This bug was fixed in the package linux-gcp - 5.15.0-1069.77 --------------- linux-gcp (5.15.0-1069.77) jammy; urgency=medium
* jammy/linux-gcp: 5.15.0-1069.77 -proposed tracker (LP: #2078120) * GVE stuck TX queues (LP: #2077571) - gve: ignore nonrelevant GSO type bits when processing TSO headers - gve: Fix an edge case for TSO skb validity check [ Ubuntu: 5.15.0-122.132 ] * jammy/linux: 5.15.0-122.132 -proposed tracker (LP: #2078154) * isolcpus are ignored when using cgroups V2, causing processes to have wrong affinity (LP: #2076957) - cgroup/cpuset: Optimize cpuset_attach() on v2 * Jammy update: v5.15.164 upstream stable release (LP: #2076100) // CVE-2024-41009 - bpf: Fix overrunning reservations in ringbuf * CVE-2024-39494 - ima: Fix use-after-free on a dentry's dname.name * CVE-2024-39496 - btrfs: zoned: fix use-after-free due to race with dev replace * CVE-2024-42160 - f2fs: check validation of fault attrs in f2fs_build_fault_attr() - f2fs: Add inline to f2fs_build_fault_attr() stub * CVE-2024-38570 - gfs2: Rename sd_{ glock => kill }_wait - gfs2: Fix potential glock use-after-free on unmount * CVE-2024-42228 - drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc * CVE-2024-27012 - netfilter: nf_tables: restore set elements when delete set fails * CVE-2024-26677 - rxrpc: Fix delayed ACKs to not set the reference serial number -- Manuel Diewald <manuel.diew...@canonical.com> Fri, 30 Aug 2024 19:03:36 +0200 ** Changed in: linux-gcp (Ubuntu Jammy) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26677 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-27012 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38570 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-39494 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-39496 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41009 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42160 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42228 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-gcp in Ubuntu. https://bugs.launchpad.net/bugs/2077571 Title: GVE stuck TX queues Status in linux-gcp package in Ubuntu: Fix Released Status in linux-gke package in Ubuntu: New Status in linux-gkeop package in Ubuntu: New Status in linux-gcp source package in Jammy: Fix Released Status in linux-gke source package in Jammy: Fix Committed Status in linux-gkeop source package in Jammy: Fix Committed Status in linux-gcp source package in Noble: Fix Released Status in linux-gke source package in Noble: Fix Committed Status in linux-gkeop source package in Noble: Invalid Bug description: [Impact] Request from Google to backport a set of patches to address issues in the GVE driver. [Fix] 36e3b949e35964e22b9a57f960660fc599038dd4 (gve: Fix an edge case for TSO skb validity check) 1b9f756344416e02b41439bf2324b26aa25e141c (gve: ignore nonrelevant GSO type bits when processing TSO headers) [Test] Compile and boot tested. [Where problems could occur] Changes are limited to the GVE driver. [Other info] #SF 00389911 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2077571/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp