[Bug 1965589] Re: Impish update: upstream stable patchset 2022-03-18
This bug was fixed in the package linux - 5.13.0-41.46 --- linux (5.13.0-41.46) impish; urgency=medium * impish/linux: 5.13.0-41.46 -proposed tracker (LP: #1969014) * NVMe devices fail to probe due to ACPI power state change (LP: #1942624) - ACPI: power: Rework turning off unused power resources - ACPI: PM: Do not turn off power resources in unknown state * Recent 5.13 kernel has broken KVM support (LP: #1966499) - KVM: Add infrastructure and macro to mark VM as bugged - KVM: x86: Use KVM_BUG/KVM_BUG_ON to handle bugs that are fatal to the VM - KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled * LRMv6: add multi-architecture support (LP: #1968774) - [Packaging] resync dkms-build{,--nvidia-N} * io_uring regression - lost write request (LP: #195) - io-wq: split bounded and unbounded work into separate lists * xfrm interface cannot be changed anymore (LP: #1968591) - xfrm: fix the if_id check in changelink * Use kernel-testing repo from launchpad for ADT tests (LP: #1968016) - [Debian] Use kernel-testing repo from launchpad * vmx_ldtr_test in ubuntu_kvm_unit_tests failed (FAIL: Expected 0 for L1 LDTR selector (got 50)) (LP: #1956315) - KVM: nVMX: Set LDTR to its architecturally defined value on nested VM-Exit * audio from external sound card is distorted (LP: #1966066) - ALSA: usb-audio: Fix packet size calculation regression * Impish update: upstream stable patchset 2022-04-12 (LP: #1968771) - cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug - btrfs: tree-checker: check item_size for inode_item - btrfs: tree-checker: check item_size for dev_item - clk: jz4725b: fix mmc0 clock gating - vhost/vsock: don't check owner in vhost_vsock_stop() while releasing - parisc/unaligned: Fix fldd and fstd unaligned handlers on 32-bit kernel - parisc/unaligned: Fix ldw() and stw() unalignment handlers - KVM: x86/mmu: make apf token non-zero to fix bug - drm/amdgpu: disable MMHUB PG for Picasso - drm/i915: Correctly populate use_sagv_wm for all pipes - sr9700: sanity check for packet length - USB: zaurus: support another broken Zaurus - CDC-NCM: avoid overflow in sanity checking - x86/fpu: Correct pkru/xstate inconsistency - tee: export teedev_open() and teedev_close_context() - optee: use driver internal tee_context for some rpc - ping: remove pr_err from ping_lookup - perf data: Fix double free in perf_session__delete() - bnx2x: fix driver load from initrd - bnxt_en: Fix active FEC reporting to ethtool - hwmon: Handle failure to register sensor with thermal zone correctly - bpf: Do not try bpf_msg_push_data with len 0 - selftests: bpf: Check bpf_msg_push_data return value - bpf: Add schedule points in batch ops - io_uring: add a schedule point in io_add_buffers() - net: __pskb_pull_tail() & pskb_carve_frag_list() drop_monitor friends - tipc: Fix end of loop tests for list_for_each_entry() - gso: do not skip outer ip header in case of ipip and net_failover - openvswitch: Fix setting ipv6 fields causing hw csum failure - drm/edid: Always set RGB444 - net/mlx5e: Fix wrong return value on ioctl EEPROM query failure - net/sched: act_ct: Fix flow table lookup after ct clear or switching zones - net: ll_temac: check the return value of devm_kmalloc() - net: Force inlining of checksum functions in net/checksum.h - nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() - netfilter: nf_tables: fix memory leak during stateful obj update - net/smc: Use a mutex for locking "struct smc_pnettable" - surface: surface3_power: Fix battery readings on batteries without a serial number - udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() - net/mlx5: Fix possible deadlock on rule deletion - net/mlx5: Fix wrong limitation of metadata match on ecpf - net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets - spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() - regmap-irq: Update interrupt clear register for proper reset - RDMA/rtrs-clt: Fix possible double free in error case - RDMA/rtrs-clt: Move free_permit from free_clt to rtrs_clt_close - configfs: fix a race in configfs_{,un}register_subsystem() - RDMA/ib_srp: Fix a deadlock - tracing: Have traceon and traceoff trigger honor the instance - iio: adc: men_z188_adc: Fix a resource leak in an error handling path - iio: adc: ad7124: fix mask used for setting AIN_BUFP & AIN_BUFM bits - iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot - iio: Fix error handling for PM - sc16is7xx: Fix for incorrect data being transmitted - ata: pata_hpt37x: disable primary channel on HPT371 - Revert "USB: serial: ch341: add new Product ID for CH341A" - usb: gadget: rndi
[Bug 1965589] Re: Impish update: upstream stable patchset 2022-03-18
Skipped "net: sched: fix use-after-free in tc_new_tfilter()" as this was already applied for CVE-2022-1055. ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1055 ** Changed in: linux (Ubuntu Impish) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1965589 Title: Impish update: upstream stable patchset 2022-03-18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1965589/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1965589] Re: Impish update: upstream stable patchset 2022-03-18
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + upstream stable patchset 2022-03-18 + from git://git.kernel.org/ -upstream stable patchset 2022-03-18 -from git://git.kernel.org/ + PCI: pciehp: Fix infinite loop in IRQ handler upon power fault + net: ipa: use a bitmap for endpoint replenish_enabled + net: ipa: prevent concurrent replenish + KVM: x86: Forcibly leave nested virt when SMM state is toggled + net/mlx5e: Fix handling of wrong devices during bond netevent + net/mlx5: Use del_timer_sync in fw reset flow of halting poll + net/mlx5: E-Switch, Fix uninitialized variable modact + ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback + net: amd-xgbe: ensure to reset the tx_timer_active flag + net: amd-xgbe: Fix skb data length underflow + fanotify: Fix stale file descriptor in copy_event_to_user() + net: sched: fix use-after-free in tc_new_tfilter() + rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() + cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() + af_packet: fix data-race in packet_setsockopt / packet_setsockopt + tcp: add missing tcp_skb_can_collapse() test in tcp_shift_skb_data() + selftests: mptcp: fix ipv6 routing setup + net/mlx5e: Fix module EEPROM query + net/mlx5: Fix offloading with ESWITCH_IPV4_TTL_MODIFY_ENABLE + net/mlx5e: Don't treat small ceil values as unlimited in HTB offload + i40e: Fix reset path while removing the driver + UBUNTU: upstream stable to v5.10.97, v5.15.20 + UBUNTU: upstream stable to v5.10.98, v5.15.21 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1965589 Title: Impish update: upstream stable patchset 2022-03-18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1965589/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs