr_os.c
- scsi_done(scmd);
+ scmd->scsi_done(scmd);
On line 4149 I made this change
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595380/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595381/+files/acpidump.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595379/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595378/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595371/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595370/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595377/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "PaInfo.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595372/+files/PaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595376/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595375/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595373/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595374/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595368/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "Lspci-vt.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595369/+files/Lspci-vt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595367/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595366/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
ProblemType: Bug
ApportVersion: 2.20.11-0ubuntu82.1
Architecture: amd64
AudioDevicesInUse:
USERPID ACCESS COMMAND
/dev/snd/controlC0: braadli4596 F pipewire
braadli4597 F pipewire-media-
/dev/snd/seq:braadli4596 F pipewire
CRDA: N/A
apport information
** Attachment added: "AlsaInfo.txt"
https://bugs.launchpad.net/bugs/1898301/+attachment/5595365/+files/AlsaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
This bug was fixed in the package nvidia-graphics-drivers-510-server -
510.73.08-0ubuntu0.18.04.1
---
nvidia-graphics-drivers-510-server (510.73.08-0ubuntu0.18.04.1) bionic;
urgency=medium
* New upstream release (LP: #1975509):
- When calculating the address of grid barrier
This bug was fixed in the package nvidia-graphics-drivers-510-server -
510.73.08-0ubuntu0.20.04.1
---
nvidia-graphics-drivers-510-server (510.73.08-0ubuntu0.20.04.1) focal;
urgency=medium
* New upstream release (LP: #1975509):
- When calculating the address of grid barrier
** Changed in: linux-firmware (Ubuntu)
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1371425
Title:
linux-firmware 1.127.5, 1.127.6
Same issue with a different Intel card: Intel(R) Wireless-AC 9560 160MHz,
REV=0x318
Ubuntu 22.04
[ 27.661715] iwlwifi: unknown parameter 'd0i3_disable' ignored
[ 27.661720] iwlwifi: unknown parameter 'lar_disable' ignored
[ 27.770071] iwlwifi :00:14.3: WRT: Overriding region id 0
[
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-firmware (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
** Changed in: linux-gke-5.4 (Ubuntu)
Status: Fix Committed => Fix Released
** Changed in: linux-oracle-5.13 (Ubuntu)
Status: Fix Committed => Fix Released
** Changed in: linux-bluefield (Ubuntu)
Status: Confirmed => Fix Committed
--
You received this bug notification
** CVE removed: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1966
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1976363
Title:
upcoming update - nf oob
Status in linux package
This bug was fixed in the package linux-raspi-5.4 -
5.4.0-1065.75~18.04.1
---
linux-raspi-5.4 (5.4.0-1065.75~18.04.1) bionic; urgency=medium
[ Ubuntu: 5.4.0-1065.75 ]
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow
This bug was fixed in the package linux-raspi2 - 4.15.0-1114.122
---
linux-raspi2 (4.15.0-1114.122) bionic; urgency=medium
[ Ubuntu: 4.15.0-184.194 ]
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza Cascardo
Could someone try wake up from deep sleep on Bluetooth? Didn't work for me
since recently (maybe Ubuntu 21.10), I wonder if it's related issue or not.
