This bug was fixed in the package linux-gcp - 5.15.0-1069.77

---------------
linux-gcp (5.15.0-1069.77) jammy; urgency=medium

  * jammy/linux-gcp: 5.15.0-1069.77 -proposed tracker (LP: #2078120)

  * GVE stuck TX queues (LP: #2077571)
    - gve: ignore nonrelevant GSO type bits when processing TSO headers
    - gve: Fix an edge case for TSO skb validity check

  [ Ubuntu: 5.15.0-122.132 ]

  * jammy/linux: 5.15.0-122.132 -proposed tracker (LP: #2078154)
  * isolcpus are ignored when using cgroups V2, causing processes to have wrong
    affinity (LP: #2076957)
    - cgroup/cpuset: Optimize cpuset_attach() on v2
  * Jammy update: v5.15.164 upstream stable release (LP: #2076100) //
    CVE-2024-41009
    - bpf: Fix overrunning reservations in ringbuf
  * CVE-2024-39494
    - ima: Fix use-after-free on a dentry's dname.name
  * CVE-2024-39496
    - btrfs: zoned: fix use-after-free due to race with dev replace
  * CVE-2024-42160
    - f2fs: check validation of fault attrs in f2fs_build_fault_attr()
    - f2fs: Add inline to f2fs_build_fault_attr() stub
  * CVE-2024-38570
    - gfs2: Rename sd_{ glock => kill }_wait
    - gfs2: Fix potential glock use-after-free on unmount
  * CVE-2024-42228
    - drm/amdgpu: Using uninitialized value *size when calling 
amdgpu_vce_cs_reloc
  * CVE-2024-27012
    - netfilter: nf_tables: restore set elements when delete set fails
  * CVE-2024-26677
    - rxrpc: Fix delayed ACKs to not set the reference serial number

 -- Manuel Diewald <manuel.diew...@canonical.com>  Fri, 30 Aug 2024
19:03:36 +0200

** Changed in: linux-gcp (Ubuntu Jammy)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-26677

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-27012

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38570

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-39494

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-39496

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41009

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42160

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42228

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2077571

Title:
  GVE stuck TX queues

Status in linux-gcp package in Ubuntu:
  Fix Released
Status in linux-gke package in Ubuntu:
  New
Status in linux-gkeop package in Ubuntu:
  New
Status in linux-gcp source package in Jammy:
  Fix Released
Status in linux-gke source package in Jammy:
  Fix Committed
Status in linux-gkeop source package in Jammy:
  Fix Committed
Status in linux-gcp source package in Noble:
  Fix Released
Status in linux-gke source package in Noble:
  Fix Committed
Status in linux-gkeop source package in Noble:
  Invalid

Bug description:
  [Impact]
  Request from Google to backport a set of patches to address issues in the GVE 
driver.

  [Fix]
  36e3b949e35964e22b9a57f960660fc599038dd4 (gve: Fix an edge case for TSO skb 
validity check)
  1b9f756344416e02b41439bf2324b26aa25e141c (gve: ignore nonrelevant GSO type 
bits when processing TSO headers)

  [Test]
  Compile and boot tested.

  [Where problems could occur]
  Changes are limited to the GVE driver.

  [Other info]
  #SF 00389911

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2077571/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to