This bug was fixed in the package linux-gcp - 5.15.0-1069.77
---------------
linux-gcp (5.15.0-1069.77) jammy; urgency=medium
* jammy/linux-gcp: 5.15.0-1069.77 -proposed tracker (LP: #2078120)
* GVE stuck TX queues (LP: #2077571)
- gve: ignore nonrelevant GSO type bits when processing TSO headers
- gve: Fix an edge case for TSO skb validity check
[ Ubuntu: 5.15.0-122.132 ]
* jammy/linux: 5.15.0-122.132 -proposed tracker (LP: #2078154)
* isolcpus are ignored when using cgroups V2, causing processes to have wrong
affinity (LP: #2076957)
- cgroup/cpuset: Optimize cpuset_attach() on v2
* Jammy update: v5.15.164 upstream stable release (LP: #2076100) //
CVE-2024-41009
- bpf: Fix overrunning reservations in ringbuf
* CVE-2024-39494
- ima: Fix use-after-free on a dentry's dname.name
* CVE-2024-39496
- btrfs: zoned: fix use-after-free due to race with dev replace
* CVE-2024-42160
- f2fs: check validation of fault attrs in f2fs_build_fault_attr()
- f2fs: Add inline to f2fs_build_fault_attr() stub
* CVE-2024-38570
- gfs2: Rename sd_{ glock => kill }_wait
- gfs2: Fix potential glock use-after-free on unmount
* CVE-2024-42228
- drm/amdgpu: Using uninitialized value *size when calling
amdgpu_vce_cs_reloc
* CVE-2024-27012
- netfilter: nf_tables: restore set elements when delete set fails
* CVE-2024-26677
- rxrpc: Fix delayed ACKs to not set the reference serial number
-- Manuel Diewald <[email protected]> Fri, 30 Aug 2024
19:03:36 +0200
** Changed in: linux-gcp (Ubuntu Jammy)
Status: Fix Committed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26677
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-27012
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38570
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-39494
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-39496
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41009
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42160
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42228
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2077571
Title:
GVE stuck TX queues
Status in linux-gcp package in Ubuntu:
Fix Released
Status in linux-gke package in Ubuntu:
New
Status in linux-gkeop package in Ubuntu:
New
Status in linux-gcp source package in Jammy:
Fix Released
Status in linux-gke source package in Jammy:
Fix Committed
Status in linux-gkeop source package in Jammy:
Fix Committed
Status in linux-gcp source package in Noble:
Fix Released
Status in linux-gke source package in Noble:
Fix Committed
Status in linux-gkeop source package in Noble:
Invalid
Bug description:
[Impact]
Request from Google to backport a set of patches to address issues in the GVE
driver.
[Fix]
36e3b949e35964e22b9a57f960660fc599038dd4 (gve: Fix an edge case for TSO skb
validity check)
1b9f756344416e02b41439bf2324b26aa25e141c (gve: ignore nonrelevant GSO type
bits when processing TSO headers)
[Test]
Compile and boot tested.
[Where problems could occur]
Changes are limited to the GVE driver.
[Other info]
#SF 00389911
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2077571/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp