This bug was fixed in the package linux-gcp - 5.4.0-1138.147 --------------- linux-gcp (5.4.0-1138.147) focal; urgency=medium
* focal/linux-gcp: 5.4.0-1138.147 -proposed tracker (LP: #2082208) [ Ubuntu: 5.4.0-198.218 ] * focal/linux: 5.4.0-198.218 -proposed tracker (LP: #2082232) * Packaging resync (LP: #1786013) - [Packaging] debian.master/dkms-versions -- update from kernel-versions (main/s2024.09.02) * CVE-2024-45016 - netem: fix return value if duplicate enqueue fails * CVE-2024-38630 - watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger * CVE-2024-27397 - netfilter: nf_tables: use timestamp to check for set element timeout * CVE-2024-26960 - mm: swap: fix race between free_swap_and_cache() and swapoff() linux-gcp (5.4.0-1137.146) focal; urgency=medium * focal/linux-gcp: 5.4.0-1137.146 -proposed tracker (LP: #2078183) [ Ubuntu: 5.4.0-196.216 ] * focal/linux: 5.4.0-196.216 -proposed tracker (LP: #2078205) * CVE-2024-39494 - ima: Fix use-after-free on a dentry's dname.name * CVE-2024-42160 - f2fs: check validation of fault attrs in f2fs_build_fault_attr() - f2fs: Add inline to f2fs_build_fault_attr() stub * CVE-2024-38570 - gfs2: Rename sd_{ glock => kill }_wait - gfs2: Fix potential glock use-after-free on unmount * CVE-2024-42228 - drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc * CVE-2022-48791 - scsi: pm80xx: Fix TMF task completion race condition - scsi: pm8001: Fix use-after-free for aborted TMF sas_task * CVE-2024-26787 - mmc: mmci_sdmmc: Rename sdmmc_priv struct to sdmmc_idma - mmc: mmci: stm32: use a buffer for unaligned DMA requests - mmc: mmci: stm32: fix DMA API overlapping mappings warning * CVE-2024-27012 - netfilter: nf_tables: restore set elements when delete set fails * CVE-2022-48863 - mISDN: Fix memory leak in dsp_pipeline_build() * CVE-2021-47188 - scsi: ufs: core: Improve SCSI abort handling * CVE-2024-26677 - rxrpc: Fix delayed ACKs to not set the reference serial number -- Kevin Becker <kevin.bec...@canonical.com> Mon, 07 Oct 2024 14:47:23 -0400 ** Changed in: linux-gcp (Ubuntu Focal) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-47188 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-48791 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-48863 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26677 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26787 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26960 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-27012 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-27397 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38570 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38630 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-39494 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42160 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42228 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-45016 -- You received this bug notification because you are a member of hardware- certification-users, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/2082208 Title: focal/linux-gcp: 5.4.0-1138.147 -proposed tracker Status in canonical-signing-jobs task00 series: Fix Released Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow abi-testing series: Fix Released Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow boot-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow new-review series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-generate series: Fix Released Status in Kernel SRU Workflow prepare-package-lrg series: Fix Released Status in Kernel SRU Workflow prepare-package-lrm series: Fix Released Status in Kernel SRU Workflow prepare-package-lrs series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow sru-review series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-gcp source package in Focal: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- built: from: f131e3a49d78641d route-entry: 2 comments: abi-testing: 1 delta: promote-to-proposed: [lrm, lrs, main, meta, signed, lrg, generate] promote-to-updates: [lrm, lrs, main, meta, signed] flag: boot-testing-requested: true bugs-spammed: true proposed-announcement-sent: true proposed-testing-requested: true stream-from-cycle: true issue: KSRU-14074 kernel-stable-master-bug: 2082232 packages: generate: linux-generate-gcp lrg: linux-restricted-generate-gcp lrm: linux-restricted-modules-gcp lrs: linux-restricted-signatures-gcp main: linux-gcp meta: linux-meta-gcp signed: linux-signed-gcp phase: Promote to Updates phase-changed: Tuesday, 15. October 2024 10:12 UTC reason: promote-to-updates: Ongoing -- packages not yet published synthetic: :promote-to-as-proposed: Invalid testing: verification-bugs: [2082208] trackers: bionic/linux-gcp-5.4: bug 2082207 focal/linux-gcp-fips: bug 2082206 variant: debs versions: lrm: 5.4.0-1138.147 main: 5.4.0-1138.147 meta: 5.4.0.1138.140 signed: 5.4.0-1138.147 ~~: announce: swm-transition-crankable: 2024-10-07 14:12:04.542668 clamps: new-review: f131e3a49d78641d promote-to-proposed: f131e3a49d78641d self: 5.4.0-1138.147 sru-review: f131e3a49d78641d tracker: last-message: '2024-10-15 11:05:03.655774+00:00' To manage notifications about this bug go to: https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2082208/+subscriptions -- Mailing list: https://launchpad.net/~canonical-hw-cert Post to : canonical-hw-cert@lists.launchpad.net Unsubscribe : https://launchpad.net/~canonical-hw-cert More help : https://help.launchpad.net/ListHelp