Thanks.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
This bug was fixed in the package linux - 4.15.0-184.194
---
linux (4.15.0-184.194) bionic; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza Cascardo Thu, 02 Jun
2022 15:36:51 -0300
** Changed
This bug was fixed in the package linux-oem-5.14 - 5.14.0-1042.47
---
linux-oem-5.14 (5.14.0-1042.47) focal; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux-oem-5.14 - 5.14.0-1042.47
---
linux-oem-5.14 (5.14.0-1042.47) focal; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux - 4.15.0-184.194
---
linux (4.15.0-184.194) bionic; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza Cascardo Thu, 02 Jun
2022 15:36:51 -0300
** Changed
This bug was fixed in the package linux-oem-5.14 - 5.14.0-1042.47
---
linux-oem-5.14 (5.14.0-1042.47) focal; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux - 4.15.0-184.194
---
linux (4.15.0-184.194) bionic; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza Cascardo Thu, 02 Jun
2022 15:36:51 -0300
** Changed
This bug was fixed in the package linux - 4.15.0-184.194
---
linux (4.15.0-184.194) bionic; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza Cascardo Thu, 02 Jun
2022 15:36:51 -0300
** Changed
This bug was fixed in the package linux-oem-5.14 - 5.14.0-1042.47
---
linux-oem-5.14 (5.14.0-1042.47) focal; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux-intel-5.13 - 5.13.0-1014.15
---
linux-intel-5.13 (5.13.0-1014.15) focal; urgency=medium
[ Ubuntu: 5.13.0-48.54~20.04.1 ]
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter:
This bug was fixed in the package linux-azure - 5.4.0-1083.87
---
linux-azure (5.4.0-1083.87) focal; urgency=medium
[ Ubuntu: 5.4.0-117.132 ]
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in
This bug was fixed in the package linux-azure - 5.4.0-1083.87
---
linux-azure (5.4.0-1083.87) focal; urgency=medium
[ Ubuntu: 5.4.0-117.132 ]
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in
This bug was fixed in the package linux-oem-5.14 - 5.14.0-1042.47
---
linux-oem-5.14 (5.14.0-1042.47) focal; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux-azure - 5.4.0-1083.87
---
linux-azure (5.4.0-1083.87) focal; urgency=medium
[ Ubuntu: 5.4.0-117.132 ]
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in
This bug was fixed in the package linux-oem-5.14 - 5.14.0-1042.47
---
linux-oem-5.14 (5.14.0-1042.47) focal; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This is CVE-2022-1972.
** Information type changed from Private Security to Public Security
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1972
** Description changed:
- placeholder - embargoed until June 2nd
+ [Impact]
+ An unprivileged user could write out-of-bounds by
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1011.12
---
linux-oem-5.17 (5.17.0-1011.12) jammy; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1011.12
---
linux-oem-5.17 (5.17.0-1011.12) jammy; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1011.12
---
linux-oem-5.17 (5.17.0-1011.12) jammy; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux-meta-azure-fde -
5.4.0.1083.87+cvm1.24
---
linux-meta-azure-fde (5.4.0.1083.87+cvm1.24) focal; urgency=medium
* Bump ABI 5.4.0-1083.87+cvm1
* linux-azure-fde: Do not depend on grub (LP: #1976763)
- [Package] Skip diverting grub when
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1011.12
---
linux-oem-5.17 (5.17.0-1011.12) jammy; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1011.12
---
linux-oem-5.17 (5.17.0-1011.12) jammy; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1011.12
---
linux-oem-5.17 (5.17.0-1011.12) jammy; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1011.12
---
linux-oem-5.17 (5.17.0-1011.12) jammy; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1011.12
---
linux-oem-5.17 (5.17.0-1011.12) jammy; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1011.12
---
linux-oem-5.17 (5.17.0-1011.12) jammy; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
This bug was fixed in the package linux - 5.4.0-117.132
---
linux (5.4.0-117.132) focal; urgency=medium
* CVE-2022-1966
- netfilter: nf_tables: add nft_set_elem_expr_alloc()
- netfilter: nf_tables: disallow non-stateful expression in sets earlier
-- Thadeu Lima de Souza
This bug was fixed in the package linux-oem-5.17 - 5.17.0-1011.12
---
linux-oem-5.17 (5.17.0-1011.12) jammy; urgency=medium
* CVE-2022-1972
- netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
* CVE-2022-1966
- netfilter: nf_tables: disallow non-stateful
Hi Thomas, thx for the verification.
Well, this is (kind of) expected for now.
The request to validate (in comment #7 above:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1974433/comments/7)
was so far for jammy aka Ubuntu 22.04 only.
A separate comment will be added once an updated
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: zfs-linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
Public bug reported:
Touchpad doesn't work
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: linux-image-5.14.0-1038-oem 5.14.0-1038.42
ProcVersionSignature: Ubuntu 5.14.0-1038.42-oem 5.14.21
Uname: Linux 5.14.0-1038-oem x86_64
ApportVersion: 2.20.11-0ubuntu27.24
Architecture: amd64
** Changed in: linux-kvm (Ubuntu Jammy)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1963088
Title:
Add support for TPM
Status in
1 - 100 of 206 matches
Mail list logo