This bug was fixed in the package linux-gcp-5.19 -
5.19.0-1030.32~22.04.1

---------------
linux-gcp-5.19 (5.19.0-1030.32~22.04.1) jammy; urgency=medium

  * jammy/linux-gcp-5.19: 5.19.0-1030.32~22.04.1 -proposed tracker
    (LP: #2027609)

  * gcp: backport "iommu/amd: Add map/unmap_pages() iommu_domain_ops  callback
    support" (LP: #2023313)
    - iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback
    - iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback
    - iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support

linux-gcp-5.19 (5.19.0-1029.31~22.04.1) jammy; urgency=medium

  * jammy/linux-gcp-5.19: 5.19.0-1029.31~22.04.1 -proposed tracker
    (LP: #2026451)

  * Packaging resync (LP: #1786013)
    - [Packaging] update update.conf

  [ Ubuntu: 5.19.0-50.50 ]

  * jammy/linux-hwe-5.19: 5.19.0-50.50 -proposed tracker (LP: #2026456)
  * CVE-2023-2640 // CVE-2023-32629
    - Revert "UBUNTU: SAUCE: overlayfs: handle idmapped mounts in
      ovl_do_(set|remove)xattr"
    - Revert "UBUNTU: SAUCE: overlayfs: Skip permission checking for
      trusted.overlayfs.* xattrs"
    - SAUCE: overlayfs: default to userxattr when mounted from non initial user
      namespace
  * CVE-2023-35001
    - netfilter: nf_tables: prevent OOB access in nft_byteorder_eval
  * CVE-2023-31248
    - netfilter: nf_tables: do not ignore genmask when looking up chain by id
  * CVE-2023-3389
    - io_uring: hold uring mutex around poll removal
  * CVE-2023-3390
    - netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
  * CVE-2023-3141
    - memstick: r592: Fix UAF bug in r592_remove due to race condition
  * CVE-2023-3090
    - ipvlan:Fix out-of-bounds caused by unclear skb->cb
  * CVE-2022-48502
    - fs/ntfs3: Check fields while reading
  * Packaging resync (LP: #1786013)
    - [Packaging] update update.conf

 -- Thadeu Lima de Souza Cascardo <[email protected]>  Wed, 12 Jul
2023 16:00:46 -0300

** Changed in: linux-gcp-5.19 (Ubuntu Jammy)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-48502

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-2640

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-3090

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-31248

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-3141

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-32629

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-3389

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-3390

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-35001

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2023313

Title:
  gcp: backport "iommu/amd: Add map/unmap_pages() iommu_domain_ops
  callback support"

Status in linux-gcp package in Ubuntu:
  In Progress
Status in linux-gcp-5.19 package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  Invalid
Status in linux-gcp-5.19 source package in Jammy:
  Fix Released
Status in linux-gcp source package in Kinetic:
  In Progress
Status in linux-gcp-5.19 source package in Kinetic:
  Invalid

Bug description:
  GCP is requesting the backport of the patch "6b080c4e815ceba3c08f
  iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support"
  from upstream 6.2 to the 5.19 gcp kernel

  The following two patches are required for the backport:
   6b080c4e815ceba3c08ffa980c858595c07e7 iommu/amd/io-pgtable: Implement 
map_pages io_pgtable_ops callback
   251c4db699ca7b966db7e59e8663a231c96ba iommu/amd/io-pgtable: Implement 
unmap_pages io_pgtable_ops callback

  More info at
  https://canonical.lightning.force.com/lightning/r/Case/5008e00000CjJJCAA3/view

  Impact:
   - This allows the AMD iommu driver to map/unmap multiple pages in one call. 
GCP states that these changes also have a security side-effect which they are 
interested in.

  Testing:
   - Boot-tested the changes in SEV, SEV-SNP and non-SEV environments on AMD 
hardware.

  Regression potential:
   - The changes are limited to the AMD iommu driver. Regression potential 
could impact virtualization on AMD hardware. Risk is considered low as the 
changes are limited and apply cleanly from upstream. The requested patch is 
from 6.2 and there have been no follow-up fixes since.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2023313/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to